MOON
Server: Apache
System: Linux mail.espica.me 5.14.0-611.54.3.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu May 7 16:31:24 EDT 2026 x86_64
User: solaraatech (1010)
PHP: 8.2.31
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //proc/thread-self/root/var/cache/dnf/appstream-updateinfo.solvx
SOLV	`R�P 	0dnf1.01.2˄��.eK�k�o<���Q��Ղ�>0ȩN�IL����x86_64noarchcvebugzillai6863finalpackager@almalinux.orgselfrhsa9:20200406-26.el9_21:7.1.8.1-11.el9.alma2.el9_3.alma4.alma.13.el9_4.alma.14.el9_4.alma.1
8.el9_1.almaModerateImportant6.2.2-7.el9_5.alma.10-1.el92.el9_45.el9_4Copyright 2024 AlmaLinux OS
5 AlmaLinux OS
3 AlmaLinux OSkernel-docCopyright 2026 AlmaLinux OS4.10.0-98.el9_7.134586.el9_6.7kernel-debug-devel-matched	vel-matchedperfkernel-headersrtla8cf767d6rvnodejs2.28-13.el9_6.alma.14.el9_610.5.0-7.el9_5.alma.1webkit2gtk3-develjsc-devel10.0.0-6.2.el9_4.alma.1	6.el9_4.alma.1	el9_4.alma.1Copyright 2022 AlmaLinux OSfirefoxthunderbird9.5.0-7.el9_3.alma.1python3-perf13.3.1-2.2.el9_54.2.1-1.3.el9_5nodejs-docs8.0.13-2.el9_020-3.el97-1.el9_130-1.el9_23.el9_65.el9_71.14-1.module_el9.2.0+24+ca6bd7c227-1.module_el9.3.0+53+44872dd130-1.module_el9.5.0+131+62ecd6872-1.module_el9.5.0+156+9f1cd3fd2.25-1.module_el9.5.0+132+adb0ae7a8-1.module_el9.6.0+165+cf879a7c30-1.module_el9.7.0+205+fe410f103.19-1.module_el9.6.0+166+f262c21c26-1.module_el9.7.0+197+324afee89-1.module_el9.7.0+206+f4fec7f311.5.0-5.el9_5.alma.1firefox-x11python3-devel1:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_08.5.0-7.el9_19.0.0-10.2.el9_25.14.0-70.17.1.el9_0
22.1.el9_017:6.2.0-11.el9_0.37.0.0-13.el9postgresqlython3.11-devellibs17:8.0.0-16.el9_3.alma.12.0-11.el9_4.49.0.0-10.el9_57.2.0-14.el9_2.5.alma.140.7-19.el9npmodejs-full-i18npython-unversioned-command1:1.8.0.342.b07-1.el9_0podman-docker3.79.0-17.el9_190.0-4.el9_36.el9_3nodejs-nodemongolang-docsmiscsrctests15.10-1.module_el9.5.0+126+03d48c9f2-1.module_el9.5.0+140+e3f03d9d4-1.module_el9.6.0+176+c508cfa25-2.module_el9.7.0+203+960b74c07-1.module_el9.7.0+214+91f631df3-1.module_el9.2.0+32+f3c125b55-1.module_el9.3.0+52+217339196-1.module_el9.3.0+55+d62f47798-1.module_el9.4.0+111+667b9e9e6.10-1.module_el9.6.0+174+80cb77f01-1.module_el9.7.0+202+21427d8a3-1.module_el9.7.0+213+65e1da694-1.module_el9.4.0+109+624ac33a8-1.module_el9.5.0+141+f4b0f9b75.15.9-10.el9_41.el9_67.el99.el9python3.12-devellibsruby4.12.2-14.el9_6.1522.el9_7.1nodejs-packaging-bundler1.66.1-2.el9_23:10.11.10-1.module_el9.5.0+135+c9657a87	5-1.module_el9.7.0+199+a988ea015.16-2.el9_0libcurl-develphpnodejs-libspostgresql-contribplperlython3
tclrivate-libsserverupgradeopenssl-devel2.31.1-3.el9_19.1-1.el93-1.el9_243.5-1.el9_47.1-2.el9_63-1.el9_64.12.2-1.el9_5.3dotnet-hostnetstandard-targeting-pack-2.1odejs-devel4.10.0-43.el955.el9_3.2.alma.162.el9
_4.34.alma.1576.el9_5.4.alma.1python3-tkinter1.22.12-5.el9_73.20-1.el9_53-1.el9_7buildah-testspodman-pluginsremotetests1.6.1-20.el9_2.1Lowjava-1.8.0-openjdk-javadoc-zippostgresql-test-rpm-macrosruby-devellibs3:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6
3.el9_74.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_4libtiff-develxml2-devel1.22.12-3.el9golang-binrafanaimp-libsrubygem-rbs1:25.0.2.0.10-1.el9.alma.13.0.9-1.el9.alma.1go-toolsetnginxpython3.11
-tkinter5.14.0-503.38.1.el9_570.16.1.el9_67.1.el9_68.1.el9_69.1.el9_621.1.el9_62.1.el9_63.1.el9_64.1.el9_65.1.el9_66.1.el9_68.1.el9_630.1.el9_62.1.el9_63.2.el9_65.1.el9_67.1.el9_69.1.el9_641.1.el9_62.2.el9_64.1.el9_66.1.el9_69.1.el9_651.1.el9_62.1.el9_65.1.el9_660.1.el9_62.1.el9_6611.11.1.el9_73.1.el9_76.1.el9_720.1.el9_74.1.el9_76.1.el9_77.1.el9_730.1.el9_74.1.el9_75.1.el9_76.1.el9_78.1.el9_741.1.el9_75.1.el9_77.1.el9_79.1.el9_72.el9_75.1.el9_74.1.el9_73.el9_76.el9_75.1.el9_79.1.el9_7tigervnc-icons	license	selinux1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1	8.module_el9.5.0+153+8c633b18.1.alma.14.0-4.module_el9.5.0+154+722f94fd.1.alma.1	5.module_el9.7.0+212+9d3c155a.1.alma.120+47ec8b91.2.alma.12021.06-4.module_el9.1.0+13+d9a595ea:1.26.3-2.module_el9.7.0+215+8d94e91c23+9cd7031b.11:5.9.1-13.el9_4.3	7.el9_7.19.el9expat-develrubygem-bigdecimalio-consolejsonpsych10.0.4-1.el9_7:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.19.0.10-2.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.11.0.10-2.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.12:3.5.25-1.el98.0.10-1.el9_43-2.el9_35-1.el9_47-1.el9_48-1.el9_49.0.0-1.el9_510-1.el9_63-1.el9_55-1.el9_66-1.el9_6nginx-all-modulesfilesystemredis5.14.0-427.13.1.el9_46.1.el9_48.1.el9_420.1.el9_44.1.el9_46.1.el9_48.1.el9_431.1.el9_43.1.el9_45.1.el9_47.1.el9_440.1.el9_42.1.el9_4503.14.1.el9_55.1.el9_56.1.el9_59.1.el9_521.1.el9_52.1.el9_53.2.el9_56.1.el9_531.1.el9_5freerdp-libsgnutls-c++daneevelkrb5-devellibgssoup-develwinprredis-devel1:1.20.1-14.el9_2.1.alma.148.4-2.el9.alma2.4.53-7.el9_1.157-11.el9_4.15.el98.el962-1.el94.el9_6.47.el9_7.3:1.20.1-22.el9_6.2.alma.1
4.el9_7.1.alma.12.alma.13.1.4-143.module_el9.3.0+60+5ebc989a5-145.module_el9.5.0+129+9ba7e8b13.1-2.module_el9.4.0+102+68a938530-5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a25-3.module_el9.4.0+115+226a984bjava-17-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsphp-bcmathcliommondbagevelembeddednchantffipmgdmpintlldapmbstringysqlndodbcpcachepdogsqlrocesssnmpoapxml4.16.1.3-27.el9_3bind-dnssec-doclicensefence-agents-common
ibm-powervsvpc
virshpython3-bindruby-default-gemsgem-bundlerirbminitestpower_assertrake	doc	exml	sstest-unit	ypeprofs-devel1.22.1-2.el93.el9_52-4.el93.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_48-1.el9_522-1.el9_63-2.el9_76.6-1.module_el9.5.0+128+1095dce221.01.0-13.el9	4.el921.el9	3.el9_78.0.14-1.el9_56-1.el9_67-1.el9_621-1.el9_65-1.el9_76-1.el9_79.0.14-1.el9_7aspnetcore-runtime-6.0targeting-pack-6.0dotnet-apphost-pack-6.0hostfxr-6.0runtime-6.0sdk-6.0targeting-pack-6.0emplates-6.0java-1.8.0-openjdk-demovelheadlesssrcpg_repackauditostgres-decoderbufsql-docsprivate-develserver-develtatictestupgrade-develredis-docskopeo-tests1:2.3.3op2-16.el9_2.121.el97.el9_431.el9_53.el9_6.14.el9_7.22:1.20.1-24.el9_7.3.alma.13.5.3-3.module_el9.7.0+187+2286ff0a9.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6aspnetcore-runtime-8.0targeting-pack-8.0dotnet-apphost-pack-8.0hostfxr-8.0runtime-8.0sdk-8.0targeting-pack-8.0emplates-8.0httpd-filesystemmanualpython3.12
-tkintertomcat-admin-webappsdocs-webappel-3.0-apijsp-2.3-apilibservlet-4.0-apiwebapps11.0.6-2.el9_02.37.4-21.el9_732:9.16.23-1.el9_0.11.el9_2.124.el9_3.48.el9_4.1624.el9_5.334.el9_7.125.el9_15.1.21-1.module_el9.1.0+15+94ba28e48.4.6-1.module_el9.6.0+180+a4e757e57-1.module_el9.7.0+194+73a02de88-1.module_el9.7.0+219+aca48cd3ruby-bundled-gems1.18.9-1.el9_19.10-1.el9_23-1.el9_223.6-2.el9_59-1.el9_64.4-1.el9_66-1.el9_65.3-1.el9_75-2.el9_77-1.el9_78-1.el9_71.3.0-1.el95.0-2.el9_4.alma.12.36.7-1.el9_0
1.1238.5-1.el9_2.12340.5-1.el9_3.12.5-1.el94.3-2.el96.1-2.el9_43-1.el9_52.el9_55-1.el9_56-1.el9_52.el9_58.1-1.el9_5
62-1.el9_65-1.el9_650.1-0.el9_61.el9_73-1.el9_74-1.el9_72.3-0.el9_7.13.0.21-37.el940.el9_44:5.32.1-481.el96.0.10-1.el9_08-1.el9_09-1.el9_07.0.0-0.5.rc2.el9_110-1.el9_21-1.el9_22-1.el9_23-1.el9_27-1.el9_29-1.el9_28.0.0-2.el9_31-1.el9_32-2.el9_3golang-racerafana-selinuxmysqltigervnc-server-minimalodule16.6-1.module_el9.5.0+127+50ff03a92:4.2.0-7.el9_15.14.0-162.6.1.el9_1284.11.1.el9_225.1.el9_270.30.1.el9_06.5.1-1.el9_12-6.el9_2.alma.17.12.1-11.el9_7.343.0-13.el9_3cups-develedk2-ovmfglibc-devel1:1.8.0.352.b08-2.el9_0	62.b09-2.el9_1	72.b07-1.el9_1	82.b05-2.el9	92.b08-3.el9402.b06-2.el9	12.b08-2.el9	22.b05-2.el9	32.b06-2.el9	52.b09-2.el9	62.b08-3.el9	72.b08-1.el9.alma.1	82.b08-1.el9.alma.1	92.b09-2.el9.alma.1aspnetcore-runtime-7.0targeting-pack-7.0dotnet-apphost-pack-7.0hostfxr-7.0runtime-7.0sdk-7.0targeting-pack-7.0emplates-7.0nginx-coremod-http-image-filterperlxslt-filter
mailopenssl-perl1.12.0-13.el9_25.el9_1.123.1-3.el9_3.3.alma.16.alma.18.el9_4.34.1-1.el9_5.18.el9_69.el9_65.0-6.el9_7.13.2.3-5.el97.6-12.el9_08.el9_123.el9_3.348.3-10.el9_74.el9_46.el9_6.2mysql-commonerrmsg1.17.12-1.el9_09.9-2.el9_220.11-11.el9	7.el9	9.el924.el9	6.el9	8.el9_631.el9_6	2.el9_7	3.el9_72-1.el9_32.el9_34.el9_31.11-1.el9_43-3.el9_44.el9_49-2.el9_47.0-8.el99.el9:9.0.62-11.el9_2.3	37.el9_3.1287-1.el9_4.12	2.el9_5.1	3.el9_6.13	6.el9_7.12.24.0-2.el9_5.alma.13.0.4-160.el9_07-162.el9_43.el9_56.el9_74.16.4-101.el9	3.el9_17.5-102.el9	3.el9_2.alma8.6-100.el9	1.el9_3.alma.15.14.0-284.18.1.el9_230.1.el9_26.0.13-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.14-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_4aspnetcore-runtime-dbg-8.0bind-chrootdnssec-utilslibsutilscontainernetworking-pluginsdotnet-runtime-dbg-8.0sdk-dbg-8.0fence-agents-compute
kubevirtvirt
d-cpglibvirtmulticastserialtcpghostscript-docit-lfsjava-21-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsnginx-mod-streamosbuild-composer-coreworkerruncsquid1.2.6-2.el9_72.9.4-11.el9_6.1:4.2.0-3.el94.1-3.el96.1-5.el97.el9_35.1.23-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.0-162.12.1.el9_18.1.el9_122.2.el9_13.1.el9_170.26.1.el9_07.76.1-14.el9_0.5apcu-panelglib2-develstreamer1-plugins-bad-freegood-gtklibssh-develpam-develsystemd-develunbound-libs1.0.0-10.el9_1.282.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7020.3-8.el9_5.13.1.5-144.module_el9.4.0+101+d58a8d951.11-2.el9
_6.123-5.1.el9_7
2.el9_7
3.el9_7
el9_72-2.el9_2.125-1.el9_37-1.el9_4.13569-7.el9_5.1232.1-4.el9_4.342-1.el9_74.el9_7.1235-2.el9_5.1239-1.el9_6.1224.31-5.el9gimphttpd-coredeveltoolsjava-11-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsmod_ldapuaproxy_htmlsessionslysql-serverphp-pecl-apcu
-devel	rrd	xdebug3	zipvim-X11commonenhanced141-1.el9.alma.12.0.32-5.el9_442.6-3.el94.el9_46.el9_7.1emacs-filesystemipa-client-commonommonselinuxrver-commondnslibarchive-develpython3-ipaclientlibserverruby-doc12.1.5-1.el9_2.1.alma3.alma.12.5-3.el9_3.2.alma.15.0-1.el9.alma.1_6.23.0.0-1.el9_7.132:9.18.29-1.el9_5.14.el9_6.25.el9_7.248.0.43-1.el9_64-1.el9_75-1.el9_79.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_65-1.el9_7grafana-pcpmariadbopenssh-askpasspam_ssh_agent_authxorg-x11-server-Xdmxephyrnestorgvfbwaylandcommon0.5.4-1.module_el9.1.0+8+503f6fbd1.16.2-19.el9_6.13.5-1.module_el9.1.0+8+503f6fbd6.17-1.el9_70.2-11.el9:22.13.1-1.module_el9.5.0+139+092964915.0-1.module_el9.6.0+164+2d89b8ed6.0-1.module_el9.6.0+170+f035de7822.0-1.module_el9.7.0+208+fb06c0ab4.13.0-1.module_el9.7.0+209+ecf6523e4.1-2.module_el9.7.0+222+ef1c61e17.2-10.el9_41.el9_5.124.el9_6.26.el9_1.18.el9_2.13.0.1-41.el9_02.41-5.el9_7.14-3.el9_7.1:4.9.4-0.1.el98.2.2637-16.el9_0.233.4.8-1.el94:4.9.4-10.el9_4	3.el9_4	6.el9_43.el9_44.el9_45.el9_45.2.2-13.el9_59.el9_55:5.4.0-10.el9_6	2.el9_6	3.el9_66:5.6.0-11.el9_7	4.el9_76.el9_77.el9_79.el9_7flatpak-libsgstreamer1-plugins-base-develiperf3libpng-develvpxxslt-developenexr-libspcp-devellibs-develtestsuiteoppler-cppglibqt5qt5-qtbase
-develexamplesguimysqlodbcpostgresqlrivate-develrubygem-mysql2-docpg-docraccsqlite-develvarnish0.4.31-7.el9_41.0.9-9.el9_712.8-1.el99-1.el9_43.el9_4
58.1-3.el94.el9_4:1.48.10-2.el9_5.alma.1
5.el9_56.16.0-1.el9_07.1-1.el9_08.1-3.el9_19.1-1.el9_2
2.el9_220.1-1.el9_22-3.el9_2
4.el9_3
8.el9_42.0.90-6.el9_17.el919.1-1.el9_650.7-1.el9_2.152-55.el9_7.7.alma.1
9.alma.1:2.11.2-1.el97-1.el9_7.1235674.1-5.el95.15.9-2.el9_7.1autocorr-af	bg	ca
s	da
e
sb	el
n
s	fa
i
r	ga	hr
sb
u	is
t	ja	ko	lb
t	mn	nl	pl
t	ro
u	sk
l
r
v	tr	vi
ro	zhcups-filesystemedk2-aarch64freerdpghostscript-tools-dvipdffontsprintingx11it-allcore-docemailguiinstawebsvnkweblibc-docnutls-utilslibreoffice-dataopensymbol-fontsure-commonperl-Git-SVNython3-lib389qemu-guest-agentimgkvm-audio-pa	block-curlrbd	commonre	device-display-virtio-gpu"-pcivgausb-hostredirect
ocs	tools	ui-egl-headlessopenglpr-helperrubygem-mysql2pg3.14.0-13.el96.el97.el9_76.2-10.20210508.el97.2.11-1.module_el9.6.0+188+92104ce80.996-3.module_el9.6.0+152+8cbce00c.410.0.104-1.el9_71.3.5-1.el9_0.15:2.3.16-11.el9_4.1
5.el9_7.1	7.el92.7.0.20070801-24.module_el9.6.0+152+8cbce00c06.0.108-1.el9_076-2.el9_2.alma8.0.103-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_430-3.el9_02-1.el9_26-1.el9_341-2.el9_5emacs-commonlucidnoxipa-client
-epnsambaserver
-trust-adlibvirt-clientdaemon-config-networkwfilterdriver-interfacenetworkodedevwfilterqemusecrettorage-corediskiscsilogicalmpathrbdscsikvmlibsnssmariadb-backupcommonembedded	rrmsggssapi-serveroqgraph-enginepamserver-galerautilsnginx-mod-developen-vm-tools
-desktopsdmptestrepokey:type:idtoolbox-tests0.30.0-6.el98-22.el9_61.03-481.el91.0-19.module_el9.6.0+152+8cbce00c6.2-2.el93.el9_3.159.3-2.el9_032.9-1.el9_55.4-1.module_el9.4.0+75+1a8fe981:1.12.20-7.el9_12.16.20.2-1.el9_28.12.1-1.module_el9.1.0+16+91bc168f4.2-2.module_el9.2.0+29+de583a0b
3.module_el9.2.0+30+e33124936.1-1.module_el9.2.0+31+cbae0c8e7.1-1.module_el9.2.0+36+853e48f58.2-2.module_el9.2.0+43+3ebc9e209.1-1.module_el9.3.0+59+28b9564420.2-2.module_el9.4.0+99+a01f76764-1.module_el9.4.0+112+bb28ff816-1.module_el9.5.0+136+92f38f3c20.11.1-1.module_el9.3.0+88+29afeaa22.2-2.module_el9.4.0+100+71fc95286.0-1.module_el9.4.0+107+dbd477e48.2-1.module_el9.5.0+137+381f3eaf9.1-1.module_el9.6.0+163+d268fe532-1.module_el9.6.0+169+c9cb05c220.0-1.module_el9.7.0+207+845738102.40-21.el9_7.15.2-9.el9_56.1-8.el9_67.0-10.el9_7:21.11.2-1.el9_13.11-2.el9_5LibRawavahi-glibc-ares-develfrr-selinuxgdk-pixbuf2-develmoduleslib2-docstreamer1-plugins-bad-free-libskeylime-selinuxlibpq-develnet-snmp-agent-libs	devel	libsspr-devels-develsoftokn-develfreebl-develutil-develprotobuf-litewireshark-cli0.40.0-6.el9_31.0.10-6.el9.28-4.el91.34-13.el9_64.el9_7.19.el9_5.128.4-6.el92.0-6.el9_17.el9_22.12-4.el9_646.5-3.el97.0-1.module_el9.3.0+52+217339192.el9_39.7-1.Final.module_el9.3.0+52+217339193.11-1.el96.0-1.module_el9.4.0+66+eb9878bc:6.2.0-13.el92.3.4-28.el94.0-1.Final.module_el9.4.0+66+eb9878bc68.4-11.el94.el9_4.16.el9_6.28.el9_7.127.4-10.el98.el92.0-10.el9_6.122.el9_7.13568.el9_5.233.2.1-10.el934.1-6.el9_17.el9_38.el9_69.el9_75.13-10.el98.el9_16.0-12.el9_73.el9_74.el9_79.14-1.el9_1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9_5.121-1.el9_52.el9_6.125-2.el9_73.el9_7.12389-ds-base-libs4.34.0-17.el9_15.0-4.el9_36.el9_34.0-10.el92.el9_4.13.el9_6.25.el9_7.232.el95.el9_17.el98.el9_26.2.17-1.el9_58-1.el9_620-1.el9_62.el9_77-1.el9aspnetcore-runtime-9.0dbg-9.0targeting-pack-9.0bsdtarcups-clientipptoollpdprinterappdotnet-apphost-pack-9.0hostfxr-9.0runtime-9.0dbg-9.0sdk-9.0aot-9.0dbg-9.0targeting-pack-9.0emplates-9.0frrgit-coreredential-libsecretdaemonsubtreelibc-headerslocale-sourceutilslibreoffice-basecalc
oredrawemailmergefiltersgdb-debug-support
raphicfilter
tk3help-arbgncasdaezelnostufirgluheiruidtjakoltvnblnplt-BRPTrousiklvtarukzh-Hanstimpresslangpack-afrsbgnrcasydaezelnostufairygaluheiruidtjakknoltvmailrnblnrsoorpalt-BRPTrousiklrstvtaehnrsukvexhzh-Hanstumathogltranspdfimport
yunourewiki-publisher
riterx11
sltfilterkitswanmod_http2ysql-libsopen-vm-tools-salt-minionsamba-clientkrb5-printingvfs-iouringwinbind-clientskrb5-locator	exe3.0.1-1.module_el9.2.0+36+853e48f55.32.1-481.el90.7.0-3.20211109gitb79fd91.el91.02-481.el99-481.el901-1.el9.alma.12.el9_4.alma.12.12.0-1.el9_2.alma3.0-2.el9_2.alma4.0-1.el9_2.alma5.0-1.el9_2.alma1-1.el9_2.alma8.0-2.el9_1.alma15.11.0-1.el9_4.alma.13.0-3.el9_4.alma.16.0-1.el9_3.alma7.0-1.el9_3.alma8.0-1.el9_3.alma8-2.el9_5.alma.1.2-1.el9_5.alma.128.10.0-1.el9_5.alma.16.alma.11.0-1.el9_6.alma.12.0-1.el9_6.alma.12.0-1.el9_4.alma.13.0-1.el9_4.alma.132-1.el9.alma.1.2-1.el9_6.alma.12.el9_6.alma.140.10.0-1.el9_7.alma.13.0-1.el9_6.alma.16.0-1.el9_7.alma.17.0-1.el9_7.alma.19.0-1.el9_7.alma.11-1.el9_7.alma.19-3.el9_7.alma.34.el9_7.alma.35.el9_7.alma.32021.06-4.module_el9.3.0+88+29afeaa25.0+139+09296491:8.2.2637-20.el9_11.el92.el9_6.13.el9_7.1233.5.3-2.el9_06.0.109-1.el9_010-1.el9_07.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_28.0.100-2.el9_31-1.el9_32-2.el9_314-1.el9_56-1.el9_67-1.el9_621-1.el9_65-1.el9_76-1.el9_7fence-agents-amt-wspc-snmp
bladecenterrocade
cisco-mdsucs
drac5
eaton-snmpmersonps
heuristics-pingpblade
ibmbladefmiblo-moonshotpssh2ntelmodularpdumilan
lpar
mpath
rhevmsab
sbdcsi
vmware-restsoap
wtilatpak-selinuxgaleralib2-testsvisor-tap-vsockipa-selinux-lunanfastkeylime-baseregistrartenantverifierlibreofficevirt-daemon-commonlockgplugin-lockdroxyopentelemetry-collectorpam-docscp-docgvectorodman-gvproxyython3-jinja2keylimeunbound.11-urllib3qt5-qtbase-commonrsync-daemonsystemd-journal-remoteunbound0.11.0-7.el93.71-11.el9_4	2.el921.1-1.el95.13-14.el9_75-1.module_el9.4.0+75+1a8fe9813.module_el9.7.0+184+e2e360728-15.el920.el91.0.31-8.el923-481.el98.7-11.el9_2.17.el9_45.1-19.el921.el9_52.el9_55.el9_66.el9_64-1.el9:3.0.1-43.el9_0	7.el9_17-16.el9_225.el9_3	7.el9	8.el9_46.el9_22.2-6.el9_5.14.10-4.el9	6.el9	8.el9_7.15.1-4.el9_77.el9_72.1.3-4.el9_12.10-12.el9_0.24.5-8.el9_49.el9_47.0-11.el9_7.3024.3-3.el9_45.5-1.el950-12.el9_1.1
32-32.el9_4.alma.1:2.99.8-3.el9	4.el9_356.23.0.4-1.el9_7.1234540.3-2.el9_6.13.1.1-2.el9_4.15.13.el9_7.125.3-5.el9_66.el9_67.el9_79.el9_79.10-3.el9_04.16.0-8.el9_19.el95.2.5-8.el9_06.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.17.1-10.el9_67.2.10-1.module_el9.6.0+173+efaf92056-1.module_el9.5.0+130+36ae76357-1.module_el9.5.0+134+2e6456008-1.module_el9.6.0+168+b8d8e900binutils-develcompat-openssl11rosynclibups-filters-libsdbus-develflac-libsgstreamer1-plugins-ugly-freeharfbuzz-devel	iculibX11-develxcbpm-develasan8blockdev-cryptodmfskbdloop
vm-dbusmdraid
pathnvdimmmepartswaputilscap-develjpeg-turbo
-develnbdtasn1-develpmswebp-developenjpeg2rpm-ostree-libszziplib1.12-481.el920.1-1.module_el9.1.0+15+94ba28e42.0.3-4.module_el9.4.0+65+49ff6472021.06-4.module_el9.6.0+162+8dc602e53.1.4-1.module_el9.1.0+15+94ba28e46.1-5.el911.2-1.el9_423.1-1.el9_5bind9.18-chroot	dnssec-utils	libs	utilsfence-agents-aliyunlwszure-arm
gce
kdump
openstack
redfishlatpak-session-helpergstreamer1-plugins-base-toolsha-cloud-supportproxylibvirt-client-qemumod_auth_openidcopenexrpcp-confexport-pcp2elasticsearchgraphiteinfluxdbjsonsparkxmlzabbixzabbix-agentgeolocateuiimport-collectl2pcpganglia2pcpiostat2pcpmrtg2pcpsar2pcppmda-activemq
pache	bash
cc
ind2
onding
pftrace	cifssco	dbping
enki
m
ocker
s389log	elasticsearch	farm	gfs2
luster
pfssd	haclusterproxy	infiniband	json	libvirto
msensors
ogger
ustrecomm	mailq
emcache
ic
ongodbunts
ssql
ysql	named
etcheckfilterws
fsclient
ginx
vidia-gpu	openmetrics
vswitch
racle	pdns
erfevent
odmanstfix
gresql	rabbitmq
edissctrl
oomtemp
syslog	samba
endmail
hping
lurm
mart
nmp
ockets
tatsd
ummary
ystemd	trace	unbound	weblog	zimbra
swapselinuxystem-toolszeroconferl-PCP-LogImportSummary	MMV	PMDAoppler-utilsython3-pcptornadoqemu-kvm-block-blkiosudo-python-pluginv8-12.4-develarnish-docs2.27-481.el93.0.1-1.module_el9.5.0+125+8dc388705.15.3-1.el99-1.el9Criticalcockpit-packagekitstoragedfence-agents-nutanix-ahvgo-rpm-templatessrpm-macrosmysql-test-datapostgresql-jdbcython3-protobufrequests+securityocksyajl0.0.99.3-10.el9_2	5.el9	9.el94-6.el9_35-2.el9	5.el92-1.el9_66.2-2.module_el9.6.0+167+4e5611461.0.9-1.el91.6-3.el9_62.22-4.el9_52.3-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.8-1.module_el9.2.0+22+096537932.module_el9.5.0+119+18833d035.1-1.module_el9.6.0+146+c54fdeca7.0-1.module_el9.2.0+22+096537939.7-1.Final.module_el9.2.0+22+096537930.2.6-11.el9_63.el9_64.el9_67.el9_78.el9_79.el9_720.el9_74.el97.el9_59.el9_52.10.0-1.el9_1.alma1.0-2.el9_2.alma4.0-1.el9_0.alma9.0-3.el9_1.alma15.10.0-1.el9_3.alma.12.0-1.el9_4.alma.14.0-2.el9_4.alma.13.1-1.el9_2.alma.14.0-1.el9_2.alma.15.0-1.el9_3.alma.19.1-1.el9_3.alma.128.10.1-1.el9_6.alma.13.0-1.el9_6.alma.14.0-2.el9_6.alma.13.1-2.el9_4.alma.14.0-1.el9_455.1-1.el9_56.0-1.el9_57.0-1.el9_58.0-1.el9_59.0-2.el9_540.4.0-3.el9_6.alma.15.0-1.el9_7.alma.18.0-2.el9_7.alma.1:1.27.0-2.el99.1-1.el931.3-1.el9	2.el9_34-1.el9_35-1.el9_32.14.14-1.el94.53-7.el9_1.157-11.el9_4.1	5.el9	8.el962-1.el9	4.el9_6.4	7.el9_7.35.4-38.el9_7.30.20.2-1.module_el9.7.0+226+88d368703.26.1-1.el9_7.12.0.3-4.module_el9.1.0+15+94ba28e46.0+151+5f31e57685-14.el9_3.15.el99.6-2.el9_6:1.11.2-0.1.el93.3-1.el9	3.el9_3	4.el9_34.3-0.1.el9	2.el9_4	3.el9_45-1.el9_4	2.el9_46.1-1.el98.1-1.el9_6	2.el9_620.0-2.el9_7	3.el9_733.10-1.el9_46-2.el97-1.el9_4	2.el9_4	3.el9_4	4.el9_49-1.el9_47.2-1.el95-1.el9_56-1.el9_59.4-1.el9_6	2.el9_641.6-1.el9_78-1.el9_7	2.el9_7	3.el9_79.2-1.el92.99.8-4.el9_63.2.2-2.module_el9.4.0+65+49ff64723.1-1.module_el9.6.0+151+5f31e57666-10.el9_62.el9_689-ds-base-snmp5.72-2.el96.0.113-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_41.0-2.module_el9.6.0+151+5f31e576:0.8.5-2.el9_67.0.114-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.6-2.el9_77-1.el9_719.2.10-16.el9_4.alma.17.el9_49.el9_41.13.0-1.el9_0.almaavahi-toolsbind-dyndb-ldapdelvensmasq-utilsovecot-mysqlpgsql	igeonholego-filesystemrpm-macrosimage-builderpa-client-encrypted-dnsserver-encrypted-dnsluamariadb-develembedded-develtestecab-develipadic-EUCJPysql-develtestnet-snmp-perl	utilsss-sysinittoolsphp-pecl-redis6ython3-net-snmprapidjson-develweldr-clientireshark0.10.4-11.el93.el95.el9_677.el9_720.2-6.el91.1-2.el9_75.11-143.module_el9.3.0+60+5ebc989a	5.module_el9.5.0+129+9ba7e8b16.1-13.el9_2.alma7.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a29.1-3.20211126git1ff6fe1f43.el9_25.20211126git1ff6fe1f43.el9_69.9-5.el91.0.8-10.el9_510.0-11.el93-481.el97.1-5.el9_2.19.1-1.el92.el9_44.el9_12.0-11.el90.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_62.1-2.el9_34.el92-4.el9_73.3-10.el9_2.148.2-5.el95.30-14.el9_7.14-2.module_el9.7.0+245+447713a27.3-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a29.0-10.el9_77.el9_2.alma.18.el9_59.el9_6:0.9.72-5.el91.1.1k-5.el9_6.17.142.0-2.el9_42.0.7-6.el90.20.2-1.module_el9.7.0+224+0af7cc6b2.0.15-32.el9_520-2.module_el9.2.0+29+de583a0b6-4.el9_31.0-22.el90.4-9.el935.2-42.el967.el9_7.14.0-7.el98.el99-1.el9_1.18-10.el9_7.19.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_67.16.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b17.0-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b11-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b2-5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a29.13-10.el9_61.el9_62.el9_64.el9_73.el9_1
2.15.el9_36.el9_4
5.12:1.6.37-12.el9_7.12343.0.1-1.module_el9.3.0+47+c33bc2881.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a29-2.el9_67.14.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a29-10.el9_2.alma3.el9
_5.14.el9_7.14.0.2-11.el9_74-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15.1.2-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a22.1-9.el9_7.14.0-5.el97.76.1-19.el9
_1.1223.el9
_2.1246.el9
_3.239.el9_4.135.el9_7.38.3.1-11.el9_3.2.alma.1alma.15.el9_2.2.alma5.3-4.el9OpenIPMI-lanserv
ibsPackageKit-glibapr-develutil-bdb	develbrotli-develzip2-develcapstonejoseyrus-imapd-libse2fsprogs-develfreeglut-develipmitype-develibidi-develgcc-toolset-13-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel
4-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel
5-binutils-develiflibmp-c++develstreamer1
-develrtsp-servertk3-devellassoibasanblkid-develcom_err-develfastjsongccjit	-develrypt-develicu-develnputtm-develjoselouismicrohttpdount-develpng15qbuadmath-develrabbitmqsvg2-develsndfiletdc++-develubsandisks2uid-develvldpd-develmotif-develpg123-libsunge-libsncurses-c++-libsdevelorc-develperl-devellibsixman-develmix-develpmiqt5-qt3d-develrapidjson-doctor2epokey:type:strpm-develust-std-staticspeextbb-develexlive-libusbguardwavpackxz-develyelp-libs0.03-481.el94.8-7.el9_76.2-1.module_el9.5.0+120+4533eb201.0.2-2.el95-481.el96-481.el97-481.el91.0-3.el91-481.el92431-481.el97-481.el94.8-2.module_el9.5.0+120+4533eb205.1-1.module_el9.5.0+127+50ff03a92.25.1-10.el9_67.el9_29.el9021.06-4.module_el9.3.0+48+1cf146a15.module_el9.7.0+207+845738106.module_el9.7.0+226+88d3687030524-3.el9	4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.32.3.1-4.el96.4.20-1.module_el9.5.0+135+c9657a873.12.33-160.el9_0	2.el9_4	3.el9_5	6.el9_75-3.el9_7.23.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95	5.module_el9.5.0+129+9ba7e8b15.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a29-2.module_el9.4.0+102+68a9385344-2.el9_75.74-481.el965.5.1-2.el9_4.14.el9_68.234904002024040318301350020241004143704600202503171508331939NetworkManager-cloud-setuponfig-connectivity-redhatdispatcher-routing-rulesovspppbpftoolcloud-initockpit-pcpups-filtersdbus-daemonx11pdk-develoctoolsfreeradius
-develockrb5ldaputilsgnupg2-smimeidm-pki-acmebasecaestjavakraservertoolsputils-ninfodjava-25-openjdk-crypto-adapterdemovelheadlessjavadoc-zipmodssrctatic-libskernel-abi-stablelistscoreross-headersdebug-core
modules-extramodules-extratools-libs-devellibX11-commonblockdev-plugins-alltoolsguestfs-winsupportjpeg-turbo-utilsnbd-bash-completiontasn1-toolssan2mod_jkproxy_clusteruttnbdfusepki-jackson-databindostgis-clientdocsupgrade	tilsython3-blockdevfreeradiusidm-pkijwcryptolibnbd.11-setuptools-wheel	2-cryptographysetuptoolsurllib3qemu-kvm-device-display-virtio-gpu-gl#pci-glvga-glt5-rpm-macrossrpm-macrosrpm-ostreesync-rrsyncsssd-idpysstattemd-boot-unsignedukifyv8-13.6-develalkey-develim-filesystemminimalxterm-resizezziplib-utils2021.06-4.module_el9.5.0+124+df88fe4936+92f38f3c6.module_el9.7.0+198+8bf605ba209+ecf6523e3.0.1-1.module_el9.5.0+136+92f38f3c9+092964913-3.module_el9.7.0+209+ecf6523erepokey:type:flexarray0.10.4-5.29.el9_2	30.el9_2
4.el9_3.3
8.el9_4.14	45.el9
7.el9_7.alma.1
8.el9_7.alma.1
9.el9_7.alma.127.0-1.el9_62.el9_635.0-2.el9_73.el9_744.0-1.el9_76-103.el9_6.2.0-1.el99-481.el92.2-2.el97-3.el93-481.el95.11-144.module_el9.4.0+101+d58a8d957-160.el9_02.el9_43.el9_56.el9_765-481.el91.15-481.el9.19-3.el9_1.55.el9_3.16-481.el98-481.el99.9-1.el9_22.10-2.el91-32.el9_049-1.el9_450-1.el9_4.10-481.el91.1-8.el9_424.1-2.el9_55.2-1.el9_72.el9_767-1.el9_78-481.el93.20-1.el9_42-1.el9_6.10-481.el9401-481.el94.8-1.module_el9.3.0+52+217339194.0+66+eb9878bc3-481.el97-481.el98-481.el97.4.1-6.el9_6.18.10-2.el9.alma0-481.el99.5p2-10.el9_36.1	5.el9_77.el9_1.14-481.el90.112.10.0-2.el9_1.alma1.0-1.el9_2.alma3.0-3.el9_0.alma6.el9_0.alma7.el9_0.alma5.0-1.el9_1.alma2.el9_1.alma6.0-1.el9_1.alma2.el9_1.alma7.0-1.el9_1.alma1-1.el9_1.alma2.el9_1.alma9.0-1.el9_1.alma1.9-10.el9_4.alma.18.el9_3.3.alma.19.el9_4.alma.15-6.el9_1.10.0-2.el9_3.alma.12.1-1.el9_4.alma.14.0-1.el9_4.alma.13.1-1.el9_2.alma4.1-1.el9_2.alma5.0-1.el9_3.alma9.0-1.el9_3.alma.12.5.4-5.el97.el98.13.0-3.el9_6.alma.14.0-3.el9_6.alma.13.1-1.el9_4.alma.14.0-1.el9_4.alma.15.alma.15.0-1.el9_5.alma.16.0-3.el9_5.alma.17.0-1.el9_5.alma.18.0-2.el9_5.alma.19.0-2.el9_5.alma.12-1.el9_5.alma.14-2.el90.4.0-2.el9_6.alma.18.0-1.el9_7.alma.1:4.99.0-9.el9:0.79-8.1.el9_61.2.0-1.el93.0-4.el96.el9_34.0-2.el9_43.el9_44.el9_45.el9_46.el9_45.1-2.el96.2-2.el9_67.1-3.el9_70.2.4-1.18.19.1.1.module_el9.3.0+59+28b9564420.11.1.1.module_el9.3.0+88+29afeaa25.0-1.18.20.2.2.module_el9.4.0+99+a01f767620.12.2.2.module_el9.4.0+100+71fc95287.0-1.18.20.4.1.module_el9.4.0+112+bb28ff818.1-1.20.16.0.1.module_el9.4.0+107+dbd477e42-1.18.20.6.1.module_el9.5.0+136+92f38f3c20.18.2.1.module_el9.5.0+137+381f3eaf9.1.1.module_el9.6.0+163+d268fe532.1.module_el9.6.0+169+c9cb05c220.0.1.module_el9.7.0+207+845738102.1.module_el9.7.0+224+0af7cc6b9.2-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de784-1.22.22.0.1.module_el9.7.0+208+fb06c0ab2.4.26-1.el9_7.18.11.0-1.16.16.0.1.el9_05.0-1.16.17.1.1.el9_09.2-1.16.18.1.3.el9_18.12.1.1.module_el9.1.0+16+91bc168f3-1.16.19.1.1.el9_22.el9_24-1.16.20.1.1.el9_22.1.el9_23.el9_24.el9_38.el9_49.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b3.module_el9.2.0+30+e33124931-1.18.16.1.1.module_el9.2.0+31+cbae0c8e6.7-1.18.17.1.1.module_el9.2.0+36+853e48f58.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e202.0.26-1.el92.el9_4.14.el9_6.11.0-21.el94.0-1.el92.10-12.el9_0.38-4.el9_53.3-2.el9_05.el9_74.10-1.el9_6.127-3.el9_1.222-1.el93.el9_39.4-4.el91-3.el96-9.1.el9_75.1-160.el9_02.el9_43.el9_56.el9_76-21.el9_3.alma.1-144.module_el9.4.0+101+d58a8d957.0-144.module_el9.4.0+101+d58a8d958.14-1.el9_7.19.4-6.el9_47-4.el9_7.10210202-11.el9_6.131.1.3-3.el97.el92.1.9-2.el95.el93.2.7-1.el93.el9_64.el9_65.el9_76.el9_746.4.14-1.el9_2.alma.120-1.el9_52-1.el9_6:1.14.0-1.el92.1.7-1.el9_23.0.0-160.el9_02.el9_43.el9_56.el9_75-6.el9_7.21.1-144.module_el9.4.0+101+d58a8d952-4.el9_32.0-1.el92.el9_33.el93.2-160.el9_02.el9_43.el9_56.el9_74.1-2.el9_44.el9_455.3-4.el96.1-1.el92.el9_64.el9_77.el9_78.el9_7
.11-2.el9_73.el9_74.el9_75.12-4.el9_65-4.el99-1.el97.0.2-6.el9:12.4.254.21-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de7822.0.1.module_el9.7.0+208+fb06c0ab3.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e4.1.2.module_el9.7.0+222+ef1c61e14.0.4-144.module_el9.4.0+101+d58a8d9512-1.el9
_3.1.alma.12.el9_4.1
alma.16.5-3.el99-2.el9_24.el9_20.0-11.el9_610-21.el91.0.7-2.el9_6.1:1.1.12-1.el9_3	2.el9	3.el9_4	4.el9_43-4.el94-1.el99-1.el92.el9_32.5-3.el9_63.0-4.el9_74.0-2.el9_75.1.1-1.el91.el9_62.el9_73.el9_72.el9_3.alma.14.alma.13.el9_49.el9_54.2-4.el9_0.34-2.el9_13.el9:2.2.6-1.el92.el96.1.0-9.el94.2-1.el9_52.el9_6.25.5-1.el9_7.1:0.7.3-3.el9_4.alma.14.el9_4.alma.15.el9_4.alma.18.5-1.el9_57.5.11-5.el9_05-3.el9:5.2-1.el9_0.125-13.el9_44.el9_5.322.el9_7.145.el9_2.16.el9_3.12588.2.2-4.el97p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.18.el9_7.alma.19.el9_7.alma.19.0.9-2.el93.el9_2.alma4.el9_2.alma.12-1.el92.el9_2.10-7.el9_3.alma.18.el9_3.alma.10500202502040937111404284360020251030145517700202602171315211.11.0-2.el9_0.alma2.0-2.el9_0.almaNetworkManager-libreswan-gnomePackageKit
-command-not-foundgstreamer-plugintk3-moduleaardvark-dnsidensible-coretestpr-util-ldap	mysql	odbc
penssl	pgsql	sqlitespnetcore-runtime-10.0dbg-10.0targeting-pack-10.0vahi-autoipdbcc-toolsluez-cupsobexdootcupdpftraceutanecargolippyonmonpprunurl-minimalyrus-imapd-utilsdotnet-apphost-pack-10.0hostfxr-10.0runtime-10.0dbg-10.0sdk-10.06.0-source-built-artifactsaot-10.0dbg-10.0targeting-pack-10.0emplates-10.0expatfreeipmi-bmc-watchdog	ipmidetectd
seldwupd-plugin-flashromgcc-c++gfortranoffload-nvptxplugin-annobintoolset-13-binutils-goldgcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx
4-binutils-goldprofnggcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx
5-binutils-goldprofngdb-gdbserverheadlessminimalnome-remote-desktopshellpsd-minimal-clientstk-update-icon-cache3-immodule-ximuestfs-toolsvisor-tap-vsock-gvforwardericugnitionjava-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebug1-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug7-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebugosekeepalivedylime-agent-rustlibarchivebpf-toolscurl-minimalgomp-offload-nvptxuestfs
-appliancerescuesyncxfsinput-devel	utilslsanrabbitmq-toolssvg2-toolssndfile-utilstdc++-docstsanvirt-ssh-proxymingw-binutils-genericod_mdsecurity-mlogcpg123-plugins-pulseaudioungenfs-utils-coreosv4-client-utilsoci-seccomp-bpf-hookpenssl-libsrc-compilersbuild-composer-dnf-jsonpcp-export-pcp2openmetricspmda-uwsgierl-BCyrusDevel-PeekynaLoaderErrnoFCGIcntlile-DosGlobGDBM_FileHash-Util-FieldHashI18N-LanginfoONDBM_FileODBM_FilepcodePOSIXSys-Guestfs	HostnameTime-PieceXML-Parserinterpreterlibmrophsignki-symkeytoolsmix-toolsodman-catatonitstfix-cdbldap	mdbmysqlpcre	erl-scripts	gsqlsqliteython3-brotlilasso	ibguestfsmount	xmltbb.11-cryptographyqatzip-libst5-qt3d-examplesrearpm-buildplugin-fapolicydimasyslogtemd-inhibitust-analysis
zerdoctoolsetfmtsocatwtpm-libstoolsystem-reinstall-bootctangbb-doccpdumpexlive-bibtexdvipdfmxngssvgmfontwaregsftopkkpathsealuahbtextexmakeindex	etafontpost	fwarepdftextex4htxdvi	etexracker-minersudisks2-iscsilsm	vm2nbound-dracutsbguard-dbus	notifier	toolsuiddvirt-v2vsftpdwgetxz-lzma-compatyelpzlib-devel0.02-481.el94-481.el96-481.el976-461.el913-481.el95.2-160.el9_0	2.el9_4	3.el9_5	6.el9_72.9-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_56.el9_71.3-143.module_el9.3.0+60+5ebc989a	4.module_el9.4.0+101+d58a8d95	5.module_el9.5.0+129+9ba7e8b19-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a25-481.el93.0-2.module_el9.4.0+102+68a938531-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a241.2-3.el9_7.14-481.el960.800-481.el96-481.el97-481.el975-481.el98-5.el9_41.0.0-9.el9_71-481.el94-481.el98-481.el91-481.el9.3-13.el9_64-6.el90-481.el90.600-481.el91.0-2.module_el9.4.0+102+68a938533.1-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a27-481.el92.0-160.el9_01-162.el9_43.el9_56.el9_71-481.el95-481.el96-481.el9.12-2.el9
_5.125.el9_7.18-2.el9_5.19-1.el9_7.13.5-160.el9_02.el9_43.el9_56.el9_75-481.el94.0-160.el9_02.el9_43.el9_56.el9_71-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b103-481.el95.6-2.el91-481.el96-481.el99-481.el97044-14.1.el9_53.0.3-160.el9_0	2.el9_4	3.el9_5	6.el9_76-143.module_el9.3.0+60+5ebc989a	4.module_el9.4.0+101+d58a8d95	5.module_el9.5.0+129+9ba7e8b11.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a2:0.08-481.el921-481.el911.11.0-1.24.14.1.2.module_el9.7.0+222+ef1c61e16.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e2.0.1-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b19-1.el9_020-1.module_el9.1.0+16+91bc168f2.el9_13-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a23-481.el94-481.el911.3-5.el96.el97.el9_58.el9_53-481.el94.1-2.el92.33-160.el9_0	2.el9_4	3.el9_5	6.el9_79-3.el93.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95	5.module_el9.5.0+129+9ba7e8b14-481.el941-481.el95.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a29-2.module_el9.4.0+102+68a9385385-481.el9021.06-5.module_el9.7.0+196+ac40ca3b208+fb06c0ab21207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_51.2.3-7.el93.1.1-11.el9.alma.14.4-4.el9_6.3.alma.13.0.1-1.module_el9.6.0+172+f0ba00ec5-481.el92.3-18.el920.el9_5.15-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_56.el9_76-2.module_el9.4.0+102+68a938533.6-3.module_el9.4.0+115+226a984b7-160.el9_02.el9_43.el9_56.el9_74.4-5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a25.3-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b16.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a24.6-481.el92.2.18-6.el9_127-1.el98-1.el9_35.14.2-160.el9_0	2.el9_4	3.el9_5	6.el9_75.0-143.module_el9.3.0+60+5ebc989a	4.module_el9.4.0+101+d58a8d95	5.module_el9.5.0+129+9ba7e8b120.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a239-16.el96.3.3-160.el9_04.1-162.el9_4
3.el9_5
6.el9_74.0-143.module_el9.3.0+60+5ebc989a1-9.el9_1.1-144.module_el9.4.0+101+d58a8d95
5.module_el9.5.0+129+9ba7e8b16.3.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791666.module_el9.7.0+245+447713a28.2.2-3.el9_4.15.el9_6bcelgdb-docnome-classic-sessionshell-extension-apps-menuuto-move-windowsclassification-bannerommonustom-menudash-to-dockpanelesktop-iconsrive-menugesture-inhibitorheads-up-displaylaunch-new-instancenative-window-placementpanel-favoriteslaces-menuscreenshot-window-sizerystemMonitortop-iconsupdates-dialogser-themewindow-listsNavigatororkspace-indicatorlibguestfs-bash-completioninspect-iconsncurses-termosbuild-depsolve-dnfluks2	vm2ostreeselinuxperl-App-cpanminusttribute-HandlersutoLoader	SplitBenchmarkCPANlass-Structonfig-ExtensionsDBM_Filterevel-SelfStubberirHandleumpvalueEnglishxtUtils-ConstantEmbedMiniperlFile-Basename
Comparepy
Find
stat	Cache	HandlendBinGetopt-StdHTTP-TinyI18N-Collate
LangTagsPC-Open3Locale-Maketext-SimpleMath-Complexemoizeodule-LoadedNEXTetPod-Functions	HtmlSafeearch-DictlectSaverfLoaderymbolTerm-Complete
ReadLinestxt-Abbrevhread-Semaphoreie-File	MemoizemeUnicode-UCDser-pwentautousebaselibdebuggerprecateiagnosticsocencoding-warningsfieldsletestiflessibnetcfgocalemacroseta-notationopenverload
ingsigtraportubsutilsvarsmsishki-acmebase-javacajackson-annotationscorejaxrs-json-providerprovidersmodule-jaxb-annotationskraserverython3-bccfile-magickdcproxylouismakoosbuildpip	ki	yasn1-modules.11-PyMySQL+rsapip-wheel	2-PyMySQL+rsawheelrpm-apidocscronust-debugger-commongdblldbsrctd-static-wasm32-unknown-unknownwasitexlive-adjustbox	e	lgorithms
phalph	msclsfontsmath	nyfontsizesize	ppendix	rabxetex
phic	tbegshi
tachfile2
veryend	uxhook	vantgar	wesomeboxbabel
-english
bib
se	eamer
ra
ton	ibtopic
di
gfootintcalc
tset	ookmanrktabs	reakurlqncapt-ofion
rlisle
tchfile	hangebarpagerter
ngcntr	ite	jk	lasspack	m
-lgcsuper
ap
extra	ns	ollectboxion-basicfontsrecommendedhtmlxmllatexrecommendedxetexorprofiles
tbl
ntext
urier	rop	squotes	tablestack	urrfiledatetime	ehyphec	epic	nctex
umitem
viron	psftopdf-pkg	qparbox	so-pic	tex-pkgcmds
ocolbox	uenc
ler
rosym	xtsizesfancybox
hdr
ref
vrb	ilecontentshook
nstrut
x2collatvian	loat	mtcount	ncychap	ontawesomebooks-tlwg
pecwrap
otmiscnotehyper	p
l	ramedgaruda-c90	eometry
ttitlestring	lyphlist	raphics-cfgdef
fextfilehanging	elvetic	obsub
logo	ycolor
perrefh-utf8en-baseatexifmtarg
oddpage
platform
tex	mport	ndex
fwarerr
tcalcjadetex	knapltxkastrup	erkis	nuth-libocal	oma-script	vdefinekeys
options
setkeysl3backend
experimental
kernel
packages	astpage
tex
-fonts
2man
bug
config	etltxmacrotrine	inegoalno
stingsofitems	m
-math	tabptch
xcmdsmisc	ua-alt-getoptlatex-mathibsotfloadtex85base	warpmakecmds
nfnt-font
rginnotevosym
thpazospectools	dwtools	emoir
talogo	flogo-font
nfss	icrotype
nitoc	nsymbol	odes	parhack
topdf	s	ultido
rownatbib	cctools
ntrsbk	eedspace
wfloatunicodechar	orasi-c90
toccite	tgclassoberdiek
solete	verpicpalatino
ralist
lelskip
ssivetex	dfcolmkescapelscapepagestexcmds	gf	hilokalia	laceinsin	olyglossia
werdot	reprint	sfrag
latex
nfss
picture
t-3darrowblurcoilepsfillgradmathnodeplotslpetext
ools
reericks-add	text	xfontsqstestragged2e	cs	ealscripts
fcount
runfilecheck	sfssansmathaccent
uerj	cheme-basic	ectionsty
minar
pnum
tspace	howexpl	oul	tackengine
maryrd
ringenc	ubfigure	vn-prov	ymbolt2	abulary	ex-gyre-mathini-fileslive-common-docdocindexenmsg-translationsscripts-extra.infratcasepos	hreeparttable
umbpdf	imes
pa
tlesecing	ocloft
ols	ranslator
imspaces	xfonts	ype1cmhtmlucharcatlasses
s	hc	lem	nderscore
icode-datamathquecountersugar	pdmap-map
quote	rl	topiavarwidthwadalab
sy-type1sym	rapfigxcolor	ecjkoloryr
index
persian
search
tex-itranspstrickstibetan
config
fontinfo	ifthen	keyval	ltxtra	mltexconfig	string	tab	unicodezapfchanding	refuned-gtkppdrofiles-atomicmssqloraclepostgresqlspectrumscaleutilsusbguard-selinuxvirt-v2v-bash-completionwin-regxdg-utils901002022120713184520020230413133347537
511122142
623091417
802112332
927094557	1019054835261116023002023122112104840124164610
227081546
402085113
114627906462740020240403183139
5101753126053207
60610363063337
82612492781343369130124
9030745541909074450020241004144219
113054853
20414452361405238331206590850127065635
21404303721080435
328124628928
42819310660020250318115828
5131505158374095852
604050441617
729092450
91714314070020250925080448	121108402550939066021712463730349
30408573211090120
40803501010072346patch:ALBA-2022:82565:20841SA-2022:49405242495276348252769570916366799904428600343157657422435852185905602103470017638389549136399700713207117828831482369950458967870898003811225476278708906810012263951629472078192126502637919317405361844314449356180637438329065803:00052177194202108253023418218334567894383476608112281024903465134786570106781413376840770592670936701386809798090918207481276125677799320241622346489536789601823933129264057667703841744538788751923327082621633455034531437850245318423325597781567992566171145223923484030576047199158778201325730149504774112629956971634424838955850486971801941436942001424313634345536962532968497081133844953635849679246960771206788912426656324304013663589712805402392093146973482924675081823435942495166970589366315435961779948970732844587253577746550177112547534623456845914:0001102571108415126249656731087463567475335760237057908057114895012637710090218447438447259027025878918586099394950788311112232193842509301494127869503091034764273686285935012330766889175089818225872990840632033557911926325745675696097080493920481137283694566472688799025830233748536687787944103384763504124895019602456897016167972458798423538389103306739619687175482036730145784239559994002507788316521278312497189422395075002637873836234726495567612676986192835513892231793223463925293383693815928999602014676367984678992457356464510296768137265478358489134679771362046034645750550286799588025379110127214762803744467563617788072693800914359051889937811452283564450867801457890234520043778130617253137140451349501246789687023454138523459605258275:005980146761210308122434774226578667739237919124722351007213648899635379550631676998374862773114033541162374884961992200883100872804475196274683143009304286507860273782935624075130814162036936408276278983500710189239942960861700408879006046861081635639859701818070843778412835587426080971495152758132181521491135237345409895849273050203551883890922683564355456789601311101392558046269370281591626682005111753764056607908653034496387109114221041309235636423480359700293944856919500627689798649931072612344406531566173144571373833455259374025169229446344360889166978769779370495067767941079183847603578201412356309137879957402491078922356789301235678404586986007289390337958049126364283293333746787660735435582813737916908010618434575062843023627964301244862526634587780978A00256:005212637238473124223745587091236059467197193914234783236101352267083945577488994913609884350410227131094413381506596701377781579177840891020097389181958879295716172064824802893099038133920428212624707922768123699920303144066795189291833794015940588507166386873053839429692840664110658737882163544575467275982898508059960240930426004153882668563001408239046257062176692370022593435084671989691580752594579695108415988921904468369923A00259repokey:type:relidarray
numsitory:solvablessolvable:arch	buildtime	conflicts	description	evr	name	patchcategory
rovides	summary	vendorupdate:collection:archevrfilenamenamelistmodule
:archcontextnamestreamversionreference:hrefidtitleypeightsseveritytatus�	�
�
�
�[�[�Z�Zl�T�d�[�e�[�b�]�c�]�b�c�c�c�d�`�e�`�W�W�U�U�V�V�T�T�S�S�B�B�C�C�o�J�p�J�s�M�t�M�u��v��
��w��x��Y�Y�L�L�K�	�L��y�	�z�	�{��|��q�K�r�K������������l�P�I�I�i�i�q�(�r�(l�H�b�p�c�p�d�o�e�o��l��l�9�9�
��u��v��o�j�p�j�s�N�t�N�w��x�l�o�	�z�L��{��|���f�	�f��n��n��m��m������P��P��I��I��P��P��I��I�|��
�{�o�k�p�k�
��w��x��q�)�r�)�s�P�t�P�u��v���a��a�����������A�A�@�@���
�
���M�M�	�	���x�x��X�X�Y�Y�Z�Z�"�"������p�p((�t�t�m�m##�l�l�u�u%%&&�E�E$$�o�o�i�i�q�q''�s�s�r�r;;�k�k�n�n�n�n�*�*�f�f�V�V�y�y�V�x�x�:�:�2�2�A�A���0�0�;�;���8�8�>�>�3�3�9�9�6�6�1�1�<�<���5�5�@�@�=�=�?�?�4�4�7�799�{�{�L�L�Q�Q�[�[�K�K�R�R�I�I�Z�Z�S�S�G�G�V�V�Y�Y�J�J�E�E�O�O�P�P�U�U�F�F�X�X�\�\�W�W�T�T�H�H�D�D�K�K�N�N�F�F�X�X�V�V�T�T�E�E�W�W�M�M�J�J�I�I�U�U�L�L�H�H�G�G�I�I�]�]�j�j�������f�f�_�_���`�`�b�b�e�e�^�^�d�d���i�i���c�c�����g�g�a�a���h�h88�T�T�H�H�G�G���������
�
�������������������	�	�������������
�
�����������|�|���������~�~�����~�~�}�}�����M�M���R�R�O�O�P�P�"�"�L�L�S�S�Q�Q�!�!�N�N���p�p�q�q���������������;�;�:�:�;������������:�R�R�V�V����dd��,,ee��U�U112200331032�^�^�[�[�]�]�Z�Z�\�\�b�b�b�a�a�a�)�)�c�c�c�z�z�+�+QQ�,�,�-�-�}�}���3�3�4�4�M�M�1�1�2�2�d�d�c�c�v�v�u�u�w�w�;�;�s�s�t�t�#�#�A�A�u�u�L�L�M�M�L�M�J�J�?�?�J����x�x�s�s�i�i�g�g�w�w�k�k�y�y�r�r�v�v�h�h�m�m�f�f�u�u�j�j�{�{�o�o�p�p�q�q�l�l�t�t�n�n�z�z�0�0�/�/�/�/�.�.�.�/�P�P����U�U�M�M�N�N�O�O�C�C�P�P�A�A�@�@�Q�Q�B�B�s�s�r�r�%�%�%�z�z�i�
�
���R�R�Q�Q�P�P�9�9�D�D����@�@�@�H�H�A�A�?�?�?�B�B�A�B�����D�D�C�C�C�D�F�F�F�v�v�u�u�w�w�t�t�����������������=�=�~�~�^�^�N�N�K�K�L�L�N�N�O�O�Q�Q�S�S�P�P�R�R�-�-�-Q�)�)�)�P�P�P�'�'�(�(�'�(�/�/�y�y�~�~�w�w�z�z�{�{�}�}�|�|�x�x�>�>�O�O�@�@�?�?�A�A�B�B�d�d�d�N�N�P�P�P�#�#�L�L�s�s�q�q����r�r�P�P�'�'�?�?�@�@�.�.���a�a�H�H�4�4���T�T�n�n�Q�Q�~�~�G�G�K�K���2�2�B�B�t�t�
�
�
�
�!�!�F�F���v�v���\�\�I�I���W�W�Y�Y�<�<�h�h�"�"�r�r�N�N�y�y�+�+�M�M�q�q���/�/�$�$�_�_�8�8�I�I���*�*�Z�Z�E�E�(�(�f�f�d�d�1�1�������k�k�6�6���V�V�F�F� � ���j�j���l�l�b�b�`�`�&�&�c�c�e�e�{�{�X�X���E�E���]�]���[�[�)�)���g�g�,�,�:�:�o�o�����u�u���G�G�-�-�H�H�U�U�i�i�7�7�>�>�=�=�����|�|�	�	���3�3�^�^���w�w���C�C�R�R�O�O�p�p�}�}���0�0�%�%���9�9�B�B�C�C�x�x�A�A�z�z�S�S���D�D�m�m�D�D�L�L�J�J�5�5�;�;�s�s���#�#�N�N�I�I�$�$�$�J�J����T�T�E�E�E�N�N�O�O�N�O�B�B�|�|�B�-�-�,�,�,�-�>�>�;�;�:�:�=�=�<�<�X�X�W�W�Y�Y�Z�ZPP�+�+�?�?�@�@�?�z�z�@�G�G�B�B���K�K�I�I�F�F�D�D�E�E�
�
�J�J�J�I�H�H�C�C�B�H�E�C�D�G�F�K�K�K����ZZ�����������b�b�]�]�^�^�`�`�_�_�E�E�D�D�D�E�d�d�i�i�g�g�j�j�h�h�b�b�f�f�c�c�e�e�P�P�T�T�S�S�O�O�Q�Q�	�	�R�R�y�y���x�x�y�y�w�w���9�9�7�7�7�8�8�9�8�����
�
�
����]�]�h�h���`�`�`�h�l�l�_�_���N�N�N���@�@�?�?���@�
�
�	�	�?�A�A�A�C�C�C))���J�J�����!�!�q�q� � � �s�s�"�"�u�u�r�r�!�t�t�p�p�"�#�#�#�H�H�5�5�5�Q�Q[[[�P�P\\\�b�b�a�a�i�i���d�d�[�[�e�e�f�f�_�_�Z�Z�`�`�h�h�j�j�\�\�]�]��Y�Y�g�g�^�^�W�W�X�X�c�c�]�]�_�_�\�\�a�a�`�`�^�^�'�'�'�5�5�5�L�L�����J�J���M�M�I�I�K�K��N�N�-�-�,�,�.�.�+�+�f�f�f�/�/�>�>�>�|�|�b�b�a�a�b�a�@�@�h�h�A�A�h�?�?�������e�e�����e�7�7�7���������v�v�O�O�����3�3�3�d�d�K�K�I�I�D�D�F�F�C�C�G�G�H�H�H�J�J�I�F�C�J�G�E�E�D�E�7�7�9�9�8�8�:�:�Z�Z�Z�F�F�D�D�E�E�G�G�H�H�=�=�>�>�>�=�Q�Q�Q�{�{�`�`�`�T�T�*�*�+�+�*�)�)�)�+�C�C�^�^�2�2�_�_�2�J�J�^�[�[�[�^�^�^� � � ���:�:�����G�G�F�F�G�F�p�p�o�o�p�o�o�o�4�4�4�q�q�n�n�r�r�s�s�p�p�t�t�m�m�o�o�u�u�x�x�y�y�u�u�v�v�{�{�w�w�|�|�z�z�������k�k�v�v�u�u�u�v����a�a�c�c�b�b�d�d�e�e�D�D���F�F�H�H��G�G�E�E���J�J�++�����������	��������K�K�K������������4�4�3�3�`�`�3�4�m�m�����m�C�C�a�a�Y�Y�`�`�p�p�c�c�c�}�}�x�x�y�y�w�w�y�w�.�.�x�A�A�����A�V�V�A�A���>�>�*�*�{�{���������t�t�u�u�5�5���g�g�>�>�'�'�$�$�G�G�E�E���?�?�"�"���
�
�;�;�h�h�i�i�C�C�~�~�0�0�)�)�I�I�1�1���n�n���,�,�p�p���9�9�;�f�f�.�.�#�#�r�r�6�6�(�(�/�/�=�=�2�2�����k�k�z�z���=�<�<�����4�4�s�s�|�|� � �=�=�B�B���3�3���m�m�������l�l�v�v�w�w�<�<�;�;�x�x�%�%�F�F�7�7�o�o�y�y���!�!�:�:���@�@�}�}�
�
�&�&�q�q�����8�8���-�-���>�<�+�+�����j�j���D�D�	�	�k�k�l�l�l�k���'�'�t�t�"�"�����(�(�t����� � ���*�*�s�s�s�����)�)�����$�$�!�!�������%�%�c�c�n�n�o�o�?�?���*�*�*�+�+�+�%�%�H�H�H���~�~�U�U���
�z�y�[�z�[�M�M�M�K�[�G�G�G���;�;�G�G�h�h�h�r�r�q�q�r�
�
�q�w�w����������:�:�e�e�:�<�<���i�i�j�j�j�i�k�k�Y�Y�Y�L�L�?�?�L�@�@�K�K�K�{�{�o�o�z�z�����
�
�(�(�(�	�	�4�4�7�7�2�2�6�6�5�5�1�1�8�8�3�3�0�0�
�
�@�@�C�C�D�D�T�T�T�}�}�|�|�����7�7�)�)�2�2�5�5�8�8�1�1�6�6�0�0�(�(�'�'�4�4�3�3�g�g�f�f�f�f�g�g�g�f�}�}�}�,�&�-�&�l�l�%�%�%�O�O�;�;�]�]�W�W�[�[�V�V�Z�Z�\�\�X�X�Y�Y�a�a�p�p�U�U�C�C�U���>�>�����U�U�I�I�0�0�.�.�B�B�B�.�.�C�C�?�?�,�,�<�<�/�/�=�=�-�-�C�2�2�<�>�>�A�A�}�}�>�.�1�1�=�A�@�@�3�3�?�;�;�;�@�4�4�2�2�2�9�9�%�%�#�#�$�$�3�3�9�4�'�'�1�1�"�"�3�5�5�7�7�1�6�6�5�(�(�7�8�8�6�!�!�8�&�&�e�e�W�W�_�_���R�R�e���R�_�W���S�S�����N�N�S�r�r�d�d�X�X�X�z�z�����N�d�~�~�#�#�$�$�f�
�&l�*�	�'�m�m�f�f�m�m�n�n�f�l�l�o�o���L�L�����M�M�S�S�U�U�R�R�T�T�Q�Q�|�|�{�{�^�^�!�H�"�H��H� �H�b�H�z�z�z�{�{�B�B�{�M�M�M�:�:�q�q��� � �y�y�x�x���K�\�y�\�z�\���0�0� � �0���9�9�8�8�9�8�S�S�l�l�S�S�~�~�H�H�J�J�H�;�;�;�&�&�J�I�I�I�&�"�"�"���m�m�	�L�
�L����y�yl�+�	�{�y�y�!�!�!�������B�B�2�2�;�;�3�3�w�w�4�4�4�/�/�:�:�<�<�:���=�=�<�=�1�1�8�8�2�0�0�8�5�5�5�3�1�;�/�0�9�9�6�6�x�x�9�7�7�7�6�)�)�+�+�*�*�:�:�:�6�6�6�[�l�\�l�]�l�^�l�_�l�`�l�a�l�b�l�c�l�d�l�v�v�=�=�>�>�h�h�g�g�_�_�c�c�d�d�b�b�`�`�e�e�f�f�a�a�k�k�i�i�j�j����h�h�5�5�6�6�4�4�D�D�D�z�z�,�,�������,�O�O�t�t�\�\�g�g�O�\�<�<�g�$�$�9�9�$�#�#�#l�,�
�(���	�)�]�]�]���n�n�n���	�	���������x�x�w�w�
�
�������v�v���&�&�&���&�&�E�E�E�-�	�.�	�/�	�0�	�6�	�7�	�?�	�e�g�f�g�g�g�h�g�o
�i�p�j�p�k�p�l�p�m�p�n�p�o�p�p�p�q�p�r�p�p�s��t��u��v��w��q
�x��y��z��{��|��}��~����!��r
��x��x��x��x��x�s
�V�V�V�V�jV�	V�
V�V�V�
V�V�V�VV�V�V�V�V�V�V�V�V�V�V�V�V�V�V�V� V�!V�"V�#V�$V�%V�&V�'V�(V�)V�*V�+V�,V�t
�-��.��/��0��1��2��u
�3��4��5��6��7��8��9��v
�:X�;X�<X�=X�>X�?X�@X�AX�BX�CX�DX�EX�FX�GX�HX�IX�JX�KX�LX�MX�NX�OX�PX�QX�RX�SX�TX�UX�VX�WX�XX�YX�ZX�[X�\X�]X�^X�_X�`X�aX�bX�cX�w
�d�d�e�d�x
�f�D�g�D�y
�hR�iR�jR�kR�lR�mR�nR�oR�pR�qR�rR�sR�tR�uR�vR�wR�xR�yR�zR�{R�|R�}R�~R�R�R�R�R�R�R�R�R�R�R�	R�
R�R�R�
R�R�R�R�R�R�R�R�R�z
�7g�g�g�g�g�g�g�g�g�g�g� g�!g�"g�#g�$g�%g�&g�'g�(g�)g�*g�+g�,g�-g�.g�/g�0g�1g�8g�2g�3g�{
�4�B�5�B�|
�6S�7S�8S�9S�:S�;S�<S�=S�>S�?S�@S�AS�BS�CS�DS�ES�FS�GS�HS�IS�JS�KS�LS�MS�NS�OS�PS�QS�RS�SS�TS�US�VS�WS�XS�YS�ZS�[S�\S�]S�^S�_S�`S�aS�bS�cS�}
�d�e�e�e�~
o��f��g�p�n�m��h��i��j��k��
�l?�m?�n?�o?�p?�q?�r?�s?�t?�u?�v?�w?�x?�y?�z?�{?�|?�}?�~?�?�?�?�?�?�?�?�?�?�?�	?�
?�?�?�
?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�
�z� �{� �|� �}� �~� �� �!� �x� �y� �
����� ��!��"��#��$��%��&��'��(��)��*��+��,��-��.��/��0��1��2��3��4��5��6��7��8��9��
�#W�$W�W�WW�W�W�W� W�)W�*W�!W�"W�W�W�W�W�W�W�W�W�W�W�%W�&W�jW�W�W�W�W�W�W�W�W�	W�
W�'W�(W�
W�W�+W�,W�
�:�H�;�H�<�R�=�R�>�H�?�H�@�H�A�H�B�H�C�H�D�R�E�R�F�H�G�H�H�R�I�R�J�R�K�R�L�H�M�H�N�H�O�H�
�P�	�Q�	�R�	�S�	�T�	�U�	�V�	�W�	�X�	�Y�	�Z�	�
�d�n�e�n�
�d�n�e�n�
�[��\��]��^��_��`��a��b��c��
�m�K�n�K�q�K�r�K�k�K�l�K�i�K�j�K�	
�H��I��F�I�G�I�@�I�A�I�L�I�M�I�B�I�C�I�J��K��D��E��>�I�?�I�N�I�O�I�:�I�;�I�

�d�<�e�<�2��f�<�g�<�4�(�/�
�h�<�0��i�q�j�q�k�<�l�<�1��,�,�m�V�n�V�o�C�p�C�3�(�K�>�*�9�q�<�)�l�r�{�s�{�(�<�-�K�+�!�.�-�t�<�
�u�Y�v�Y�w�Y�x�Y�y�Y�z�Y�{�Y�|�Y�
�}�3�~�3l�]��[��[��[��[��[��[��[>�[�

��K��K�
��������������
����!��"��
��)�	�)�
�)��)��)�
�)��)��)��)��)��)��)�
�d�p�e�p�
�d�o�e�o�
�����!��������������'������"��
��I��I�
�f�E�g�E�
����� ��!��"��#��$��%��&��'��(��
�L�G�M�G�J��K��D��E��:�G�;�G�@�G�A�G�N�G�O�G�H��I��B�G�C�G�>�G�?�G�F�G�G�G�
>�\��\��\��\��\��\��\��\�}�4�~�4�
�X�,�Y�,�<�,�=�,�`�,�a�,�>�,�?�,�Z�,�[�,�D�,�E�,�P�,�Q�,�T�,�U�,�:�,�;�,�
�8�i�,�i�-�i�$�i�%�i��i��i��i��i� �i�!�i�7�i�
�n��o��r��s��~������	������x��y��h��i����������
�d�q�e�q�
�d�}�e�}�
�d�}�e�}�
�a�i�\�i�[�i�_�i�`�i�
�)�O�*�O� 
�`�!�`�"�`��`��`��`��`��`��`�
�`��`��`��`�!
�+��,�f��-��.��"
�/�	�0�	�1�	�2�	�#
�3�5�4�5�$
�5�
�6�
�%
�7�~�8�~�9�~�:�~�;�~�<�~�=�~�>�~h�~�?�~�@�~�&
�A�L�B�L�C�L�D�L�'
�E�k�F�k�G�k�H�k�I�k�J�k�K�k�L�k�M�k�N�k�O�k�P�k�Q�k�R�k�V�k�U�k�(
�S�6�T�6�7�6�)
�VY�WY�bY�cY�FY�GY�RY�SY�JY�KY�>Y�?Y�LY�MY�<Y�=Y�^Y�_Y�@Y�AY�NY�OY�:Y�;Y�ZY�[Y�XY�YY�BY�CY�PY�QY�HY�IY�DY�EY�TY�UY�`Y�aY�\Y�]Y�*
�6�E�U�E�V�E�+
�W�D�X�D�Y�D�Z�D�[�D�[�D�\�D�,
�]��^��_��`��a��-
�b�)�c�)�d�)�.
�eT�fT�gT�hT�iT�jT�kT�lT�mT�nT�oT�pT�qT�rT�sT�tT�uT�vT�wT�xT�yT�zT�{T�|T�}T�~T�T�T�T�T�T�T�T�T�T�T�	T�
T�T�T�
T�T�T�T�/
���������0
��P��P��P��P��P��P�1
��Q��Q��Q�2
��(�	�(��(��(��(��(��(�
�(��(�
�(��(��(�3
�4�C�5�C�4
����������� ��!��5
�~�l�"�l�#�l�$�l�%�l�&��'��(�l�)�l�}�l�*�l�+�l�,�l�-�l�.�l�/�l�0��1��2�l�3�l�6
�����������������"������'��!��7
�4�,�5�,�6�,�7�,�8
�8�4�9�4�:�4�9
�;�'�<�'�:
�b�&��&� �&�!�&�"�&�=�&�;
�>�`�?�`�@�`�A�`�<
�B�V�C�V�D�V�E�V�F�V�G�V�=
�H�O�I�O�>
�J�H�K�H�?
�L��M��N��@
�O�A�P�A�Q�A�R�A�S�A�T�A�U�A�V�A�W�A�X�A�Y�A�Z�A�[�A�\�A�A
�]�w�^�w�/�w�_�w�`�w�B
�a��b��c��d��e��f��C
�
@�@�@�@�z@�{@�r@�s@�@�
@�@�@�v@�w@�t@�u@�@�@�n@�o@�@�@�p@�q@�@�@�@�@�x@�y@�@�@�@�@�@�@�~@�@�@�@�|@�}@�@�	@�@�@�@�@�l@�m@�D
�g�N�h�N�i�N�E
�j�O�k�O�l�O�m�O�n�O�o�O�p�O�q�O�F
�r�8�s�8�G
�t��u��v��w��x��y��z��{��|��}��~����H
��b��b�I
�����J
��z��z�K
��G��G�L
�M�1��1�	�1�
�1��1��1�
�1�M
��]��]�]�
�]��]��]��]��]��]��]��]�!�]�"�]�N
�S��O
�V�	�Q�	�P�	�P
��@��@��@��@��@��@��@��@��@��@��@��@�Q
��K��K��K�R
�+�}�,�}f�}�-�}�.�}��}�S
��Z��Z� �Z�!�Z�"�Z�#�Z�T
�$�j�%�j�&�j�'�j�(�j�)�j�U
�7�\�8�\�=�\�>�\h�\�?�\�@�\�;�\�<�\�*�\�+�\�9�\�:�\�V
�,�J�-�J�L�J�M�J�D��E��.��/��0�J�1�J�2�J�3�J�4�J�5�J�6�J�7�J�8��9��:�J�;�J�W
�<�a�<�a�=�a�>�a�?�a�@�a�A�a�B�a�C�a�D�a�E�a�F�a�G�a�X
f�~��~�.�~�-�~�+�~�,�~�Y
�d�s�e�s�Z
�d�r�e�r�[��H�(�I�(�J�(�\
�K��L��M��N��O��]
>�l�^�}�6�~�6�P��Q����������^
�d�t�e�t�_
�d�u�e�u�`
�;�2�a
��*��*�
�*��*��*�	�*��*��*�
�*��*��*��*�b
�B�H�C�H�F�H�G�H�@�H�A�H�J�U�K�U�N�H�O�H�:�H�;�H�H�U�I�U�>�H�?�H�c
�<�-�=�-�`�-�a�-�:�-�;�-�X�-�Y�-�Z�-�[�-�>�-�?�-�T�-�U�-�P�-�Q�-�D�-�E�-�d
�r��s��x��y��h��i������~������	����������n��o��e
��j��j�$�j�%�j�,�j�-�j��j��j� �j�!�j�7�j�8�j�f
�R�j�S�j�g
�d�v�e�v�h
�f��b��c��d��a��e��i
�T��U��V��W��X��Y��Z��5��[��\��j
�]�^�_�`�a�b��v�c�d�e�f�
��g�h�t�i�j�k�l�m�n�o�p��q�r�s�t��u�v�w�x���y�z�{�|�}�~��������,�����	�
���
������������������� ��!�"�#�$�%�&�'�(��)�*�+�,�-�.��/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F��G�H�I�J�K�L�u�M�N�O�P�}�y�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�w�_�`�a�b���c�d�s�e�f�g�h�i�j�k�l�m�n�o�p�q�r��s�t�{�u�v�w�x�y�z�{�|�x�}�~������������	�
���	�
������������~�������� �!�"�#�$�|�%�&�'�(�)�*�+�,���*�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>��?�@�
��A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T��U�V�W�X�Y�Z�+��[�\�]�^�_�`��a�b�c�d�e�f�z�g�h�i�j�k�l�k
�Z��l
>�]��]��]l�_��]��]��]��]��]�}�5�~�5�m
�f��g��m��n�p��h��i��j��k�m�n�o��n
�P�
�Q�
�V�
�o
�!��"�����������
��������p
�o��p��q��r��s��t��u��q
�v�~�w�~�x�~�y�~�z�~�r
��P��P��P�s
�{�e�|�e�}�e�t
�~�t��t��t��t��t��t�u
�����������v
�	�y�
�y��y��y�
�y��y�w
�d�w�e�w�x
�d�x�e�x�y
�'��-��"�� ����������!��#������&������$������.��%��z
������������������� ����{
�!�`�"�`�d�`�e�`�|
�d�`�e�`�}
��+��+��+��+�
�+��+�
�+��+��+�	�+��+��+�~
�_�j�`�j�a�j�\�j�[�j�
��
����!��"��������������
�-��.�f����+��,��
�x��w��y��z��v��
�3�6�4�6�
�x�|�y�|�|�|�}�|�z�|�{�|�
�|A�}A�A�A�tA�uA�A�A�
A�A�A�	A�A�A�xA�yA�A�A�A�A�lA�mA�A�A�A�A�A�A�A�
A�~A�A�A�A�nA�oA�A�A�A�A�pA�qA�zA�{A�A�A�rA�sA�vA�wA�
�*�m�+�m�&��'��}�m�"�m�#�m�,�m�-�m�$�m�%�m�~�m�(�m�)�m�.�m�/�m�2�m�3�m�0��1��
�#�}�$�}�
�%�d�&�d�'�d�(�d�)�d�*�d�+�d�,�d�
�!��"��(��'��$��%�� ����&��#����	
�!�~�"�~�d�~�e�~�

�-i�.i�/��0��1i�2i�3i�4i�5i�6i�7i�8i�9i�:i�;i�<i�=i�>i�?i�@i�Ai�Bi�Ci�Di�E��F��G��Hi�Ii�J��Ki�Li�Mi�Ni�
�d�y�e�y�
�����!��"��
�������������

��������� ��������������
�}�n�$�n�%�n�~�n�*�n�+�n�,�n�-�n�"�n�#�n�&��'��2�n�3�n�(�n�)�n�0��1��O�I�P�I�.�n�/�n�
�Q�8�R�8�S�8�T�8�U�8�V�8�W�8�X�8�Y�8�Z�8�[�8�\�8�]�8�^�8�_�8�`�8�
�a�P�b�P�
�P��Q��V��
��
��������!��"����������
�d�{�e�{�!�{�"�{�
�d�m�e�m�
�`�.�a�.�Z�.�[�.�T�.�U�.�:�.�;�.�X�.�Y�.�P�.�Q�.�<�.�=�.�D�.�E�.�>�.�?�.�
�r��s��h��i����	��~����x��y����������n��o������
�7�k��k��k�,�k�-�k��k��k� �k�!�k�$�k�%�k�8�k�
��,��,��,�
�,��,�	�,�
�,��,��,��,��,��,�
�c��d��e��f��g��h��`��i��j��
�k�W�l�W�m�W�n�W�o�W�p�W�
��A��A��A��A��A��A��A��A��A��A��A��A�
�$�$�q�$�r�$�s�$�t�$�u�$�v�$�w�$�x�$�y�$�z�$�#�$�&�$�{�$�|�$�}�$�~�$��$��$��$��$�%�$�
�Ba�Ca�Pa�Qa�Ra�Sa�Xa�Ya�Da�Ea�La�Ma�<a�=a�\a�]a�`a�aa�^a�_a�Na�Oa�>a�?a�Ha�Ia�Ja�Ka�Za�[a�ba�ca�Ta�Ua�:a�;a�
�g�}�
��D��D��D��D��D��D�	�D�
�D��D��D�
�D��D��D��D� 
�4�Y�5�Y�!
��-��-�"
��\��\�#
��=��=�$
�H��I��6��%
��S��S�5��6���S��S��S��S��S��S�&
��]��]��]� �]�!�]�"�]�#�]�$�]�%�]�'
�&�p�'�p�(
�(��)��)
�>�a�?�a�@�a�A�a�*
�x� �y� �v� �w� �z� �{� �~� �� �t� �u� �|� �}� �+
��c��c�,
���������-
�
�-��-��-�
�-��-�	�-��-��-��-��-��-��-�.
��� ��������������������/
�<�$�0
�R�B�S�B�V�B�W�B�O�B�P�B�T�B�U�B�Y�B�Z�B�\�B�X�B�[�B�Q�B�1
�*�V�+�V�,�V�-�V�.�V�/�V�2
�"��'������!������������������3
�?��@��9��:��;��<��7��8�h��=��>��4
�A�.�B�.�C�.�D�.�5
�X�&�0�&�1�&�W�&�\�&�[�&�
�&�Y�&�Z�&�V�&�6
��k�7
�"�� ��!��%��'������#������$������.��-������&������8
�2�q�3�q�4�q�5�q�6�q�7�q�8�q�9�q�9
�f� �b� �e� �d� �c� �a� �:
�:�x�;�x�;
�i��j��e��f��`��g��h��c��d��<
�<��=��=
� ��!������������>
�>�r�?�r�@�r�A�r�B�r�?
�Z��@
�E�E�lE�mE�E�E�pE�qE�E�E�E�E�nE�oE�
E�E�E�E�E�
E�zE�{E�E�	E�E�E�rE�sE�xE�yE�tE�uE�E�E�E�E�E�E�E�E�vE�wE�E�E�|E�}E�E�E�~E�E�A
�C��D��E��F��G��H��I��J��K��L��M��N��O��P��Q��R��S��B
�T��U��V��C
��^��^�W�^�X�^�^��^��^�!�^�"�^��^��^�
�^��^�D
�P��Q��V��E
�Y�e�Z�e�F
��B��B��B��B��B��B��B��B��B��B��B��B�G
�_�o�`�o�a�o�\�o�[�o�H
�/��0��I
�H�*�I�*�J�*�J
�3�7�4�7�K
�y�Z�z�Z�{�Z�|�Z�w�Z�x�Z�u�Z�v�Z�L
�i��j��e��f��g��h��`��c��d��M
�[��\��N
�]�.�^�.�_�P�`�P�O
�P�
�Q�
�V�
�P
��.�	�.��.�
�.��.��.��.�
�.��.��.��.��.�Q
�}�>�~�>>����������P��Q��R
��^��^�}�7�~�7��^��^��^��^��^>�^�S
�!�|�"�|�d�|�e�|�T
�a�5�b�5�c�5�d�5�e�5�f�5�g�5�h�5�i�5�j�5�k�5�l�5�m�5�n�5�o�5�p�5�q�5�r�5�s�5�t�5�u�5�U
�[��\��V
�d�n�e�n�W
�����&��%��!�� ����������$������'��"������-��.��#��X
�j��k��h��i�p��f��g�o�m��m�M�n�Mn��Y
�v�a�w�a�x�a�y�a�z�a�Z
��/�
�/�
�/��/��/�	�/��/��/��/��/��/��/�[
�{�%�|�%�}�%�\
>����������}�?�~�?�P��Q��]
�>�I�?�I�N�I�O�I�J�V�K�V�F�I�G�I�@�I�A�I�H�V�I�V�:�I�;�I�B�I�C�I�^
�~�$��$��$��$��$��$��$��$��$��$�_
��_��_��_��_��_�}�8�~�8>�_��_��_�`
�d�[�e�[�a
�d�[�e�[�!�[�"�[�b
�4�O�5�O�6�O�7�O�:�O�;�O�.�	�/�	�D�	�E�	�,�O�-�O�0�O�1�O�L�O�M�O�8�	�9�	�2�O�3�O�c
�-��.���f��+��,��d
��j�q�]��s��i�]�-��c���	�X��[�L�c�=�t�g�4�=�Y�y�N���Q�b�~�M�M�\�"�l�s��
��Z� �O�z��g�V�D��0���
� �l���	�Y��K�&�
��_�T�+�d�r�W�!�v�m��`�m�'�4�(�;�8�D�K�?�#��)�o�o�u�/������W�	�*�e�1�T�+���p�>�T���.��d�����F����,��i�/��:�%�,��j��B�]�<�{�m�S��v���� �'��^��[�-�>�k���6�!�8�<�%�H�7�f�
�P�U���"�5�}����@���n�x�,�q�w�@�e�Q���G�c�a�&��F�Q��t���E�f�_�)���h�Z�&�W�N�9�X�V����q�Y�0�������3�~�|�3�A�k��n��H���[���y����?��l�+��U��^� �!�'�j��R�{�%�h��J�t��d�"�#�u�.�B�b�G��b�f�U�S�L�k���e��
�$�%��*��&�6�P��v�_�R�'�(�I�x�#�`��
�)�9�$�2�$�g��~�x�\�|�n��{�}�r�r�E�S�:�I��w�)�*�|�O��!�A��\�C�(�	�a�h�"�*�+�,�`�C�-�.�/�0��
�z�2�Z�7��^�R�y�5��o��1�2�X�p�V�$��;�
�#����}�i�s��a�p�1�w�J�u�z�(�e
�c�!�d�!�f�!�b�!�a�!�e�!�f
�W�9�X�9�]�9�^�9�[�9�\�9�U�9�V�9�Y�9�Z�9�_�9�`�9�Q�9�R�9�S�9�T�9�g
�qU�rU�wU�xU�U�U�gU�hU�U�U�
U�U�}U�~U�	U�
U�iU�jU�{U�|U�uU�vU�mU�nU�U�U�kU�lU�U�U�yU�zU�U�U�U�U�eU�fU�oU�pU�sU�tU�U�U�h
�a�k�\�k�[�k�_�k�`�k�i
�!�F�"�F��F��F�W�F�X�F��F��F��F��F�
�F��F�j
p�m��h��i��j��k��f��g��m��n�n�o��k
�o�k�p�k�k�k�l�k�m�k�n�k�q�k�r�k�i�k�j�k�l
�4�Z�5�Z�m
�8�
�9�
�D�
�E�
�2�P�3�P�4�P�5�P�6�P�7�P�,�P�-�P�.�
�/�
�0�P�1�P�:�P�;�P�L�P�M�P�n
�B�J�C�J�@�J�A�J�F�J�G�J�>�J�?�J�N�J�O�J�J�W�K�W�H�W�I�W�:�J�;�J�o
�d�\�e�\�p
�!�\�"�\�d�\�e�\�q
��
��
�'�
��
��
�"�
��
��
�!�
��
��
��
��
�r
�h��i������~����������	��n��o������x��y��r��s��s
�P�/�Q�/�Z�/�[�/�X�/�Y�/�<�/�=�/�D�/�E�/�`�/�a�/�>�/�?�/�T�/�U�/�:�/�;�/�t
��l��l�8�l�,�l�-�l� �l�!�l�$�l�%�l�7�l��l��l�u
��0�
�0��0��0�	�0��0��0��0��0��0��0�
�0�v
��C��C��C��C��C��C��C��C��C��C��C��C�w
�3v�4v�Wv�Xv�5v�6v�Qv�Rv�_v�`v�Sv�Tv�]v�^v�7v�8v�9v�:v�;v�<v�=v�>v�Yv�Zv�[v�\v�9v�Uv�Vv�x
�}�@�~�@>������P��Q������y
��`��`�}�9�~�9��`��`��`>�`��`��`�z
�}�f�|�f�{�f�{
�\��]��|
�V��Q��P��}
��_��_�!�_�"�_�
�_��_�_�W�_�X�_��_��_��_��_�~
�?��@��A��
�_�Q�`�Q�]�/�^�/�
�!�]�"�]�d�]�e�]�
�d�]�e�]�
�o��p��q��r��s��t��u��
�B�|�C�|�D�|�
�E��F��N��G��H��I��J��K��L��P��M��M��N��L��O��P��Q��R��S��T��U��K��V��W��O��
�,�K�-�K�4�K�5�K�:�K�;�K�2�K�3�K�8��9��L�K�M�K�6�K�7�K�0�K�1�K�D��E��.��/��
�F�K�G�K�H�X�I�X�J�X�K�X�:�K�;�K�B�K�C�K�@�K�A�K�N�K�O�K�>�K�?�K�
�X�e�Y�e�Z�e�[�e�\�e�]�e�^�e�_�e�`�e�a�e��e�b�e�c�e�d�e�
�d�^�e�^�	
�d�^�e�^�!�^�"�^�

�:�5�9�5�8�5�
�!�G�"�G�
�G��G��G��G��G��G��G��G�W�G�X�G�
�e�R�f�R�g�R�

�B�b�C�b�@�b�A�b�D�b�E�b�>�b�?�b�<�b�<�b�=�b�F�b�G�b�
�h�g�i�g�j�g�k�g�l�g�m�g�n�g�o�g�
�Jb�Kb�bb�cb�Db�Eb�Zb�[b�Nb�Ob�:b�;b�Pb�Qb�>b�?b�Rb�Sb�^b�_b�Xb�Yb�Tb�Ub�\b�]b�`b�ab�<b�=b�Hb�Ib�Bb�Cb�Lb�Mb�
�@�L�A�L�>�L�?�L�F�L�G�L�H�Y�I�Y�N�L�O�L�J�Y�K�Y�:�L�;�L�B�L�C�L�
�L�L�M�L�6�L�7�L�2�L�3�L�:�L�;�L�.��/��D��E��,�L�-�L�8��9��4�L�5�L�0�L�1�L�
�6��H��I��
�d�_�e�_�!�_�"�_�
�p�X�l�X�m�X�n�X�k�X�o�X�
�d�_�e�_�
�m�l�n�l�k�l�l�l�i�l�j�l�q�l�r�l�o�l�p�l�
�}�A�~�A�� �� �� �� >� �P� �Q� �
�d��e��!��"��
�d��e��
�p��q��r��s��(��t��u��v��w��x��
��%��%��%��%��%��%��%��%�~�%��%�
�y�m�z�m�{�m�|�m�}�m�~�m��m��m�k�m��m��m��m��m��m�
f����.��-��+��,��
�������������}�:�~�:>��
��>��>��>� 
�,�<�-�<�&�<�'�<�*�<�+�<��<��<�,�l�-�l� �<�!�<�$�<�%�<�4�<�5�<�"�<�#�<�(�<�)�<�8�<�9�<�.�<�/�<�!
�"��'��!����������������������"
�J�Z�K�Z�B�M�C�M�H�Z�I�Z�F�M�G�M�N�M�O�M�@�M�A�M�:�M�;�M�>�M�?�M�#
�G�j�	�j�
�j��j��j�
�j��j��j��j�H�j��j��j��j��j��j��j�$
��m��m�8�m�$�m�%�m� �m�!�m�,�m�-�m�7�m��m��m�%
o��j��k��h��i�m��m��n��f��g�n�p��&
�r��s����	������h��i������~����x��y������n��o��'
�2�M�3�M�D�
�E�
�4�M�5�M�8�
�9�
�:�M�;�M�0�M�1�M�.�
�/�
�L�M�M�M�6�M�7�M�,�M�-�M�(
�:�0�;�0�X�0�Y�0�P�0�Q�0�`�0�a�0�T�0�U�0�<�0�=�0�D�0�E�0�>�0�?�0�Z�0�[�0�)
�P��Q��V��*
>�a��a��a��a��a��a�}�;�~�;��a��a�+
��!��!�}�B�~�B��!��!>�!�P�!�Q�!�,
�4�[�5�[�-
�M��N��O��K��L��.
�rB�sB�B�B�B�
B�B�B�B�B�pB�qB�zB�{B�xB�yB�B�B�B�B�B�B�B�	B�B�B�vB�wB�B�B�~B�B�lB�mB�B�B�B�B�B�B�nB�oB�B�B�
B�B�tB�uB�|B�}B�/
��1��1��1��1��1��1��1��1�0
�>�_�?�_�@�_�A�_�1
���������������������G��H������	��
��
����2
��]��]�3
�!��"��d��e��4
�d��e��5
�H�[�I�[�>�N�?�N�F�N�G�N�N�N�O�N�:�N�;�N�@�N�A�N�B�N�C�N�J�[�K�[�6
�2�N�3�N�8��9��:�N�;�N�,�N�-�N�6�N�7�N�4�N�5�N�.��/��L�N�M�N�0�N�1�N�D��E��7���n��n�y�n�z�n��n�}�n�~�n�k�n�{�n�|�n��n��n��n��n�8
�f�J�g�J�9
�E�%�D�%�:
���g��;
�|�!�}�!�v�!�w�!�~�!��!�t�!�u�!�x�!�y�!�z�!�{�!�<
��d��d�=
�������>
�@�b�A�b�>�b�?�b�?
�A�/�B�/�C�/�D�/�@
��S��S�A
�X]�Y]�^]�_]�<]�=]�>]�?]�B]�C]�H]�I]�P]�Q]�L]�M]�]�]�T]�U]�\]�]]�N]�O]�D]�E]�R]�S]�Z]�[]�`]�a]�:]�;]�J]�K]�b]�c]�B
� ��!��"��#��$��%��&��'���R�(��)��*��+��,��-��.���R�/��R��0���R�1��2��3��4��5��6��7��C
�F��D
�8�
�9�
�:�
�;�
�<�
�<�
�=�
�>�
�?�
�E
�;�(�<�(�F
�@�N�A�N�B�N�;�N�G
�<��=��H
�"�q�#�q�}�q�2�q�3�q�.�q�/�q�&� �'� �*�q�+�q�$�q�%�q�~�q�0� �1� �(�q�)�q�,�q�-�q�I
�g:�h:�C:�D:�q:�r:�m:�n:�k:�l:�:�:�:�:�o:�p:�w:�x:�e:�f:�}:�~:�:�:�E:�F:�y:�z:�i:�j:�	:�
:�G:�H:�{:�|:�:�:�s:�t:�:�:�I:�J:�K:�L:�:�:�
:�:�u:�v:�:�:�J
�4�^�5�^�K
�M�^�N�^�O�^�P�^�Q�^�R�^�L
�S�!�T�!�U�!�M
�6��H��I��N
�B�s�A�s�>�s�?�s�@�s�O
���������P
�=��>�h��?��@��;��<��7��8��9��:��Q
�V�V�W�V�X�V�Y�V�Z�V�R
�[��\��S
��&��&�~�&��&��&��&��&��&��&��&�T
�a�Q�b�Q�U��v�/�]�/�^�/�_�/�`�/�a�/�b�/�c�/�d�/�e�/�V
�	�
�3�4�C�D�i�j�A�B�m�n���u�v�c�d�i�j�{�|�;�<�� ����G�H�I�J��{�|�f�g�]�^���)�*�_�`�g�h�
����E�F�]�^�=�>�*�}�g�h�w�x�?�@�,���e�f�#�$�q�r���k�l�-�.���}�~�y�o�p��'�(�Y�Z�{�/�0�
��t�s�t�U�V�u�v���E�F�+��_�`���
���!�"��%�&�/�0�q�r����g�h�#�$��1�2�5�6�a�b��O�P�C�D�3�4�7�8���5�6�i�j�9�:�
�������Y�Z�+�,���A�B�+�,�M�N�y�z�k�l�e�f���c�d�'�(����W�X�Q�R�������u�e�f�m�n����k�l���� �[�\�a�b�|�	��=�>�I�J�)�*�Q�R��K�L����-�.�w�;�<��o�p�G�H�U�V�}�~�s�t�%�&�1�2�a�b�O�P���?�@�7�8�S�T�~����W�X�	�
�c�d�w�x��x�]�^��[�\�S�T�K�L�M�N��v���!�"�z��y�z���s���_�`��9�:�W
�h�S�i�S�j�S�k�S�8�S�l�S�m�S�n�S�X
�o�:�p�:�Y
�4�*�5�*�6�*�7�*�Z
��1��1��1�	�1��1��1��1�
�1��1�
�1��1��1�[
�c�p�\
�w�~�]
�y�o�z�o�k�o�}�o�~�o�{�o�|�o��o��o��o��o��o��o��o�^
�[��\��_
��J��J�q�J�`
�r�A�s�A�t�A�a
�(��)��b
��2��2��2��2��2��2��2��2�c
�f��b��e��d��c��a��d
�u�I�v�I�w�I�e
�x�L�y�L�z�L�f
�\�f�]�f�X�f�Y�f�^�f�_�f�Z�f�[�f�c�f�d�f�`�f�a�f��f�b�f�g
�{�d�|�d�}�d�~�d��d�:�d�h
�}�&�|�&�{�&�i
�������j
f��+��,����.��-��k
��a��a��a��a��a��a�l
��D��D��D��D��D��D��D��D��D��D��D��D�m
�P��Q��V��n
�>��o
�W�G�	�G�
�G��G��G�
�G��G�p
�J�+�I�+�H�+�q
��]��]��]��]��]�r
��p��p�}�p�~�p��p��p��p�y�p�z�p�{�p�|�p�k�p��p��p�s
��1��1��1��1��1��1��1��1��1��1��1��1� �1�!�1�"�1�#�1�$�1�%�1�t
��E��E��E��E��E��E��E��E��E��E��E��E�u
�P��Q��V��v
�f�K�g�K�w
�D��E��&�Q�'�Q�(�Q�)�Q�*�Q�+�Q�,�Q�-�Q�.�Q�/�Q�0�Q�1�Q�2��3��L�Q�M�Q�4��5��x
�:�T�;�T�0�T�1�T�,�T�-�T�2�T�3�T�8�c�9�c�4�T�5�T�.�c�/�c�6�T�7�T�y
�B�O�C�O�@�O�A�O�H�\�I�\�J�\�K�\�>�O�?�O�N�O�O�O�F�O�G�O�:�O�;�O�z
�m�m�n�m�k�m�l�m�o�m�p�m�i�m�j�m�q�m�r�m�{
�f�L�g�L�|
�d��e��}
�d��e��!��"��~
�6�\�7�\�8�\�9�\�:�\�;�\��<�w�=�w��
�2��2��2��2�	�2��2��2��2�
�2��2��2��2��}�g�|�g�{�g��y�%�z�%�q�%�r�%�%�%�w�%�x�%�$�%�u�%�v�%�{�%�|�%�}�%�~�%��%��%��%��%�s�%�t�%�#�%�&�%��>�O�?�O�@�O�A�O�B�O�C�O��C�0�D�0�A�0�B�0��;�)�<�)�����������7��8��=��>��9��:��?��@��;��<�h���<��=��	�Y�:�Z�:�_�:�`�:�]�:�^�:�Q�:�R�:�[�:�\�:�S�:�T�:�W�:�X�:�U�:�V�:�
�Yw�Zw�;w�<w�=w�>w�Uw�Vw�]w�^w�Ww�Xw�5w�6w�7w�8w�Qw�Rw�[w�\w�_w�`w�9w�:w�9w�Sw�Tw�3w�4w��D�1�E�1�F�1��d�c�e�c�
������� �����������������d�c�e�c�!�c�"�c��f�M�g�M��Ij�<j�J��F��Kj�:j�?j�@j�Nj�4j�Lj�.j�Hj�Dj�Bj�6j�;j�3j�/��0��-j�Mj�8j�1j�2j�9j�7j�Aj�G��E��Cj�5j�=j�>j��i�@�a�@�G�@�H�@�g�@�b�@�d�@�e�@�I�@�J�@�c�@�K�@�L�@�M�@�N�@�h�@�O�@�P�@��6�U�7�U�4�U�5�U�:�U�;�U�8�d�9�d�,�U�-�U�.�d�/�d�0�U�1�U�2�U�3�U��,�R�-�R�2��3��*�R�+�R�4��5��0�R�1�R�.�R�/�R�D��E��(�R�)�R�L�R�M�R�&�R�'�R��>�P�?�P�@�P�A�P�F�P�G�P�H�]�I�]�:�P�;�P�J�]�K�]�N�P�O�P�B�P�C�P�� �4�!�4��4��4�"�4�#�4��4��4��4��4��4��4��4��4�$�4�%�4��4��4��8�n� �n�!�n�,�n�-�n�7�n�$�n�%�n��n��n��n��n��n��o��������	����������r��s��h��i��x��y��~�����>�"�?�"�X�"�Y�"�:�"�;�"�T�"�U�"�<�"�=�"�`�"�a�"�Z�"�[�"�P�"�Q�"�D�"�E�"��[�l�\�l�a�l�_�l�`�l��pF�qF�vF�wF�F�F�xF�yF�F�F�F�F�|F�}F�F�F�tF�uF�F�F�F�F�F�F�~F�F�F�	F�lF�mF�F�F�
F�F�nF�oF�rF�sF�zF�{F�F�F�F�F�F�
F�F�F�F�F��Q� �R� �S� �T� �U� �V� �I� �W� �X� �Y� �Z� �[� �\� �]� �J� ���u��u��u��u�~�u��u��+��,�f��-��.������3��3��3��3��3��3��3��3��H��I��6�� � ����(��'��#��"��$��%��!����&��!��	��	��	��	��	��	��	��	� �	��	��	�"�d�d�e�d�#�!�d�"�d�d�d�e�d�$�;�"�<�"�%�_��`��]��^��a��&�?k�@k�Nk�4k�Ck�Dk�Hk�Bk�6k�-k�.k�Ak�G��0��E��F��Lk�1k�2k�9k�:k�;k�<k�=k�>k�Ik�Kk�3k�7k�8k�Mk�5k�/��J��'�8�e�9�e�.�e�/�e�,�V�-�V�:�V�;�V�6�V�7�V�4�V�5�V�2�V�3�V�0�V�1�V�(�J�^�K�^�:�Q�;�Q�H�^�I�^�F�Q�G�Q�>�Q�?�Q�N�Q�O�Q�B�Q�C�Q�@�Q�A�Q�)�R�g�S�g�*�*�S�+�S�D��E��L�S�M�S�.�S�/�S�2��3��0�S�1�S�,�S�-�S�(�S�)�S�&�S�'�S�4��5��+�9x�:x�Yx�Zx�]x�^x�;x�<x�Ux�Vx�_x�`x�=x�>x�Wx�Xx�Qx�Rx�7x�8x�Sx�Tx�9x�[x�\x�5x�6x�3x�4x�,�U�;�V�;�[�;�\�;�_�;�`�;�S�;�T�;�Q�;�R�;�W�;�X�;�Y�;�Z�;�]�;�^�;�-�!�e�"�e�d�e�e�e�.�d�e�e�e�/����� ��!��������0����������������� ������1�^�J�2�^�e�_�e�`�e�a�e�b�e�3�X��X��X�
�X��X��X��X��X��X�!�X�"�X�c�X�d�X�W�X�X�X��X��X�4�4�;�1�;�2�;�3�;�-�;�.�;�/�;�0�;�5��7�	�7��7��7�
�7��7��7��7�
�7��7��7��7�6�o�;�p�;�7�d��e��8�!��"��d��e��9�g����:�;q�<q�Uq�Vq�[q�\q�5q�6q�9q�=q�>q�9q�:q�Yq�Zq�3q�4q�7q�8q�Sq�Tq�_q�`q�Wq�Xq�Qq�Rq�]q�^q�;�W�[�X�[�]�[�^�[�=�[�>�[�9�[�[�[�\�[�Y�@�Z�@�;�@�<�@�_�@�`�@�7�[�8�[�S�@�T�@�3�@�4�@�U�@�V�@�9�@�:�@�5�@�6�@�Q�[�R�[�<�U�=�V�=�[�=�\�=�]�=�^�=�S�=�T�=�Y�=�Z�=�Q�=�R�=�_�=�`�=�W�=�X�=�=�f�>�g�>�4�*�h�>�e�>�*�;�o�E�p�E�r�}�s�}�d�>�3�*�-�M�m�X�n�X�)�n�,�.�+�#�K�@�.�/�(�>�0�	�k�>�l�>�i�s�j�s�1��2��/��t�>�q�>�>�k�q�j�q�f�z�g�z�,�\�l�z�m�z�q�z�l�z�(�z�k�z�4�0�*�D�d�z�e�z�3�0�o��p��i�q�n�z�o�Z�n�Z�2�
�p��s��1��r��.�4�m�Z�q�\�r�\�0��t�z�+�'�s�\�j�z�-�Q�h�z�t��)�s�/�	�?�!��"��b���� ��@�W�Y�X�Y�Y��Y��Y��Y��Y�!�Y�"�Y��Y��Y�
�Y��Y��Y��Y�c�Y�d�Y�A�I�I�I�I�zI�{I�I�I�I�I�lI�mI�nI�oI�I�I�I�I�~I�I�I�I�I�I�I�I�I�	I�
I�I�vI�wI�pI�qI�|I�}I�tI�uI�rI�sI�xI�yI�I�I�I�
I�I�I�I�I�B�~G�G�xG�yG�lG�mG�G�G�G�G�nG�oG�G�
G�G�G�tG�uG�G�G�pG�qG�G�G�G�G�G�G�G�G�G�G�rG�sG�zG�{G�vG�wG�G�	G�G�G�
G�G�|G�}G�G�G�G�G�C�u�9�v�9�w�9�x�9�y�9�z�9�{�9�|�9�}�9�~�9�D�+�
�,�
�-�
�.�
f�
��
�E��.��.��.��.��.��.��.��.�~�.��.�F�,�6�+�6�*�6�-�6�.�6�/�6�G��6��6��6��6��6��6��6��6�H�g�"��"�I�Q�5�J�����	��
������
��K�^�d�_�d�b�d�`�d�a�d�L�P��Q��V��M�_�R�`�R�]�0�^�0�Nn�(m�(o�(p�(�m�(�n�(�h�(�i�(�j�(�k�(�O��4��4��4��4��4��4��4��4�P�@�e�A�e�F�e�G�e�>�e�?�e�<�e�=�e�B�e�C�e�<�e�D�e�E�e�Q�y�[�z�[�w�[�x�[�u�[�v�[�{�[�|�[�R�a�R�b�R�S��Z��Z�T�!�Z�"�Z�Z�c�Z�d�Z��Z��Z��Z��Z�W�Z�X�Z�
�Z��Z��Z��Z��Z��Z�U�A�1�B�1�C�1�D�1�V���������W�.�f�/�f�:�W�;�W�8�f�9�f�4�W�5�W�6�W�7�W�2�W�3�W�0�W�1�W�,�W�-�W�X�0�>�1�>�*�>�+�>�2�T�3�T�(�>�)�>�D�T�E�T�&�>�'�>�L�>�M�>�4�T�5�T��T��T�.�>�/�>�,�>�-�>��>��>��>��>�Y�6�+�7�+�4�+�5�+�Z�f�N�g�N�[�/�0������e�f�)�*�	�
��i�j����t�m�n�Y�Z�� �y�z�s�]�^���s�t�E�F�w����7�8������w�x�{�|�����|�9�:�u�v��� �y�f�g�?�@�A�B�_�`�	�+�c�d�Q�R�1�2�E�F�;�<�g�h�����_�`���k�l�I�J�
����!�"��[�\�����o�p�
�o�p�-�.��i�j�����i�j�;�<���W�X�	�
�{�Y�Z��U�V�%�&���x�O�P���9�:�q�r�C�D�g�h���a�b�k�l�g�h�3�4�*�q�r���}�~�]�^�k�l�=�>���O�P�}�~�-�.�S�T�W�X����[�\�M�N�e�f�'�(���C�D�7�8�~�����m�n�_�`�c�d�%�&�
��K�L�M�N�+�,��Q�R����S�T�3�4�G�H�z�u�I�J�v�]�^�A�B�U�V��+�,�{�|��?�@�=�>�c�d�'�(�u�v�s�t�
�!�"���}�1�2�G�H��K�L�#�$�/�0�5�6�a�b�,��y�z�e�f�5�6�)�*�a�b�#�$�w�x�����\�Z� �]�}�<�~�<��b��b��b��b��b��b>�b��b�^p�)�j�)�k�)�h�)�i�)�m�)�n�)n�)m�)o�)�_�!��"��d��e��`�d��e��a�4�_�5�_�b��1��1�c�P�"�Q�"��"��">�"��"��"�}�"�~�"�d��S��S��S�e�r��s��*�B�(�y�)�q�4�.�f�y�g�y�h�y�e�y�2��i�p�j�p�/��.�1�1��j�y�o�Y�n�Y�3�.�n�y�m�y�,�Z�p��m�Y�d�y�t�y�o��p��l�y�q�[�r�[�+�%�-�O�k�y�l�y�0��k�p�q�y�t��s�[�f>�&�	���&��&�P�&�Q�&��&��&�
��}�#�~�#�g�M��N��O��K��L��h��������� ��!����i�"��'����������!�������{��{���������j�8�o��o��o�,�o�-�o�$�o�%�o��o��o�7�o� �o�!�o�k�����x��y��n��o����	������~����h��i������r��s��l�Z�#�[�#�T�#�U�#�<�#�=�#�`�#�a�#�>�#�?�#�:�#�;�#�D�#�E�#�P�#�Q�#�X�#�Y�#�m��5��5�"�5�#�5��5��5��5��5��5��5�$�5�%�5��5��5� �5�!�5��5��5�n�O�J�P�J�o� ����&��'��$��%��(��!��"��#����p�!��"��d��e��q�d�~�e�~�r�j�*�k�*m�*�m�*�n�*p�*o�*�h�*�i�*n�*�s�[��\��t���������u�:�y�;�y�v��Y��Y��Y��Y��Y��Y�w�
�3��3��3�
�3��3�	�3��3��3��3��3��3��3�x�s�&�t�&��&��&��&��&�$�&�}�&�~�&�y�&�z�&�%�&�w�&�x�&�&�&�#�&�q�&�r�&�{�&�|�&�u�&�v�&�y�`^�a^�P^�Q^�^^�_^�N^�O^�L^�M^�>^�?^�J^�K^�b^�c^�\^�]^�D^�E^�Z^�[^�T^�U^�B^�C^�:^�;^�<^�=^�X^�Y^�R^�S^�H^�I^�^�^�z��Y��Y��Y�{�]�0�^�0�d�0�c�0�a�0�v�0�b�0�_�0�`�0�e�0�|��x�
�x��x��x�
�x�	�x�}�K�B�L�B�c�B�O�B�P�B�a�B�I�B�J�B�M�B�N�B�i�B�h�B�G�B�H�B�g�B�d�B�b�B�e�B�~�H��I��6���Q�3��@�c�A�c�>�c�?�c��x�"�y�"�~�"��"�|�"�}�"�t�"�u�"�v�"�w�"�z�"�{�"���e��e��;�#�<�#���_��_��_��_��_�h��7��8��?��@��9��:��=��>��������� ��!��"��#��$��%��&��'���(�W�)�W�*�W�+�W�,�W�-�W�{�W�.�W��4�j�5�j�2�j�3�j�8�j�7�j�9�j�6�j�	�/��0��
�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
��K��
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�������b��b��b��b��b��b��	�H�
�H��W�k��z�0�_�� �F��	�a�6�+�
�g���"�
�j�l�=��F��F�x�W�t�d�s�%���&�{�
�F��F��k��k��R��R��W��b��b�}��h�
��1�~�V��!��G��G������F�{�W���q��!�X��$��$��$��I��I�d��	�+�"�F��H�v�I����K��K�f�}�'�X���o�&��L��L�n�z��u���`�6�(�e�i�O��2� �U�!�U��U�r�X�"�F�#�F��E���m�X�$�F��O�#�U�b�`�%�Z�&�Z�*�U��O���'�f�(�f�)�`�*�`�+�]�,�]�
��)��e�	�-�A�.�A������|�%��/�`�0�`�|�I�1�c�2�c�y��3�F�4�F��W�p�t���u�G���5�>�6�>�$�I�7�a�8�a�,� ���j��9�^�:�^�
�G6�H6�y6�z6�
6�6�6�6�m6�n6�C6�D6�6�6�E6�F6�	6�
6�w6�x6�6�6�;6�<6�I6�J6�6�6�6�6�u6�v6�K6�L6�q6�r6�k6�l6�o6�p6�i6�j6�s6�t6�6�6�{6�|6�g6�h6�6�6�}6�~6�e6�f6��A�2�B�2�C�2�D�2���=��=��=��=��=��>��?��@���g�~��<��=���&��'��4��5��0��%��1��*��+��7�� ��!��$��6��#��2��.��-��"��(��)��R��3��/��,���*�r�+�r�,�r�-�r�}�r�$�r�%�r�2�r�3�r�0�!�1�!�(�r�)�r�.�r�/�r�&�!�'�!�"�r�#�r�~�r��D�2�E�2�F�2��a��b��c��d��e��f���r�9�s�9��~�'��'��'��'��'��'��'��'��'��'��'�e�(�e�%�e�&�e�,�e�*�e�+�e�)�e���
��
��
��
��
��
��
��
��
��
� �
���5��5��5��5��5��5��5��5��/�5�.�5�-�5�,�5�+�5�*�5��A��B���N�f��C�T�D�T� �E�s�F�s�G�s�H�s�I�s�J�s�!�O�C�P�C�"�K�W�L�W�M�W�N�W�O�W�#�P�[�Q�[�R�P�S�P�$�W�J�X�J�
�J��J��J��J��J��J�!�J�"�J��J��J�J�c�J�d�J��J��J�%�&�i�'�i�$�i�%�i�(�i�)�i�&��^��^��^��^��^�'�`�c�a�c�b�c�_�c�^�c�(�_�m�`�m�a�m�\�m�[�m�)�y��z��x��w��v��*�������+�9�,�,�=�%�>�%�?�%�@�%�9�%�:�%h�%�7�%�8�%�-�C�3�D�3�A�3�B�3�.��>��>��>��>�/��|��|���������'��"����������!������0���1�4�4�E4�F4�G4�H4�y4�z4�4�4�4�4�4�4�s4�t4�4�4�
4�4�I4�J4�k4�l4�C4�D4�	4�
4�u4�v4�;4�<4�g4�h4�q4�r4�w4�x4�4�4�m4�n4�K4�L4�e4�f4�o4�p4�i4�j4�{4�|4�}4�~4�4�4�2�h�.�i�.�m�.�n�.n�.p�.o�.�j�.�k�.m�.�3�O�D�P�D�4�[��\��5�u�v�G�H��b�y�z�i�j�7�8�9�:��	�}�~�u�v���)�*�Q�R��
�;�<�o�p�U�V�-�.�[�\�W�X�g�h�;�<�?�@�t� �����y�z�_�`�a���U�V�1�2��=�>�]�^�_�`�s�t�o�p�m�n�a�b�7�8�q�r�Y�Z�K�L�5�6���k�l�O�P�/�0�s�N�'�(�E�F�A�B�%�&�+�,�e�f�W�X�S�T���1�2�O�P�3�4�m�n���3�4�}�~�=�>�9�:���[�\�c�d�Q�R���I�J�?�@�E�F�C�D�
��g�h��{�|�q�r�I�J�i�j�!�"�5�6�K�L���w�x�A�B�{�|�k�l�M���c�d�w�x�K�S�T���Y�Z�G�H�M�N�]�^�e�f���#�$���C�D�6�4�k�5�k�T�k�U�k�7��2��2�8�$��%��&��'��#��"��(��!������ ��9�V�^�W�^�:��������������������� ��;�}�h�|�h�{�h�<�:��;��=�!�K�"�K�K�
�K��K��K��K��K��K�c�K�d�K��K��K�W�K�X�K��K��K�>�P�#�Q�#>�#��#��#�}�$�~�$��#��#�?�2�U�3�U��?��?�(�?�)�?�4�U�5�U�&�?�'�?�,�?�-�?�D�U�E�U�0�?�1�?�.�?�/�?�*�?�+�?�L�?�M�?��U��U��?��?�@�:�X�;�X�0�X�1�X�8�g�9�g�4�X�5�X�.�g�/�g�2�X�3�X�,�X�-�X�6�X�7�X�A>�'��'��'�P�'�Q�'�}�%�~�%��'��'�B�!�a�"�a�d�a�e�a�C�d�a�e�a�D�}�=�~�=��c��c��c��c��c��c>�c��c�E��L��L�c�L�d�L�L��L��L��L��L�W�L�X�L�
�L��L��L��L�!�L�"�L�F��5��5��5��5��5��5��5��5�G�v��s��t��u��r��(��p��q��w��x��H��M��M�W�M�X�M�c�M�d�M��M��M��M��M�M�
�M��M��M��M�!�M�"�M�I�1��2��-�P�(��r��s��s�\�r�\�)�r�+�&�,�[�.�3�q��l��o�B�p�B�3�/�j��f��g��0��d��e��/��i�v�j�v�*�C�m�[�n�[�n��m��4�/�J�r��s��4�4�n�{�m�{�)�y�0��[�9�\�9�s�x�r�x�m�]�n�]�]�9�f�{�g�{�.�5�k�{�l�{�-�R�o��p��1��t�{�/��*�'�j�{�(�{�l�{�d�{�e�{�o�]�,�`�k�r�j�r�h�{�2��q�x�p��t��3�4�q�{�+�(�i�r�K�G�A�H�A�O�A�P�A�i�A�h�A�M�A�N�A�d�A�a�A�I�A�J�A�e�A�c�A�K�A�L�A�g�A�b�A�L�q�'�r�'�$�'�%�'��'��'�}�'�~�'�u�'�v�'�y�'�z�'�s�'�t�'�&�'�w�'�x�'��'��'�#�'�{�'�|�'�M�_�|�`�|�a�|�b�|�c�|�N�=�&�>�&�9�&�:�&h�&�?�&�@�&�7�&�8�&�O��?��?��?��?�P�d�>�e�>�Q�<��=��R�"�^�#�^�%�^�$�^��^��^� �^�!�^��^�S�e�f�k�l�9�:�u�c�d�w���k�l�{�|�o�p�a�b�	�
��*�_�`�;�<���O�P�!�"�g�h�A�B�I�J�e�f�#�$���m�n���I�J����	�
�o�p�E�F�'�(���w�x�� ���
�]�^��7�8�O�P�y�z��%�&��7�8�E�F�����G�H�U�V�-�.�f�g�
��W�X�%�&��_�`�i�j�{���Q�R�c�d�3�4�}�/�0�?�@�u�v�s�t�����Q�R�!�"��1�2�y�#�$�w�x�i�j�a�b����5�6�[�\�g�h�U�V�[�\��z�K�L���y�z���{�|�-�.�+�,�,�]�^�+�,��]�^���
��t��'�(�q�r�v�W�X�~�}�~����a�b���c�d�/�0���)�*�G�H�5�6�Y�Z�	�;�<�?�@�9�:�|�e�f�����S�T�
��=�>�s�t�q�r�A�B�1�2�C�D�}�~�m�n�s�M�N�k�l�C�D���Y�Z�K�L�S�T�+�i�j������x�u�v����_�`�3�4�M�N�)�*������g�h�� ����=�>������T�/�y�]�y�^�y�_�y�`�y�U�K�?�*�:�0��h�=�e�=�m�W�n�W�t�=�g�=�3�)�-�L�i�r�j�r�)�m�2��.�.�o�D�p�D�r�|�s�|�k�=�l�=�4�)�+�"�f�=�,�-�/��d�=�q�=�1��(�=�V�}�'�|�'�{�'�W�U�O�T�O�f�O�g�O�X�d��e��!��"��Y�8�T�h�T�i�T�j�T�k�T�l�T�m�T�n�T�Z��q��q��q��q�{�q�|�q�y�q�z�q�k�q�}�q�~�q��q��q��q�[�d��e��\�[��\��]��(��(��(��(��(��(��(�~�(��(��(�^���.�f��+��,��-��_�-��$����������"��%������!��.��'������#�� ��&������`�Y�'�X�'�
�'�\�'�V�'�0�'�1�'�[�'�W�'�Z�'�ao�+m�+�j�+�k�+p�+n�+�m�+�n�+�h�+�i�+�b�D_�E_�P_�Q_�\_�]_�:_�;_�<_�=_�>_�?_�`_�a_�L_�M_�R_�S_�T_�U_�b_�c_�_�_�H_�I_�^_�__�N_�O_�J_�K_�B_�C_�X_�Y_�Z_�[_�c�]�1�^�1�_�S�`�S�d�
�N��N�c�N�d�N�W�N�X�N�!�N�"�N��N��N��N��N�N��N��N��N��N�e��@��@��@��@�f�7�'�8�'�9�'�:�'�?�'�@�'�=�'�>�'h�'�g�d�?�e�?�h�&�(��(��(�s�(�t�(�w�(�x�(��(��(�y�(�z�(�u�(�v�(�%�(�}�(�~�(�{�(�|�(�$�(�#�(�q�(�r�(�i�:�R�;�R�N�R�O�R�B�R�C�R�@�R�A�R�H�_�I�_�>�R�?�R�F�R�G�R�J�_�K�_�j�&�@�'�@��@��@��@��@�L�@�M�@�0�@�1�@�(�@�)�@�.�@�/�@�D�V�E�V�4�V�5�V�,�@�-�@�*�@�+�@�2�V�3�V��V��V�k�]�2�^�2�_�T�`�T�l�d�b�e�b�!�b�"�b�m�C�4�D�4�A�4�B�4�n��p��p��p��p� �p�!�p�8�p�$�p�%�p�7�p�,�p�-�p�o�r� �s� �� �	� �� �� �� �� �x� �y� �~� �� �h� �i� �� �� �n� �o� �p�P�$�Q�$�>�$�?�$�D�$�E�$�T�$�U�$�X�$�Y�$�`�$�a�$�Z�$�[�$�<�$�=�$�:�$�;�$�q��6��6��6��6��6��6�$�6�%�6��6��6� �6�!�6�"�6�#�6��6��6��6��6�r��O��O�c�O�d�O�O�
�O��O�W�O�X�O��O��O�!�O�"�O��O��O��O��O�s�,�+�-�.�*�7�5�(�)�3� �!�"�#�1�'�/�6�0�%�$�4�&�R�2�t�d�b�e�b�u�*�o�+�o�"�o�#�o�,�o�-�o�&��'��2�o�3�o�}�o�(�o�)�o�0��1��~�o�$�o�%�o�.�o�/�o�v�g� �� �w�k�l�3�4���*��E�F�=�>�5�6���S�T��c�d�#�$�g�h��+�,�-�.�c�d���=�>�� �i�j�
��{�|���w�x�O�P��M�N�!�"�
���;�<�5�6�q�r���]�^����g�h�z�c�d�]�^�W�X�C�D��a�b�	�m�n���?�@�~���9�:�s�t�u�v�s���i�j�A�B��a�b�{�#�$�Y�Z��E�F�w�����)�*��}��q�r��-�.���[�\�I�J�/�0�k�l�K�L�K�L���e�f�	�
�_�`�9�:�x�u�y�'�(�;�<����S�T�1�2�i�j���}�~�}�~�G�H�+�f�g�Q�R�e�f��� �]�^���
��)�*���v�k�l�	�
�o�p���W�X���O�P�{�|�|�%�&�M�N���,�[�\�/�0�+�,���y�z��_�`�!�"�o�p�
�Y�Z�a�b�t�G�H���g�h��U�V�3�4�%�&�m�n���u�v����y�z�e�f�U�V�1�2�����?�@�'�(�7�8���7�8���I�J�A�B�_�`�w�x�s�t���C�D���Q�R�x�h�D�i�D�j�D�y�5�5�K5�L5�g5�h5�q5�r5�5�5�5�5�{5�|5�
5�5�5�5�}5�~5�	5�
5�I5�J5�C5�D5�5�5�5�5�i5�j5�m5�n5�s5�t5�k5�l5�u5�v5�o5�p5�y5�z5�5�5�G5�H5�w5�x5�;5�<5�E5�F5�e5�f5�z�<��=��{�;�$�<�$�|��)��)��)��)��)�~�)��)��)��)��)�}�`�g�a�g�Z�g�[�g�c�g�d�g��g�X�g�Y�g�b�g�^�g�_�g�\�g�]�g�~�-��.�f��+��,�����f�F�g�F��!�P�"�P��P��P��P��P�P�W�P�X�P��P��P��P��P�
�P��P�c�P�d�P���E��E��E��E�
�E��E��E��E��E��E��E��E�	�E�
�E��"�p�#�p�.�p�/�p�&��'��~�p�2�p�3�p�}�p�$�p�%�p�*�p�+�p�,�p�-�p�0��1��(�p�)�p��_�z�`�z�/�z�]�z�^�z����������'�������z��z�!��"������������7�
�7��!��"��d��e���2�W�3�W�D�W�E�W��W��W�&�A�'�A�0�A�1�A�,�A�-�A�4�W�5�W�(�A�)�A��A��A��A��A�*�A�+�A�.�A�/�A�L�A�M�A���Q��Q��Q��Q�c�Q�d�Q��Q��Q�W�Q�X�Q��Q��Q�Q�!�Q�"�Q�
�Q��Q�	�d��e��
�P��Q��V����9��k�l������}�~���-�.�G�H�%�&���g�h�w�x�g�h����Y�Z�_�`�{�|�+�,�c�d�M�N�c�d��s�t�A�B�o�p�{�|���]�^����{���q�r�y�=�>���y�z�,�Q�R�W�X�]�^���w�x������}�~�|�U�V���;�<�C�D�f�g�*�E�F�U�V�)�*�_�`���-�.�E�F�K�L�[�\��~�?�@�/�0�� ��Q�R�����%�&�!�"��}�#�$�e�f���Y�Z����m�n���'�(����9�:�/�0�m�n�	�u�'�(�5�6�;�<�s�t�W�X���9�:�1�2�I�J�y�z�3�4��7�8�i�j�o�p�7�8�s�=�>�	�
�G�H���_�`�A�B�O�P���I�J���S�T�!�"�S�T�k�l�i�j��K�L�?�@�t�5�6�u�v�]�^�e�f�3�4�w�q�r�
��C�D�x�a�b�	�
��
�v�a�b�k�l����1�2��)�*��c�d�i�j���g�h�u�v�+�,�+��e�f�
���a�b�
�����z���M�N�� �#�$���O�P�[�\�
��6��6��6��6��6��6��6��6���(��(>�(��(��(�P�(�Q�(�}�'�~�'���R��R��R��R��R��R��R��R�!�R�"�R�W�R�X�R�
�R��R�R�c�R�d�R��=}�>}�9}�:}�W}�X}�;}�<}�S}�T}�U}�V}�5}�6}�]}�^}�9}�[}�\}�Y}�Z}�Q}�R}�7}�8}�_}�`}�3}�4}��`��`��Y�<�Z�<�S�<�T�<�_�<�`�<�U�<�V�<�W�<�X�<�Q�<�R�<�]�<�^�<�[�<�\�<��Sy�Ty�9y�:y�Uy�Vy�[y�\y�Wy�Xy�7y�8y�Yy�Zy��_��_�]y�^y�3y�4y�Qy�Ry�=y�>y�5y�6y�_y�`y�9y�;y�<y��w�0�x�0�}�0�v�0�~�0�|�0�{�0�y�0�z�0�u�0���$��$��$��$>�$�}�&�~�&�P�$�Q�$��-��.��+��,���f���H�,�I�,�J�,���*��*��*��*��*��*��*��*�~�*��*��k�Q�l�Q�m�Q�n�Q�o�Q�p�Q�q�Q�r�Q��<��=���d�@�e�@��;�%�<�%���A��A��A��A��s�S�t�S��=�"�>�"�9�"�:�"�7�"�8�"h�"�?�"�@�"��C�5�D�5�A�5�B�5� ��r��r�y�r�z�r��r��r�{�r�|�r�k�r�}�r�~�r��r��r��r�!�j�U�k�U�8�U�l�U�m�U�n�U�h�U�i�U�"�:�e��e�|�e�{�e�}�e�~�e�#�i��j��c��d��e��f��g��h��`��$�n�M�o�M�j�M�k�M�l�M�m�M�p�M�q�M�%�W�S�X�S��S��S�c�S�d�S�S�
�S��S��S��S�!�S�"�S��S��S��S��S�&�d�l�e�l�!�l�"�l�'�d�l�e�l�(�%�)�$�)�}�)�~�)��)��)�u�)�v�)�y�)�z�)�w�)�x�)�#�)�{�)�|�)�q�)�r�)�&�)��)��)�s�)�t�)�)��T��T��T�*�(�X�)�X�,�X�-�X�{�X�*�X�+�X�.�X�+�_�n�`�n�[�n�\�n�a�n�,�k�~�l�~�/��(�~�l�~�m�~�j�~�]�:�\�:�)�v�3�1�4�1�q�y�r�y�o�^�n�^�1��[�:�i�s�j�s�d�~�e�~�,�a�r��s��q�~�.�6�-�S�k�s�s�y�f�~�g�~�m�^�t�~�o��p��p��*�(�+�)�t��h�~�n�~�0��2��-�S�T�k�l�7�8�����I�J���E�F�1�2�9�:�W�X�m�n�K�L�W�X���S�T�i�j�+�,�g�h�_�`�_�`�y�z���a�b�E�F��	�=�>�q�r�=�>�Y�Z�{�|�o�p�O�P�5�6�y�z�3�4�u�v�Q�R��[�\�1�2�Y�Z�3�4�m�n���G�H�]�^�M�N�}�~�]�^�o�p�A�B���7�8�K�}�~�w�x�K�L��
�c�d�9�:���?�@�O�P�Q�R�e�f�c�d�U�V�� �)�*�u�v���G�H���q�r�U�V�#�$�g�h�w�x�i�j�e�f�!�"�I�J�M�N�A�B�����/�0��%�&�a�b�;�<�[�\�5�6�-�.�s�t�C�D���C�D�s�t�{�|�'�(�?�@�
����;�<�k�l�.p�,�h�,�i�,n�,�m�,�n�,m�,�j�,�k�,o�,�/��3��3�0�4�l�5�l�T�l�U�l�1��T��T��T��T��T��T��T��T�W�T�X�T�!�T�"�T�
�T��T�c�T�d�T�T�2�:��;��3��Z��Z��Z��Z��Z��Z�4�K��F��N��O��S��R��E��I��J��L��M��G��H��P��Q��C��D��5�x�b�w�b�y�b�z�b�v�b�6�R�Q�S�Q�7�!�m�"�m�d�m�e�m�8�m�-�n�-n�-p�-�j�-�k�-o�-�h�-�i�-m�-�9�d�m�e�m�:�B�S�C�S�F�S�G�S�@�S�A�S�H�`�I�`�J�`�K�`�:�S�;�S�N�S�O�S�>�S�?�S�;�(�=�)�=�L�=�M�=�&�=�'�=�2�X�3�X�4�X�5�X�,�=�-�=�0�=�1�=�D�X�E�X��=��=�*�=�+�=��X��X��=��=�.�=�/�=�<�d�	�e�	�!�	�"�	�=�d�	�e�	�>�u�\�v�\�w�\�x�\�y�\�z�\�{�\�|�\�}�\�?�7�#�8�#�=�#�>�#�9�#�:�#�?�#�@�#h�#�@�<��=��A�A�6�B�6�C�6�D�6�B��B��B��B��B�C�,�q�-�q�$�q�%�q�8�q��q��q��q��q�7�q� �q�!�q�D�r�!�s�!��!��!��!��!��!��!�n�!�o�!�h�!�i�!�x�!�y�!�~�!��!��!�	�!�E�<�%�=�%�:�%�;�%�>�%�?�%�D�%�E�%�P�%�Q�%�`�%�a�%�T�%�U�%�X�%�Y�%�Z�%�[�%�F��7��7��7��7��7��7�"�7�#�7� �7�!�7��7��7��7��7��7��7�$�7�%�7�G��U��U�c�U�d�U�
�U��U�U�W�U�X�U��U��U�!�U�"�U��U��U��U��U�H��5��5��5��5�
�5��5��5�	�5��5��5��5�
�5�I��+��+��+��+��+��+��+��+�~�+��+�J���.��+��,�f��-��K�~�1�|�1�u�1�v�1�}�1�{�1�w�1�x�1�y�1�z�1�L��<��<��<��<�M�
�V��V�V��V��V��V��V��V��V�c�V�d�V�!�V�"�V��V��V�W�V�X�V�N�T�m�U�m�4�m�5�m�O�O�E�P�E�P�!�
�"�
�d�
�e�
�Q�d�
�e�
�R�~����������S�e��d��a��b��c��f��T��!�g�!�U�=�$�>�$�?�$�@�$�7�$�8�$h�$�9�$�:�$�V�g��W�<��=��X��f��f�Y��C��C��C��C�Z�C�7�D�7�A�7�B�7�[�Nc�Mc�Ac�Tc�Pc�Gc�@c�Ec�����Hc�Qc�Bc�Cc�Rc�Kc�Sc�=c�>c�Lc�Oc�Ic�Fc�Jc�Dc�?c�\�T�x�U�x�4�x�5�x�]�z�#�{�#�|�#�}�#�v�#�w�#�x�#�y�#�~�#��#�t�#�u�#�^�C/�D/�y/�z/�}/�~/�/�/�u/�v/�w/�x/�I/�J/�/�/�g/�h/�E/�F/�e/�f/�q/�r/�;/�</�{/�|/�/�/�
/�/�s/�t/�/�/�/�/�k/�l/�i/�j/�	/�
/�G/�H/�/�/�/�/�K/�L/�o/�p/�/�/�m/�n/�_�@�d�A�d�>�d�?�d�`�>`�?`�\`�]`�J`�K`�N`�O`�Z`�[`�X`�Y`�<`�=`�H`�I`�P`�Q`�L`�M`�^`�_`�:`�;`�B`�C`�``�a`�`�`�D`�E`�T`�U`�b`�c`�R`�S`�a�
�4��4��4�
�4��4�	�4��4��4��4��4��4��4�b�N�g�c��Q��Q�	�Q�
�Q��Q��Q�d�V�C�W�C�[�C�U�C�X�C�O�C�P�C�T�C�Y�C�Z�C�R�C�S�C�Q�C�\�C�e��M��M�f�
�h��h��h��h��h�g��>��>��>��>��>��>��>��>��>��>�h�D�}�C�}�B�}�i���������8�� ��!��j�"�Y�#�Y�k�u�7�v�7�}�7�~�7�|�7�w�7�x�7�{�7�y�7�z�7�l��,��,��,��,��,�~�,��,��,��,��,�m�G��F��n�B��C��o�$�!�%�!�&�!�'�!�(�!�)�!�*�!�+�!�,�!�p�;�&�<�&�q�-�<�.�<�/�<�0�<�1�<�2�<�3�<�4�<�5�<�6�<�7�<�8�<�9�<�:�<�;�<�<�<�=�<�>�<�r�?�N�@�N�s��F�t�2�s�3�s�}�s�"�s�#�s�0�"�1�"�.�s�/�s�&�"�'�"�(�s�)�s�,�s�-�s�*�s�+�s�$�s�%�s�~�s�u�A�Y�A�Y�B�Y�B�Y�C�Y�D�Y�E�Y�F�Y�v�f�P�g�P�U�P�T�P�w�J�-�I�-�H�-�x�a�p�\�p�_�p�`�p�[�p�y�-��.��+��,�f����z�G�#�H�#�I�#�{�|�}�}�}�x�}�y�}�z�}�{�}�|�J�T�K�T�L�T�M�T�}�j�V�k�V�n�V�l�V�m�V�h�V�i�V�8�V�~��-��-��-�~�-��-��-��-��-��-��-��{�8�|�8�}�8�v�8�~�8�y�8�z�8�u�8�w�8�x�8��q�r���U�V�S�T���9�:�}�~�M�N�u�v�W�X�;�<���w�x�k�l�m�n�_�`�+�,�-�.�!�"�_�`�Y�Z�o�p�m�n�
��W�X�E�F���K�;�<�G�H�#�$�N�O��b�?�@�s�t���g�h�Y�Z�7�8�t� �Q�R�I�J�)�*�A�B�����G�H�1�2�a�b�3�4�=�>�3�4�g�h�=�>���/�0�c�d�C�D�c�d�u�v�K�L�S�T�y�z�O�P�'�(�����M�N�Q�R����e�f�P�Q��	�5�6�a�I�J�]�^�w�x�K�L�y�z�[�\�9�:�s�{�|�E�F�i�j�k�l�}�~�O�P�%�&�e�f�1�2���C�D�i�j�{�|�7�8�?�@�U�V���o�p�q�r���
�5�6���A�B�]�^�[�\��7�)�8�)�?�)�@�)h�)�9�)�:�)�=�)�>�)���f��f��f��f��f��f���7��Q�4���D��D��D��D��-�	�.�	f�	�+�	�,�	��	��b�h�a�h�\�h�]�h�^�h�_�h�c�h�d�h�`�h�Z�h�[�h��h�X�h�Y�h���4��4�	�T�y�U�y�4�y�5�y�
�H�.�I�.�J�.���U��U��U��R�B�S�B�L�B�M�B�T�B�U�B�D�x�E�x�V�B�W�B�X�x�Y�x�Z�x�[�x�\�B�]�B�^�x�_�x�`�B�a�B�b�B�c�B�d�B�e�B�f�x�g�x�h�B�i�B�
���������~���d��e����6��6��6�	�6�
�6��6�
�6��6��6��6��6��6��d��e��!��"���j�i�k�i�l�i�m�i��n�q�o�q�p�q�q�q�r�q�s�q���W��W�W�c�W�d�W��W��W�
�W��W�!�W�"�W�W�W�X�W��W��W��W��W��f�G�g�G���?��?��?��
�[��[��[��[��[��[��[��[�[��[��[�W�[�X�[�!�[�"�[�c�[�d�[��!�
�"�
�d�
�e�
���8��8��8�
�8��8�
�8��8��8�	�8��8��8��8��d�
�e�
��B�~�C�~�D�~���2�	�2�
�2��2�M�2��2�
�2���*��*��*��*�}�*�~�*�w�*�x�*�q�*�r�*�y�*�z�*�#�*�$�*�%�*�&�*�{�*�|�*�u�*�v�*�s�*�t�*��t�G�u�G�v�G��S���e� �i� �h� �c� �b� �d� �=� �a� �g� �M� �N� �<� �G� �H� �O� �P� �I� �J� �K� �L� � �E�Z�F�Z�A�Z�A�Z�B�Z�C�Z�D�Z�B�Z�!�X�&�Y�&�P�&�Q�&�<�&�=�&�>�&�?�&�T�&�U�&�`�&�a�&�Z�&�[�&�:�&�;�&�D�&�E�&�"�"�8�#�8��8��8��8��8� �8�!�8��8��8��8��8��8��8�$�8�%�8��8��8�#�
�\��\�c�\�d�\��\��\��\��\��\��\�\�W�\�X�\�!�\�"�\��\��\�$�N�h�%�:��;��&�!��"���� ��b��'��"� �"�b�"�=�"�"�"�!�"�(�s�r�o�r�n�r�r�r�q�r�p�r�)�6��7��(��)��*��+��2��3��"��#��.��/��4��5��0��1������ ��!��8��9��&��'��,��-��$��%��*�,�=�-�=�&�=�'�=�8�=�9�=�(�=�)�=�"�=�#�=� �=�!�=�,�m�-�m��=��=�.�=�/�=�$�=�%�=�4�=�5�=�*�=�+�=�+�y�J�z�J�,�=�(�>�(�9�(�:�(h�(�?�(�@�(�7�(�8�(�-��E��E��E��E�.�{�"�|�"�}�"�/�!�k�"�k�d�k�e�k�0�+��,�f��-��.����1�~��������������������2�~�<�|�<�y�<�z�<�u�<�v�<�{�<�}�<�w�<�x�<�3�d�k�e�k�4�~�d��d�5��[��[�[�c�[�d�[��[��[�W�[�X�[�'�[�(�[��[��[�
�[��[�!�[�"�[��[��[�6�?�+�@�+�7�+�8�+�9�+�:�+h�+�=�+�>�+�7�����8�!��"��d��e��9�j� �k� �m� �n� n� �f� �g� m� p� �h� �i� o� �:�{�a�|�a�}�a�;��\��\�\�!�\�"�\�
�\��\�c�\�d�\�W�\�X�\�'�\�(�\��\��\��\��\��\��\�<�F��=��s��s�8�s� �s�!�s��s��s�7�s�,�s�-�s�$�s�%�s�>�:�(�;�(�X�(�Y�(�T�(�U�(�Z�(�[�(�<�(�=�(�D�(�E�(�P�(�Q�(�`�(�a�(�>�(�?�(�?�"�:�#�:��:��:��:��:��:��:� �:�!�:�$�:�%�:��:��:��:��:��:��:�@�:�f�}�f�~�f��f�|�f�{�f�A��8��8��8��8��8��8��8��8�B�!�]�"�]�c�]�d�]��]��]�W�]�X�]�
�]��]��]��]�]��]��]��]��]�'�]�(�]�C�����%��!��"��.��'������-��#������&�� ��$����������D�4"�"�"�"�("�."�7"�""�1"�-"�2"�/"�"�q"�r"�*"�%"�$"�&"�3"�{"�|"�)"�"�"�"�$"�"�"�&"� "�"�#"�"�s"�t"�u"�v"�'"�"�"�w"�x"�"�%"�"�	"�,"�#"�
"�"�}"�~"�"�
"�!"�"�+"�"�"�"�"�"�0"�6"�"�"�y"�z"�"�"�5"�E�d��e��!��"��F�d��e��G��
��
� �
�!�
��
��
��
��
��
�H�!�^�"�^��^��^�W�^�X�^�
�^��^�'�^�(�^�^��^��^��^��^��^��^�c�^�d�^�I�~�v��v��v��v��v��v�J��� ��!��"��b��K�����������L����������� ��!��"��#��$��M�V� �U� �T� �N�d��e��O�1�f�2�f�3�f�4�f��f�5�f�P�{�b�|�b�}�b�Q�]��\��R�
�]��]��]��]�!�]�"�]��]��]�]��]��]�W�]�X�]�c�]�d�]��]��]�S��_��_�_��_��_�c�_�d�_��_��_�W�_�X�_�
�_��_�'�_�(�_��_��_�!�_�"�_�T�%�7�&�7�U��:�V�'=�(=�)=�*=�+=�,=�-=�.=�/=�0=�1=�2=�3=�4=�5=�6=�7=�8=�9=�:=�;=�<=�==�>=�?=�@=�A=�B=�C=�D=�E=�F=�G=�H=�I=�J=�K=�L=�M=�N=�O=�P=�Q=�R=�S=�T=�U=�V=�W�W<�X<�Y<�Z<�[<�\<�]<�^<�_<�)<�*<�`<�a<�b<�c<�d<�e<�f<�g<�h<�i<�I<�j<�k<�l<�m<�n<�o<�p<�q<�r<�s<�t<�u<�v<�w<�x<�y<�F<�G<�z<�{<�|<�}<�~<�<�<�<�X�[�q�\�q�_�q�`�q�a�q�Y�}�c�|�c�{�c�Z�O�O�O�O�O�O�O�	O�
O�O�O�
O�O�O�O�O�O�O�O�O�O�O�O�O�O�O�O�O�O�O� O�!O�"O�#O�$O�%O�&O�'O�(O�)O�*O�+O�,O�-O�[�}�i�|�i�{�i�\�
�8��8�]�c�`�d�`�'�`�(�`��`��`�W�`�X�`�
�`��`��`��`�`��`��`�!�`�"�`��`��`�^�@�e�A�e�>�e�?�e�_��>��>��>��>��>��>�
�>��>�
�>��>�	�>��>�`�h�!�i�!�j�!�k�!p�!n�!m�!o�!�f�!�g�!�m�!�n�!�a�!�a�"�a��a��a��a��a�'�a�(�a��a��a�W�a�X�a�a�
�a��a�c�a�d�a��a��a�b�.�R�/�R�0�R�1�R�c�/��0��2��2��1��d��9��9��9��9��9��9��9��9�e�d��e��!��"��f�c�b�d�b��b��b��b��b�W�b�X�b�
�b��b��b��b��b��b�!�b�"�b�b�'�b�(�b�g��)��)��)��)>�)�}�)�~�)�P�)�Q�)�h>�%�}�(�~�(��%��%�P�%�Q�%��%��%�i�6�<�7�<�j�d��e��k�Yz�Zz�]z�^z�9z�:z�5z�6z�Qz�Rz�[z�\z�Sz�Tz�3z�4z�Wz�Xz�9z�7z�8z�_z�`z�;z�<z�Uz�Vz�=z�>z�l�]s�^s�7s�8s�=s�>s�Qs�Rs�Us�Vs�3s�4s�;s�<s�9s�_s�`s�Ss�Ts�Ws�Xs�[s�\s�Ys�Zs�5s�6s�9s�:s�m�S�>�T�>�Q�>�R�>�W�>�X�>�Y�>�Z�>�[�>�\�>�]�>�^�>�_�>�`�>�U�>�V�>�n�O�F�P�F�o�}�=�v�=�y�=�z�=�~�=�|�=�u�=�{�=�w�=�x�=�p�����������~����������q�'�c�(�c��c��c�c�c�d�c�
�c��c�W�c�X�c��c��c��c��c�c��c��c�!�c�"�c�r�8�}�9�}�:�}�;�}�<�}�=�}�>�}�?�}�@�}�A�}�B�}�s�+�
�,�
f�
��
�.�
�-�
�t�&�#�'�#�2�t�3�t�$�t�%�t�(�t�)�t�}�t�*�t�+�t�0�#�1�#�.�t�/�t�,�t�-�t�"�t�#�t�~�t�u�b�g�_�g�^�g�`�g�a�g�v�d�W�d�X�d��d��d�
�d��d�c�d�d�d�!�d�"�d��d��d�'�d�(�d��d��d��d��d�w�C�!�D�!�x��e��e�W�e�X�e��e��e�c�e�d�e�'�e�(�e�
�e��e�!�e�"�e��e��e�e��e��e�y�^�i�_�i�Z�i�[�i�c�i�d�i�X�i�Y�i�`�i�a�i��i�b�i�\�i�]�i�z��f��f��f��f�f�W�f�X�f��f��f�
�f��f��f��f�!�f�"�f�'�f�(�f�c�f�d�f�{�%�8�&�8�|h�,�?�,�@�,�=�,�>�,�9�,�:�,�7�,�8�,�}�u��v����E��F����G��H��w��x��I��J��Y��~�u�u�v�u�y�u�z�u�E�u�F�u�{�u�|�u�w�u�x�u��d�r�e�r�!�r�"�r��!��"��(��'������$��%��&�� ��#�������K��L�����>��P��Q������}�.�~�.��d�r�e�r���g��g�W�g�X�g��g��g�!�g�"�g��g��g�g��g��g�'�g�(�g�
�g��g�c�g�d�g��
�^��^��^��^�^�!�^�"�^�c�^�d�^��^��^�W�^�X�^��^��^��^��^��M�q�N�q�O�q�P�q�Q�q�R�q�S�q�T�q�U�q�V�q��u�\�v�\�{�\�|�\�y�\�z�\�w�\�x�\������'��!��"�������������������!�h�"�h��h��h�'�h�(�h�c�h�d�h��h��h��h��h�
�h��h��h��h�h�W�h�X�h�	�M��N��g��W��X��i��d��O��P��<��h��=��e��a��K��L��Y��Z��b��c��G��H��I��J��
�i��i��i��i��i�W�i�X�i��i��i��i��i�'�i�(�i�
�i��i�c�i�d�i�!�i�"�i��O�-�P�-�R�-�N�-�Q�-�M�-��_r�`r�Sr�Tr�5r�6r�;r�<r�Wr�Xr�9r�9r�:r�=r�>r�Yr�Zr�3r�4r�[r�\r�Qr�Rr�Ur�Vr�7r�8r�]r�^r�
�W�-�X�-�Y�-�Z�-�U�-�V�-�]�-�^�-�Q�-�R�-�S�-�T�-�[�-�\�-�_�-�`�-��o�o�p�o�m�o�n�o�q�o�r�o�k�o�l�o�i�o�j�o��7~�8~�3~�4~�9~�:~�W~�X~�=~�>~�[~�\~�5~�6~�Q~�R~�S~�T~�_~�`~�;~�<~�]~�^~�U~�V~�9~�Y~�Z~��[�a�\�a��x��y��|��}��z��{���W�j�X�j�j�'�j�(�j��j��j�!�j�"�j�
�j��j��j��j�c�j�d�j��j��j��j��j��
�?��?��?��?��?��?�
�?��?�	�?��?��?��?���H��H��H��H�0�H�1�H�2��3��,�H�-�H�4��5��.�H�/�H�*�H�+�H�����&�H�'�H�(�H�)�H��\�C�]�C�h�C�i�C�b�C�c�C�X�|�Y�|�`�C�a�C�D�|�E�|�f�|�g�|�d�C�e�C�Z�|�[�|�T�C�U�C�R�C�S�C�^�|�_�|�L�C�M�C�V�C�W�C��d��e��!��"����������W�k�X�k�k��k��k�'�k�(�k��k��k��k��k�!�k�"�k��k��k�
�k��k�c�k�d�k��d��e���8�t��t��t� �t�!�t��t��t�,�t�-�t�$�t�%�t�7�t��<�)�=�)�D�)�E�)�X�)�Y�)�`�)�a�)�P�)�Q�)�>�)�?�)�Z�)�[�)�T�)�U�)�:�)�;�)��$�;�%�;��;��;��;��;�"�;�#�;��;��;��;��;��;��;� �;�!�;��;��;��f��b��a��e��d��c���g��h��`��c��d��i��j��e��f���=�$�"�$�b�$��$� �$�!�$� �!�W�l�X�l�!�l�"�l�c�l�d�l��l��l�l��l��l��l��l�'�l�(�l�
�l��l��l��l�"��� ��������������������#�&�>�'�>�$�>�%�>�,�>�-�>�*�>�+�>�(�>�)�>�.�>�/�>� �>�!�>��>��>�8�>�9�>�,�n�-�n�"�>�#�>�4�>�5�>�$�;�*�<�*�%��m��m�m��m��m��m��m�
�m��m�!�m�"�m��m��m�'�m�(�m�W�m�X�m�c�m�d�m�&�Q�r�R�r�U�r�V�r�M�r�N�r�O�r�P�r�S�r�T�r�'��9�
�9��9�	�9��9��9��9��9�
�9��9��9��9�(���������!��"��c��d��'��(��
���������W��X������)�M�X�N�X�K�X�L�X�O�X�*h�/�=�/�>�/�7�/�8�/�9�/�:�/�?�/�@�/�+��@��@��@��@��@�	�@��@�
�@��@��@�
�@��@�,�!�%�"�%�b�%��%� �%�=�%�-�g��b��Y��Z��K��L��e��<��h��a��c��W��X��d��=��O��P��G��H��i��M��N��I��J��.�f�H�g�H�/�~�w��w��w��w��w��w�0�������1�z��{��|��}��x��y��2�V�_�W�_�3�4�c��d��f��b��e��a��5�;�+�<�+�6������������������� ����7�s�m�o�m�p�m�q�m�n�m�r�m�8��i��i�9�|�&�}�&�z�&�{�&�x�&�y�&�v�&�w�&�t�&�u�&�~�&��&�:�b�r�c�r�d�r�e�r�f�r�g�r�h�r�i�r�;�!��������������"����������'��<�Q�s�R�s�M�s�N�s�O�s�P�s�S�s�T�s�U�s�V�s�=�:��>�[�u�\�u�a�u�_�u�`�u�?�d��e��!��"��@�j�{�k�{�l�{�m�{�n�{�A�a�]�b�]�B�9�0�:�0h�0�7�0�8�0�=�0�>�0�?�0�@�0�C�f�"�g�"n�"m�"o�"�o�V�p�V�j�"�k�"�m�"�n�"p�"�h�"�i�"�D�q�h�r�h�s�h�t�h�E�'��(������!��"���c��d������W��X��
������������F�_��`��]��^��a��G�u�z�v�z�W�z�X�z�w�z�x�z�H��H��H��H��H�I��X��X��X�J�}�d�|�d�{�d�K��n��n�
�n��n�W�n�X�n��n��n�'�n�(�n��n��n�!�n�"�n��n��n�c�n�d�n�n�L�y�h�z�h�v�h�w�h�y�h�z�h�x�h��h�M��A��A��A�	�A��A�
�A��A��A��A��A�
�A��A�N�o�W�o�X�o��o��o��o��o��o��o�!�o�"�o��o��o�'�o�(�o�c�o�d�o�
�o��o�O�!�s�"�s�d�s�e�s�P��:��:��:��:��:��:��:��:�Q�r��s��k�|�l�|�2��+�*�i�t�j�t�q�z�r�z�-�T�h�|�e�|�k�t�o��p��s�z�j�|�m�_�n�_�.�7�,�b�q�|�3�2�n�|�m�|�o�_�)�w�]�;�\�;�[�;�p��*�)�0��4�2�l�|�d�|�t��(�|�/��1��t�|�g�|�f�|�R�4�t�5�t�T�t�U�t�S�E�v�F�v�y�v�z�v�u�v�v�v�{�v�|�v�w�v�x�v�T�u��v��G��H����I��J��E��F��w��x����Y��U�B�t�A�t�@�t�>�t�?�t�V�>�c�?�c�<�c�=�c�@�c�A�c�B�c�C�c�F�c�G�c�D�c�E�c�<�c�W�
�p��p�W�p�X�p�c�p�d�p��p��p�!�p�"�p�'�p�(�p��p��p�p��p��p��p��p�X�M�M�M�M�nM�oM�M�M�M�	M�M�M�M�
M�M�M�pM�qM�
M�M�M�M�M�M�M�M�zM�{M�xM�yM�M�M�rM�sM�~M�M�|M�}M�lM�mM�M�M�tM�uM�vM�wM�M�M�M�M�Y�w�2�x�2�~�2�|�2�u�2�v�2�{�2�y�2�z�2�}�2�Z�7�1�8�1�=�1�>�1�?�1�@�1�9�1�:�1h�1�[�C�:�D�:�A�:�B�:�\�~�-��-��-��-��-��-��-�]�-��.�f����+��,��^�z�M�y�M�x�M�_�]�4�^�4�_�V�`�V�`�������a�!��"��d��e��b�
�B��B��B��B��B��B�
�B��B�	�B��B��B��B�c�%�9�&�9�d��2��2�e�:��;��f�d�s�e�s�g�}�u�&�$�'�$�2�u�3�u�0�$�1�$�.�u�/�u�*�u�+�u�,�u�-�u�"�u�#�u�~�u�(�u�)�u�$�u�%�u�h��
��
��
��
��
��
��
��
��
��
� �
�i�W�_�X�_��_��_��_��_�_�!�_�"�_�
�_��_�c�_�d�_��_��_��_��_�j�V�D�W�D�`�D�a�D�T�D�U�D�^�y�_�y�b�D�c�D�X�y�Y�y�d�D�e�D�h�D�i�D�D�y�E�y�L�D�M�D�f�y�g�y�Z�y�[�y�\�D�]�D�R�D�S�D�k�����(�E�)�E�*�E�+�E��E��E��E��E�,�E�-�E�4��5��2��3��&�E�'�E�0�E�1�E�.�E�/�E�l�{�j�|�j�}�j�m�
�:��:��:��:��:��:�
�:��:��:�	�:��:��:�n�d��e��o��T��T�	�T�
�T��T��T�p��	��	��	��	��	��	�H�	�
�	��	��	��	�	�	�
�	�G�	��	��	��	��	�q�
�
��
�H�
��
��
��
��
��
��
��
��
��
��
��
��
�G�
�	�
�
�
�r�4�z�5�z�T�z�U�z�s�N�i�t��V��V��V�u�!��"��d��e��v�_��`��a��^��]��w�}�:�v�:�y�:�z�:�u�:�{�:�|�:�w�:�x�:�~�:�x��/��/�~�/��/��/��/��/��/��/��/�y��7��7��7��7��7��7��7��7�z��;�	�;��;�
�;��;��;��;��;��;�
�;��;��;�{n��m��n��j��k�p�o�m��o�U�p�U�f��g��h��i��|�d�A�e�A�}�,�r�-�r� �r�!�r�7�r�$�r�%�r�8�r��r��r��r��r�~�X�'�Y�'�P�'�Q�'�Z�'�[�'�<�'�=�'�`�'�a�'�>�'�?�'�:�'�;�'�T�'�U�'�D�'�E�'���9��9�$�9�%�9��9��9��9��9��9��9��9��9�"�9�#�9� �9�!�9��9��9���R��R�c�R�d�R�R�W�R�X�R�
�R��R��R��R��R��R�'�R�(�R��R��R�!�R�"�R���U��U�	�U�
�U��U��U��d��e���d��e���(��w��x��p��q��t��u��v��s��r���H�H�H�H�nH�oH�H�
H�xH�yH�rH�sH�H�	H�tH�uH�lH�mH�H�H�H�H�H�H�H�H�|H�}H�H�H�H�H�
H�H�~H�H�H�H�zH�{H�H�H�H�H�H�H�vH�wH�pH�qH��d�h�e�h�!�h�"�h��d�h�e�h��	�/�.�]�.�^�.�
�.��.�_�.�`�.�
��g��g��g��g��g��g��e��f��i��j��g��h��`��c��d��f��+��,��-��.����
�_�U�`�U�]�3�^�3��\��]���S�,��,��H�/�I�/�J�/��#��"��&��'������ ��!��$��%��(���������������o��o��~�;�|�;�y�;�z�;�w�;�x�;�}�;�v�;�{�;�u�;��~���������������������Z�[�=�[�\�[��n��n�]�[�Y�[��n��n�[�[�X�[��n��n��[�E�X�E�\�E�Z�E�W�E�[�E�Y�E��a�}�`�}�b�}�c�}�_�}���h��h��h��h��~�$��$�x�$�y�$�|�$�}�$�t�$�u�$�v�$�w�$�z�$�{�$���g��g���F��F�F�F�E�F�D�F��F��F��F��F��F��F��F��F��F� �F�!�F�"�F�#�F��$�v�%�v�&�v��'�@�(�@��/�7�.�7�*�7�+�7�,�7�-�7� ��7��7��7��7��7��7��7��7�!�:��;��"�i�O�h�O�g�O�#�)�?�*�?�$�C� �D� �%��<�
�<��<��<��<��<�
�<��<�	�<��<��<��<�&��F��F��F��F�'�]�/�^�/�/�/�
�/��/�_�/�`�/�(�A�8�B�8�C�8�D�8�)�
�v��v�G�v��v��v�H�v��v��v�	�v�
�v��v��v��v��v��v��v�*�4�q�5�q�T�q�U�q�+�.������#������-������ ��!��'��&������"��%��$������,��R��R�	�R�
�R��R��R�-�_�M�`�M�]�M�^�M�.�pL�qL�L�L�|L�}L�L�L�L�L�L�L�L�
L�nL�oL�L�L�L�L�L�L�L�L�tL�uL�vL�wL�L�L�zL�{L�~L�L�
L�L�lL�mL�rL�sL�L�	L�L�L�xL�yL�L�L�L�L�/��N��N�0�y�s�z�s��s��s��s��s�k�s��s��s��s�}�s�~�s�{�s�|�s�1��S��S�'�S�(�S�
�S��S�c�S�d�S�S��S��S�!�S�"�S�W�S�X�S��S��S��S��S�2��o��o��o��o��o��o�3��*��*>�*�P�*�Q�*�}�*�~�*��*��*�4�0�Q�1�Q�.�Q�/�Q�5�!�i�"�i�d�i�e�i�6�!��"��b���� ��7�-�
�.�
�/�
�0�
�1�
�8�C�C�C�C�C�C�xC�yC�C�C�lC�mC�tC�uC�pC�qC�C�C�~C�C�C�C�C�C�C�C�C�
C�zC�{C�C�C�|C�}C�C�C�C�C�
C�C�C�C�nC�oC�C�	C�rC�sC�vC�wC�9�J�J�J�J�J�
J�J�J�J�	J�J�J�nJ�oJ�vJ�wJ�J�J�J�J�rJ�sJ�J�J�zJ�{J�J�J�pJ�qJ�xJ�yJ�J�J�tJ�uJ�lJ�mJ�J�J�~J�J�
J�J�J�J�J�J�|J�}J�:�}�/�~�/>��������������K��L��P��Q��;�d�i�e�i�<�p�k�q�k�r�k�s�k�o�k�n�k�=���������4��5����>�=�#�"�#�b�#�!�#��#� �#�?�|�~�}�~�z�~�{�~�x�~�y�~�@��W��W��W�A��t��t�k�t�}�t�~�t�{�t�|�t��t��t�y�t�z�t��t��t��t�B�(�F�)�F�.�F�/�F��F��F�0�F�1�F�2��3������*�F�+�F��F��F�4��5��&�F�'�F�,�F�-�F�C�V�E�W�E�Z�z�[�z�`�E�a�E�X�z�Y�z�L�E�M�E�T�E�U�E�d�E�e�E�h�E�i�E�R�E�S�E�b�E�c�E�^�z�_�z�f�z�g�z�\�E�]�E�D�z�E�z�D�8�#�E�T�r�U�r�4�r�5�r�F��T��T�c�T�d�T��T��T�
�T��T�'�T�(�T�W�T�X�T�!�T�"�T�T��T��T��T��T�G�6�B�7�B�8�B�H��=�
�=��=��=��=��=��=�	�=��=�
�=��=��=�I�!��"��d��e��J�p�l�q�l�r�l�n�l�o�l�s�l�K�o�<�p�<�L�'�U�(�U�U�W�U�X�U�c�U�d�U��U��U��U��U�!�U�"�U��U��U�
�U��U��U��U�M��Y��Y�F�Y�E�Y��Y�D�Y�N�!�j�"�j�d�j�e�j�O�W�V�X�V��V��V�!�V�"�V��V��V�
�V��V��V��V��V��V�c�V�d�V�'�V�(�V�V�P�M��N��O��K��L��Q�����P��Q�>��}�0�~�0�����K��L������R�}�+�~�+>�+��+��+�P�+�Q�+��+��+�S�m��n��f��g��j��k�n��h��i�o�p�m��T�d�j�e�j�U�9��:��V�'�W�(�W��W��W�W��W��W�
�W��W��W��W��W��W�W�W�X�W�c�W�d�W�!�W�"�W�W�w��x��v��s��p��q��t��u��r��(��X�T�s�U�s�4�s�5�s�Y�,�G�-�G��G��G��G��G�&�G�'�G�.�G�/�G�4��5��*�G�+�G�2��3��0�G�1�G�����(�G�)�G�Z�`�F�a�F�d�F�e�F�^�{�_�{�Z�{�[�{�D�{�E�{�L�F�M�F�\�F�]�F�h�F�i�F�b�F�c�F�T�F�U�F�V�F�W�F�f�{�g�{�R�F�S�F�X�{�Y�{�[�;�-�<�-�=�-�>�-�\��.��.�]��X��X��X��X��X��X�'�X�(�X��X��X�c�X�d�X�!�X�"�X�
�X��X�W�X�X�X�X�^�:��;��_��@��@��@�`�<� �=� �a�7�*�8�*�=�*�>�*�?�*�@�*�9�*�:�*h�*�b�C�9�D�9�A�9�B�9�c��G��G��G��G�d�d�b�e�b�?�b�@�b�e�_��`��]��^��a��f�<��g��e��i��d��b��I��J��a��O��P��c��W��X��h��=��Y��Z��K��L��G��H��M��N��g��Y��Y��Y��Y��Y��Y�'�Y�(�Y�c�Y�d�Y�!�Y�"�Y��Y��Y�Y�
�Y��Y�W�Y�X�Y�h��h��h�t�%�u�%�x�%�y�%�v�%�w�%�z�%�{�%�|�%�}�%�~�%��%�i����������� ������������j�A.�B.�C.�D.�E.�F.�G.�H.�I.�J.�K.�L.�M.�N.�O.�P.�Q.�R.�S.�T.�U.�V.�W.�X.�Y.�Z.�[.�\.�].�^.�_.�`.�a.�b.�c.�d.�e.�f.�g.�h.�i.�j.�k.�l.�m.�n.�o.�p.�q.�r.�s.�k��O��O�l�J�0�I�0�H�0�m�1��2��/��0��2��n�[�`�\�`�o�P�\�Q�\�p�i��j��`��e��f��g��h��c��d��q�/��!��*��+��1��'��-��.��6��#��2��&��(��)��"��$��%��,��7��5��0�� ��4��3��R��r�^�f�_�f�`�f�a�f�b�f�s��p��p��p��p��p��p�t�5��6��u�t��u��(��r��s��v��w��x��p��q��v��Z��Z��Z��Z�Z��Z��Z�
�Z��Z�c�Z�d�Z��Z��Z�'�Z�(�Z�!�Z�"�Z�W�Z�X�Z�w�R�h�S�h�x�i�n�j�n�m�n�n�n�q�n�r�n�k�n�l�n�o�n�p�n�y�]-�B-�E-�F-�e-�Z-�c-�b-�i-�j-�R-�O-�h-�_-�g-�M-�s-�l-�Y-�o-�S-�T-�f-�D-�d-�p-�q-�I-�J-�X-�V-�k-�P-�Q-�A-�K-�L-�G-�H-�a-�[-�\-�N-�`-�^-�m-�n-�W-�C-�r-�U-�z�t��u��v��w��x��y��z��{��|��{�T�D�U�D�V�D�W�D�X�D�[�D�Y�D�Z�D�Q�D�P�D�\�D�R�D�S�D�O�D�|�*�?�+�?�8�?�9�?�(�?�)�?�"�?�#�?��?��?�$�?�%�?� �?�!�?�.�?�/�?�,�?�-�?�&�?�'�?�4�?�5�?�}�}�k�~�k��k�~�*�
�+�
�4�
�5�
�(�
�)�
�6�
�7�
�"�
�#�
�$�
�%�
�8�
�9�
��
��
�0�
�1�
�2�
�3�
�&�
�'�
�.�
�/�
�,�
�-�
� �
�!�
��Z�j�[�j�X�j�Y�j�b�j�a�j��j�^�j�_�j�`�j�\�j�]�j�c�j�d�j��p�n�q�n�s�n�o�n�n�n�r�n���I��I��I��I��'�q�(�q�q��q��q��q��q�W�q�X�q�
�q��q�c�q�d�q�!�q�"�q��q��q��q��q��O�.�P�.�M�.�N�.�R�.�Q�.��9�-�:�-�7�-�8�-�=�-�>�-�?�-�@�-h�-��U�.�V�.�S�.�T�.�Y�.�Z�.�]�.�^�.�_�.�`�.�Q�.�R�.�[�.�\�.�W�.�X�.��9t�:t�Ut�Vt�;t�<t�Yt�Zt�9t�[t�\t�3t�4t�Wt�Xt�=t�>t�St�Tt�5t�6t�_t�`t�Qt�Rt�7t�8t�]t�^t��5{�6{�W{�X{�Q{�R{�;{�<{�[{�\{�]{�^{�7{�8{�={�>{�9{�Y{�Z{�9{�:{�S{�T{�_{�`{�3{�4{�U{�V{��
�u��u�	�!�t�"�t�d�t�e�t�
�L��M��Q��R��G��H��P��I��J��S��E��F��K��N��O��C��D����L��L���'�
�'��'��'�
��r��r�r�'�r�(�r��r��r�!�r�"�r�
�r��r��r��r��r��r�W�r�X�r�c�r�d�r��a��^��]��_��`��m�#�j�#�k�#n�#p�#�m�#�n�#�f�#�g�#o�#�h�#�i�#��d�t�e�t��>�*�?�*�X�*�Y�*�D�*�E�*�Z�*�[�*�T�*�U�*�P�*�Q�*�:�*�;�*�`�*�a�*�<�*�=�*���2��2��2��2�"�2�#�2� �2�!�2��2��2��2��2��2��2�$�2�%�2��2��2��,�u�-�u�$�u�%�u��u��u� �u�!�u�8�u��u��u�7�u���L��L��L��L��L��L��L��L��L��L��L��L��L��L��L��L� �L�!�L�"�L�#�L��}�g�~�g�:�g�{�g�|�g��g���K��K��K��K��4�w�5�w�T�w�U�w��"�_�#�_�$�_��_�%�_�!�_� �_��_��_���������������������� ���{�6�|�6�y�6�z�6�u�6�v�6�~�6�}�6�w�6�x�6��!�q�"�q�d�q�e�q���"��"��"��"��"�~�"��"��"��"��"���8��Q�6����.��-�f��+��,�� �������!��j��j�"�t�'�u�'�x�'�y�'�z�'�{�'�~�'��'�|�'�}�'�v�'�w�'�#��s��s��s��s�c�s�d�s�!�s�"�s�s�'�s�(�s��s��s�W�s�X�s�
�s��s��s��s�$�$�|�%�|�&�|�'�|�(�|�)�|�*�|�+�|�,�|�-�|�.�|�%�|��}��z��{��x��y��&�c��d��a��b��f��e��'�R�i�S�i�(�& �0 � � �' �% � �* �, � � �  �u �v �% � � � � �V �3 �s �t �/ �! �7 �4 � �	 � �. �1 � � �( �$ � � � � � �" �5 � �
 �y �z �$ �# �w �x � � � �) �2 � �{ �| �+ � � �} �~ �q �r � �- �
 � �& �# �6 �)�e�Q�f�Q�g�Q�*�_�X�`�X�]�6�^�6�+�P��Q��V��,���������'��(������
����W��X��c��d�������!��"��-�/��0��1��2��3��4��5��6��7��.�o�=�p�=�/�8��9��0�&�w�%�w�$�w�1�x�i�w�i�y�i�z�i�v�i��i�y�i�z�i�2�8�	�9�	�3��w��w��w��w��w��w�4�p�N�q�N�n�N�o�N�l�N�m�N�j�N�k�N�5�.�3�!�%�(����{�|����w�x��	����%�
�� �5�$�u�v�-�)�����q�r���0�/�}�~�&���1�����2�7�+�4����&�#�*�#�s�t�6��
�'�"�$�V�y�z�,�6�p�p�q�p�r�p�s�p�o�p�n�p�7�{�3�|�3�w�3�x�3�~�3�}�3�v�3�y�3�z�3�u�3�8�K�K�K�K�K�K�K�K�K�K�K�K�K�	K�
K�K�|K�}K�K�K�xK�yK�K�K�K�K�K�
K�pK�qK�K�K�zK�{K�K�K�rK�sK�vK�wK�~K�K�tK�uK�K�K�nK�oK�lK�mK�9�~�#��#��#��#��#��#��#��#��#��#�:�:��;��;�N�N�nN�oN�rN�sN�N�N�xN�yN�N�
N�N�N�zN�{N�tN�uN�N�N�
N�N�vN�wN�lN�mN�pN�qN�N�N�~N�N�N�N�|N�}N�N�N�N�N�N�N�N�N�N�N�N�	N�N�N�<�[�v�\�v�_�v�`�v�a�v�=�-��.�f��+��,����>�}�m�~�m��m�?�:��;��<��=��>��?��@��A��B��@�~����������A�d�q�e�q�B�B��C��D��C�}�h�~�h�:�h��h�|�h�{�h�D��t��t�'�t�(�t�W�t�X�t�t��t��t�!�t�"�t�
�t��t��t��t�c�t�d�t��t��t�E�W��X��'��(������!��"��c��d��
�����������������F�4�p�5�p�9�p�3�p�2�p�6�p�7�p�8�p�G�a�	�^�	�_�	�`�	�]�	�H��n�~�n�}�n�I��k��k�G�k��k��k�H�k��k��k�	�k�
�k��k��k�
�k��k�J�{�8�|�8�n�}�m�}�-�U�)�x�,�c�*�*�o��p��k�}�l�}�t��(�}�p��s��h�}�e�}�t�}�g�}�4�3�3�3�2��q�{�r�{�/��j�}�+�+�1��r��]�<�\�<�s�{�f�}�d�}�o�`�n�`�[�<�i�u�j�u�L�8�l�}�m�`�k�u�q�}�.�8�0��K�m�Y�n�Y�)�o�2��0�
�t�?�g�?�/�
�+�$�3�+�K�A�,�/�h�?�e�?�*�<�d�?�1��i�t�j�t�k�?�l�?�(�?�o�F�p�F�.�0�q�?�f�?�4�+�-�N�r�~�s�~�L�!�!� !�&!�!�!�!�-!�
!�!�,!�!�"!�!�&!�!�!�!!�{!�|!�q!�r!�+!�!�!�2!�1!�.!�$!�#!�!�!�u!�v!�5!�y!�z!�(!�*!�!�	!�!�
!�!�}!�~!�'!�/!�!�!�!�6!�w!�x!�!�!�3!�#!�s!�t!�V!�!�4!�%!�7!�0!�!�!�%!�!�!�)!�$!�M�%�:�&�:�N�C�
�D�
�E�
�F�
�G�
�H�
�I�
�J�
�K�
�L�
�M�
�N�
�O�
�O�H��P�P�R�Q�R�R�R�S�R�T�R�U�R�V�R�W�R�Q�6�k�7�k�4�k�5�k�2�k�3�k�8�k�9�k�R�W�u�X�u�'�u�(�u�c�u�d�u��u��u�
�u��u�u�!�u�"�u��u��u��u��u��u��u�S�n�o�o�o�s�o�p�o�q�o�r�o�T�D�d�E�d�@�d�A�d�>�d�?�d�<�d�F�d�G�d�<�d�=�d�B�d�C�d�U�_��`��]��^��a��V�f�$�g�$m�$p�$�m�$�n�$o�$�j�$�k�$n�$�h�$�i�$�W�!�v�"�v�'�v�(�v��v��v�c�v�d�v��v��v��v��v�
�v��v��v��v�v�W�v�X�v�X�g�#��#�Y�P��Q�d�Y���������Z��[�����>��Z�	�|�K��L������
�{l��P��Q�>������}�1�~�1�����[�	��P�,�Q�,��,��,��,��,�
��}�,�~�,>�,�\�v��s��r��w��x��p��q��(��t��u��]�lD�mD�
D�D�D�D�~D�D�nD�oD�D�D�|D�}D�D�D�rD�sD�xD�yD�D�D�D�
D�D�D�D�D�D�D�tD�uD�D�D�pD�qD�zD�{D�D�	D�D�D�D�D�vD�wD�D�D�D�D�^�T�u�U�u�4�u�5�u�_�]�7�^�7�_�7�`�`�Z�a�Z�b�Z�c�Z�d�Z�a��/��/�b�'�w�(�w��w��w�
�w��w�W�w�X�w��w��w�!�w�"�w��w��w�w�c�w�d�w��w��w�c�9�l�3�l�4�l�5�l�2�l�6�l�7�l�8�l�d�[�F�X�F�[�F�Y�F�Z�F�W�F�\�F�e�_�0�`�0�]�0�^�0�
�0��0�/�0�f�;�,�<�,�g��J��J��J��J�h�=�.�>�.�?�.�@�.�9�.�:�.h�.�7�.�8�.�i�!��"��d��e��j�C�;�D�;�A�;�B�;�k�<�!�=�!�l�A�
�@�
�m��l�~�l�}�l�n�c�x�d�x��x��x�
�x��x�!�x�"�x��x��x��x��x�'�x�(�x��x��x�x�W�x�X�x�o�q�i�r�i�s�i�t�i�p�d��e��q�����
����	��
������H��G������������������r�w�{�x�{�X�{�u�{�v�{�W�{�s�Y�?�Z�?�W�?�X�?�S�?�T�?�[�?�\�?�U�?�V�?�]�?�^�?�_�?�`�?�Q�?�R�?�t��x��x��x��x��x��x�u�8�
�9�
�v�o�W�p�W�w�Yu�Zu�]u�^u�7u�8u�Su�Tu�Qu�Ru�3u�4u�=u�>u�9u�_u�`u�Wu�Xu�5u�6u�Uu�Vu�;u�<u�[u�\u�9u�:u�x�:��;��y�e�%�f�%�g�%�h�%�z��y��y�
�y��y��y��y��y��y�c�y�d�y�W�y�X�y�!�y�"�y�'�y�(�y��y��y�y�{�W|�X|�9|�_|�`|�;|�<|�Q|�R|�=|�>|�Y|�Z|�S|�T|�9|�:|�3|�4|�U|�V|�7|�8|�5|�6|�[|�\|�]|�^|�|�u�4�v�4�w�4�x�4�~�4�|�4�{�4�}�4�y�4�z�4�}���.��+��,��-�f��~�]��^��a��_��`���%�;�&�;��!��"��$��%��#��(��'�� ������&���� �� �~� �� �� �� �� �� �� �� ������	��
����������G��H������
�������������i�J�j�J�k�J�l�J�m��n��o�J�p�J�q��r��s��t��u��v��L��M��w��x��y�J�z�J�{��|��}��~��������=��=��=���I��I�����2��3��*�I�+�I�0�I�1�I�,�I�-�I�4��5��.�I�/�I�&�I�'�I��I��I�(�I�)�I��b�K�c�K�`�K�a�K�X�}�Y�}�^�}�_�}�T�K�U�K�V�K�W�K�Z�}�[�}�d�K�e�K�R�K�S�K�D�}�E�}�h�K�i�K�f�}�g�}�\�K�]�K��6�C�7�C�8�C��z��z��z��z��z�!�z�"�z�c�z�d�z�'�z�(�z��z��z�W�z�X�z�
�z��z��z��z�	�u�w�v�w�y�w�z�w�E�w�F�w�{�w�|�w�w�w�x�w�
��������2��2��/��0��1����w��w��w��w��w��w��w��w�H�w�
�w��w�G�w��w��w�	�w�
�w�
�|��}��z��{��x��y���G��H��E��F����w��x��Y����I��J��u��v���!�u�"�u�d�u�e�u�o�%n�%�h�%�i�%p�%�f�%�g�%�j�%�k�%m�%�m�%�n�%��4�m�5�m�6�m�7�m�9�m�3�m�2�m�8�m���{��{�
�{��{�'�{�(�{��{��{�{�!�{�"�{�c�{�d�{�W�{�X�{��{��{��{��{��d�u�e�u���S��S��S��S�
�S�	�S��~�5�|�5�}�5�v�5�w�5�x�5�u�5�y�5�z�5�{�5���!��!�~�!��!��!��!��!��!��!��!���,��,��,��,�F�,�E�,��,��,�,�,�+�,��,��,�/�,�.�,�*�,�-�,��,�D�,��3��3�#�3��,��,��f�I�g�I��8�n�7�n�2�n�3�n�6�n�4�n�5�n�9�n��T�v�U�v�4�v�5�v���0��0���-�S�-��_�W�`�W�]�5�^�5���|��|�'�|�(�|��|��|�
�|��|�|��|��|�W�|�X�|�!�|�"�|��|��|�c�|�d�|���Y��Y� f����.��-��+��,��!�����	��
��������������G��H����������
����"�H�x��x��x��x��x��x��x��x��x��x��x�
�x��x�G�x�	�x�
�x�#�:��;��$�������������
����G������	��
����������H��%>��������������P��Q��Z��[�d�X�&�U�5�T�5�'�d�v�e�v�!�v�"�v�(��U��U�)>�F��&��&�P�F�Q�F�	��
���&��&�}�-�~�-�*�Q�t�R�t�M�t�N�t�U�t�V�t�S�t�T�t�O�t�P�t�+�!��'������"������������������,�x��y��|��}��z��{��-�8�o�7�o�9�o�3�o�6�o�2�o�4�o�5�o�.�d�v�e�v�/�(�J�)�J�4��5�������J��J��J��J�*�J�+�J�0�J�1�J�&�J�'�J�,�J�-�J�.�J�/�J�2��3��0�/��0��2��2��1��1�X�|�u�|�v�|�w�|�x�|�W�|�2���	��
��3��
��
��
��
�~�
�4��}��}��}��}�'�}�(�}�!�}�"�}�W�}�X�}�}�c�}�d�}��}��}��}��}�
�}��}�5��y��y��y��y��y��y�6��v��v� �v�!�v��v��v�,�v�-�v�8�v�7�v�$�v�%�v�7�P�+�Q�+�`�+�a�+�<�+�=�+�D�+�E�+�T�+�U�+�:�+�;�+�X�+�Y�+�Z�+�[�+�>�+�?�+�8��3��3�$�3�%�3��3��3��3��3��3��3� �3�!�3�"�3�#�3��3��3��3��3�9��C�	�C��C��C�
�C��C��C��C��C�
�C��C��C�:��M��M��M��M��M��M��M��M��M��M��M��M�"�M�#�M��M��M� �M�!�M��M��M�;�'�~�(�~�c�~�d�~��~��~�
�~��~�!�~�"�~��~��~��~��~�~��~��~�W�~�X�~�<�
��������c��d����������!��"������W��X���'��(��=�'��(��
����c��d��W��X������!��"���������������>�G��B��F��K��I�?� �D�?���A�-�H�~�_��J�~�]��^��E�~��~�Y�~�Z�~�[�~�\��X�-�P��N��M��O�~�L�-�Q�-�C�@�U��V��W��T��S��R�-;NOPSTUABCDEFHIJKLMRWXZ[\]_ABCDEFHIJKLMR_WX����3�P�o
	��SBBbugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256
�A�gqatzip-libs-1.0.9-1.el9.x86_64.rpm�@�gqatzip-1.0.9-1.el9.x86_64.rpm�A�gqatzip-libs-1.0.9-1.el9.x86_64.rpm�@�gqatzip-1.0.9-1.el9.x86_64.rpm����|�p	�"�XBBBBBBBBbugfixModerate: open-vm-tools bug fix and enhancement updateyyhttps://access.redhat.com/errata/RHBA-2025:20841RHBA-2025:20841RHBA-2025:20841https://errata.almalinux.org/9/ALBA-2025-20841.htmlALBA-2025:20841ALBA-2025:20841
https://www.redhat.com/security/data/cve/CVE-2025-22247.htmlCVE-2025-22247CVE-2025-22247��popen-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm�
�popen-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm��popen-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpm�M�popen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm�	�popen-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm��popen-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm�
�popen-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm��popen-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpm�M�popen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm�	�popen-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm����q
	�(�cBBBsecurityImportant: xz security update7�r�https://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:4940
��xz-devel-5.2.5-8.el9_0.i686.rpm�x�xz-lzma-compat-5.2.5-8.el9_0.x86_64.rpm��xz-devel-5.2.5-8.el9_0.x86_64.rpm��xz-devel-5.2.5-8.el9_0.i686.rpm�x�xz-lzma-compat-5.2.5-8.el9_0.x86_64.rpm��xz-devel-5.2.5-8.el9_0.x86_64.rpm����$�r
	�2�iBBBBBBBsecurityModerate: vim security update7��Thttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242
�X�vim-X11-8.2.2637-16.el9_0.2.x86_64.rpm�Y�vim-common-8.2.2637-16.el9_0.2.x86_64.rpm�Z�vim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm�"�vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm�!�vim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm�X�vim-X11-8.2.2637-16.el9_0.2.x86_64.rpm�Y�vim-common-8.2.2637-16.el9_0.2.x86_64.rpm�Z�vim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm�"�vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm�!�vim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm���T�s
	�8�sBBBsecurityModerate: expat security update7�[�xhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244
��xexpat-devel-2.2.10-12.el9_0.2.x86_64.rpm��xexpat-devel-2.2.10-12.el9_0.2.i686.rpm��xexpat-2.2.10-12.el9_0.2.x86_64.rpm��xexpat-devel-2.2.10-12.el9_0.2.x86_64.rpm��xexpat-devel-2.2.10-12.el9_0.2.i686.rpm��xexpat-2.2.10-12.el9_0.2.x86_64.rpm���:�t
	�#�yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update7�S�
https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249
�pVkernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm(Vkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�jVkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm�tVkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm�mVkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm#Vkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�lVkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmVkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm�uVkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm%Vkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm&Vkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�EVbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm$Vkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�oVkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�iVkernel-5.14.0-70.17.1.el9_0.x86_64.rpm�qVkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm'Vperf-5.14.0-70.17.1.el9_0.x86_64.rpm�sVkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm�rVkernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm;Vpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm�kVkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm�nVkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm�pVkernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm(Vkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�jVkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm�tVkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm�mVkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm#Vkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�lVkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmVkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm�uVkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm%Vkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm&Vkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�EVbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm$Vkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�oVkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�iVkernel-5.14.0-70.17.1.el9_0.x86_64.rpm�qVkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm'Vperf-5.14.0-70.17.1.el9_0.x86_64.rpm�sVkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm�rVkernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm;Vpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm�kVkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm�nVkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm�����u
	�*�dBBBBsecurityModerate: libarchive security update7�h�Xhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252
�n�libarchive-3.5.3-2.el9_0.x86_64.rpm�*�bsdtar-3.5.3-2.el9_0.x86_64.rpm�f�libarchive-devel-3.5.3-2.el9_0.x86_64.rpm�n�libarchive-3.5.3-2.el9_0.x86_64.rpm�*�bsdtar-3.5.3-2.el9_0.x86_64.rpm�f�libarchive-devel-3.5.3-2.el9_0.x86_64.rpm���e�v
	�2�kBBBBBsecurityModerate: libinput security update7�@�3https://access.redhat.com/errata/RHSA-2022:5257RHSA-2022:5257RHSA-2022:5257https://access.redhat.com/security/cve/CVE-2022-1215CVE-2022-1215CVE-2022-1215https://bugzilla.redhat.com/20749522074952https://errata.almalinux.org/9/ALSA-2022-5257.htmlALSA-2022:5257ALSA-2022:5257
�V�libinput-1.19.3-2.el9_0.x86_64.rpm�y�libinput-utils-1.19.3-2.el9_0.x86_64.rpm�V�libinput-1.19.3-2.el9_0.i686.rpm�x�libinput-devel-1.19.3-2.el9_0.x86_64.rpm�V�libinput-1.19.3-2.el9_0.x86_64.rpm�y�libinput-utils-1.19.3-2.el9_0.x86_64.rpm�V�libinput-1.19.3-2.el9_0.i686.rpm�x�libinput-devel-1.19.3-2.el9_0.x86_64.rpm���s�w
	���sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security and bug fix update7�s�>https://access.redhat.com/errata/RHSA-2022:5263RHSA-2022:5263RHSA-2022:5263https://access.redhat.com/security/cve/CVE-2022-26353CVE-2022-26353CVE-2022-26353https://access.redhat.com/security/cve/CVE-2022-26354CVE-2022-26354CVE-2022-26354https://bugzilla.redhat.com/20631972063197https://bugzilla.redhat.com/20632572063257https://errata.almalinux.org/9/ALSA-2022-5263.htmlALSA-2022:5263ALSA-2022:5263
�:Xqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpm�2Xqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpm�AXqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpm�Xqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpm�0Xqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpm�;Xqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpm�Xqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpm�8Xqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpm�>Xqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpm�3Xqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpm�9Xqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpm�6Xqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpm�1Xqemu-img-6.2.0-11.el9_0.3.x86_64.rpm�<Xqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpm�Xqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpm�5Xqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpm�@Xqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpm�=Xqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpm�?Xqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpm�4Xqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpm�7Xqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpm�:Xqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpm�2Xqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpm�AXqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpm�Xqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpm�0Xqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpm�;Xqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpm�Xqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpm�8Xqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpm�>Xqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpm�3Xqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpm�9Xqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpm�6Xqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpm�1Xqemu-img-6.2.0-11.el9_0.3.x86_64.rpm�<Xqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpm�Xqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpm�5Xqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpm�@Xqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpm�=Xqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpm�?Xqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpm�4Xqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpm�7Xqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpm���$�x
	�� ��^securityImportant: thunderbird security update7�1�ehttps://access.redhat.com/errata/RHSA-2022:5482RHSA-2022:5482https://access.redhat.com/security/cve/CVE-2022-2200CVE-2022-2200https://access.redhat.com/security/cve/CVE-2022-2226CVE-2022-2226https://access.redhat.com/security/cve/CVE-2022-31744CVE-2022-31744https://access.redhat.com/security/cve/CVE-2022-34468CVE-2022-34468https://access.redhat.com/security/cve/CVE-2022-34470CVE-2022-34470https://access.redhat.com/security/cve/CVE-2022-34472CVE-2022-34472https://access.redhat.com/security/cve/CVE-2022-34479CVE-2022-34479https://access.redhat.com/security/cve/CVE-2022-34481CVE-2022-34481https://access.redhat.com/security/cve/CVE-2022-34484CVE-2022-34484https://bugzilla.redhat.com/21021612102161https://bugzilla.redhat.com/21021622102162https://bugzilla.redhat.com/21021632102163https://bugzilla.redhat.com/21021642102164https://bugzilla.redhat.com/21021652102165https://bugzilla.redhat.com/21021662102166https://bugzilla.redhat.com/21021682102168https://bugzilla.redhat.com/21021692102169https://bugzilla.redhat.com/21022042102204https://errata.almalinux.org/9/ALSA-2022-5482.htmlALSA-2022:5482ALSA-2022:5482
9�dthunderbird-91.11.0-2.el9_0.alma.x86_64.rpm9�dthunderbird-91.11.0-2.el9_0.alma.x86_64.rpm���Y�y
	��#��asecurityImportant: squid security update7��https://access.redhat.com/errata/RHSA-2022:5527RHSA-2022:5527https://access.redhat.com/security/cve/CVE-2021-46784CVE-2021-46784https://bugzilla.redhat.com/21007212100721https://errata.almalinux.org/9/ALSA-2022-5527.htmlALSA-2022:5527ALSA-2022:5527
�{�Dsquid-5.2-1.el9_0.1.x86_64.rpm�{�Dsquid-5.2-1.el9_0.1.x86_64.rpm����z
	����dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security, bug fix, and enhancement update7��+https://access.redhat.com/errata/RHSA-2022:5695RHSA-2022:5695RHSA-2022:5695https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5695.htmlALSA-2022:5695ALSA-2022:5695
�LRjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm�QRjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�[Rjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�KRjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm�RRjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�IRjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm�ZRjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�SRjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�GRjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm�VRjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�YRjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�JRjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm�ERjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm�ORjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�PRjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�URjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�FRjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm�XRjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�\Rjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�WRjava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�TRjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�HRjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm�DRjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm�LRjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm�QRjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�[Rjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�KRjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm�RRjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�IRjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm�ZRjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�SRjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�GRjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm�VRjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�YRjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�JRjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm�ERjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm�ORjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�PRjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�URjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�FRjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm�XRjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�\Rjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�WRjava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�TRjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�HRjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm�DRjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm�����{
	��3��SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security, bug fix, and enhancement update7�G�.https://access.redhat.com/errata/RHSA-2022:5709RHSA-2022:5709RHSA-2022:5709https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5709.htmlALSA-2022:5709ALSA-2022:5709
�7gjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm�Kgjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Ngjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Fgjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Xgjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm�Vgjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm�Tgjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm�Egjava-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Wgjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm�Mgjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Jgjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Igjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Ugjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm�Lgjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Hgjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�8gjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm�Ggjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�7gjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm�Kgjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Ngjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Fgjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Xgjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm�Vgjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm�Tgjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm�Egjava-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Wgjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm�Mgjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Jgjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Igjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Ugjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm�Lgjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Hgjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�8gjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm�Ggjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�����|
	��6��tsecurityImportant: grafana security update7�u�phttps://access.redhat.com/errata/RHSA-2022:5716RHSA-2022:5716https://access.redhat.com/security/cve/CVE-2022-31107CVE-2022-31107https://bugzilla.redhat.com/21043672104367https://errata.almalinux.org/9/ALSA-2022-5716.htmlALSA-2022:5716ALSA-2022:5716
�I�Bgrafana-7.5.11-5.el9_0.x86_64.rpm�I�Bgrafana-7.5.11-5.el9_0.x86_64.rpm����'�}
	��%��wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security, bug fix, and enhancement update7�e�e
https://access.redhat.com/errata/RHSA-2022:5736RHSA-2022:5736RHSA-2022:5736https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-21549CVE-2022-21549CVE-2022-21549https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085472108547https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5736.htmlALSA-2022:5736ALSA-2022:5736
�]Sjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�jSjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm�fSjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�_Sjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm�`Sjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�bSjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�eSjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�^Sjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�dSjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm�iSjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm�cSjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm�gSjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�aSjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm�hSjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�]Sjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�jSjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm�fSjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�_Sjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm�`Sjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�bSjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�eSjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�^Sjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�dSjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm�iSjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm�cSjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm�gSjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�aSjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�Sjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm�hSjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�����~
	��(��fsecurityImportant: firefox security update7�J�fhttps://access.redhat.com/errata/RHSA-2022:5767RHSA-2022:5767https://access.redhat.com/security/cve/CVE-2022-2505CVE-2022-2505https://access.redhat.com/security/cve/CVE-2022-36318CVE-2022-36318https://access.redhat.com/security/cve/CVE-2022-36319CVE-2022-36319https://bugzilla.redhat.com/21119072111907https://bugzilla.redhat.com/21119082111908https://bugzilla.redhat.com/21119102111910https://errata.almalinux.org/9/ALSA-2022-5767.htmlALSA-2022:5767ALSA-2022:5767
8�efirefox-91.12.0-2.el9_0.alma.x86_64.rpm8�efirefox-91.12.0-2.el9_0.alma.x86_64.rpm����y�
	��3��iBBBBBBBBsecurityImportant: go-toolset and golang security and bug fix update7�0�https://access.redhat.com/errata/RHSA-2022:5799RHSA-2022:5799https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-1962CVE-2022-1962https://access.redhat.com/security/cve/CVE-2022-28131CVE-2022-28131https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30633CVE-2022-30633https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073762107376https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21073902107390https://bugzilla.redhat.com/21073922107392https://errata.almalinux.org/9/ALSA-2022-5799.htmlALSA-2022:5799ALSA-2022:5799
o�golang-src-1.17.12-1.el9_0.noarch.rpm�T�golang-race-1.17.12-1.el9_0.x86_64.rpmp�golang-tests-1.17.12-1.el9_0.noarch.rpmn�golang-misc-1.17.12-1.el9_0.noarch.rpmm�golang-docs-1.17.12-1.el9_0.noarch.rpm�H�golang-bin-1.17.12-1.el9_0.x86_64.rpm�G�golang-1.17.12-1.el9_0.x86_64.rpmo�golang-src-1.17.12-1.el9_0.noarch.rpm�T�golang-race-1.17.12-1.el9_0.x86_64.rpmp�golang-tests-1.17.12-1.el9_0.noarch.rpmn�golang-misc-1.17.12-1.el9_0.noarch.rpmm�golang-docs-1.17.12-1.el9_0.noarch.rpm�H�golang-bin-1.17.12-1.el9_0.x86_64.rpm�G�golang-1.17.12-1.el9_0.x86_64.rpm����o�
	��&��tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php security update7�B�https://access.redhat.com/errata/RHSA-2022:5904RHSA-2022:5904https://access.redhat.com/security/cve/CVE-2022-31626CVE-2022-31626https://bugzilla.redhat.com/20985232098523https://errata.almalinux.org/9/ALSA-2022-5904.htmlALSA-2022:5904ALSA-2022:5904
�?php-opcache-8.0.13-2.el9_0.x86_64.rpm�?php-mysqlnd-8.0.13-2.el9_0.x86_64.rpm�?php-fpm-8.0.13-2.el9_0.x86_64.rpm�?php-pgsql-8.0.13-2.el9_0.x86_64.rpm�
?php-devel-8.0.13-2.el9_0.x86_64.rpm�?php-dbg-8.0.13-2.el9_0.x86_64.rpm�?php-ldap-8.0.13-2.el9_0.x86_64.rpm�?php-8.0.13-2.el9_0.x86_64.rpm�?php-gd-8.0.13-2.el9_0.x86_64.rpm�?php-bcmath-8.0.13-2.el9_0.x86_64.rpm�?php-dba-8.0.13-2.el9_0.x86_64.rpm�?php-gmp-8.0.13-2.el9_0.x86_64.rpm�?php-xml-8.0.13-2.el9_0.x86_64.rpm�?php-pdo-8.0.13-2.el9_0.x86_64.rpm�	?php-cli-8.0.13-2.el9_0.x86_64.rpm�?php-mbstring-8.0.13-2.el9_0.x86_64.rpm�?php-embedded-8.0.13-2.el9_0.x86_64.rpm�?php-ffi-8.0.13-2.el9_0.x86_64.rpm�?php-intl-8.0.13-2.el9_0.x86_64.rpm�?php-snmp-8.0.13-2.el9_0.x86_64.rpm�?php-process-8.0.13-2.el9_0.x86_64.rpm�
?php-common-8.0.13-2.el9_0.x86_64.rpm�?php-enchant-8.0.13-2.el9_0.x86_64.rpm�?php-odbc-8.0.13-2.el9_0.x86_64.rpm�?php-soap-8.0.13-2.el9_0.x86_64.rpm�?php-opcache-8.0.13-2.el9_0.x86_64.rpm�?php-mysqlnd-8.0.13-2.el9_0.x86_64.rpm�?php-fpm-8.0.13-2.el9_0.x86_64.rpm�?php-pgsql-8.0.13-2.el9_0.x86_64.rpm�
?php-devel-8.0.13-2.el9_0.x86_64.rpm�?php-dbg-8.0.13-2.el9_0.x86_64.rpm�?php-ldap-8.0.13-2.el9_0.x86_64.rpm�?php-8.0.13-2.el9_0.x86_64.rpm�?php-gd-8.0.13-2.el9_0.x86_64.rpm�?php-bcmath-8.0.13-2.el9_0.x86_64.rpm�?php-dba-8.0.13-2.el9_0.x86_64.rpm�?php-gmp-8.0.13-2.el9_0.x86_64.rpm�?php-xml-8.0.13-2.el9_0.x86_64.rpm�?php-pdo-8.0.13-2.el9_0.x86_64.rpm�	?php-cli-8.0.13-2.el9_0.x86_64.rpm�?php-mbstring-8.0.13-2.el9_0.x86_64.rpm�?php-embedded-8.0.13-2.el9_0.x86_64.rpm�?php-ffi-8.0.13-2.el9_0.x86_64.rpm�?php-intl-8.0.13-2.el9_0.x86_64.rpm�?php-snmp-8.0.13-2.el9_0.x86_64.rpm�?php-process-8.0.13-2.el9_0.x86_64.rpm�
?php-common-8.0.13-2.el9_0.x86_64.rpm�?php-enchant-8.0.13-2.el9_0.x86_64.rpm�?php-odbc-8.0.13-2.el9_0.x86_64.rpm�?php-soap-8.0.13-2.el9_0.x86_64.rpm����2�
	��0��gBBBBBBBsecurityModerate: vim security update7�D�Rhttps://access.redhat.com/errata/RHSA-2022:5942RHSA-2022:5942RHSA-2022:5942https://access.redhat.com/security/cve/CVE-2022-1785CVE-2022-1785CVE-2022-1785https://access.redhat.com/security/cve/CVE-2022-1897CVE-2022-1897CVE-2022-1897https://access.redhat.com/security/cve/CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/20886892088689https://bugzilla.redhat.com/20916822091682https://bugzilla.redhat.com/20916872091687https://errata.almalinux.org/9/ALSA-2022-5942.htmlALSA-2022:5942ALSA-2022:5942
�Y� vim-common-8.2.2637-16.el9_0.3.x86_64.rpm�Z� vim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm�"� vim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm�!� vim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm�X� vim-X11-8.2.2637-16.el9_0.3.x86_64.rpm�Y� vim-common-8.2.2637-16.el9_0.3.x86_64.rpm�Z� vim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm�"� vim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm�!� vim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm�X� vim-X11-8.2.2637-16.el9_0.3.x86_64.rpm����R�
	��
��qBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update7��iJhttps://access.redhat.com/errata/RHSA-2022:5948RHSA-2022:5948RHSA-2022:5948https://access.redhat.com/security/cve/CVE-2021-46659CVE-2021-46659CVE-2021-46659https://access.redhat.com/security/cve/CVE-2021-46661CVE-2021-46661CVE-2021-46661https://access.redhat.com/security/cve/CVE-2021-46663CVE-2021-46663CVE-2021-46663https://access.redhat.com/security/cve/CVE-2021-46664CVE-2021-46664CVE-2021-46664https://access.redhat.com/security/cve/CVE-2021-46665CVE-2021-46665CVE-2021-46665https://access.redhat.com/security/cve/CVE-2021-46668CVE-2021-46668CVE-2021-46668https://access.redhat.com/security/cve/CVE-2021-46669CVE-2021-46669CVE-2021-46669https://access.redhat.com/security/cve/CVE-2022-24048CVE-2022-24048CVE-2022-24048https://access.redhat.com/security/cve/CVE-2022-24050CVE-2022-24050CVE-2022-24050https://access.redhat.com/security/cve/CVE-2022-24051CVE-2022-24051CVE-2022-24051https://access.redhat.com/security/cve/CVE-2022-24052CVE-2022-24052CVE-2022-24052https://access.redhat.com/security/cve/CVE-2022-27376CVE-2022-27376CVE-2022-27376https://access.redhat.com/security/cve/CVE-2022-27377CVE-2022-27377CVE-2022-27377https://access.redhat.com/security/cve/CVE-2022-27378CVE-2022-27378CVE-2022-27378https://access.redhat.com/security/cve/CVE-2022-27379CVE-2022-27379CVE-2022-27379https://access.redhat.com/security/cve/CVE-2022-27380CVE-2022-27380CVE-2022-27380https://access.redhat.com/security/cve/CVE-2022-27381CVE-2022-27381CVE-2022-27381https://access.redhat.com/security/cve/CVE-2022-27382CVE-2022-27382CVE-2022-27382https://access.redhat.com/security/cve/CVE-2022-27383CVE-2022-27383CVE-2022-27383https://access.redhat.com/security/cve/CVE-2022-27384CVE-2022-27384CVE-2022-27384https://access.redhat.com/security/cve/CVE-2022-27386CVE-2022-27386CVE-2022-27386https://access.redhat.com/security/cve/CVE-2022-27387CVE-2022-27387CVE-2022-27387https://access.redhat.com/security/cve/CVE-2022-27444CVE-2022-27444CVE-2022-27444https://access.redhat.com/security/cve/CVE-2022-27445CVE-2022-27445CVE-2022-27445https://access.redhat.com/security/cve/CVE-2022-27446CVE-2022-27446CVE-2022-27446https://access.redhat.com/security/cve/CVE-2022-27447CVE-2022-27447CVE-2022-27447https://access.redhat.com/security/cve/CVE-2022-27448CVE-2022-27448CVE-2022-27448https://access.redhat.com/security/cve/CVE-2022-27449CVE-2022-27449CVE-2022-27449https://access.redhat.com/security/cve/CVE-2022-27451CVE-2022-27451CVE-2022-27451https://access.redhat.com/security/cve/CVE-2022-27452CVE-2022-27452CVE-2022-27452https://access.redhat.com/security/cve/CVE-2022-27455CVE-2022-27455CVE-2022-27455https://access.redhat.com/security/cve/CVE-2022-27456CVE-2022-27456CVE-2022-27456https://access.redhat.com/security/cve/CVE-2022-27457CVE-2022-27457CVE-2022-27457https://access.redhat.com/security/cve/CVE-2022-27458CVE-2022-27458CVE-2022-27458https://access.redhat.com/security/cve/CVE-2022-31622CVE-2022-31622CVE-2022-31622https://access.redhat.com/security/cve/CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/20493022049302https://bugzilla.redhat.com/20500172050017https://bugzilla.redhat.com/20500222050022https://bugzilla.redhat.com/20500242050024https://bugzilla.redhat.com/20500262050026https://bugzilla.redhat.com/20500322050032https://bugzilla.redhat.com/20500342050034https://bugzilla.redhat.com/20682112068211https://bugzilla.redhat.com/20682332068233https://bugzilla.redhat.com/20682342068234https://bugzilla.redhat.com/20698332069833https://bugzilla.redhat.com/20748172074817https://bugzilla.redhat.com/20749472074947https://bugzilla.redhat.com/20749492074949https://bugzilla.redhat.com/20749512074951https://bugzilla.redhat.com/20749662074966https://bugzilla.redhat.com/20749812074981https://bugzilla.redhat.com/20749872074987https://bugzilla.redhat.com/20749962074996https://bugzilla.redhat.com/20749992074999https://bugzilla.redhat.com/20750052075005https://bugzilla.redhat.com/20750062075006https://bugzilla.redhat.com/20756912075691https://bugzilla.redhat.com/20756922075692https://bugzilla.redhat.com/20756932075693https://bugzilla.redhat.com/20756942075694https://bugzilla.redhat.com/20756952075695https://bugzilla.redhat.com/20756962075696https://bugzilla.redhat.com/20756972075697https://bugzilla.redhat.com/20756992075699https://bugzilla.redhat.com/20757002075700https://bugzilla.redhat.com/20757012075701https://bugzilla.redhat.com/20761442076144https://bugzilla.redhat.com/20761452076145https://bugzilla.redhat.com/20923542092354https://bugzilla.redhat.com/20923602092360https://errata.almalinux.org/9/ALSA-2022-5948.htmlALSA-2022:5948ALSA-2022:5948
��mariadb-pam-10.5.16-2.el9_0.x86_64.rpm��mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm�|�mariadb-backup-10.5.16-2.el9_0.x86_64.rpm��mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm��mariadb-10.5.16-2.el9_0.x86_64.rpm��mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm��mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm�~�mariadb-embedded-10.5.16-2.el9_0.x86_64.rpm��mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm��mariadb-test-10.5.16-2.el9_0.x86_64.rpm�~�mariadb-devel-10.5.16-2.el9_0.x86_64.rpm�}�mariadb-common-10.5.16-2.el9_0.x86_64.rpm��mariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm��mariadb-server-10.5.16-2.el9_0.x86_64.rpm��mariadb-pam-10.5.16-2.el9_0.x86_64.rpm��mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm�|�mariadb-backup-10.5.16-2.el9_0.x86_64.rpm��mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm��mariadb-10.5.16-2.el9_0.x86_64.rpm��mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm��mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm�~�mariadb-embedded-10.5.16-2.el9_0.x86_64.rpm��mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm��mariadb-test-10.5.16-2.el9_0.x86_64.rpm�~�mariadb-devel-10.5.16-2.el9_0.x86_64.rpm�}�mariadb-common-10.5.16-2.el9_0.x86_64.rpm��mariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm��mariadb-server-10.5.16-2.el9_0.x86_64.rpm��ͬt�
	��8��NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update7���qhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003
�sWkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm�pWkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmWkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm(Wkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�qWkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�kWkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm'Wperf-5.14.0-70.22.1.el9_0.x86_64.rpm�iWkernel-5.14.0-70.22.1.el9_0.x86_64.rpm�mWkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm$Wkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�lWkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�uWkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�rWkernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�jWkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm&Wkernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�EWbpftool-5.14.0-70.22.1.el9_0.x86_64.rpm�oWkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm%Wkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�tWkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm;Wpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm#Wkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�nWkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm�sWkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm�pWkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmWkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm(Wkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�qWkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�kWkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm'Wperf-5.14.0-70.22.1.el9_0.x86_64.rpm�iWkernel-5.14.0-70.22.1.el9_0.x86_64.rpm�mWkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm$Wkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�lWkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�uWkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�rWkernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�jWkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm&Wkernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�EWbpftool-5.14.0-70.22.1.el9_0.x86_64.rpm�oWkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm%Wkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�tWkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm;Wpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm#Wkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�nWkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm��л�
	����yBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement update7��p�Jhttps://access.redhat.com/errata/RHSA-2022:6043RHSA-2022:6043RHSA-2022:6043https://access.redhat.com/security/cve/CVE-2022-34716CVE-2022-34716CVE-2022-34716https://bugzilla.redhat.com/21151832115183https://errata.almalinux.org/9/ALSA-2022-6043.htmlALSA-2022:6043ALSA-2022:6043
�M�Haspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm��Rdotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm�R�Hdotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm�O�Hdotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm�P�Hdotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm�"�Rnetstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm�L�Haspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm�S�Rdotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm�Q�Rdotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm�!�Hdotnet-host-6.0.8-1.el9_0.x86_64.rpm�N�Hdotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm�M�Haspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm��Rdotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm�R�Hdotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm�O�Hdotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm�P�Hdotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm�"�Rnetstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm�L�Haspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm�S�Rdotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm�Q�Rdotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm�!�Hdotnet-host-6.0.8-1.el9_0.x86_64.rpm�N�Hdotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm��к2�
	����PBBBBBBBBBsecurityModerate: curl security update7��:�https://access.redhat.com/errata/RHSA-2022:6157RHSA-2022:6157RHSA-2022:6157https://access.redhat.com/security/cve/CVE-2022-32206CVE-2022-32206CVE-2022-32206https://access.redhat.com/security/cve/CVE-2022-32207CVE-2022-32207CVE-2022-32207https://access.redhat.com/security/cve/CVE-2022-32208CVE-2022-32208CVE-2022-32208https://bugzilla.redhat.com/20993002099300https://bugzilla.redhat.com/20993052099305https://bugzilla.redhat.com/20993062099306https://errata.almalinux.org/9/ALSA-2022-6157.htmlALSA-2022:6157ALSA-2022:6157
��	libcurl-devel-7.76.1-14.el9_0.5.i686.rpm�p�	libcurl-7.76.1-14.el9_0.5.x86_64.rpm�q�	libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm��	libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm��	curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm��	curl-7.76.1-14.el9_0.5.x86_64.rpm��	libcurl-devel-7.76.1-14.el9_0.5.i686.rpm�p�	libcurl-7.76.1-14.el9_0.5.x86_64.rpm�q�	libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm��	libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm��	curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm��	curl-7.76.1-14.el9_0.5.x86_64.rpm�����
	����\securityImportant: thunderbird security update7��S�https://access.redhat.com/errata/RHSA-2022:6165RHSA-2022:6165RHSA-2022:6165https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6165.htmlALSA-2022:6165ALSA-2022:6165
9�nthunderbird-91.13.0-1.el9_0.alma.x86_64.rpm9�nthunderbird-91.13.0-1.el9_0.alma.x86_64.rpm�����
	��!��_securityImportant: firefox security update7��a�?https://access.redhat.com/errata/RHSA-2022:6174RHSA-2022:6174RHSA-2022:6174https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6174.htmlALSA-2022:6174ALSA-2022:6174
8�nfirefox-91.13.0-1.el9_0.alma.x86_64.rpm8�nfirefox-91.13.0-1.el9_0.alma.x86_64.rpm����+�
	��+��bBBBBBBBsecurityModerate: openssl security and bug fix update7�� �/https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224
��openssl-devel-3.0.1-41.el9_0.i686.rpm��openssl-libs-3.0.1-41.el9_0.x86_64.rpm��openssl-perl-3.0.1-41.el9_0.x86_64.rpm��openssl-devel-3.0.1-41.el9_0.x86_64.rpm��openssl-3.0.1-41.el9_0.x86_64.rpm��openssl-devel-3.0.1-41.el9_0.i686.rpm��openssl-libs-3.0.1-41.el9_0.x86_64.rpm��openssl-perl-3.0.1-41.el9_0.x86_64.rpm��openssl-devel-3.0.1-41.el9_0.x86_64.rpm��openssl-3.0.1-41.el9_0.x86_64.rpm�����	
	��4��lBBBBBBsecurityImportant: open-vm-tools security update7��O�https://access.redhat.com/errata/RHSA-2022:6358RHSA-2022:6358RHSA-2022:6358https://access.redhat.com/security/cve/CVE-2022-31676CVE-2022-31676CVE-2022-31676https://bugzilla.redhat.com/21187142118714https://errata.almalinux.org/9/ALSA-2022-6358.htmlALSA-2022:6358ALSA-2022:6358
��Kopen-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm�	�Kopen-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm�
�Kopen-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm��Kopen-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm��Kopen-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm�	�Kopen-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm�
�Kopen-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm��Kopen-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm�����

	��	��uBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update7��V�xhttps://access.redhat.com/errata/RHSA-2022:6521RHSA-2022:6521RHSA-2022:6521https://access.redhat.com/security/cve/CVE-2022-38013CVE-2022-38013CVE-2022-38013https://bugzilla.redhat.com/21251242125124https://errata.almalinux.org/9/ALSA-2022-6521.htmlALSA-2022:6521ALSA-2022:6521

�S�dotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpm�L�Iaspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm�O�Idotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpm�!�Idotnet-host-6.0.9-1.el9_0.x86_64.rpm�P�Idotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm�Q�dotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpm�"�netstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm�R�Idotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm�N�Idotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpm�M�Iaspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm
�S�dotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpm�L�Iaspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm�O�Idotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpm�!�Idotnet-host-6.0.9-1.el9_0.x86_64.rpm�P�Idotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm�Q�dotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpm�"�netstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm�R�Idotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm�N�Idotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpm�M�Iaspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm����%�
	��)��JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security, bug fix, and enhancement update7��N�Mhttps://access.redhat.com/errata/RHSA-2022:6585RHSA-2022:6585RHSA-2022:6585https://access.redhat.com/security/cve/CVE-2022-28738CVE-2022-28738CVE-2022-28738https://access.redhat.com/security/cve/CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/20756852075685https://bugzilla.redhat.com/20756872075687https://errata.almalinux.org/9/ALSA-2022-6585.htmlALSA-2022:6585ALSA-2022:6585
�;�<ruby-libs-3.0.4-160.el9_0.x86_64.rpm�2�rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm�:�<ruby-devel-3.0.4-160.el9_0.x86_64.rpm�4�(rubygems-devel-3.2.33-160.el9_0.noarch.rpm�/�
rubygem-rexml-3.2.5-160.el9_0.noarch.rpm�;�<ruby-libs-3.0.4-160.el9_0.i686.rpm�0�rubygem-rss-0.2.9-160.el9_0.noarch.rpm��qrubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpm��<ruby-3.0.4-160.el9_0.i686.rpm�1�rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm�,�,rubygem-power_assert-1.2.0-160.el9_0.noarch.rpm��Vrubygem-json-2.5.1-160.el9_0.x86_64.rpm��Crubygem-io-console-0.5.7-160.el9_0.x86_64.rpm�3�(rubygems-3.2.33-160.el9_0.noarch.rpm�K�>rubygem-rbs-1.4.0-160.el9_0.noarch.rpm�*�9rubygem-irb-1.3.5-160.el9_0.noarch.rpm��<ruby-3.0.4-160.el9_0.x86_64.rpm�)�lrubygem-bundler-2.2.33-160.el9_0.noarch.rpm��{rubygem-psych-3.3.2-160.el9_0.x86_64.rpm�(�<ruby-default-gems-3.0.4-160.el9_0.noarch.rpm�-�Krubygem-rake-13.0.3-160.el9_0.noarch.rpm�+�!rubygem-minitest-5.14.2-160.el9_0.noarch.rpm�.�-rubygem-rdoc-6.3.3-160.el9_0.noarch.rpm�:�<ruby-devel-3.0.4-160.el9_0.i686.rpm�;�<ruby-libs-3.0.4-160.el9_0.x86_64.rpm�2�rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm�:�<ruby-devel-3.0.4-160.el9_0.x86_64.rpm�4�(rubygems-devel-3.2.33-160.el9_0.noarch.rpm�/�
rubygem-rexml-3.2.5-160.el9_0.noarch.rpm�;�<ruby-libs-3.0.4-160.el9_0.i686.rpm�0�rubygem-rss-0.2.9-160.el9_0.noarch.rpm��qrubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpm��<ruby-3.0.4-160.el9_0.i686.rpm�1�rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm�,�,rubygem-power_assert-1.2.0-160.el9_0.noarch.rpm��Vrubygem-json-2.5.1-160.el9_0.x86_64.rpm��Crubygem-io-console-0.5.7-160.el9_0.x86_64.rpm�3�(rubygems-3.2.33-160.el9_0.noarch.rpm�K�>rubygem-rbs-1.4.0-160.el9_0.noarch.rpm�*�9rubygem-irb-1.3.5-160.el9_0.noarch.rpm��<ruby-3.0.4-160.el9_0.x86_64.rpm�)�lrubygem-bundler-2.2.33-160.el9_0.noarch.rpm��{rubygem-psych-3.3.2-160.el9_0.x86_64.rpm�(�<ruby-default-gems-3.0.4-160.el9_0.noarch.rpm�-�Krubygem-rake-13.0.3-160.el9_0.noarch.rpm�+�!rubygem-minitest-5.14.2-160.el9_0.noarch.rpm�.�-rubygem-rdoc-6.3.3-160.el9_0.noarch.rpm�:�<ruby-devel-3.0.4-160.el9_0.i686.rpm����R�
	��2��jBBBBBBsecurityModerate: mysql security, bug fix, and enhancement update7���eZhttps://access.redhat.com/errata/RHSA-2022:6590RHSA-2022:6590RHSA-2022:6590https://access.redhat.com/security/cve/CVE-2022-21412CVE-2022-21412CVE-2022-21412https://access.redhat.com/security/cve/CVE-2022-21413CVE-2022-21413CVE-2022-21413https://access.redhat.com/security/cve/CVE-2022-21414CVE-2022-21414CVE-2022-21414https://access.redhat.com/security/cve/CVE-2022-21415CVE-2022-21415CVE-2022-21415https://access.redhat.com/security/cve/CVE-2022-21417CVE-2022-21417CVE-2022-21417https://access.redhat.com/security/cve/CVE-2022-21418CVE-2022-21418CVE-2022-21418https://access.redhat.com/security/cve/CVE-2022-21423CVE-2022-21423CVE-2022-21423https://access.redhat.com/security/cve/CVE-2022-21425CVE-2022-21425CVE-2022-21425https://access.redhat.com/security/cve/CVE-2022-21427CVE-2022-21427CVE-2022-21427https://access.redhat.com/security/cve/CVE-2022-21435CVE-2022-21435CVE-2022-21435https://access.redhat.com/security/cve/CVE-2022-21436CVE-2022-21436CVE-2022-21436https://access.redhat.com/security/cve/CVE-2022-21437CVE-2022-21437CVE-2022-21437https://access.redhat.com/security/cve/CVE-2022-21438CVE-2022-21438CVE-2022-21438https://access.redhat.com/security/cve/CVE-2022-21440CVE-2022-21440CVE-2022-21440https://access.redhat.com/security/cve/CVE-2022-21444CVE-2022-21444CVE-2022-21444https://access.redhat.com/security/cve/CVE-2022-21451CVE-2022-21451CVE-2022-21451https://access.redhat.com/security/cve/CVE-2022-21452CVE-2022-21452CVE-2022-21452https://access.redhat.com/security/cve/CVE-2022-21454CVE-2022-21454CVE-2022-21454https://access.redhat.com/security/cve/CVE-2022-21455CVE-2022-21455CVE-2022-21455https://access.redhat.com/security/cve/CVE-2022-21457CVE-2022-21457CVE-2022-21457https://access.redhat.com/security/cve/CVE-2022-21459CVE-2022-21459CVE-2022-21459https://access.redhat.com/security/cve/CVE-2022-21460CVE-2022-21460CVE-2022-21460https://access.redhat.com/security/cve/CVE-2022-21462CVE-2022-21462CVE-2022-21462https://access.redhat.com/security/cve/CVE-2022-21478CVE-2022-21478CVE-2022-21478https://access.redhat.com/security/cve/CVE-2022-21479CVE-2022-21479CVE-2022-21479https://access.redhat.com/security/cve/CVE-2022-21509CVE-2022-21509CVE-2022-21509https://access.redhat.com/security/cve/CVE-2022-21515CVE-2022-21515CVE-2022-21515https://access.redhat.com/security/cve/CVE-2022-21517CVE-2022-21517CVE-2022-21517https://access.redhat.com/security/cve/CVE-2022-21522CVE-2022-21522CVE-2022-21522https://access.redhat.com/security/cve/CVE-2022-21525CVE-2022-21525CVE-2022-21525https://access.redhat.com/security/cve/CVE-2022-21526CVE-2022-21526CVE-2022-21526https://access.redhat.com/security/cve/CVE-2022-21527CVE-2022-21527CVE-2022-21527https://access.redhat.com/security/cve/CVE-2022-21528CVE-2022-21528CVE-2022-21528https://access.redhat.com/security/cve/CVE-2022-21529CVE-2022-21529CVE-2022-21529https://access.redhat.com/security/cve/CVE-2022-21530CVE-2022-21530CVE-2022-21530https://access.redhat.com/security/cve/CVE-2022-21531CVE-2022-21531CVE-2022-21531https://access.redhat.com/security/cve/CVE-2022-21534CVE-2022-21534CVE-2022-21534https://access.redhat.com/security/cve/CVE-2022-21537CVE-2022-21537CVE-2022-21537https://access.redhat.com/security/cve/CVE-2022-21538CVE-2022-21538CVE-2022-21538https://access.redhat.com/security/cve/CVE-2022-21539CVE-2022-21539CVE-2022-21539https://access.redhat.com/security/cve/CVE-2022-21547CVE-2022-21547CVE-2022-21547https://access.redhat.com/security/cve/CVE-2022-21553CVE-2022-21553CVE-2022-21553https://access.redhat.com/security/cve/CVE-2022-21556CVE-2022-21556CVE-2022-21556https://access.redhat.com/security/cve/CVE-2022-21569CVE-2022-21569CVE-2022-21569https://bugzilla.redhat.com/20826362082636https://bugzilla.redhat.com/20826372082637https://bugzilla.redhat.com/20826382082638https://bugzilla.redhat.com/20826392082639https://bugzilla.redhat.com/20826402082640https://bugzilla.redhat.com/20826412082641https://bugzilla.redhat.com/20826422082642https://bugzilla.redhat.com/20826432082643https://bugzilla.redhat.com/20826442082644https://bugzilla.redhat.com/20826452082645https://bugzilla.redhat.com/20826462082646https://bugzilla.redhat.com/20826472082647https://bugzilla.redhat.com/20826482082648https://bugzilla.redhat.com/20826492082649https://bugzilla.redhat.com/20826502082650https://bugzilla.redhat.com/20826512082651https://bugzilla.redhat.com/20826522082652https://bugzilla.redhat.com/20826532082653https://bugzilla.redhat.com/20826542082654https://bugzilla.redhat.com/20826552082655https://bugzilla.redhat.com/20826562082656https://bugzilla.redhat.com/20826572082657https://bugzilla.redhat.com/20826582082658https://bugzilla.redhat.com/20826592082659https://bugzilla.redhat.com/21152822115282https://bugzilla.redhat.com/21152832115283https://bugzilla.redhat.com/21152842115284https://bugzilla.redhat.com/21152852115285https://bugzilla.redhat.com/21152862115286https://bugzilla.redhat.com/21152872115287https://bugzilla.redhat.com/21152882115288https://bugzilla.redhat.com/21152892115289https://bugzilla.redhat.com/21152902115290https://bugzilla.redhat.com/21152912115291https://bugzilla.redhat.com/21152922115292https://bugzilla.redhat.com/21152932115293https://bugzilla.redhat.com/21152942115294https://bugzilla.redhat.com/21152952115295https://bugzilla.redhat.com/21152962115296https://bugzilla.redhat.com/21152972115297https://bugzilla.redhat.com/21152982115298https://bugzilla.redhat.com/21152992115299https://bugzilla.redhat.com/21153002115300https://bugzilla.redhat.com/21153012115301https://errata.almalinux.org/9/ALSA-2022-6590.htmlALSA-2022:6590ALSA-2022:6590
�R�Ymysql-server-8.0.30-3.el9_0.x86_64.rpm�V�Ymysql-8.0.30-3.el9_0.x86_64.rpm��Ymysql-errmsg-8.0.30-3.el9_0.x86_64.rpm��Ymysql-common-8.0.30-3.el9_0.x86_64.rpm�R�Ymysql-server-8.0.30-3.el9_0.x86_64.rpm�V�Ymysql-8.0.30-3.el9_0.x86_64.rpm��Ymysql-errmsg-8.0.30-3.el9_0.x86_64.rpm��Ymysql-common-8.0.30-3.el9_0.x86_64.rpm����O�

	��>��sBBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security and bug fix update7���1https://access.redhat.com/errata/RHSA-2022:6595RHSA-2022:6595RHSA-2022:6595https://access.redhat.com/security/cve/CVE-2020-28469CVE-2020-28469CVE-2020-28469https://access.redhat.com/security/cve/CVE-2020-7788CVE-2020-7788CVE-2020-7788https://access.redhat.com/security/cve/CVE-2021-33502CVE-2021-33502CVE-2021-33502https://access.redhat.com/security/cve/CVE-2021-3807CVE-2021-3807CVE-2021-3807https://access.redhat.com/security/cve/CVE-2022-29244CVE-2022-29244CVE-2022-29244https://access.redhat.com/security/cve/CVE-2022-32212CVE-2022-32212CVE-2022-32212https://access.redhat.com/security/cve/CVE-2022-32213CVE-2022-32213CVE-2022-32213https://access.redhat.com/security/cve/CVE-2022-32214CVE-2022-32214CVE-2022-32214https://access.redhat.com/security/cve/CVE-2022-32215CVE-2022-32215CVE-2022-32215https://access.redhat.com/security/cve/CVE-2022-33987CVE-2022-33987CVE-2022-33987https://bugzilla.redhat.com/19074441907444https://bugzilla.redhat.com/19454591945459https://bugzilla.redhat.com/19644611964461https://bugzilla.redhat.com/20075572007557https://bugzilla.redhat.com/20985562098556https://bugzilla.redhat.com/21020012102001https://bugzilla.redhat.com/21054222105422https://bugzilla.redhat.com/21054262105426https://bugzilla.redhat.com/21054282105428https://bugzilla.redhat.com/21054302105430https://errata.almalinux.org/9/ALSA-2022-6595.htmlALSA-2022:6595ALSA-2022:6595
d�3npm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpml�]nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm��[nodejs-libs-16.16.0-1.el9_0.x86_64.rpm,�[nodejs-16.16.0-1.el9_0.x86_64.rpme�[nodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm��[nodejs-libs-16.16.0-1.el9_0.i686.rpm>�[nodejs-docs-16.16.0-1.el9_0.noarch.rpmd�3npm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpml�]nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm��[nodejs-libs-16.16.0-1.el9_0.x86_64.rpm,�[nodejs-16.16.0-1.el9_0.x86_64.rpme�[nodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm��[nodejs-libs-16.16.0-1.el9_0.i686.rpm>�[nodejs-docs-16.16.0-1.el9_0.noarch.rpm�����
	����securityModerate: gnupg2 security update7��1�(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602
�U�Kgnupg2-smime-2.3.3-2.el9_0.x86_64.rpm�U�Kgnupg2-smime-2.3.3-2.el9_0.x86_64.rpm����'�
	��
��BBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update7��Y�=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610
$�kernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm%�kernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm&�kernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm#�kernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm'�perf-5.14.0-70.26.1.el9_0.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm%�kernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm&�kernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm#�kernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm'�perf-5.14.0-70.26.1.el9_0.x86_64.rpm����&�
	����NBBBBBBBBBBsecurityModerate: webkit2gtk3 security update7���uhttps://access.redhat.com/errata/RHSA-2022:6634RHSA-2022:6634RHSA-2022:6634https://access.redhat.com/security/cve/CVE-2022-32893CVE-2022-32893CVE-2022-32893https://bugzilla.redhat.com/21216452121645https://errata.almalinux.org/9/ALSA-2022-6634.htmlALSA-2022:6634ALSA-2022:6634
1�)webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm2�)webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm0�)webkit2gtk3-2.36.7-1.el9_0.i686.rpm3�)webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm1�)webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm0�)webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm3�)webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm2�)webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm1�)webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm2�)webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm0�)webkit2gtk3-2.36.7-1.el9_0.i686.rpm3�)webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm1�)webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm0�)webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm3�)webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm2�)webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm����T�
	����[securityImportant: firefox security update7���yhttps://access.redhat.com/errata/RHSA-2022:6700RHSA-2022:6700RHSA-2022:6700https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6700.htmlALSA-2022:6700ALSA-2022:6700
8�pfirefox-102.3.0-6.el9_0.alma.x86_64.rpm8�pfirefox-102.3.0-6.el9_0.alma.x86_64.rpm�����
	�� ��^securityImportant: thunderbird security update7���https://access.redhat.com/errata/RHSA-2022:6717RHSA-2022:6717RHSA-2022:6717https://access.redhat.com/security/cve/CVE-2022-3032CVE-2022-3032CVE-2022-3032https://access.redhat.com/security/cve/CVE-2022-3033CVE-2022-3033CVE-2022-3033https://access.redhat.com/security/cve/CVE-2022-3034CVE-2022-3034CVE-2022-3034https://access.redhat.com/security/cve/CVE-2022-36059CVE-2022-36059CVE-2022-36059https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21232552123255https://bugzilla.redhat.com/21232562123256https://bugzilla.redhat.com/21232572123257https://bugzilla.redhat.com/21232582123258https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6717.htmlALSA-2022:6717ALSA-2022:6717
9�othunderbird-102.3.0-3.el9_0.alma.x86_64.rpm9�othunderbird-102.3.0-3.el9_0.alma.x86_64.rpm����1�
	��.��aBBBBBBBBBBBsecurityImportant: bind security update7���https://access.redhat.com/errata/RHSA-2022:6763RHSA-2022:6763RHSA-2022:6763https://access.redhat.com/security/cve/CVE-2022-3080CVE-2022-3080CVE-2022-3080https://access.redhat.com/security/cve/CVE-2022-38177CVE-2022-38177CVE-2022-38177https://access.redhat.com/security/cve/CVE-2022-38178CVE-2022-38178CVE-2022-38178https://bugzilla.redhat.com/21286002128600https://bugzilla.redhat.com/21286012128601https://bugzilla.redhat.com/21286022128602https://errata.almalinux.org/9/ALSA-2022-6763.htmlALSA-2022:6763ALSA-2022:6763
�^�bind-utils-9.16.23-1.el9_0.1.x86_64.rpm�!�bind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm�[�bind-chroot-9.16.23-1.el9_0.1.x86_64.rpm�]�bind-libs-9.16.23-1.el9_0.1.x86_64.rpm�Z�bind-9.16.23-1.el9_0.1.x86_64.rpm�'�python3-bind-9.16.23-1.el9_0.1.noarch.rpm�\�bind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm�"�bind-license-9.16.23-1.el9_0.1.noarch.rpm�^�bind-utils-9.16.23-1.el9_0.1.x86_64.rpm�!�bind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm�[�bind-chroot-9.16.23-1.el9_0.1.x86_64.rpm�]�bind-libs-9.16.23-1.el9_0.1.x86_64.rpm�Z�bind-9.16.23-1.el9_0.1.x86_64.rpm�'�python3-bind-9.16.23-1.el9_0.1.noarch.rpm�\�bind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm�"�bind-license-9.16.23-1.el9_0.1.noarch.rpm����
�
	��1��osecurityImportant: expat security update7��"�Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838
��Iexpat-devel-2.2.10-12.el9_0.3.x86_64.rpm��Iexpat-devel-2.2.10-12.el9_0.3.x86_64.rpm�����
	��4��rsecurityImportant: squid security update7��w�
https://access.redhat.com/errata/RHSA-2022:6839RHSA-2022:6839RHSA-2022:6839https://access.redhat.com/security/cve/CVE-2022-41318CVE-2022-41318CVE-2022-41318https://bugzilla.redhat.com/21297712129771https://errata.almalinux.org/9/ALSA-2022-6839.htmlALSA-2022:6839ALSA-2022:6839
�{�Esquid-5.2-1.el9_0.2.x86_64.rpm�{�Esquid-5.2-1.el9_0.2.x86_64.rpm�����
	����uBBBBBBBBBsecurityModerate: gnutls and nettle security, bug fix, and enhancement update7���2https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854
�b�gnutls-dane-3.7.6-12.el9_0.x86_64.rpm�b�gnutls-dane-3.7.6-12.el9_0.i686.rpm�a�gnutls-c++-3.7.6-12.el9_0.x86_64.rpm�a�gnutls-c++-3.7.6-12.el9_0.i686.rpm�)�gnutls-utils-3.7.6-12.el9_0.x86_64.rpm�c�gnutls-devel-3.7.6-12.el9_0.x86_64.rpm�c�gnutls-devel-3.7.6-12.el9_0.i686.rpm�b�gnutls-dane-3.7.6-12.el9_0.x86_64.rpm�b�gnutls-dane-3.7.6-12.el9_0.i686.rpm�a�gnutls-c++-3.7.6-12.el9_0.x86_64.rpm�a�gnutls-c++-3.7.6-12.el9_0.i686.rpm�)�gnutls-utils-3.7.6-12.el9_0.x86_64.rpm�c�gnutls-devel-3.7.6-12.el9_0.x86_64.rpm�c�gnutls-devel-3.7.6-12.el9_0.i686.rpm�����
	����ABBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update7��6�Vhttps://access.redhat.com/errata/RHSA-2022:6913RHSA-2022:6913RHSA-2022:6913https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-6913.htmlALSA-2022:6913ALSA-2022:6913

�!�Gdotnet-host-6.0.10-1.el9_0.x86_64.rpm�Q�dotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpm�"�netstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm�M�Gaspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm�O�Gdotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm�N�Gdotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm�S�dotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm�P�Gdotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm�R�Gdotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm�L�Gaspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm
�!�Gdotnet-host-6.0.10-1.el9_0.x86_64.rpm�Q�dotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpm�"�netstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm�M�Gaspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm�O�Gdotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm�N�Gdotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm�S�dotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm�P�Gdotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm�R�Gdotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm�L�Gaspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm����;�
	�� ��VBBBBBBBBsecurityImportant: nodejs security update7���Ohttps://access.redhat.com/errata/RHSA-2022:6963RHSA-2022:6963RHSA-2022:6963https://access.redhat.com/security/cve/CVE-2022-35255CVE-2022-35255CVE-2022-35255https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://bugzilla.redhat.com/21305172130517https://bugzilla.redhat.com/21305182130518https://errata.almalinux.org/9/ALSA-2022-6963.htmlALSA-2022:6963ALSA-2022:6963
>�\nodejs-docs-16.17.1-1.el9_0.noarch.rpm��\nodejs-libs-16.17.1-1.el9_0.x86_64.rpme�\nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm,�\nodejs-16.17.1-1.el9_0.x86_64.rpm��\nodejs-libs-16.17.1-1.el9_0.i686.rpmd�4npm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm>�\nodejs-docs-16.17.1-1.el9_0.noarch.rpm��\nodejs-libs-16.17.1-1.el9_0.x86_64.rpme�\nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm,�\nodejs-16.17.1-1.el9_0.x86_64.rpm��\nodejs-libs-16.17.1-1.el9_0.i686.rpmd�4npm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm����^�
	��3��aBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update7��[�
https://access.redhat.com/errata/RHSA-2022:6999RHSA-2022:6999RHSA-2022:6999https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-6999.htmlALSA-2022:6999ALSA-2022:6999
	��,java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm	��,java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm��,java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm�����
	����tBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update7��e�_
https://access.redhat.com/errata/RHSA-2022:7007RHSA-2022:7007RHSA-2022:7007https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://errata.almalinux.org/9/ALSA-2022-7007.htmlALSA-2022:7007ALSA-2022:7007
�8�ijava-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm�U�ijava-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm�W�ijava-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm�X�ijava-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm�V�ijava-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm�T�ijava-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm�7�ijava-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm�8�ijava-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm�U�ijava-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm�W�ijava-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm�X�ijava-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm�V�ijava-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm�T�ijava-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm�7�ijava-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm��ɷ�
	����ABBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update7��D�https://access.redhat.com/errata/RHSA-2022:7013RHSA-2022:7013RHSA-2022:7013https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-7013.htmlALSA-2022:7013ALSA-2022:7013
	�K�java-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpm�J�java-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpm�F�java-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpm�G�java-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpm�E�java-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpm�D�java-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm	�K�java-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpm�J�java-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpm�F�java-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpm�G�java-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpm�E�java-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpm�D�java-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm�����
	����TsecurityImportant: firefox security update7��O�Khttps://access.redhat.com/errata/RHSA-2022:7020RHSA-2022:7020RHSA-2022:7020https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-7020.htmlALSA-2022:7020ALSA-2022:7020
8�qfirefox-102.3.0-7.el9_0.alma.x86_64.rpm8�qfirefox-102.3.0-7.el9_0.alma.x86_64.rpm����+�
	����WsecurityImportant: firefox security update7���)
https://access.redhat.com/errata/RHSA-2022:7071RHSA-2022:7071RHSA-2022:7071https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7071.htmlALSA-2022:7071ALSA-2022:7071
8�}firefox-102.4.0-1.el9_0.alma.x86_64.rpm8�}firefox-102.4.0-1.el9_0.alma.x86_64.rpm����A�
	����ZsecurityImportant: thunderbird security update7��C�>https://access.redhat.com/errata/RHSA-2022:7178RHSA-2022:7178RHSA-2022:7178https://access.redhat.com/security/cve/CVE-2022-39236CVE-2022-39236CVE-2022-39236https://access.redhat.com/security/cve/CVE-2022-39249CVE-2022-39249CVE-2022-39249https://access.redhat.com/security/cve/CVE-2022-39250CVE-2022-39250CVE-2022-39250https://access.redhat.com/security/cve/CVE-2022-39251CVE-2022-39251CVE-2022-39251https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21353912135391https://bugzilla.redhat.com/21353932135393https://bugzilla.redhat.com/21353952135395https://bugzilla.redhat.com/21353962135396https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7178.htmlALSA-2022:7178ALSA-2022:7178
9�}thunderbird-102.4.0-1.el9_0.alma.x86_64.rpm9�}thunderbird-102.4.0-1.el9_0.alma.x86_64.rpm���:�
	��"��]BBBsecurityImportant: openssl security update7���https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288
��iopenssl-devel-3.0.1-43.el9_0.x86_64.rpm��iopenssl-devel-3.0.1-43.el9_0.i686.rpm��iopenssl-perl-3.0.1-43.el9_0.x86_64.rpm��iopenssl-devel-3.0.1-43.el9_0.x86_64.rpm��iopenssl-devel-3.0.1-43.el9_0.i686.rpm��iopenssl-perl-3.0.1-43.el9_0.x86_64.rpm����h� 
	��%��csecurityModerate: zlib security update7���Ohttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314
�z�Ozlib-devel-1.2.11-32.el9_0.i686.rpm�z�Ozlib-devel-1.2.11-32.el9_0.i686.rpm����O�!
	��3��fBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update7��c�https://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318
�`kernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm'�`perf-5.14.0-70.30.1.el9_0.x86_64.rpm$�`kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm&�`kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm(�`kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm#�`kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm%�`kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpm�`kernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm'�`perf-5.14.0-70.30.1.el9_0.x86_64.rpm$�`kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm&�`kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm(�`kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm#�`kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm%�`kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpm����^�"
	��9��tBBBsecurityModerate: python3.9 security update7��f�nhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323
�+�python3-tkinter-3.9.10-3.el9_0.x86_64.rpmf�python-unversioned-command-3.9.10-3.el9_0.noarch.rpmQ�python3-devel-3.9.10-3.el9_0.x86_64.rpm�+�python3-tkinter-3.9.10-3.el9_0.x86_64.rpmf�python-unversioned-command-3.9.10-3.el9_0.noarch.rpmQ�python3-devel-3.9.10-3.el9_0.x86_64.rpm�����#
	��>�LBBBBBB�iBBsecurityImportant: pki-core security update7��T�https://access.redhat.com/errata/RHSA-2022:7326RHSA-2022:7326RHSA-2022:7326https://access.redhat.com/security/cve/CVE-2022-2414CVE-2022-2414CVE-2022-2414https://bugzilla.redhat.com/21046762104676https://errata.almalinux.org/9/ALSA-2022-7326.htmlALSA-2022:7326ALSA-2022:7326
	�,�	pki-symkey-11.0.6-2.el9_0.x86_64.rpm�?�	python3-pki-11.0.6-2.el9_0.noarch.rpm�6�	pki-kra-11.0.6-2.el9_0.noarch.rpm�/�	pki-base-java-11.0.6-2.el9_0.noarch.rpm�-�	pki-acme-11.0.6-2.el9_0.noarch.rpm�7�	pki-server-11.0.6-2.el9_0.noarch.rpm�-�	pki-tools-11.0.6-2.el9_0.x86_64.rpm�.�	pki-base-11.0.6-2.el9_0.noarch.rpm�0�	pki-ca-11.0.6-2.el9_0.noarch.rpm	�,�	pki-symkey-11.0.6-2.el9_0.x86_64.rpm�?�	python3-pki-11.0.6-2.el9_0.noarch.rpm�6�	pki-kra-11.0.6-2.el9_0.noarch.rpm�/�	pki-base-java-11.0.6-2.el9_0.noarch.rpm�-�	pki-acme-11.0.6-2.el9_0.noarch.rpm�7�	pki-server-11.0.6-2.el9_0.noarch.rpm�-�	pki-tools-11.0.6-2.el9_0.x86_64.rpm�.�	pki-base-11.0.6-2.el9_0.noarch.rpm�0�	pki-ca-11.0.6-2.el9_0.noarch.rpm�����$
	����securityModerate: lua security update7��p�https://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329
�}�5lua-5.4.2-4.el9_0.3.x86_64.rpm�}�5lua-5.4.2-4.el9_0.3.x86_64.rpm�����%
	����BsecurityLow: Image Builder security, bug fix, and enhancement update7�6���https://access.redhat.com/errata/RHSA-2022:7950RHSA-2022:7950RHSA-2022:7950https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/21138142113814https://errata.almalinux.org/9/ALSA-2022-7950.htmlALSA-2022:7950ALSA-2022:7950
��
weldr-client-35.5-4.el9.x86_64.rpm��
weldr-client-35.5-4.el9.x86_64.rpm��݆�&
	����EBBBBBBBBBsecurityModerate: podman security and bug fix update7���zhttps://access.redhat.com/errata/RHSA-2022:7954RHSA-2022:7954RHSA-2022:7954https://access.redhat.com/security/cve/CVE-2020-28851CVE-2020-28851CVE-2020-28851https://access.redhat.com/security/cve/CVE-2020-28852CVE-2020-28852CVE-2020-28852https://access.redhat.com/security/cve/CVE-2021-20199CVE-2021-20199CVE-2021-20199https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33197CVE-2021-33197CVE-2021-33197https://access.redhat.com/security/cve/CVE-2021-34558CVE-2021-34558CVE-2021-34558https://access.redhat.com/security/cve/CVE-2021-4024CVE-2021-4024CVE-2021-4024https://access.redhat.com/security/cve/CVE-2022-27191CVE-2022-27191CVE-2022-27191https://bugzilla.redhat.com/19133331913333https://bugzilla.redhat.com/19133381913338https://bugzilla.redhat.com/19190501919050https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19835961983596https://bugzilla.redhat.com/19895701989570https://bugzilla.redhat.com/20266752026675https://bugzilla.redhat.com/20647022064702https://errata.almalinux.org/9/ALSA-2022-7954.htmlALSA-2022:7954ALSA-2022:7954
�3�~podman-remote-4.2.0-3.el9.x86_64.rpm�4�~podman-tests-4.2.0-3.el9.x86_64.rpm�M�~podman-gvproxy-4.2.0-3.el9.x86_64.rpm�1�~podman-4.2.0-3.el9.x86_64.rpmh�~podman-docker-4.2.0-3.el9.noarch.rpm�2�~podman-plugins-4.2.0-3.el9.x86_64.rpm�3�~podman-remote-4.2.0-3.el9.x86_64.rpm�4�~podman-tests-4.2.0-3.el9.x86_64.rpm�M�~podman-gvproxy-4.2.0-3.el9.x86_64.rpm�1�~podman-4.2.0-3.el9.x86_64.rpmh�~podman-docker-4.2.0-3.el9.noarch.rpm�2�~podman-plugins-4.2.0-3.el9.x86_64.rpm��ܸN�'
	����QBBsecurityModerate: skopeo security and bug fix update7���?https://access.redhat.com/errata/RHSA-2022:7955RHSA-2022:7955RHSA-2022:7955https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33198CVE-2021-33198CVE-2021-33198https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19895751989575https://errata.almalinux.org/9/ALSA-2022-7955.htmlALSA-2022:7955ALSA-2022:7955
�d�Lskopeo-tests-1.9.2-1.el9.x86_64.rpm�c�Lskopeo-1.9.2-1.el9.x86_64.rpm�d�Lskopeo-tests-1.9.2-1.el9.x86_64.rpm�c�Lskopeo-1.9.2-1.el9.x86_64.rpm��ܷ-�(
	��&��VBBBBBBBBBBBBBBsecurityLow: libguestfs security, bug fix, and enhancement update7�6��G�https://access.redhat.com/errata/RHSA-2022:7958RHSA-2022:7958RHSA-2022:7958https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7958.htmlALSA-2022:7958ALSA-2022:7958
	�v�klibguestfs-rsync-1.48.4-2.el9.alma.x86_64.rpm�u�klibguestfs-rescue-1.48.4-2.el9.alma.x86_64.rpm�w�klibguestfs-xfs-1.48.4-2.el9.alma.x86_64.rpm�;�kpython3-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�s�klibguestfs-1.48.4-2.el9.alma.x86_64.rpm�t�klibguestfs-appliance-1.48.4-2.el9.alma.x86_64.rpm�#�kperl-Sys-Guestfs-1.48.4-2.el9.alma.x86_64.rpm�V�klibguestfs-inspect-icons-1.48.4-2.el9.alma.noarch.rpm�U�klibguestfs-bash-completion-1.48.4-2.el9.alma.noarch.rpm	�v�klibguestfs-rsync-1.48.4-2.el9.alma.x86_64.rpm�u�klibguestfs-rescue-1.48.4-2.el9.alma.x86_64.rpm�w�klibguestfs-xfs-1.48.4-2.el9.alma.x86_64.rpm�;�kpython3-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�s�klibguestfs-1.48.4-2.el9.alma.x86_64.rpm�t�klibguestfs-appliance-1.48.4-2.el9.alma.x86_64.rpm�#�kperl-Sys-Guestfs-1.48.4-2.el9.alma.x86_64.rpm�V�klibguestfs-inspect-icons-1.48.4-2.el9.alma.noarch.rpm�U�klibguestfs-bash-completion-1.48.4-2.el9.alma.noarch.rpm��ܵh�)
	��*��gBsecurityLow: guestfs-tools security, bug fix, and enhancement update7�6��W�https://access.redhat.com/errata/RHSA-2022:7959RHSA-2022:7959RHSA-2022:7959https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7959.htmlALSA-2022:7959ALSA-2022:7959
�A�6guestfs-tools-1.48.2-5.el9.x86_64.rpm�7�6virt-win-reg-1.48.2-5.el9.noarch.rpm�A�6guestfs-tools-1.48.2-5.el9.x86_64.rpm�7�6virt-win-reg-1.48.2-5.el9.noarch.rpm��ܴ<�*
	����kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement update7��n�S
https://access.redhat.com/errata/RHSA-2022:7967RHSA-2022:7967RHSA-2022:7967https://access.redhat.com/security/cve/CVE-2021-3507CVE-2021-3507CVE-2021-3507https://access.redhat.com/security/cve/CVE-2021-3611CVE-2021-3611CVE-2021-3611https://access.redhat.com/security/cve/CVE-2021-3750CVE-2021-3750CVE-2021-3750https://access.redhat.com/security/cve/CVE-2021-4158CVE-2021-4158CVE-2021-4158https://bugzilla.redhat.com/19511181951118https://bugzilla.redhat.com/19737841973784https://bugzilla.redhat.com/19990731999073https://bugzilla.redhat.com/20350022035002https://errata.almalinux.org/9/ALSA-2022-7967.htmlALSA-2022:7967ALSA-2022:7967
�Yqemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpm�7Yqemu-kvm-core-7.0.0-13.el9.x86_64.rpm�Yqemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpm�1Yqemu-img-7.0.0-13.el9.x86_64.rpm�>Yqemu-kvm-tools-7.0.0-13.el9.x86_64.rpm�AYqemu-pr-helper-7.0.0-13.el9.x86_64.rpm�3Yqemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpm�2Yqemu-kvm-7.0.0-13.el9.x86_64.rpm�?Yqemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpm�Yqemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpm�9Yqemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpm�:Yqemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpm�@Yqemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpm�5Yqemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpm�0Yqemu-guest-agent-7.0.0-13.el9.x86_64.rpm�6Yqemu-kvm-common-7.0.0-13.el9.x86_64.rpm�8Yqemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpm�;Yqemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpm�<Yqemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpm�4Yqemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpm�=Yqemu-kvm-docs-7.0.0-13.el9.x86_64.rpm�Yqemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpm�7Yqemu-kvm-core-7.0.0-13.el9.x86_64.rpm�Yqemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpm�1Yqemu-img-7.0.0-13.el9.x86_64.rpm�>Yqemu-kvm-tools-7.0.0-13.el9.x86_64.rpm�AYqemu-pr-helper-7.0.0-13.el9.x86_64.rpm�3Yqemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpm�2Yqemu-kvm-7.0.0-13.el9.x86_64.rpm�?Yqemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpm�Yqemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpm�9Yqemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpm�:Yqemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpm�@Yqemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpm�5Yqemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpm�0Yqemu-guest-agent-7.0.0-13.el9.x86_64.rpm�6Yqemu-kvm-common-7.0.0-13.el9.x86_64.rpm�8Yqemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpm�;Yqemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpm�<Yqemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpm�4Yqemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpm�=Yqemu-kvm-docs-7.0.0-13.el9.x86_64.rpm��ܳ&�+
	����VBsecurityLow: virt-v2v security, bug fix, and enhancement update7�6��A�lhttps://access.redhat.com/errata/RHSA-2022:7968RHSA-2022:7968RHSA-2022:7968https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7968.htmlALSA-2022:7968ALSA-2022:7968
�6�Evirt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm�u�Evirt-v2v-2.0.7-6.el9.x86_64.rpm�6�Evirt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm�u�Evirt-v2v-2.0.7-6.el9.x86_64.rpm��ܲ�,
	��!��ZBBBBBsecurityModerate: protobuf security update7��-�Nhttps://access.redhat.com/errata/RHSA-2022:7970RHSA-2022:7970RHSA-2022:7970https://access.redhat.com/security/cve/CVE-2021-22570CVE-2021-22570CVE-2021-22570https://bugzilla.redhat.com/20494292049429https://errata.almalinux.org/9/ALSA-2022-7970.htmlALSA-2022:7970ALSA-2022:7970
�L�Dprotobuf-3.14.0-13.el9.i686.rpm�M�Dprotobuf-lite-3.14.0-13.el9.x86_64.rpm�L�Dprotobuf-3.14.0-13.el9.x86_64.rpm�[�Dpython3-protobuf-3.14.0-13.el9.noarch.rpm�M�Dprotobuf-lite-3.14.0-13.el9.i686.rpm�L�Dprotobuf-3.14.0-13.el9.i686.rpm�M�Dprotobuf-lite-3.14.0-13.el9.x86_64.rpm�L�Dprotobuf-3.14.0-13.el9.x86_64.rpm�[�Dpython3-protobuf-3.14.0-13.el9.noarch.rpm�M�Dprotobuf-lite-3.14.0-13.el9.i686.rpm��ނh�-
	��'��bBBBsecurityModerate: gimp security and enhancement update7��{�https://access.redhat.com/errata/RHSA-2022:7978RHSA-2022:7978RHSA-2022:7978https://access.redhat.com/security/cve/CVE-2022-30067CVE-2022-30067CVE-2022-30067https://access.redhat.com/security/cve/CVE-2022-32990CVE-2022-32990CVE-2022-32990https://bugzilla.redhat.com/20875912087591https://bugzilla.redhat.com/21032022103202https://errata.almalinux.org/9/ALSA-2022-7978.htmlALSA-2022:7978ALSA-2022:7978
�J�gimp-libs-2.99.8-3.el9.x86_64.rpm�?�gimp-2.99.8-3.el9.x86_64.rpm�J�gimp-libs-2.99.8-3.el9.i686.rpm�J�gimp-libs-2.99.8-3.el9.x86_64.rpm�?�gimp-2.99.8-3.el9.x86_64.rpm�J�gimp-libs-2.99.8-3.el9.i686.rpm��ރ
�.
	��+��hBsecurityLow: speex security update7�6���8https://access.redhat.com/errata/RHSA-2022:7979RHSA-2022:7979RHSA-2022:7979https://access.redhat.com/security/cve/CVE-2020-23903CVE-2020-23903CVE-2020-23903https://bugzilla.redhat.com/20242502024250https://errata.almalinux.org/9/ALSA-2022-7979.htmlALSA-2022:7979ALSA-2022:7979
��)speex-1.2.0-11.el9.x86_64.rpm��)speex-1.2.0-11.el9.i686.rpm��)speex-1.2.0-11.el9.x86_64.rpm��)speex-1.2.0-11.el9.i686.rpm��ރ�/
	����lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityLow: libvirt security, bug fix, and enhancement update7�6��8�https://access.redhat.com/errata/RHSA-2022:8003RHSA-2022:8003RHSA-2022:8003https://access.redhat.com/security/cve/CVE-2022-0897CVE-2022-0897CVE-2022-0897https://bugzilla.redhat.com/20638832063883https://errata.almalinux.org/9/ALSA-2022-8003.htmlALSA-2022:8003ALSA-2022:8003
�xTlibvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1.x86_64.rpm�sTlibvirt-daemon-driver-storage-disk-8.5.0-7.el9_1.x86_64.rpm�iTlibvirt-daemon-config-network-8.5.0-7.el9_1.x86_64.rpm�gTlibvirt-client-8.5.0-7.el9_1.x86_64.rpm�wTlibvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1.x86_64.rpm�kTlibvirt-daemon-driver-interface-8.5.0-7.el9_1.x86_64.rpm�yTlibvirt-daemon-kvm-8.5.0-7.el9_1.x86_64.rpm�rTlibvirt-daemon-driver-storage-core-8.5.0-7.el9_1.x86_64.rpm�vTlibvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1.x86_64.rpm�hTlibvirt-daemon-8.5.0-7.el9_1.x86_64.rpm�mTlibvirt-daemon-driver-nodedev-8.5.0-7.el9_1.x86_64.rpm�fTlibvirt-8.5.0-7.el9_1.x86_64.rpm�uTlibvirt-daemon-driver-storage-logical-8.5.0-7.el9_1.x86_64.rpm�jTlibvirt-daemon-config-nwfilter-8.5.0-7.el9_1.x86_64.rpm�{Tlibvirt-nss-8.5.0-7.el9_1.x86_64.rpm�oTlibvirt-daemon-driver-qemu-8.5.0-7.el9_1.x86_64.rpm�pTlibvirt-daemon-driver-secret-8.5.0-7.el9_1.x86_64.rpm�qTlibvirt-daemon-driver-storage-8.5.0-7.el9_1.x86_64.rpm�lTlibvirt-daemon-driver-network-8.5.0-7.el9_1.x86_64.rpm�tTlibvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1.x86_64.rpm�nTlibvirt-daemon-driver-nwfilter-8.5.0-7.el9_1.x86_64.rpm�zTlibvirt-libs-8.5.0-7.el9_1.x86_64.rpm�xTlibvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1.x86_64.rpm�sTlibvirt-daemon-driver-storage-disk-8.5.0-7.el9_1.x86_64.rpm�iTlibvirt-daemon-config-network-8.5.0-7.el9_1.x86_64.rpm�gTlibvirt-client-8.5.0-7.el9_1.x86_64.rpm�wTlibvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1.x86_64.rpm�kTlibvirt-daemon-driver-interface-8.5.0-7.el9_1.x86_64.rpm�yTlibvirt-daemon-kvm-8.5.0-7.el9_1.x86_64.rpm�rTlibvirt-daemon-driver-storage-core-8.5.0-7.el9_1.x86_64.rpm�vTlibvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1.x86_64.rpm�hTlibvirt-daemon-8.5.0-7.el9_1.x86_64.rpm�mTlibvirt-daemon-driver-nodedev-8.5.0-7.el9_1.x86_64.rpm�fTlibvirt-8.5.0-7.el9_1.x86_64.rpm�uTlibvirt-daemon-driver-storage-logical-8.5.0-7.el9_1.x86_64.rpm�jTlibvirt-daemon-config-nwfilter-8.5.0-7.el9_1.x86_64.rpm�{Tlibvirt-nss-8.5.0-7.el9_1.x86_64.rpm�oTlibvirt-daemon-driver-qemu-8.5.0-7.el9_1.x86_64.rpm�pTlibvirt-daemon-driver-secret-8.5.0-7.el9_1.x86_64.rpm�qTlibvirt-daemon-driver-storage-8.5.0-7.el9_1.x86_64.rpm�lTlibvirt-daemon-driver-network-8.5.0-7.el9_1.x86_64.rpm�tTlibvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1.x86_64.rpm�nTlibvirt-daemon-driver-nwfilter-8.5.0-7.el9_1.x86_64.rpm�zTlibvirt-libs-8.5.0-7.el9_1.x86_64.rpm��ܩP�0
	����YBBsecurityModerate: buildah security and bug fix update7��H�https://access.redhat.com/errata/RHSA-2022:8008RHSA-2022:8008RHSA-2022:8008https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33195CVE-2021-33195CVE-2021-33195https://access.redhat.com/security/cve/CVE-2021-33197CVE-2021-33197CVE-2021-33197https://access.redhat.com/security/cve/CVE-2021-33198CVE-2021-33198CVE-2021-33198https://access.redhat.com/security/cve/CVE-2022-27191CVE-2022-27191CVE-2022-27191https://access.redhat.com/security/cve/CVE-2022-2989CVE-2022-2989CVE-2022-2989https://access.redhat.com/security/cve/CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19895641989564https://bugzilla.redhat.com/19895701989570https://bugzilla.redhat.com/19895751989575https://bugzilla.redhat.com/20647022064702https://bugzilla.redhat.com/21214452121445https://bugzilla.redhat.com/21214532121453https://errata.almalinux.org/9/ALSA-2022-8008.htmlALSA-2022:8008ALSA-2022:8008
�0�buildah-tests-1.27.0-2.el9.x86_64.rpm�/�buildah-1.27.0-2.el9.x86_64.rpm�0�buildah-tests-1.27.0-2.el9.x86_64.rpm�/�buildah-1.27.0-2.el9.x86_64.rpm��ܧ�1
	��$��^BBBBsecurityModerate: fribidi security update7��\�ghttps://access.redhat.com/errata/RHSA-2022:8011RHSA-2022:8011RHSA-2022:8011https://access.redhat.com/security/cve/CVE-2022-25308CVE-2022-25308CVE-2022-25308https://access.redhat.com/security/cve/CVE-2022-25309CVE-2022-25309CVE-2022-25309https://access.redhat.com/security/cve/CVE-2022-25310CVE-2022-25310CVE-2022-25310https://bugzilla.redhat.com/20478902047890https://bugzilla.redhat.com/20478962047896https://bugzilla.redhat.com/20479232047923https://errata.almalinux.org/9/ALSA-2022-8011.htmlALSA-2022:8011ALSA-2022:8011
�/�Pfribidi-devel-1.0.10-6.el9.2.i686.rpm�.�Pfribidi-1.0.10-6.el9.2.i686.rpm�.�Pfribidi-1.0.10-6.el9.2.x86_64.rpm�/�Pfribidi-devel-1.0.10-6.el9.2.x86_64.rpm�/�Pfribidi-devel-1.0.10-6.el9.2.i686.rpm�.�Pfribidi-1.0.10-6.el9.2.i686.rpm�.�Pfribidi-1.0.10-6.el9.2.x86_64.rpm�/�Pfribidi-devel-1.0.10-6.el9.2.x86_64.rpm��ރr�2
	��(��eBsecurityModerate: qt5 security and bug fix update7��C�9https://access.redhat.com/errata/RHSA-2022:8022RHSA-2022:8022RHSA-2022:8022https://access.redhat.com/security/cve/CVE-2022-25255CVE-2022-25255CVE-2022-25255https://bugzilla.redhat.com/20555052055505https://errata.almalinux.org/9/ALSA-2022-8022.htmlALSA-2022:8022ALSA-2022:8022
��Qqt5-5.15.3-1.el9.noarch.rpm��Qqt5-srpm-macros-5.15.3-1.el9.noarch.rpm��Qqt5-rpm-macros-5.15.3-1.el9.noarch.rpm��Qqt5-5.15.3-1.el9.noarch.rpm��Qqt5-srpm-macros-5.15.3-1.el9.noarch.rpm��Qqt5-rpm-macros-5.15.3-1.el9.noarch.rpm��ܣ`�3
	��5��iBBBBBBBBBBsecurityModerate: webkit2gtk3 security and bug fix update7��|�https://access.redhat.com/errata/RHSA-2022:8054RHSA-2022:8054RHSA-2022:8054https://access.redhat.com/security/cve/CVE-2022-22624CVE-2022-22624CVE-2022-22624https://access.redhat.com/security/cve/CVE-2022-22628CVE-2022-22628CVE-2022-22628https://access.redhat.com/security/cve/CVE-2022-22629CVE-2022-22629CVE-2022-22629https://access.redhat.com/security/cve/CVE-2022-22662CVE-2022-22662CVE-2022-22662https://access.redhat.com/security/cve/CVE-2022-26700CVE-2022-26700CVE-2022-26700https://access.redhat.com/security/cve/CVE-2022-26709CVE-2022-26709CVE-2022-26709https://access.redhat.com/security/cve/CVE-2022-26710CVE-2022-26710CVE-2022-26710https://access.redhat.com/security/cve/CVE-2022-26716CVE-2022-26716CVE-2022-26716https://access.redhat.com/security/cve/CVE-2022-26717CVE-2022-26717CVE-2022-26717https://access.redhat.com/security/cve/CVE-2022-26719CVE-2022-26719CVE-2022-26719https://access.redhat.com/security/cve/CVE-2022-30293CVE-2022-30293CVE-2022-30293https://bugzilla.redhat.com/20738932073893https://bugzilla.redhat.com/20738962073896https://bugzilla.redhat.com/20738992073899https://bugzilla.redhat.com/20825482082548https://bugzilla.redhat.com/20927322092732https://bugzilla.redhat.com/20927332092733https://bugzilla.redhat.com/20927342092734https://bugzilla.redhat.com/20927352092735https://bugzilla.redhat.com/20927362092736https://bugzilla.redhat.com/21047872104787https://bugzilla.redhat.com/21047892104789https://errata.almalinux.org/9/ALSA-2022-8054.htmlALSA-2022:8054ALSA-2022:8054
1�(webkit2gtk3-devel-2.36.7-1.el9.x86_64.rpm3�(webkit2gtk3-jsc-devel-2.36.7-1.el9.i686.rpm1�(webkit2gtk3-devel-2.36.7-1.el9.i686.rpm2�(webkit2gtk3-jsc-2.36.7-1.el9.x86_64.rpm2�(webkit2gtk3-jsc-2.36.7-1.el9.i686.rpm0�(webkit2gtk3-2.36.7-1.el9.i686.rpm3�(webkit2gtk3-jsc-devel-2.36.7-1.el9.x86_64.rpm0�(webkit2gtk3-2.36.7-1.el9.x86_64.rpm1�(webkit2gtk3-devel-2.36.7-1.el9.x86_64.rpm3�(webkit2gtk3-jsc-devel-2.36.7-1.el9.i686.rpm1�(webkit2gtk3-devel-2.36.7-1.el9.i686.rpm2�(webkit2gtk3-jsc-2.36.7-1.el9.x86_64.rpm2�(webkit2gtk3-jsc-2.36.7-1.el9.i686.rpm0�(webkit2gtk3-2.36.7-1.el9.i686.rpm3�(webkit2gtk3-jsc-devel-2.36.7-1.el9.x86_64.rpm0�(webkit2gtk3-2.36.7-1.el9.x86_64.rpm�����4
	��8��vsecurityImportant: grafana security, bug fix, and enhancement update7���p https://access.redhat.com/errata/RHSA-2022:8057RHSA-2022:8057RHSA-2022:8057https://access.redhat.com/security/cve/CVE-2021-23648CVE-2021-23648CVE-2021-23648https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-1962CVE-2022-1962CVE-2022-1962https://access.redhat.com/security/cve/CVE-2022-21673CVE-2022-21673CVE-2022-21673https://access.redhat.com/security/cve/CVE-2022-21698CVE-2022-21698CVE-2022-21698https://access.redhat.com/security/cve/CVE-2022-21702CVE-2022-21702CVE-2022-21702https://access.redhat.com/security/cve/CVE-2022-21703CVE-2022-21703CVE-2022-21703https://access.redhat.com/security/cve/CVE-2022-21713CVE-2022-21713CVE-2022-21713https://access.redhat.com/security/cve/CVE-2022-28131CVE-2022-28131CVE-2022-28131https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30633CVE-2022-30633CVE-2022-30633https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/20446282044628https://bugzilla.redhat.com/20458802045880https://bugzilla.redhat.com/20506482050648https://bugzilla.redhat.com/20507422050742https://bugzilla.redhat.com/20507432050743https://bugzilla.redhat.com/20652902065290https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073762107376https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21073902107390https://bugzilla.redhat.com/21073922107392https://errata.almalinux.org/9/ALSA-2022-8057.htmlALSA-2022:8057ALSA-2022:8057
�I�Cgrafana-7.5.15-3.el9.x86_64.rpm�I�Cgrafana-7.5.15-3.el9.x86_64.rpm��ܟ�5
	����yBBBBBsecurityModerate: unbound security, bug fix, and enhancement update7���5https://access.redhat.com/errata/RHSA-2022:8062RHSA-2022:8062RHSA-2022:8062https://access.redhat.com/security/cve/CVE-2022-30698CVE-2022-30698CVE-2022-30698https://access.redhat.com/security/cve/CVE-2022-30699CVE-2022-30699CVE-2022-30699https://bugzilla.redhat.com/21167252116725https://bugzilla.redhat.com/21167292116729https://errata.almalinux.org/9/ALSA-2022-8062.htmlALSA-2022:8062ALSA-2022:8062
�P�python3-unbound-1.16.2-2.el9.x86_64.rpm��unbound-libs-1.16.2-2.el9.x86_64.rpm��unbound-libs-1.16.2-2.el9.i686.rpm�U�unbound-1.16.2-2.el9.x86_64.rpm�P�python3-unbound-1.16.2-2.el9.x86_64.rpm��unbound-libs-1.16.2-2.el9.x86_64.rpm��unbound-libs-1.16.2-2.el9.i686.rpm�U�unbound-1.16.2-2.el9.x86_64.rpm��ބx�6
	����ABBBBBBBBBBBBBBBBBBsecurityModerate: httpd security, bug fix, and enhancement update7��=�nhttps://access.redhat.com/errata/RHSA-2022:8067RHSA-2022:8067RHSA-2022:8067https://access.redhat.com/security/cve/CVE-2022-22719CVE-2022-22719CVE-2022-22719https://access.redhat.com/security/cve/CVE-2022-22721CVE-2022-22721CVE-2022-22721https://access.redhat.com/security/cve/CVE-2022-23943CVE-2022-23943CVE-2022-23943https://access.redhat.com/security/cve/CVE-2022-26377CVE-2022-26377CVE-2022-26377https://access.redhat.com/security/cve/CVE-2022-28614CVE-2022-28614CVE-2022-28614https://access.redhat.com/security/cve/CVE-2022-28615CVE-2022-28615CVE-2022-28615https://access.redhat.com/security/cve/CVE-2022-29404CVE-2022-29404CVE-2022-29404https://access.redhat.com/security/cve/CVE-2022-30522CVE-2022-30522CVE-2022-30522https://access.redhat.com/security/cve/CVE-2022-30556CVE-2022-30556CVE-2022-30556https://access.redhat.com/security/cve/CVE-2022-31813CVE-2022-31813CVE-2022-31813https://bugzilla.redhat.com/20643192064319https://bugzilla.redhat.com/20643202064320https://bugzilla.redhat.com/20643222064322https://bugzilla.redhat.com/20949972094997https://bugzilla.redhat.com/20950022095002https://bugzilla.redhat.com/20950062095006https://bugzilla.redhat.com/20950122095012https://bugzilla.redhat.com/20950152095015https://bugzilla.redhat.com/20950182095018https://bugzilla.redhat.com/20950202095020https://errata.almalinux.org/9/ALSA-2022-8067.htmlALSA-2022:8067ALSA-2022:8067
�~�lhttpd-manual-2.4.53-7.el9.noarch.rpm�M�lmod_ldap-2.4.53-7.el9.x86_64.rpm�N�lmod_lua-2.4.53-7.el9.x86_64.rpm�O�mod_proxy_html-2.4.53-7.el9.x86_64.rpm�C�lhttpd-tools-2.4.53-7.el9.x86_64.rpm�}�lhttpd-filesystem-2.4.53-7.el9.noarch.rpm�P�lmod_session-2.4.53-7.el9.x86_64.rpm�A�lhttpd-core-2.4.53-7.el9.x86_64.rpm�@�lhttpd-2.4.53-7.el9.x86_64.rpm�Q�mod_ssl-2.4.53-7.el9.x86_64.rpm�B�lhttpd-devel-2.4.53-7.el9.x86_64.rpm�~�lhttpd-manual-2.4.53-7.el9.noarch.rpm�M�lmod_ldap-2.4.53-7.el9.x86_64.rpm�N�lmod_lua-2.4.53-7.el9.x86_64.rpm�O�mod_proxy_html-2.4.53-7.el9.x86_64.rpm�C�lhttpd-tools-2.4.53-7.el9.x86_64.rpm�}�lhttpd-filesystem-2.4.53-7.el9.noarch.rpm�P�lmod_session-2.4.53-7.el9.x86_64.rpm�A�lhttpd-core-2.4.53-7.el9.x86_64.rpm�@�lhttpd-2.4.53-7.el9.x86_64.rpm�Q�mod_ssl-2.4.53-7.el9.x86_64.rpm�B�lhttpd-devel-2.4.53-7.el9.x86_64.rpm��ܙI�7
	��#��VBBBBBBBBBBBsecurityModerate: bind security update7��+�
https://access.redhat.com/errata/RHSA-2022:8068RHSA-2022:8068RHSA-2022:8068https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://access.redhat.com/security/cve/CVE-2022-0396CVE-2022-0396CVE-2022-0396https://bugzilla.redhat.com/20645122064512https://bugzilla.redhat.com/20645132064513https://errata.almalinux.org/9/ALSA-2022-8068.htmlALSA-2022:8068ALSA-2022:8068
�[�bind-chroot-9.16.23-5.el9_1.x86_64.rpm�]�bind-libs-9.16.23-5.el9_1.x86_64.rpm�\�bind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpm�Z�bind-9.16.23-5.el9_1.x86_64.rpm�"�bind-license-9.16.23-5.el9_1.noarch.rpm�^�bind-utils-9.16.23-5.el9_1.x86_64.rpm�'�python3-bind-9.16.23-5.el9_1.noarch.rpm�!�bind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm�[�bind-chroot-9.16.23-5.el9_1.x86_64.rpm�]�bind-libs-9.16.23-5.el9_1.x86_64.rpm�\�bind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpm�Z�bind-9.16.23-5.el9_1.x86_64.rpm�"�bind-license-9.16.23-5.el9_1.noarch.rpm�^�bind-utils-9.16.23-5.el9_1.x86_64.rpm�'�python3-bind-9.16.23-5.el9_1.noarch.rpm�!�bind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm��ܖ<�8
	��(��dBBsecurityModerate: dnsmasq security and bug fix update7��8�0https://access.redhat.com/errata/RHSA-2022:8070RHSA-2022:8070RHSA-2022:8070https://access.redhat.com/security/cve/CVE-2022-0934CVE-2022-0934CVE-2022-0934https://bugzilla.redhat.com/20570752057075https://errata.almalinux.org/9/ALSA-2022-8070.htmlALSA-2022:8070ALSA-2022:8070
�s�,dnsmasq-utils-2.85-5.el9.x86_64.rpm�r�,dnsmasq-2.85-5.el9.x86_64.rpm�s�,dnsmasq-utils-2.85-5.el9.x86_64.rpm�r�,dnsmasq-2.85-5.el9.x86_64.rpm��ܔ=�9
	��,��iBsecurityModerate: flac security update7��h�jhttps://access.redhat.com/errata/RHSA-2022:8078RHSA-2022:8078RHSA-2022:8078https://access.redhat.com/security/cve/CVE-2021-0561CVE-2021-0561CVE-2021-0561https://bugzilla.redhat.com/20577762057776https://errata.almalinux.org/9/ALSA-2022-8078.htmlALSA-2022:8078ALSA-2022:8078
�%�4flac-libs-1.3.3-10.el9.i686.rpm�%�4flac-libs-1.3.3-10.el9.x86_64.rpm�%�4flac-libs-1.3.3-10.el9.i686.rpm�%�4flac-libs-1.3.3-10.el9.x86_64.rpm��ކK�:
	��/��msecurityLow: runc security update7�6��R�%https://access.redhat.com/errata/RHSA-2022:8090RHSA-2022:8090RHSA-2022:8090https://access.redhat.com/security/cve/CVE-2022-29162CVE-2022-29162CVE-2022-29162https://bugzilla.redhat.com/20863982086398https://errata.almalinux.org/9/ALSA-2022-8090.htmlALSA-2022:8090ALSA-2022:8090
�z�'runc-1.1.4-1.el9.x86_64.rpm�z�'runc-1.1.4-1.el9.x86_64.rpm��ܐh�;
	��6��pBBBBsecurityLow: redis security and bug fix update7�6��w�>https://access.redhat.com/errata/RHSA-2022:8096RHSA-2022:8096RHSA-2022:8096https://access.redhat.com/security/cve/CVE-2022-24735CVE-2022-24735CVE-2022-24735https://access.redhat.com/security/cve/CVE-2022-24736CVE-2022-24736CVE-2022-24736https://bugzilla.redhat.com/20802862080286https://bugzilla.redhat.com/20802892080289https://errata.almalinux.org/9/ALSA-2022-8096.htmlALSA-2022:8096ALSA-2022:8096
�b�&redis-doc-6.2.7-1.el9.noarch.rpm�I�&redis-6.2.7-1.el9.x86_64.rpm�i�&redis-devel-6.2.7-1.el9.x86_64.rpm�i�&redis-devel-6.2.7-1.el9.i686.rpm�b�&redis-doc-6.2.7-1.el9.noarch.rpm�I�&redis-6.2.7-1.el9.x86_64.rpm�i�&redis-devel-6.2.7-1.el9.x86_64.rpm�i�&redis-devel-6.2.7-1.el9.i686.rpm��ކx�<
	��;��wBBsecurityModerate: toolbox security and bug fix update7��5�@
https://access.redhat.com/errata/RHSA-2022:8098RHSA-2022:8098RHSA-2022:8098https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073862107386https://errata.almalinux.org/9/ALSA-2022-8098.htmlALSA-2022:8098ALSA-2022:8098
�
�`toolbox-tests-0.0.99.3-5.el9.x86_64.rpm��`toolbox-0.0.99.3-5.el9.x86_64.rpm�
�`toolbox-tests-0.0.99.3-5.el9.x86_64.rpm��`toolbox-0.0.99.3-5.el9.x86_64.rpm��܍e�=
	����|BBBBsecurityLow: swtpm security and bug fix update7�6��u�https://access.redhat.com/errata/RHSA-2022:8100RHSA-2022:8100RHSA-2022:8100https://access.redhat.com/security/cve/CVE-2022-23645CVE-2022-23645CVE-2022-23645https://bugzilla.redhat.com/20564912056491https://errata.almalinux.org/9/ALSA-2022-8100.htmlALSA-2022:8100ALSA-2022:8100
�R�Vswtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm�Q�Vswtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm�P�Vswtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm�R�Vswtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm�Q�Vswtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm�P�Vswtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm��܌f�>
	����CsecurityModerate: frr security, bug fix, and enhancement update7��y�$https://access.redhat.com/errata/RHSA-2022:8112RHSA-2022:8112RHSA-2022:8112https://access.redhat.com/security/cve/CVE-2022-26125CVE-2022-26125CVE-2022-26125https://bugzilla.redhat.com/20586282058628https://errata.almalinux.org/9/ALSA-2022-8112.htmlALSA-2022:8112ALSA-2022:8112
�9�Ofrr-8.2.2-4.el9.x86_64.rpm�9�Ofrr-8.2.2-4.el9.x86_64.rpm��܋E�?
	����FsecurityModerate: ignition security, bug fix, and enhancement update7���,https://access.redhat.com/errata/RHSA-2022:8126RHSA-2022:8126RHSA-2022:8126https://access.redhat.com/security/cve/CVE-2022-1706CVE-2022-1706CVE-2022-1706https://bugzilla.redhat.com/20822742082274https://errata.almalinux.org/9/ALSA-2022-8126.htmlALSA-2022:8126ALSA-2022:8126
�D�Hignition-2.14.0-1.el9.x86_64.rpm�D�Hignition-2.14.0-1.el9.x86_64.rpm��܉X�@
	����IBsecurityLow: wavpack security update7�6��I�2https://access.redhat.com/errata/RHSA-2022:8139RHSA-2022:8139RHSA-2022:8139https://access.redhat.com/security/cve/CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/20644572064457https://errata.almalinux.org/9/ALSA-2022-8139.htmlALSA-2022:8139ALSA-2022:8139
��wavpack-5.4.0-5.el9.i686.rpm��wavpack-5.4.0-5.el9.x86_64.rpm��wavpack-5.4.0-5.el9.i686.rpm��wavpack-5.4.0-5.el9.x86_64.rpm��އ>�A
	����MBBBBBBBBBBBBsecurityModerate: poppler security and bug fix update7��{�(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151
	�@�Apoppler-cpp-21.01.0-13.el9.i686.rpm�@�Apoppler-cpp-21.01.0-13.el9.x86_64.rpm�H�Apoppler-utils-21.01.0-13.el9.x86_64.rpm�A�Apoppler-glib-21.01.0-13.el9.x86_64.rpm�?�Apoppler-21.01.0-13.el9.i686.rpm�?�Apoppler-21.01.0-13.el9.x86_64.rpm�B�Apoppler-qt5-21.01.0-13.el9.i686.rpm�A�Apoppler-glib-21.01.0-13.el9.i686.rpm�B�Apoppler-qt5-21.01.0-13.el9.x86_64.rpm	�@�Apoppler-cpp-21.01.0-13.el9.i686.rpm�@�Apoppler-cpp-21.01.0-13.el9.x86_64.rpm�H�Apoppler-utils-21.01.0-13.el9.x86_64.rpm�A�Apoppler-glib-21.01.0-13.el9.x86_64.rpm�?�Apoppler-21.01.0-13.el9.i686.rpm�?�Apoppler-21.01.0-13.el9.x86_64.rpm�B�Apoppler-qt5-21.01.0-13.el9.i686.rpm�A�Apoppler-glib-21.01.0-13.el9.i686.rpm�B�Apoppler-qt5-21.01.0-13.el9.x86_64.rpm��އT�B
	��!��\BBBsecurityModerate: 389-ds-base security, bug fix, and enhancement update7��#�phttps://access.redhat.com/errata/RHSA-2022:8162RHSA-2022:8162RHSA-2022:8162https://access.redhat.com/security/cve/CVE-2022-0918CVE-2022-0918CVE-2022-0918https://access.redhat.com/security/cve/CVE-2022-0996CVE-2022-0996CVE-2022-0996https://access.redhat.com/security/cve/CVE-2022-2850CVE-2022-2850CVE-2022-2850https://bugzilla.redhat.com/20558152055815https://bugzilla.redhat.com/20647692064769https://bugzilla.redhat.com/21186912118691https://errata.almalinux.org/9/ALSA-2022-8162.htmlALSA-2022:8162ALSA-2022:8162
��w389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpm�/�wpython3-lib389-2.1.3-4.el9_1.noarch.rpm��w389-ds-base-2.1.3-4.el9_1.x86_64.rpm��w389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpm�/�wpython3-lib389-2.1.3-4.el9_1.noarch.rpm��w389-ds-base-2.1.3-4.el9_1.x86_64.rpm��܃�C
	��(��bBBBBsecurityModerate: libtiff security update7���@https://access.redhat.com/errata/RHSA-2022:8194RHSA-2022:8194RHSA-2022:8194https://access.redhat.com/security/cve/CVE-2022-0561CVE-2022-0561CVE-2022-0561https://access.redhat.com/security/cve/CVE-2022-0562CVE-2022-0562CVE-2022-0562https://access.redhat.com/security/cve/CVE-2022-0865CVE-2022-0865CVE-2022-0865https://access.redhat.com/security/cve/CVE-2022-0891CVE-2022-0891CVE-2022-0891https://access.redhat.com/security/cve/CVE-2022-0908CVE-2022-0908CVE-2022-0908https://access.redhat.com/security/cve/CVE-2022-0909CVE-2022-0909CVE-2022-0909https://access.redhat.com/security/cve/CVE-2022-0924CVE-2022-0924CVE-2022-0924https://access.redhat.com/security/cve/CVE-2022-1354CVE-2022-1354CVE-2022-1354https://access.redhat.com/security/cve/CVE-2022-1355CVE-2022-1355CVE-2022-1355https://access.redhat.com/security/cve/CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/20426032042603https://bugzilla.redhat.com/20544942054494https://bugzilla.redhat.com/20544952054495https://bugzilla.redhat.com/20641452064145https://bugzilla.redhat.com/20641462064146https://bugzilla.redhat.com/20641482064148https://bugzilla.redhat.com/20644062064406https://bugzilla.redhat.com/20644112064411https://bugzilla.redhat.com/20744042074404https://bugzilla.redhat.com/20744152074415https://errata.almalinux.org/9/ALSA-2022-8194.htmlALSA-2022:8194ALSA-2022:8194
�D�libtiff-devel-4.4.0-2.el9.x86_64.rpm�C�libtiff-4.4.0-2.el9.i686.rpm�C�libtiff-4.4.0-2.el9.x86_64.rpm�D�libtiff-devel-4.4.0-2.el9.i686.rpm�D�libtiff-devel-4.4.0-2.el9.x86_64.rpm�C�libtiff-4.4.0-2.el9.i686.rpm�C�libtiff-4.4.0-2.el9.x86_64.rpm�D�libtiff-devel-4.4.0-2.el9.i686.rpm��ވ�D
	����iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security, bug fix, and enhancement update7��S�<https://access.redhat.com/errata/RHSA-2022:8197RHSA-2022:8197RHSA-2022:8197https://access.redhat.com/security/cve/CVE-2021-21708CVE-2021-21708CVE-2021-21708https://access.redhat.com/security/cve/CVE-2022-31625CVE-2022-31625CVE-2022-31625https://bugzilla.redhat.com/20558792055879https://bugzilla.redhat.com/20985212098521https://errata.almalinux.org/9/ALSA-2022-8197.htmlALSA-2022:8197ALSA-2022:8197
�@php-mbstring-8.0.20-3.el9.x86_64.rpm�
@php-common-8.0.20-3.el9.x86_64.rpm�@php-8.0.20-3.el9.x86_64.rpm�@php-pgsql-8.0.20-3.el9.x86_64.rpm�@php-embedded-8.0.20-3.el9.x86_64.rpm�@php-ffi-8.0.20-3.el9.x86_64.rpm�@php-dbg-8.0.20-3.el9.x86_64.rpm�
@php-devel-8.0.20-3.el9.x86_64.rpm�@php-enchant-8.0.20-3.el9.x86_64.rpm�@php-mysqlnd-8.0.20-3.el9.x86_64.rpm�@php-xml-8.0.20-3.el9.x86_64.rpm�@php-fpm-8.0.20-3.el9.x86_64.rpm�@php-pdo-8.0.20-3.el9.x86_64.rpm�@php-snmp-8.0.20-3.el9.x86_64.rpm�@php-ldap-8.0.20-3.el9.x86_64.rpm�@php-gmp-8.0.20-3.el9.x86_64.rpm�@php-dba-8.0.20-3.el9.x86_64.rpm�@php-intl-8.0.20-3.el9.x86_64.rpm�@php-bcmath-8.0.20-3.el9.x86_64.rpm�@php-odbc-8.0.20-3.el9.x86_64.rpm�@php-gd-8.0.20-3.el9.x86_64.rpm�	@php-cli-8.0.20-3.el9.x86_64.rpm�@php-soap-8.0.20-3.el9.x86_64.rpm�@php-process-8.0.20-3.el9.x86_64.rpm�@php-opcache-8.0.20-3.el9.x86_64.rpm�@php-mbstring-8.0.20-3.el9.x86_64.rpm�
@php-common-8.0.20-3.el9.x86_64.rpm�@php-8.0.20-3.el9.x86_64.rpm�@php-pgsql-8.0.20-3.el9.x86_64.rpm�@php-embedded-8.0.20-3.el9.x86_64.rpm�@php-ffi-8.0.20-3.el9.x86_64.rpm�@php-dbg-8.0.20-3.el9.x86_64.rpm�
@php-devel-8.0.20-3.el9.x86_64.rpm�@php-enchant-8.0.20-3.el9.x86_64.rpm�@php-mysqlnd-8.0.20-3.el9.x86_64.rpm�@php-xml-8.0.20-3.el9.x86_64.rpm�@php-fpm-8.0.20-3.el9.x86_64.rpm�@php-pdo-8.0.20-3.el9.x86_64.rpm�@php-snmp-8.0.20-3.el9.x86_64.rpm�@php-ldap-8.0.20-3.el9.x86_64.rpm�@php-gmp-8.0.20-3.el9.x86_64.rpm�@php-dba-8.0.20-3.el9.x86_64.rpm�@php-intl-8.0.20-3.el9.x86_64.rpm�@php-bcmath-8.0.20-3.el9.x86_64.rpm�@php-odbc-8.0.20-3.el9.x86_64.rpm�@php-gd-8.0.20-3.el9.x86_64.rpm�	@php-cli-8.0.20-3.el9.x86_64.rpm�@php-soap-8.0.20-3.el9.x86_64.rpm�@php-process-8.0.20-3.el9.x86_64.rpm�@php-opcache-8.0.20-3.el9.x86_64.rpm���5�E
	����\BsecurityLow: openjpeg2 security update7�6���https://access.redhat.com/errata/RHSA-2022:8207RHSA-2022:8207RHSA-2022:8207https://access.redhat.com/security/cve/CVE-2022-1122CVE-2022-1122CVE-2022-1122https://bugzilla.redhat.com/20670522067052https://errata.almalinux.org/9/ALSA-2022-8207.htmlALSA-2022:8207ALSA-2022:8207
�F�Nopenjpeg2-2.4.0-7.el9.i686.rpm�F�Nopenjpeg2-2.4.0-7.el9.x86_64.rpm�F�Nopenjpeg2-2.4.0-7.el9.i686.rpm�F�Nopenjpeg2-2.4.0-7.el9.x86_64.rpm��ވY�F
	��(��`BBBBBBsecurityModerate: dovecot security and enhancement update7��*�Zhttps://access.redhat.com/errata/RHSA-2022:8208RHSA-2022:8208RHSA-2022:8208https://access.redhat.com/security/cve/CVE-2022-30550CVE-2022-30550CVE-2022-30550https://bugzilla.redhat.com/21050702105070https://errata.almalinux.org/9/ALSA-2022-8208.htmlALSA-2022:8208ALSA-2022:8208
�v�Odovecot-pgsql-2.3.16-7.el9.x86_64.rpm�u�Odovecot-mysql-2.3.16-7.el9.x86_64.rpm�w�Odovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm�t�Odovecot-2.3.16-7.el9.x86_64.rpm�v�Odovecot-pgsql-2.3.16-7.el9.x86_64.rpm�u�Odovecot-mysql-2.3.16-7.el9.x86_64.rpm�w�Odovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm�t�Odovecot-2.3.16-7.el9.x86_64.rpm���i�G
	��+��isecurityModerate: mutt security update7���dhttps://access.redhat.com/errata/RHSA-2022:8219RHSA-2022:8219RHSA-2022:8219https://access.redhat.com/security/cve/CVE-2022-1328CVE-2022-1328CVE-2022-1328https://bugzilla.redhat.com/20760582076058https://errata.almalinux.org/9/ALSA-2022-8219.htmlALSA-2022:8219ALSA-2022:8219
��8mutt-2.2.6-1.el9.x86_64.rpm��8mutt-2.2.6-1.el9.x86_64.rpm����-�H
	��8��lBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update7��h�Zhttps://access.redhat.com/errata/RHSA-2022:8221RHSA-2022:8221RHSA-2022:8221https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8221.htmlALSA-2022:8221ALSA-2022:8221
��xorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-common-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-common-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpm��xorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm����'�I
	��;��ysecurityModerate: xorg-x11-server-Xwayland security update7��B�khttps://access.redhat.com/errata/RHSA-2022:8222RHSA-2022:8222RHSA-2022:8222https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8222.htmlALSA-2022:8222ALSA-2022:8222
��bxorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpm��bxorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpm���D�J
	��>��|securityModerate: python-lxml security update7��-�https://access.redhat.com/errata/RHSA-2022:8226RHSA-2022:8226RHSA-2022:8226https://access.redhat.com/security/cve/CVE-2022-2309CVE-2022-2309CVE-2022-2309https://bugzilla.redhat.com/21075712107571https://errata.almalinux.org/9/ALSA-2022-8226.htmlALSA-2022:8226ALSA-2022:8226
�=�python3-lxml-4.6.5-3.el9.x86_64.rpm�=�python3-lxml-4.6.5-3.el9.x86_64.rpm��۾�K
	����securityModerate: grafana-pcp security update7��>�https://access.redhat.com/errata/RHSA-2022:8250RHSA-2022:8250RHSA-2022:8250https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://errata.almalinux.org/9/ALSA-2022-8250.htmlALSA-2022:8250ALSA-2022:8250
�~�zgrafana-pcp-3.2.0-3.el9.x86_64.rpm�~�zgrafana-pcp-3.2.0-3.el9.x86_64.rpm��ۻ9�L
	����BsecurityModerate: yajl security update7��?�Uhttps://access.redhat.com/errata/RHSA-2022:8252RHSA-2022:8252RHSA-2022:8252https://access.redhat.com/security/cve/CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/20729122072912https://errata.almalinux.org/9/ALSA-2022-8252.htmlALSA-2022:8252ALSA-2022:8252
�^�Gyajl-2.1.0-21.el9.x86_64.rpm�^�Gyajl-2.1.0-21.el9.x86_64.rpm����3�M
	����EBBBBBsecurityImportant: dpdk security and bug fix update7���)https://access.redhat.com/errata/RHSA-2022:8263RHSA-2022:8263RHSA-2022:8263https://access.redhat.com/security/cve/CVE-2021-3839CVE-2021-3839CVE-2021-3839https://access.redhat.com/security/cve/CVE-2022-2132CVE-2022-2132CVE-2022-2132https://access.redhat.com/security/cve/CVE-2022-28199CVE-2022-28199CVE-2022-28199https://bugzilla.redhat.com/20258822025882https://bugzilla.redhat.com/20994752099475https://bugzilla.redhat.com/21235492123549https://errata.almalinux.org/9/ALSA-2022-8263.htmlALSA-2022:8263ALSA-2022:8263
�M�1dpdk-doc-21.11.2-1.el9_1.noarch.rpm�N�1dpdk-tools-21.11.2-1.el9_1.x86_64.rpm�K�1dpdk-21.11.2-1.el9_1.x86_64.rpm�L�1dpdk-devel-21.11.2-1.el9_1.x86_64.rpm�M�1dpdk-doc-21.11.2-1.el9_1.noarch.rpm�N�1dpdk-tools-21.11.2-1.el9_1.x86_64.rpm�K�1dpdk-21.11.2-1.el9_1.x86_64.rpm�L�1dpdk-devel-21.11.2-1.el9_1.x86_64.rpm��۹�N
	����MBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update7��=�?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267
(�]kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpm�]kernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm#�]kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$�]kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%�]kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm&�]kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm'�]perf-5.14.0-162.6.1.el9_1.x86_64.rpm(�]kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpm�]kernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm#�]kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$�]kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%�]kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm&�]kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm'�]perf-5.14.0-162.6.1.el9_1.x86_64.rpm��۰N�O
	����securityModerate: rsync security and bug fix update7��@�zhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291
�S�rsync-daemon-3.2.3-18.el9.noarch.rpm�S�rsync-daemon-3.2.3-18.el9.noarch.rpm��ۨ@�P
	�� ��]BsecurityLow: curl security update7�6��:�8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299
��	libcurl-devel-7.76.1-19.el9.x86_64.rpm��	libcurl-devel-7.76.1-19.el9.i686.rpm��	libcurl-devel-7.76.1-19.el9.x86_64.rpm��	libcurl-devel-7.76.1-19.el9.i686.rpm��ދ�Q
	��-��aBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update7��r�mhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317
�N�@samba-client-4.16.4-101.el9.x86_64.rpm�O�@samba-krb5-printing-4.16.4-101.el9.x86_64.rpm�Q�@samba-winbind-clients-4.16.4-101.el9.x86_64.rpm�S�@samba-winexe-4.16.4-101.el9.x86_64.rpm�P�@samba-vfs-iouring-4.16.4-101.el9.x86_64.rpm�R�@samba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpm�N�@samba-client-4.16.4-101.el9.x86_64.rpm�O�@samba-krb5-printing-4.16.4-101.el9.x86_64.rpm�Q�@samba-winbind-clients-4.16.4-101.el9.x86_64.rpm�S�@samba-winexe-4.16.4-101.el9.x86_64.rpm�P�@samba-vfs-iouring-4.16.4-101.el9.x86_64.rpm�R�@samba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpm��ۓ<�R
	��1��nBsecurityModerate: freetype security update7��_�Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340
�-�Kfreetype-devel-2.10.4-9.el9.x86_64.rpm�-�Kfreetype-devel-2.10.4-9.el9.i686.rpm�-�Kfreetype-devel-2.10.4-9.el9.x86_64.rpm�-�Kfreetype-devel-2.10.4-9.el9.i686.rpm��ތ/�S
	��8��rBBBBsecurityModerate: python3.9 security, bug fix, and enhancement update7��.�5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353
�+�}python3-tkinter-3.9.14-1.el9.x86_64.rpmf�}python-unversioned-command-3.9.14-1.el9.noarch.rpmQ�}python3-devel-3.9.14-1.el9.x86_64.rpmQ�}python3-devel-3.9.14-1.el9.i686.rpm�+�}python3-tkinter-3.9.14-1.el9.x86_64.rpmf�}python-unversioned-command-3.9.14-1.el9.noarch.rpmQ�}python3-devel-3.9.14-1.el9.x86_64.rpmQ�}python3-devel-3.9.14-1.el9.i686.rpm��ތ?�T
	��?��yBBBBsecurityModerate: e2fsprogs security update7��c�<https://access.redhat.com/errata/RHSA-2022:8361RHSA-2022:8361RHSA-2022:8361https://access.redhat.com/security/cve/CVE-2022-1304CVE-2022-1304CVE-2022-1304https://bugzilla.redhat.com/20697262069726https://errata.almalinux.org/9/ALSA-2022-8361.htmlALSA-2022:8361ALSA-2022:8361
�)�Ze2fsprogs-devel-1.46.5-3.el9.x86_64.rpm�)�Ze2fsprogs-devel-1.46.5-3.el9.i686.rpm�P�Zlibcom_err-devel-1.46.5-3.el9.i686.rpm�P�Zlibcom_err-devel-1.46.5-3.el9.x86_64.rpm�)�Ze2fsprogs-devel-1.46.5-3.el9.x86_64.rpm�)�Ze2fsprogs-devel-1.46.5-3.el9.i686.rpm�P�Zlibcom_err-devel-1.46.5-3.el9.i686.rpm�P�Zlibcom_err-devel-1.46.5-3.el9.x86_64.rpm����u�U
	����@BBBBsecurityModerate: harfbuzz security update7���uhttps://access.redhat.com/errata/RHSA-2022:8384RHSA-2022:8384RHSA-2022:8384https://access.redhat.com/security/cve/CVE-2022-33068CVE-2022-33068CVE-2022-33068https://bugzilla.redhat.com/21026082102608https://errata.almalinux.org/9/ALSA-2022-8384.htmlALSA-2022:8384ALSA-2022:8384
�'�jharfbuzz-devel-2.7.4-8.el9.i686.rpm�(�jharfbuzz-icu-2.7.4-8.el9.x86_64.rpm�'�jharfbuzz-devel-2.7.4-8.el9.x86_64.rpm�(�jharfbuzz-icu-2.7.4-8.el9.i686.rpm�'�jharfbuzz-devel-2.7.4-8.el9.i686.rpm�(�jharfbuzz-icu-2.7.4-8.el9.x86_64.rpm�'�jharfbuzz-devel-2.7.4-8.el9.x86_64.rpm�(�jharfbuzz-icu-2.7.4-8.el9.i686.rpm��ލ�V
	����GBBBBBBBBBBBsecurityLow: podman security, bug fix, and enhancement update7�6���https://access.redhat.com/errata/RHSA-2022:8431RHSA-2022:8431RHSA-2022:8431https://access.redhat.com/security/cve/CVE-2022-2989CVE-2022-2989CVE-2022-2989https://access.redhat.com/security/cve/CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/21214452121445https://bugzilla.redhat.com/21214532121453https://errata.almalinux.org/9/ALSA-2022-8431.htmlALSA-2022:8431ALSA-2022:8431
�3�\podman-remote-4.2.0-7.el9_1.x86_64.rpm�1�\podman-4.2.0-7.el9_1.x86_64.rpmh�\podman-docker-4.2.0-7.el9_1.noarch.rpm�2�\podman-plugins-4.2.0-7.el9_1.x86_64.rpm�M�\podman-gvproxy-4.2.0-7.el9_1.x86_64.rpm�/�\podman-catatonit-4.2.0-7.el9_1.x86_64.rpm�4�\podman-tests-4.2.0-7.el9_1.x86_64.rpm�3�\podman-remote-4.2.0-7.el9_1.x86_64.rpm�1�\podman-4.2.0-7.el9_1.x86_64.rpmh�\podman-docker-4.2.0-7.el9_1.noarch.rpm�2�\podman-plugins-4.2.0-7.el9_1.x86_64.rpm�M�\podman-gvproxy-4.2.0-7.el9_1.x86_64.rpm�/�\podman-catatonit-4.2.0-7.el9_1.x86_64.rpm�4�\podman-tests-4.2.0-7.el9_1.x86_64.rpm�����W
	��)��UBBBBBBBBBBBBBBBBBBsecurityModerate: dotnet7.0 security, bug fix, and enhancement update7��3�Ihttps://access.redhat.com/errata/RHSA-2022:8434RHSA-2022:8434RHSA-2022:8434https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-8434.htmlALSA-2022:8434ALSA-2022:8434

�y�Jdotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�!�Jdotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpm�~�dotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm�w�Jaspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�z�Jdotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�{�Jdotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�}�Jdotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�|�dotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm�x�Jaspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm
�y�Jdotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�!�Jdotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpm�~�dotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm�w�Jaspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�z�Jdotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�{�Jdotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�}�Jdotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm�|�dotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm�x�Jaspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm����]�X
	��7��jBBBBBBBBBBBsecurityModerate: keylime security update7��|�https://access.redhat.com/errata/RHSA-2022:8444RHSA-2022:8444RHSA-2022:8444https://access.redhat.com/security/cve/CVE-2022-3500CVE-2022-3500CVE-2022-3500https://bugzilla.redhat.com/21353432135343https://errata.almalinux.org/9/ALSA-2022-8444.htmlALSA-2022:8444ALSA-2022:8444
�<�akeylime-selinux-6.5.1-1.el9_1.noarch.rpm�>�akeylime-6.5.1-1.el9_1.x86_64.rpm�O�apython3-keylime-6.5.1-1.el9_1.x86_64.rpm�@�akeylime-registrar-6.5.1-1.el9_1.x86_64.rpm�?�akeylime-base-6.5.1-1.el9_1.x86_64.rpm�A�akeylime-tenant-6.5.1-1.el9_1.x86_64.rpm�B�akeylime-verifier-6.5.1-1.el9_1.x86_64.rpm�<�akeylime-selinux-6.5.1-1.el9_1.noarch.rpm�>�akeylime-6.5.1-1.el9_1.x86_64.rpm�O�apython3-keylime-6.5.1-1.el9_1.x86_64.rpm�@�akeylime-registrar-6.5.1-1.el9_1.x86_64.rpm�?�akeylime-base-6.5.1-1.el9_1.x86_64.rpm�A�akeylime-tenant-6.5.1-1.el9_1.x86_64.rpm�B�akeylime-verifier-6.5.1-1.el9_1.x86_64.rpm���'�Y
	��>��xBBBBsecurityImportant: python3.9 security update7���Qhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493
f�~python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmQ�~python3-devel-3.9.14-1.el9_1.1.i686.rpmQ�~python3-devel-3.9.14-1.el9_1.1.x86_64.rpm�+�~python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpmf�~python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmQ�~python3-devel-3.9.14-1.el9_1.1.i686.rpmQ�~python3-devel-3.9.14-1.el9_1.1.x86_64.rpm�+�~python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpm����z�Z
	����securityImportant: thunderbird security update7��`�Dhttps://access.redhat.com/errata/RHSA-2022:8561RHSA-2022:8561RHSA-2022:8561https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8561.htmlALSA-2022:8561ALSA-2022:8561
9�sthunderbird-102.5.0-2.el9_1.alma.x86_64.rpm9�sthunderbird-102.5.0-2.el9_1.alma.x86_64.rpm����}�[�	����BsecurityImportant: firefox security update7��$�uhttps://access.redhat.com/errata/RHSA-2022:8580RHSA-2022:8580RHSA-2022:8580https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8580.htmlALSA-2022:8580ALSA-2022:8580
8�rfirefox-102.5.0-1.el9_1.alma.x86_64.rpm8�rfirefox-102.5.0-1.el9_1.alma.x86_64.rpm����R�\
	����EBsecurityImportant: krb5 security update7���ghttps://access.redhat.com/errata/RHSA-2022:8637RHSA-2022:8637RHSA-2022:8637https://access.redhat.com/security/cve/CVE-2022-42898CVE-2022-42898CVE-2022-42898https://bugzilla.redhat.com/21409602140960https://errata.almalinux.org/9/ALSA-2022-8637.htmlALSA-2022:8637ALSA-2022:8637
�d�(krb5-devel-1.19.1-24.el9_1.i686.rpm�d�(krb5-devel-1.19.1-24.el9_1.x86_64.rpm�d�(krb5-devel-1.19.1-24.el9_1.i686.rpm�d�(krb5-devel-1.19.1-24.el9_1.x86_64.rpm�����]
	����IBBBsecurityImportant: varnish security update7���Vhttps://access.redhat.com/errata/RHSA-2022:8643RHSA-2022:8643RHSA-2022:8643https://access.redhat.com/security/cve/CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/21418442141844https://errata.almalinux.org/9/ALSA-2022-8643.htmlALSA-2022:8643ALSA-2022:8643
�N�varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm�P�varnish-6.6.2-2.el9_1.1.i686.rpm�P�varnish-6.6.2-2.el9_1.1.x86_64.rpm�N�varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm�P�varnish-6.6.2-2.el9_1.1.i686.rpm�P�varnish-6.6.2-2.el9_1.1.x86_64.rpm�����^
	���aB�nBBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update7��V�}https://access.redhat.com/errata/RHSA-2022:8832RHSA-2022:8832RHSA-2022:8832https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2022-8832.htmlALSA-2022:8832ALSA-2022:8832
,��9*>�nodejs-docs-18.12.1-1.module_el9.1.0+16+91bc168f.noarch.rpml�^nodejs-nodemon-2.0.20-1.module_el9.1.0+16+91bc168f.noarch.rpmd�6npm-8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f.x86_64.rpm�#�nodejs-devel-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm,�nodejs-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm,��9*>�nodejs-docs-18.12.1-1.module_el9.1.0+16+91bc168f.noarch.rpml�^nodejs-nodemon-2.0.20-1.module_el9.1.0+16+91bc168f.noarch.rpmd�6npm-8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f.x86_64.rpm�#�nodejs-devel-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm,�nodejs-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm����7�_
	����ZsecurityImportant: firefox security update7��S�3https://access.redhat.com/errata/RHSA-2022:9065RHSA-2022:9065RHSA-2022:9065https://access.redhat.com/security/cve/CVE-2022-46872CVE-2022-46872CVE-2022-46872https://access.redhat.com/security/cve/CVE-2022-46874CVE-2022-46874CVE-2022-46874https://access.redhat.com/security/cve/CVE-2022-46878CVE-2022-46878CVE-2022-46878https://access.redhat.com/security/cve/CVE-2022-46880CVE-2022-46880CVE-2022-46880https://access.redhat.com/security/cve/CVE-2022-46881CVE-2022-46881CVE-2022-46881https://access.redhat.com/security/cve/CVE-2022-46882CVE-2022-46882CVE-2022-46882https://bugzilla.redhat.com/21534412153441https://bugzilla.redhat.com/21534492153449https://bugzilla.redhat.com/21534542153454https://bugzilla.redhat.com/21534632153463https://bugzilla.redhat.com/21534662153466https://bugzilla.redhat.com/21534672153467https://errata.almalinux.org/9/ALSA-2022-9065.htmlALSA-2022:9065ALSA-2022:9065
8�tfirefox-102.6.0-1.el9_1.alma.x86_64.rpm8�tfirefox-102.6.0-1.el9_1.alma.x86_64.rpm���:�`
	����]securityImportant: thunderbird security update7���8https://access.redhat.com/errata/RHSA-2022:9080RHSA-2022:9080RHSA-2022:9080https://access.redhat.com/security/cve/CVE-2022-45414CVE-2022-45414CVE-2022-45414https://access.redhat.com/security/cve/CVE-2022-46872CVE-2022-46872CVE-2022-46872https://access.redhat.com/security/cve/CVE-2022-46874CVE-2022-46874CVE-2022-46874https://access.redhat.com/security/cve/CVE-2022-46878CVE-2022-46878CVE-2022-46878https://access.redhat.com/security/cve/CVE-2022-46880CVE-2022-46880CVE-2022-46880https://access.redhat.com/security/cve/CVE-2022-46881CVE-2022-46881CVE-2022-46881https://access.redhat.com/security/cve/CVE-2022-46882CVE-2022-46882CVE-2022-46882https://bugzilla.redhat.com/21498682149868https://bugzilla.redhat.com/21534412153441https://bugzilla.redhat.com/21534492153449https://bugzilla.redhat.com/21534542153454https://bugzilla.redhat.com/21534632153463https://bugzilla.redhat.com/21534662153466https://bugzilla.redhat.com/21534672153467https://errata.almalinux.org/9/ALSA-2022-9080.htmlALSA-2022:9080ALSA-2022:9080
9�uthunderbird-102.6.0-2.el9_1.alma.x86_64.rpm9�uthunderbird-102.6.0-2.el9_1.alma.x86_64.rpm���#�a
	��!�� securityImportant: bcel security update��>�lhttps://access.redhat.com/errata/RHSA-2023:0005RHSA-2023:0005RHSA-2023:0005https://access.redhat.com/security/cve/CVE-2022-42920CVE-2022-42920CVE-2022-42920https://bugzilla.redhat.com/21427072142707https://errata.almalinux.org/9/ALSA-2023-0005.htmlALSA-2023:0005ALSA-2023:0005
�;�2bcel-6.4.1-9.el9_1.noarch.rpm�;�2bcel-6.4.1-9.el9_1.noarch.rpm����e�b
	��.��bBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��*�https://access.redhat.com/errata/RHSA-2023:0021RHSA-2023:0021RHSA-2023:0021https://access.redhat.com/security/cve/CVE-2022-42856CVE-2022-42856CVE-2022-42856https://bugzilla.redhat.com/21536832153683https://errata.almalinux.org/9/ALSA-2023-0021.htmlALSA-2023:0021ALSA-2023:0021
3�*webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm2�*webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm1�*webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm2�*webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm0�*webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm3�*webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm1�*webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm0�*webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm3�*webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm2�*webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm1�*webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm2�*webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm0�*webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm3�*webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm1�*webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm0�*webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm����
�c
	��?��oBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement update��D�`https://access.redhat.com/errata/RHSA-2023:0077RHSA-2023:0077RHSA-2023:0077https://access.redhat.com/security/cve/CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/21583422158342https://errata.almalinux.org/9/ALSA-2023-0077.htmlALSA-2023:0077ALSA-2023:0077
�P�Hdotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm�L�Haspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm�O�Hdotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpm�Q�Udotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm�N�Hdotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm�M�Haspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm�S�Udotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm�R�Hdotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm�P�Hdotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm�L�Haspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm�O�Hdotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpm�Q�Udotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm�N�Hdotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm�M�Haspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm�S�Udotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm�R�Hdotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm�����d
	����@BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update��$�Hhttps://access.redhat.com/errata/RHSA-2023:0194RHSA-2023:0194RHSA-2023:0194https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0194.htmlALSA-2023:0194ALSA-2023:0194
	��-java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm	��-java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm��-java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm�����e
	��%��SBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update��l�lhttps://access.redhat.com/errata/RHSA-2023:0202RHSA-2023:0202RHSA-2023:0202https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0202.htmlALSA-2023:0202ALSA-2023:0202
	�I�java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpm�G�java-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpm�E�java-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpm�J�java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpm�F�java-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpm�D�java-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpm�K�java-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm	�I�java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpm�G�java-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpm�E�java-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpm�J�java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpm�F�java-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpm�D�java-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpm�K�java-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm�����f
	��2��fBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update��X�xhttps://access.redhat.com/errata/RHSA-2023:0210RHSA-2023:0210RHSA-2023:0210https://access.redhat.com/security/cve/CVE-2023-21830CVE-2023-21830CVE-2023-21830https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604752160475https://bugzilla.redhat.com/21604902160490https://errata.almalinux.org/9/ALSA-2023-0210.htmlALSA-2023:0210ALSA-2023:0210
�X�jjava-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm�W�jjava-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm�U�jjava-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm�V�jjava-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm�T�jjava-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm�7�jjava-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm�8�jjava-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm�X�jjava-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm�W�jjava-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm�U�jjava-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm�V�jjava-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm�T�jjava-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm�7�jjava-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm�8�jjava-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm�����g
	��5��ssecurityImportant: sudo security update��P�https://access.redhat.com/errata/RHSA-2023:0282RHSA-2023:0282RHSA-2023:0282https://access.redhat.com/security/cve/CVE-2023-22809CVE-2023-22809CVE-2023-22809https://bugzilla.redhat.com/21611422161142https://errata.almalinux.org/9/ALSA-2023-0282.htmlALSA-2023:0282ALSA-2023:0282
�L�jsudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm�L�jsudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm����O�h
	��8��vsecurityImportant: firefox security update��^�=https://access.redhat.com/errata/RHSA-2023:0285RHSA-2023:0285RHSA-2023:0285https://access.redhat.com/security/cve/CVE-2022-46871CVE-2022-46871CVE-2022-46871https://access.redhat.com/security/cve/CVE-2022-46877CVE-2022-46877CVE-2022-46877https://access.redhat.com/security/cve/CVE-2023-23598CVE-2023-23598CVE-2023-23598https://access.redhat.com/security/cve/CVE-2023-23599CVE-2023-23599CVE-2023-23599https://access.redhat.com/security/cve/CVE-2023-23601CVE-2023-23601CVE-2023-23601https://access.redhat.com/security/cve/CVE-2023-23602CVE-2023-23602CVE-2023-23602https://access.redhat.com/security/cve/CVE-2023-23603CVE-2023-23603CVE-2023-23603https://access.redhat.com/security/cve/CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/21623362162336https://bugzilla.redhat.com/21623382162338https://bugzilla.redhat.com/21623392162339https://bugzilla.redhat.com/21623402162340https://bugzilla.redhat.com/21623412162341https://bugzilla.redhat.com/21623422162342https://bugzilla.redhat.com/21623432162343https://bugzilla.redhat.com/21623442162344https://errata.almalinux.org/9/ALSA-2023-0285.htmlALSA-2023:0285ALSA-2023:0285
8�vfirefox-102.7.0-1.el9_1.alma.x86_64.rpm8�vfirefox-102.7.0-1.el9_1.alma.x86_64.rpm�����i
	��?��yBBBBsecurityModerate: libtiff security update���{https://access.redhat.com/errata/RHSA-2023:0302RHSA-2023:0302RHSA-2023:0302https://access.redhat.com/security/cve/CVE-2022-2056CVE-2022-2056CVE-2022-2056https://access.redhat.com/security/cve/CVE-2022-2057CVE-2022-2057CVE-2022-2057https://access.redhat.com/security/cve/CVE-2022-2058CVE-2022-2058CVE-2022-2058https://access.redhat.com/security/cve/CVE-2022-2519CVE-2022-2519CVE-2022-2519https://access.redhat.com/security/cve/CVE-2022-2520CVE-2022-2520CVE-2022-2520https://access.redhat.com/security/cve/CVE-2022-2521CVE-2022-2521CVE-2022-2521https://access.redhat.com/security/cve/CVE-2022-2953CVE-2022-2953CVE-2022-2953https://bugzilla.redhat.com/21032222103222https://bugzilla.redhat.com/21227892122789https://bugzilla.redhat.com/21227922122792https://bugzilla.redhat.com/21227992122799https://bugzilla.redhat.com/21344322134432https://errata.almalinux.org/9/ALSA-2023-0302.htmlALSA-2023:0302ALSA-2023:0302
�D�libtiff-devel-4.4.0-5.el9_1.i686.rpm�C�libtiff-4.4.0-5.el9_1.i686.rpm�D�libtiff-devel-4.4.0-5.el9_1.x86_64.rpm�C�libtiff-4.4.0-5.el9_1.x86_64.rpm�D�libtiff-devel-4.4.0-5.el9_1.i686.rpm�C�libtiff-4.4.0-5.el9_1.i686.rpm�D�libtiff-devel-4.4.0-5.el9_1.x86_64.rpm�C�libtiff-4.4.0-5.el9_1.x86_64.rpm�����j
	��
��@BBBBBBBBsecurityModerate: usbguard security update���*https://access.redhat.com/errata/RHSA-2023:0303RHSA-2023:0303RHSA-2023:0303https://access.redhat.com/security/cve/CVE-2019-25058CVE-2019-25058CVE-2019-25058https://bugzilla.redhat.com/20584652058465https://errata.almalinux.org/9/ALSA-2023-0303.htmlALSA-2023:0303ALSA-2023:0303
�s�usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm�q�usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm��usbguard-1.0.0-10.el9_1.2.i686.rpm��usbguard-1.0.0-10.el9_1.2.x86_64.rpm�5�usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm�r�usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm�s�usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm�q�usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm��usbguard-1.0.0-10.el9_1.2.i686.rpm��usbguard-1.0.0-10.el9_1.2.x86_64.rpm�5�usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm�r�usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm�����k
	����KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update��@�z
https://access.redhat.com/errata/RHSA-2023:0304RHSA-2023:0304RHSA-2023:0304https://access.redhat.com/security/cve/CVE-2022-26305CVE-2022-26305CVE-2022-26305https://access.redhat.com/security/cve/CVE-2022-26306CVE-2022-26306CVE-2022-26306https://access.redhat.com/security/cve/CVE-2022-26307CVE-2022-26307CVE-2022-26307https://access.redhat.com/security/cve/CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/21186102118610https://bugzilla.redhat.com/21186112118611https://bugzilla.redhat.com/21186132118613https://bugzilla.redhat.com/21346972134697https://errata.almalinux.org/9/ALSA-2023-0304.htmlALSA-2023:0304ALSA-2023:0304
�0�Plibreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpm�vautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpm�@libreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm�
autocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpm�tautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpm�alibreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpm�Tlibreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpm�Qlibreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpm�Glibreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpm�Blibreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpm�tlibreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpm�
libreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm�Flibreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpm�"libreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm�+libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm�8libreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm�Ilibreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpm�Elibreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpm�dlibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpm�uautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpm�}autocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpm�yautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpm�klibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpm�wautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpm�jlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpm�llibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm�sautocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpm�blibreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpm�{autocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpm�Elibreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm�]libreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpm�xautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpm�[libreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpm�olibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpm�	autocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpm�Glibreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm�~autocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpm�Ulibreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpm�|autocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpm�|libreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpm�*libreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpm�3libreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpm�}libreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm�
autocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpm�Blibreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpm�Clibreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpm�xlibreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpm�Slibreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm�Dlibreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpm�mlibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpm�Jlibreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpm�zautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpm�slibreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm�0�Plibreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpm�vautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpm�@libreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm�
autocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpm�tautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpm�alibreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpm�Tlibreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpm�Qlibreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpm�Glibreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpm�Blibreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpm�tlibreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpm�
libreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm�Flibreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpm�"libreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm�+libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm�8libreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm�Ilibreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpm�Elibreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpm�dlibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpm�uautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpm�}autocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpm�yautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpm�klibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpm�wautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpm�jlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpm�llibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm�sautocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpm�blibreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpm�{autocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpm�Elibreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm�]libreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpm�xautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpm�[libreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpm�olibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpm�	autocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpm�Glibreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm�~autocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpm�Ulibreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpm�|autocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpm�|libreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpm�*libreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpm�3libreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpm�}libreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm�
autocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpm�libreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpm�Blibreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpm�Clibreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpm�xlibreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpm�Slibreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm�Dlibreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpm�autocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpm�mlibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm�autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpm�Jlibreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpm�zautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpm�slibreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm����6�l
	����securityModerate: postgresql-jdbc security update��:�khttps://access.redhat.com/errata/RHSA-2023:0318RHSA-2023:0318RHSA-2023:0318https://access.redhat.com/security/cve/CVE-2022-31197CVE-2022-31197CVE-2022-31197https://bugzilla.redhat.com/21294282129428https://errata.almalinux.org/9/ALSA-2023-0318.htmlALSA-2023:0318ALSA-2023:0318
�Z�postgresql-jdbc-42.2.18-6.el9_1.noarch.rpm�Z�postgresql-jdbc-42.2.18-6.el9_1.noarch.rpm����d�m
	����FBBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security, bug fix, and enhancement update��%�e
https://access.redhat.com/errata/RHSA-2023:0321RHSA-2023:0321RHSA-2023:0321https://access.redhat.com/security/cve/CVE-2021-44906CVE-2021-44906CVE-2021-44906https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/20660092066009https://bugzilla.redhat.com/21305182130518https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2023-0321.htmlALSA-2023:0321ALSA-2023:0321
>�]nodejs-docs-16.18.1-3.el9_1.noarch.rpm��]nodejs-libs-16.18.1-3.el9_1.i686.rpml�_nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm,�]nodejs-16.18.1-3.el9_1.x86_64.rpm��]nodejs-libs-16.18.1-3.el9_1.x86_64.rpme�]nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmd�5npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm>�]nodejs-docs-16.18.1-3.el9_1.noarch.rpm��]nodejs-libs-16.18.1-3.el9_1.i686.rpml�_nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm,�]nodejs-16.18.1-3.el9_1.x86_64.rpm��]nodejs-libs-16.18.1-3.el9_1.x86_64.rpme�]nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmd�5npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm�����n
	����RBBBBBBBBBBsecurityModerate: go-toolset and golang security and bug fix update��
�https://access.redhat.com/errata/RHSA-2023:0328RHSA-2023:0328RHSA-2023:0328https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-0328.htmlALSA-2023:0328ALSA-2023:0328
�T�golang-race-1.18.9-1.el9_1.x86_64.rpm�N�go-toolset-1.18.9-1.el9_1.x86_64.rpmp�golang-tests-1.18.9-1.el9_1.noarch.rpm�H�golang-bin-1.18.9-1.el9_1.x86_64.rpm�G�golang-1.18.9-1.el9_1.x86_64.rpmm�golang-docs-1.18.9-1.el9_1.noarch.rpmn�golang-misc-1.18.9-1.el9_1.noarch.rpmo�golang-src-1.18.9-1.el9_1.noarch.rpm�T�golang-race-1.18.9-1.el9_1.x86_64.rpm�N�go-toolset-1.18.9-1.el9_1.x86_64.rpmp�golang-tests-1.18.9-1.el9_1.noarch.rpm�H�golang-bin-1.18.9-1.el9_1.x86_64.rpm�G�golang-1.18.9-1.el9_1.x86_64.rpmm�golang-docs-1.18.9-1.el9_1.noarch.rpmn�golang-misc-1.18.9-1.el9_1.noarch.rpmo�golang-src-1.18.9-1.el9_1.noarch.rpm�����o
	��"��_BsecurityModerate: curl security update��!�&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333
��
libcurl-devel-7.76.1-19.el9_1.1.i686.rpm��
libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm��
libcurl-devel-7.76.1-19.el9_1.1.i686.rpm��
libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm�����p
	��.��cBBBBBBBBBsecurityImportant: kernel security and bug fix update��G�;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334
'�perf-5.14.0-162.12.1.el9_1.x86_64.rpm�kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm$�kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm#�kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm%�kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpm'�perf-5.14.0-162.12.1.el9_1.x86_64.rpm�kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm$�kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm#�kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm%�kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpm����d�q
	��6��oBBBBBsecurityModerate: dbus security update���^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335
�I�dbus-daemon-1.12.20-7.el9_1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_1.i686.rpm�J�dbus-x11-1.12.20-7.el9_1.x86_64.rpm�I�dbus-daemon-1.12.20-7.el9_1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_1.i686.rpm�J�dbus-x11-1.12.20-7.el9_1.x86_64.rpm�����r
	��<��wBBBsecurityModerate: systemd security update��`�Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336
��~systemd-devel-250-12.el9_1.1.x86_64.rpm��~systemd-devel-250-12.el9_1.1.i686.rpm�T�~systemd-journal-remote-250-12.el9_1.1.x86_64.rpm��~systemd-devel-250-12.el9_1.1.x86_64.rpm��~systemd-devel-250-12.el9_1.1.i686.rpm�T�~systemd-journal-remote-250-12.el9_1.1.x86_64.rpm�����s
	����}BsecurityModerate: expat security update��1�}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337
��Pexpat-devel-2.4.9-1.el9_1.1.i686.rpm��Pexpat-devel-2.4.9-1.el9_1.1.x86_64.rpm��Pexpat-devel-2.4.9-1.el9_1.1.i686.rpm��Pexpat-devel-2.4.9-1.el9_1.1.x86_64.rpm�����t
	����ABsecurityModerate: libxml2 security update��.�Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338
�E�elibxml2-devel-2.9.13-3.el9_1.x86_64.rpm�E�elibxml2-devel-2.9.13-3.el9_1.i686.rpm�E�elibxml2-devel-2.9.13-3.el9_1.x86_64.rpm�E�elibxml2-devel-2.9.13-3.el9_1.i686.rpm���� �u
	����EBBBBsecurityModerate: sqlite security update��t�<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339
�N�tsqlite-3.34.1-6.el9_1.i686.rpm�O�tsqlite-devel-3.34.1-6.el9_1.x86_64.rpm�N�tsqlite-3.34.1-6.el9_1.x86_64.rpm�O�tsqlite-devel-3.34.1-6.el9_1.i686.rpm�N�tsqlite-3.34.1-6.el9_1.i686.rpm�O�tsqlite-devel-3.34.1-6.el9_1.x86_64.rpm�N�tsqlite-3.34.1-6.el9_1.x86_64.rpm�O�tsqlite-devel-3.34.1-6.el9_1.i686.rpm����y�v
	����LBBBsecurityModerate: libtasn1 security update��0�uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343
�B�libtasn1-devel-4.16.0-8.el9_1.i686.rpm�|�libtasn1-tools-4.16.0-8.el9_1.x86_64.rpm�B�libtasn1-devel-4.16.0-8.el9_1.x86_64.rpm�B�libtasn1-devel-4.16.0-8.el9_1.i686.rpm�|�libtasn1-tools-4.16.0-8.el9_1.x86_64.rpm�B�libtasn1-devel-4.16.0-8.el9_1.x86_64.rpm����W�w
	����RBBBBsecurityImportant: libXpm security update��%�;https://access.redhat.com/errata/RHSA-2023:0383RHSA-2023:0383RHSA-2023:0383https://access.redhat.com/security/cve/CVE-2022-44617CVE-2022-44617CVE-2022-44617https://access.redhat.com/security/cve/CVE-2022-46285CVE-2022-46285CVE-2022-46285https://access.redhat.com/security/cve/CVE-2022-4883CVE-2022-4883CVE-2022-4883https://bugzilla.redhat.com/21600922160092https://bugzilla.redhat.com/21601932160193https://bugzilla.redhat.com/21602132160213https://errata.almalinux.org/9/ALSA-2023-0383.htmlALSA-2023:0383ALSA-2023:0383
�-�ylibXpm-devel-3.5.13-8.el9_1.x86_64.rpm�,�ylibXpm-3.5.13-8.el9_1.x86_64.rpm�,�ylibXpm-3.5.13-8.el9_1.i686.rpm�-�ylibXpm-devel-3.5.13-8.el9_1.i686.rpm�-�ylibXpm-devel-3.5.13-8.el9_1.x86_64.rpm�,�ylibXpm-3.5.13-8.el9_1.x86_64.rpm�,�ylibXpm-3.5.13-8.el9_1.i686.rpm�-�ylibXpm-devel-3.5.13-8.el9_1.i686.rpm�����x
	����YsecurityImportant: thunderbird security update��`�https://access.redhat.com/errata/RHSA-2023:0476RHSA-2023:0476RHSA-2023:0476https://access.redhat.com/security/cve/CVE-2022-46871CVE-2022-46871CVE-2022-46871https://access.redhat.com/security/cve/CVE-2022-46877CVE-2022-46877CVE-2022-46877https://access.redhat.com/security/cve/CVE-2023-23598CVE-2023-23598CVE-2023-23598https://access.redhat.com/security/cve/CVE-2023-23599CVE-2023-23599CVE-2023-23599https://access.redhat.com/security/cve/CVE-2023-23601CVE-2023-23601CVE-2023-23601https://access.redhat.com/security/cve/CVE-2023-23602CVE-2023-23602CVE-2023-23602https://access.redhat.com/security/cve/CVE-2023-23603CVE-2023-23603CVE-2023-23603https://access.redhat.com/security/cve/CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/21623362162336https://bugzilla.redhat.com/21623382162338https://bugzilla.redhat.com/21623392162339https://bugzilla.redhat.com/21623402162340https://bugzilla.redhat.com/21623412162341https://bugzilla.redhat.com/21623422162342https://bugzilla.redhat.com/21623432162343https://bugzilla.redhat.com/21623442162344https://errata.almalinux.org/9/ALSA-2023-0476.htmlALSA-2023:0476ALSA-2023:0476
9�wthunderbird-102.7.1-1.el9_1.alma.x86_64.rpm9�wthunderbird-102.7.1-1.el9_1.alma.x86_64.rpm���D�y
	����\securityImportant: thunderbird security update��l�%https://access.redhat.com/errata/RHSA-2023:0608RHSA-2023:0608RHSA-2023:0608https://access.redhat.com/security/cve/CVE-2023-0430CVE-2023-0430CVE-2023-0430https://bugzilla.redhat.com/21665912166591https://errata.almalinux.org/9/ALSA-2023-0608.htmlALSA-2023:0608ALSA-2023:0608
9�xthunderbird-102.7.1-2.el9_1.alma.x86_64.rpm9�xthunderbird-102.7.1-2.el9_1.alma.x86_64.rpm����o�z
	��3��_BBBBBBBBBBBBBBBBBBsecurityImportant: git security update���Yhttps://access.redhat.com/errata/RHSA-2023:0611RHSA-2023:0611RHSA-2023:0611https://access.redhat.com/security/cve/CVE-2022-23521CVE-2022-23521CVE-2022-23521https://access.redhat.com/security/cve/CVE-2022-41903CVE-2022-41903CVE-2022-41903https://bugzilla.redhat.com/21620552162055https://bugzilla.redhat.com/21620562162056https://errata.almalinux.org/9/ALSA-2023-0611.htmlALSA-2023:0611ALSA-2023:0611
�'�gitweb-2.31.1-3.el9_1.noarch.rpm�-�perl-Git-2.31.1-3.el9_1.noarch.rpm�"�git-email-2.31.1-3.el9_1.noarch.rpm� �git-all-2.31.1-3.el9_1.noarch.rpm�>�git-subtree-2.31.1-3.el9_1.x86_64.rpm�;�git-core-2.31.1-3.el9_1.x86_64.rpm�!�git-core-doc-2.31.1-3.el9_1.noarch.rpm�#�git-gui-2.31.1-3.el9_1.noarch.rpm�:�git-2.31.1-3.el9_1.x86_64.rpm�&�gitk-2.31.1-3.el9_1.noarch.rpm�=�git-daemon-2.31.1-3.el9_1.x86_64.rpm�$�git-instaweb-2.31.1-3.el9_1.noarch.rpm�<�git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpm�.�perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm�%�git-svn-2.31.1-3.el9_1.noarch.rpm�'�gitweb-2.31.1-3.el9_1.noarch.rpm�-�perl-Git-2.31.1-3.el9_1.noarch.rpm�"�git-email-2.31.1-3.el9_1.noarch.rpm� �git-all-2.31.1-3.el9_1.noarch.rpm�>�git-subtree-2.31.1-3.el9_1.x86_64.rpm�;�git-core-2.31.1-3.el9_1.x86_64.rpm�!�git-core-doc-2.31.1-3.el9_1.noarch.rpm�#�git-gui-2.31.1-3.el9_1.noarch.rpm�:�git-2.31.1-3.el9_1.x86_64.rpm�&�gitk-2.31.1-3.el9_1.noarch.rpm�=�git-daemon-2.31.1-3.el9_1.x86_64.rpm�$�git-instaweb-2.31.1-3.el9_1.noarch.rpm�<�git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpm�.�perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm�%�git-svn-2.31.1-3.el9_1.noarch.rpm�����{
	��?��tBBBBBBBBBsecurityImportant: tigervnc security update��j�_https://access.redhat.com/errata/RHSA-2023:0622RHSA-2023:0622RHSA-2023:0622https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-0622.htmlALSA-2023:0622ALSA-2023:0622
��tigervnc-icons-1.12.0-5.el9_1.1.noarch.rpm�X�tigervnc-server-1.12.0-5.el9_1.1.x86_64.rpm�W�tigervnc-1.12.0-5.el9_1.1.x86_64.rpm��tigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpm�Y�tigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpm�Z�tigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm��tigervnc-license-1.12.0-5.el9_1.1.noarch.rpm��tigervnc-icons-1.12.0-5.el9_1.1.noarch.rpm�X�tigervnc-server-1.12.0-5.el9_1.1.x86_64.rpm�W�tigervnc-1.12.0-5.el9_1.1.x86_64.rpm��tigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpm�Y�tigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpm�Z�tigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm��tigervnc-license-1.12.0-5.el9_1.1.noarch.rpm�����|
	����@BBsecurityImportant: firefox security update��I�Mhttps://access.redhat.com/errata/RHSA-2023:0810RHSA-2023:0810RHSA-2023:0810https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://errata.almalinux.org/9/ALSA-2023-0810.htmlALSA-2023:0810ALSA-2023:0810
P�`firefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm8�`firefox-102.8.0-2.el9_1.alma.x86_64.rpmP�`firefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm8�`firefox-102.8.0-2.el9_1.alma.x86_64.rpm��Ԅ�}
	����EsecurityImportant: thunderbird security update���xhttps://access.redhat.com/errata/RHSA-2023:0824RHSA-2023:0824RHSA-2023:0824https://access.redhat.com/security/cve/CVE-2023-0616CVE-2023-0616CVE-2023-0616https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://bugzilla.redhat.com/21713972171397https://errata.almalinux.org/9/ALSA-2023-0824.htmlALSA-2023:0824ALSA-2023:0824
9�`thunderbird-102.8.0-2.el9_1.alma.x86_64.rpm9�`thunderbird-102.8.0-2.el9_1.alma.x86_64.rpm��Ԉn�~
	����HBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��� https://access.redhat.com/errata/RHSA-2023:0903RHSA-2023:0903RHSA-2023:0903https://access.redhat.com/security/cve/CVE-2023-23529CVE-2023-23529CVE-2023-23529https://bugzilla.redhat.com/21699342169934https://errata.almalinux.org/9/ALSA-2023-0903.htmlALSA-2023:0903ALSA-2023:0903
2�+webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm3�+webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm2�+webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm0�+webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm0�+webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm1�+webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm3�+webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm1�+webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm2�+webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm3�+webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm2�+webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm0�+webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm0�+webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm1�+webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm3�+webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm1�+webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm��݆;�
	����UBBBsecurityModerate: openssl security and bug fix update��.�"https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946
��jopenssl-perl-3.0.1-47.el9_1.x86_64.rpm��jopenssl-devel-3.0.1-47.el9_1.x86_64.rpm��jopenssl-devel-3.0.1-47.el9_1.i686.rpm��jopenssl-perl-3.0.1-47.el9_1.x86_64.rpm��jopenssl-devel-3.0.1-47.el9_1.x86_64.rpm��jopenssl-devel-3.0.1-47.el9_1.i686.rpm����v�
	��&��[BBBBBBBBBsecurityImportant: kernel security and bug fix update��P�~https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951
�kernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm#�kernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm'�perf-5.14.0-162.18.1.el9_1.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm%�kernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm�kernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm#�kernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm'�perf-5.14.0-162.18.1.el9_1.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm%�kernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm�����
	��-��gBBBBsecurityModerate: python3.9 security update��N�9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953
Q�python3-devel-3.9.14-1.el9_1.2.x86_64.rpmf�python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmQ�python3-devel-3.9.14-1.el9_1.2.i686.rpm�+�python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpmQ�python3-devel-3.9.14-1.el9_1.2.x86_64.rpmf�python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmQ�python3-devel-3.9.14-1.el9_1.2.i686.rpm�+�python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpm����,�
	��3��nBBBsecurityModerate: systemd security update���]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954
��systemd-devel-250-12.el9_1.3.i686.rpm�T�systemd-journal-remote-250-12.el9_1.3.x86_64.rpm��systemd-devel-250-12.el9_1.3.x86_64.rpm��systemd-devel-250-12.el9_1.3.i686.rpm�T�systemd-journal-remote-250-12.el9_1.3.x86_64.rpm��systemd-devel-250-12.el9_1.3.x86_64.rpm�����
	��6��tsecurityModerate: lua security update��d�8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957
�}�6lua-5.4.4-2.el9_1.x86_64.rpm�}�6lua-5.4.4-2.el9_1.x86_64.rpm����{�
	��=��wBBBBsecurityModerate: vim security update���ehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958
�X�|vim-X11-8.2.2637-20.el9_1.x86_64.rpm�Z�|vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm�Y�|vim-common-8.2.2637-20.el9_1.x86_64.rpm�X�|vim-X11-8.2.2637-20.el9_1.x86_64.rpm�Z�|vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm�Y�|vim-common-8.2.2637-20.el9_1.x86_64.rpm����@�
	��0��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security update���Whttps://access.redhat.com/errata/RHSA-2023:0965RHSA-2023:0965RHSA-2023:0965https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-0965.htmlALSA-2023:0965ALSA-2023:0965
�Aphp-gd-8.0.27-1.el9_1.x86_64.rpm�Aphp-xml-8.0.27-1.el9_1.x86_64.rpm�
Aphp-devel-8.0.27-1.el9_1.x86_64.rpm�Aphp-gmp-8.0.27-1.el9_1.x86_64.rpm�Aphp-mbstring-8.0.27-1.el9_1.x86_64.rpm�	Aphp-cli-8.0.27-1.el9_1.x86_64.rpm�Aphp-process-8.0.27-1.el9_1.x86_64.rpm�Aphp-ldap-8.0.27-1.el9_1.x86_64.rpm�Aphp-enchant-8.0.27-1.el9_1.x86_64.rpm�Aphp-pdo-8.0.27-1.el9_1.x86_64.rpm�Aphp-opcache-8.0.27-1.el9_1.x86_64.rpm�Aphp-intl-8.0.27-1.el9_1.x86_64.rpm�
Aphp-common-8.0.27-1.el9_1.x86_64.rpm�Aphp-odbc-8.0.27-1.el9_1.x86_64.rpm�Aphp-embedded-8.0.27-1.el9_1.x86_64.rpm�Aphp-bcmath-8.0.27-1.el9_1.x86_64.rpm�Aphp-soap-8.0.27-1.el9_1.x86_64.rpm�Aphp-mysqlnd-8.0.27-1.el9_1.x86_64.rpm�Aphp-snmp-8.0.27-1.el9_1.x86_64.rpm�Aphp-dba-8.0.27-1.el9_1.x86_64.rpm�Aphp-fpm-8.0.27-1.el9_1.x86_64.rpm�Aphp-8.0.27-1.el9_1.x86_64.rpm�Aphp-ffi-8.0.27-1.el9_1.x86_64.rpm�Aphp-pgsql-8.0.27-1.el9_1.x86_64.rpm�Aphp-dbg-8.0.27-1.el9_1.x86_64.rpm�Aphp-gd-8.0.27-1.el9_1.x86_64.rpm�Aphp-xml-8.0.27-1.el9_1.x86_64.rpm�
Aphp-devel-8.0.27-1.el9_1.x86_64.rpm�Aphp-gmp-8.0.27-1.el9_1.x86_64.rpm�Aphp-mbstring-8.0.27-1.el9_1.x86_64.rpm�	Aphp-cli-8.0.27-1.el9_1.x86_64.rpm�Aphp-process-8.0.27-1.el9_1.x86_64.rpm�Aphp-ldap-8.0.27-1.el9_1.x86_64.rpm�Aphp-enchant-8.0.27-1.el9_1.x86_64.rpm�Aphp-pdo-8.0.27-1.el9_1.x86_64.rpm�Aphp-opcache-8.0.27-1.el9_1.x86_64.rpm�Aphp-intl-8.0.27-1.el9_1.x86_64.rpm�
Aphp-common-8.0.27-1.el9_1.x86_64.rpm�Aphp-odbc-8.0.27-1.el9_1.x86_64.rpm�Aphp-embedded-8.0.27-1.el9_1.x86_64.rpm�Aphp-bcmath-8.0.27-1.el9_1.x86_64.rpm�Aphp-soap-8.0.27-1.el9_1.x86_64.rpm�Aphp-mysqlnd-8.0.27-1.el9_1.x86_64.rpm�Aphp-snmp-8.0.27-1.el9_1.x86_64.rpm�Aphp-dba-8.0.27-1.el9_1.x86_64.rpm�Aphp-fpm-8.0.27-1.el9_1.x86_64.rpm�Aphp-8.0.27-1.el9_1.x86_64.rpm�Aphp-ffi-8.0.27-1.el9_1.x86_64.rpm�Aphp-pgsql-8.0.27-1.el9_1.x86_64.rpm�Aphp-dbg-8.0.27-1.el9_1.x86_64.rpm����F�
	����qBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security and bug fix update��X�Ihttps://access.redhat.com/errata/RHSA-2023:0970RHSA-2023:0970RHSA-2023:0970https://access.redhat.com/security/cve/CVE-2006-20001CVE-2006-20001CVE-2006-20001https://access.redhat.com/security/cve/CVE-2022-36760CVE-2022-36760CVE-2022-36760https://access.redhat.com/security/cve/CVE-2022-37436CVE-2022-37436CVE-2022-37436https://bugzilla.redhat.com/21617732161773https://bugzilla.redhat.com/21617742161774https://bugzilla.redhat.com/21617772161777https://errata.almalinux.org/9/ALSA-2023-0970.htmlALSA-2023:0970ALSA-2023:0970
�P�mmod_session-2.4.53-7.el9_1.1.x86_64.rpm�O�mod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm�}�mhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm�M�mmod_ldap-2.4.53-7.el9_1.1.x86_64.rpm�A�mhttpd-core-2.4.53-7.el9_1.1.x86_64.rpm�N�mmod_lua-2.4.53-7.el9_1.1.x86_64.rpm�~�mhttpd-manual-2.4.53-7.el9_1.1.noarch.rpm�C�mhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpm�@�mhttpd-2.4.53-7.el9_1.1.x86_64.rpm�B�mhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpm�Q�mod_ssl-2.4.53-7.el9_1.1.x86_64.rpm�P�mmod_session-2.4.53-7.el9_1.1.x86_64.rpm�O�mod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm�}�mhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm�M�mmod_ldap-2.4.53-7.el9_1.1.x86_64.rpm�A�mhttpd-core-2.4.53-7.el9_1.1.x86_64.rpm�N�mmod_lua-2.4.53-7.el9_1.1.x86_64.rpm�~�mhttpd-manual-2.4.53-7.el9_1.1.noarch.rpm�C�mhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpm�@�mhttpd-2.4.53-7.el9_1.1.x86_64.rpm�B�mhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpm�Q�mod_ssl-2.4.53-7.el9_1.1.x86_64.rpm����t�
	����FsecurityImportant: pesign security update��!�
https://access.redhat.com/errata/RHSA-2023:1067RHSA-2023:1067RHSA-2023:1067https://access.redhat.com/security/cve/CVE-2022-3560CVE-2022-3560CVE-2022-3560https://bugzilla.redhat.com/21354202135420https://errata.almalinux.org/9/ALSA-2023-1067.htmlALSA-2023:1067ALSA-2023:1067
�+�}pesign-115-6.el9_1.x86_64.rpm�+�}pesign-115-6.el9_1.x86_64.rpm����\�
	����IBBBBBBsecurityModerate: libjpeg-turbo security update��.�.https://access.redhat.com/errata/RHSA-2023:1068RHSA-2023:1068RHSA-2023:1068https://access.redhat.com/security/cve/CVE-2021-46822CVE-2021-46822CVE-2021-46822https://bugzilla.redhat.com/21000442100044https://errata.almalinux.org/9/ALSA-2023-1068.htmlALSA-2023:1068ALSA-2023:1068
�?�dlibjpeg-turbo-2.0.90-6.el9_1.x86_64.rpm�@�dlibjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpm�?�dlibjpeg-turbo-2.0.90-6.el9_1.i686.rpm�z�dlibjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpm�@�dlibjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm�?�dlibjpeg-turbo-2.0.90-6.el9_1.x86_64.rpm�@�dlibjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpm�?�dlibjpeg-turbo-2.0.90-6.el9_1.i686.rpm�z�dlibjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpm�@�dlibjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm�����	
	����RBBBBBBBBBsecurityModerate: gnutls security and bug fix update��\�https://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141
�a�gnutls-c++-3.7.6-18.el9_1.x86_64.rpm�c�gnutls-devel-3.7.6-18.el9_1.i686.rpm�)�gnutls-utils-3.7.6-18.el9_1.x86_64.rpm�b�gnutls-dane-3.7.6-18.el9_1.i686.rpm�c�gnutls-devel-3.7.6-18.el9_1.x86_64.rpm�a�gnutls-c++-3.7.6-18.el9_1.i686.rpm�b�gnutls-dane-3.7.6-18.el9_1.x86_64.rpm�a�gnutls-c++-3.7.6-18.el9_1.x86_64.rpm�c�gnutls-devel-3.7.6-18.el9_1.i686.rpm�)�gnutls-utils-3.7.6-18.el9_1.x86_64.rpm�b�gnutls-dane-3.7.6-18.el9_1.i686.rpm�c�gnutls-devel-3.7.6-18.el9_1.x86_64.rpm�a�gnutls-c++-3.7.6-18.el9_1.i686.rpm�b�gnutls-dane-3.7.6-18.el9_1.x86_64.rpm�����

	��"��^BBsecurityImportant: firefox security update��{�%https://access.redhat.com/errata/RHSA-2023:1337RHSA-2023:1337RHSA-2023:1337https://access.redhat.com/security/cve/CVE-2023-25751CVE-2023-25751CVE-2023-25751https://access.redhat.com/security/cve/CVE-2023-25752CVE-2023-25752CVE-2023-25752https://access.redhat.com/security/cve/CVE-2023-28162CVE-2023-28162CVE-2023-28162https://access.redhat.com/security/cve/CVE-2023-28164CVE-2023-28164CVE-2023-28164https://access.redhat.com/security/cve/CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/21784582178458https://bugzilla.redhat.com/21784602178460https://bugzilla.redhat.com/21784662178466https://bugzilla.redhat.com/21784702178470https://bugzilla.redhat.com/21784722178472https://errata.almalinux.org/9/ALSA-2023-1337.htmlALSA-2023:1337ALSA-2023:1337
P�~firefox-x11-102.9.0-3.el9_1.alma.x86_64.rpm8�~firefox-102.9.0-3.el9_1.alma.x86_64.rpmP�~firefox-x11-102.9.0-3.el9_1.alma.x86_64.rpm8�~firefox-102.9.0-3.el9_1.alma.x86_64.rpm���G�
	����cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: nss security and bug fix update�� �https://access.redhat.com/errata/RHSA-2023:1368RHSA-2023:1368RHSA-2023:1368https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://bugzilla.redhat.com/21703772170377https://errata.almalinux.org/9/ALSA-2023-1368.htmlALSA-2023:1368ALSA-2023:1368
�Ginss-softokn-devel-3.79.0-17.el9_1.i686.rpm�B�nspr-4.34.0-17.el9_1.i686.rpm�inss-tools-3.79.0-17.el9_1.x86_64.rpm�Kinss-util-devel-3.79.0-17.el9_1.x86_64.rpm�Iinss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpm�Finss-softokn-3.79.0-17.el9_1.i686.rpm�Dinss-3.79.0-17.el9_1.i686.rpm�Einss-devel-3.79.0-17.el9_1.x86_64.rpm�
inss-sysinit-3.79.0-17.el9_1.x86_64.rpm�Jinss-util-3.79.0-17.el9_1.x86_64.rpm�Jinss-util-3.79.0-17.el9_1.i686.rpm�Iinss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpm�Hinss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpm�C�nspr-devel-4.34.0-17.el9_1.i686.rpm�B�nspr-4.34.0-17.el9_1.x86_64.rpm�Hinss-softokn-freebl-3.79.0-17.el9_1.i686.rpm�Einss-devel-3.79.0-17.el9_1.i686.rpm�C�nspr-devel-4.34.0-17.el9_1.x86_64.rpm�Dinss-3.79.0-17.el9_1.x86_64.rpm�Ginss-softokn-devel-3.79.0-17.el9_1.x86_64.rpm�Finss-softokn-3.79.0-17.el9_1.x86_64.rpm�Kinss-util-devel-3.79.0-17.el9_1.i686.rpm�Ginss-softokn-devel-3.79.0-17.el9_1.i686.rpm�B�nspr-4.34.0-17.el9_1.i686.rpm�inss-tools-3.79.0-17.el9_1.x86_64.rpm�Kinss-util-devel-3.79.0-17.el9_1.x86_64.rpm�Iinss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpm�Finss-softokn-3.79.0-17.el9_1.i686.rpm�Dinss-3.79.0-17.el9_1.i686.rpm�Einss-devel-3.79.0-17.el9_1.x86_64.rpm�
inss-sysinit-3.79.0-17.el9_1.x86_64.rpm�Jinss-util-3.79.0-17.el9_1.x86_64.rpm�Jinss-util-3.79.0-17.el9_1.i686.rpm�Iinss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpm�Hinss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpm�C�nspr-devel-4.34.0-17.el9_1.i686.rpm�B�nspr-4.34.0-17.el9_1.x86_64.rpm�Hinss-softokn-freebl-3.79.0-17.el9_1.i686.rpm�Einss-devel-3.79.0-17.el9_1.i686.rpm�C�nspr-devel-4.34.0-17.el9_1.x86_64.rpm�Dinss-3.79.0-17.el9_1.x86_64.rpm�Ginss-softokn-devel-3.79.0-17.el9_1.x86_64.rpm�Finss-softokn-3.79.0-17.el9_1.x86_64.rpm�Kinss-util-devel-3.79.0-17.el9_1.i686.rpm���J�
	����FsecurityImportant: thunderbird security update��8�thttps://access.redhat.com/errata/RHSA-2023:1407RHSA-2023:1407RHSA-2023:1407https://access.redhat.com/security/cve/CVE-2023-25751CVE-2023-25751CVE-2023-25751https://access.redhat.com/security/cve/CVE-2023-25752CVE-2023-25752CVE-2023-25752https://access.redhat.com/security/cve/CVE-2023-28162CVE-2023-28162CVE-2023-28162https://access.redhat.com/security/cve/CVE-2023-28164CVE-2023-28164CVE-2023-28164https://access.redhat.com/security/cve/CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/21784582178458https://bugzilla.redhat.com/21784602178460https://bugzilla.redhat.com/21784662178466https://bugzilla.redhat.com/21784702178470https://bugzilla.redhat.com/21784722178472https://errata.almalinux.org/9/ALSA-2023-1407.htmlALSA-2023:1407ALSA-2023:1407
9�ythunderbird-102.9.0-1.el9_1.alma.x86_64.rpm9�ythunderbird-102.9.0-1.el9_1.alma.x86_64.rpm����

	����IBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update��,�Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470
%�kernel-devel-5.14.0-162.22.2.el9_1.x86_64.rpm'�perf-5.14.0-162.22.2.el9_1.x86_64.rpm#�kernel-debug-devel-5.14.0-162.22.2.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm�kernel-doc-5.14.0-162.22.2.el9_1.noarch.rpm$�kernel-debug-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm%�kernel-devel-5.14.0-162.22.2.el9_1.x86_64.rpm'�perf-5.14.0-162.22.2.el9_1.x86_64.rpm#�kernel-debug-devel-5.14.0-162.22.2.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm�kernel-doc-5.14.0-162.22.2.el9_1.noarch.rpm$�kernel-debug-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm����?�
	�� ��UBBBBBBBBBsecurityImportant: tigervnc security update���phttps://access.redhat.com/errata/RHSA-2023:1592RHSA-2023:1592RHSA-2023:1592https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-1592.htmlALSA-2023:1592ALSA-2023:1592
�Y�tigervnc-server-minimal-1.12.0-5.el9_1.2.x86_64.rpm��tigervnc-icons-1.12.0-5.el9_1.2.noarch.rpm�Z�tigervnc-server-module-1.12.0-5.el9_1.2.x86_64.rpm�X�tigervnc-server-1.12.0-5.el9_1.2.x86_64.rpm��tigervnc-license-1.12.0-5.el9_1.2.noarch.rpm�W�tigervnc-1.12.0-5.el9_1.2.x86_64.rpm��tigervnc-selinux-1.12.0-5.el9_1.2.noarch.rpm�Y�tigervnc-server-minimal-1.12.0-5.el9_1.2.x86_64.rpm��tigervnc-icons-1.12.0-5.el9_1.2.noarch.rpm�Z�tigervnc-server-module-1.12.0-5.el9_1.2.x86_64.rpm�X�tigervnc-server-1.12.0-5.el9_1.2.x86_64.rpm��tigervnc-license-1.12.0-5.el9_1.2.noarch.rpm�W�tigervnc-1.12.0-5.el9_1.2.x86_64.rpm��tigervnc-selinux-1.12.0-5.el9_1.2.noarch.rpm����-�
	��7��aBBBBBBBBBBBBBBBBBBBBsecurityImportant: httpd and mod_http2 security update��u�https://access.redhat.com/errata/RHSA-2023:1670RHSA-2023:1670RHSA-2023:1670https://access.redhat.com/security/cve/CVE-2023-25690CVE-2023-25690CVE-2023-25690https://bugzilla.redhat.com/21762092176209https://errata.almalinux.org/9/ALSA-2023-1670.htmlALSA-2023:1670ALSA-2023:1670
�}�nhttpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm�N�nmod_lua-2.4.53-7.el9_1.5.x86_64.rpm�~�nhttpd-manual-2.4.53-7.el9_1.5.noarch.rpm�P�nmod_session-2.4.53-7.el9_1.5.x86_64.rpm�A�nhttpd-core-2.4.53-7.el9_1.5.x86_64.rpm�M�nmod_ldap-2.4.53-7.el9_1.5.x86_64.rpm�O�mod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpm�B�nhttpd-devel-2.4.53-7.el9_1.5.x86_64.rpm�C�nhttpd-tools-2.4.53-7.el9_1.5.x86_64.rpm�Q�mod_ssl-2.4.53-7.el9_1.5.x86_64.rpm�K�Imod_http2-1.15.19-3.el9_1.5.x86_64.rpm�@�nhttpd-2.4.53-7.el9_1.5.x86_64.rpm�}�nhttpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm�N�nmod_lua-2.4.53-7.el9_1.5.x86_64.rpm�~�nhttpd-manual-2.4.53-7.el9_1.5.noarch.rpm�P�nmod_session-2.4.53-7.el9_1.5.x86_64.rpm�A�nhttpd-core-2.4.53-7.el9_1.5.x86_64.rpm�M�nmod_ldap-2.4.53-7.el9_1.5.x86_64.rpm�O�mod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpm�B�nhttpd-devel-2.4.53-7.el9_1.5.x86_64.rpm�C�nhttpd-tools-2.4.53-7.el9_1.5.x86_64.rpm�Q�mod_ssl-2.4.53-7.el9_1.5.x86_64.rpm�K�Imod_http2-1.15.19-3.el9_1.5.x86_64.rpm�@�nhttpd-2.4.53-7.el9_1.5.x86_64.rpm�����
	����xBBBBBBBBBBBBBBsecurityModerate: postgresql security update��|�jhttps://access.redhat.com/errata/RHSA-2023:1693RHSA-2023:1693RHSA-2023:1693https://access.redhat.com/security/cve/CVE-2022-2625CVE-2022-2625CVE-2022-2625https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21138252113825https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-1693.htmlALSA-2023:1693ALSA-2023:1693
��8postgresql-upgrade-13.10-1.el9_1.x86_64.rpm��8postgresql-plpython3-13.10-1.el9_1.x86_64.rpmZ�8postgresql-13.10-1.el9_1.x86_64.rpm��8postgresql-server-13.10-1.el9_1.x86_64.rpm��8postgresql-pltcl-13.10-1.el9_1.x86_64.rpm��8postgresql-plperl-13.10-1.el9_1.x86_64.rpm��8postgresql-private-libs-13.10-1.el9_1.x86_64.rpm��8postgresql-contrib-13.10-1.el9_1.x86_64.rpm��8postgresql-upgrade-13.10-1.el9_1.x86_64.rpm��8postgresql-plpython3-13.10-1.el9_1.x86_64.rpmZ�8postgresql-13.10-1.el9_1.x86_64.rpm��8postgresql-server-13.10-1.el9_1.x86_64.rpm��8postgresql-pltcl-13.10-1.el9_1.x86_64.rpm��8postgresql-plperl-13.10-1.el9_1.x86_64.rpm��8postgresql-private-libs-13.10-1.el9_1.x86_64.rpm��8postgresql-contrib-13.10-1.el9_1.x86_64.rpm�����
	����IsecurityModerate: haproxy security update��f�=https://access.redhat.com/errata/RHSA-2023:1696RHSA-2023:1696RHSA-2023:1696https://access.redhat.com/security/cve/CVE-2023-0056CVE-2023-0056CVE-2023-0056https://access.redhat.com/security/cve/CVE-2023-25725CVE-2023-25725CVE-2023-25725https://bugzilla.redhat.com/21608082160808https://bugzilla.redhat.com/21690892169089https://errata.almalinux.org/9/ALSA-2023-1696.htmlALSA-2023:1696ALSA-2023:1696
�b�Phaproxy-2.4.17-3.el9_1.2.x86_64.rpm�b�Phaproxy-2.4.17-3.el9_1.2.x86_64.rpm�����
	����LBsecurityModerate: curl security update��#�9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701
��libcurl-devel-7.76.1-19.el9_1.2.i686.rpm��libcurl-devel-7.76.1-19.el9_1.2.x86_64.rpm��libcurl-devel-7.76.1-19.el9_1.2.i686.rpm��libcurl-devel-7.76.1-19.el9_1.2.x86_64.rpm����	�
	����PBBBBBBBBBsecurityImportant: kernel security and bug fix update��\�4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703
�kernel-doc-5.14.0-162.23.1.el9_1.noarch.rpm#�kernel-debug-devel-5.14.0-162.23.1.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm'�perf-5.14.0-162.23.1.el9_1.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm%�kernel-devel-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-doc-5.14.0-162.23.1.el9_1.noarch.rpm#�kernel-debug-devel-5.14.0-162.23.1.el9_1.x86_64.rpm&�kernel-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm'�perf-5.14.0-162.23.1.el9_1.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm%�kernel-devel-5.14.0-162.23.1.el9_1.x86_64.rpm����
�
	�� ��\BBsecurityImportant: firefox security update���Dhttps://access.redhat.com/errata/RHSA-2023:1786RHSA-2023:1786RHSA-2023:1786https://access.redhat.com/security/cve/CVE-2023-1945CVE-2023-1945CVE-2023-1945https://access.redhat.com/security/cve/CVE-2023-29533CVE-2023-29533CVE-2023-29533https://access.redhat.com/security/cve/CVE-2023-29535CVE-2023-29535CVE-2023-29535https://access.redhat.com/security/cve/CVE-2023-29536CVE-2023-29536CVE-2023-29536https://access.redhat.com/security/cve/CVE-2023-29539CVE-2023-29539CVE-2023-29539https://access.redhat.com/security/cve/CVE-2023-29541CVE-2023-29541CVE-2023-29541https://access.redhat.com/security/cve/CVE-2023-29548CVE-2023-29548CVE-2023-29548https://access.redhat.com/security/cve/CVE-2023-29550CVE-2023-29550CVE-2023-29550https://bugzilla.redhat.com/21861012186101https://bugzilla.redhat.com/21861032186103https://bugzilla.redhat.com/21861042186104https://bugzilla.redhat.com/21861052186105https://bugzilla.redhat.com/21861062186106https://bugzilla.redhat.com/21861092186109https://bugzilla.redhat.com/21861102186110https://bugzilla.redhat.com/21861112186111https://errata.almalinux.org/9/ALSA-2023-1786.htmlALSA-2023:1786ALSA-2023:1786
8�{firefox-102.10.0-1.el9_1.alma.x86_64.rpmP�{firefox-x11-102.10.0-1.el9_1.alma.x86_64.rpm8�{firefox-102.10.0-1.el9_1.alma.x86_64.rpmP�{firefox-x11-102.10.0-1.el9_1.alma.x86_64.rpm����M�
	��#��asecurityImportant: thunderbird security update��T�*https://access.redhat.com/errata/RHSA-2023:1809RHSA-2023:1809RHSA-2023:1809https://access.redhat.com/security/cve/CVE-2023-0547CVE-2023-0547CVE-2023-0547https://access.redhat.com/security/cve/CVE-2023-1945CVE-2023-1945CVE-2023-1945https://access.redhat.com/security/cve/CVE-2023-28427CVE-2023-28427CVE-2023-28427https://access.redhat.com/security/cve/CVE-2023-29479CVE-2023-29479CVE-2023-29479https://access.redhat.com/security/cve/CVE-2023-29533CVE-2023-29533CVE-2023-29533https://access.redhat.com/security/cve/CVE-2023-29535CVE-2023-29535CVE-2023-29535https://access.redhat.com/security/cve/CVE-2023-29536CVE-2023-29536CVE-2023-29536https://access.redhat.com/security/cve/CVE-2023-29539CVE-2023-29539CVE-2023-29539https://access.redhat.com/security/cve/CVE-2023-29541CVE-2023-29541CVE-2023-29541https://access.redhat.com/security/cve/CVE-2023-29548CVE-2023-29548CVE-2023-29548https://access.redhat.com/security/cve/CVE-2023-29550CVE-2023-29550CVE-2023-29550https://bugzilla.redhat.com/21832782183278https://bugzilla.redhat.com/21861012186101https://bugzilla.redhat.com/21861032186103https://bugzilla.redhat.com/21861042186104https://bugzilla.redhat.com/21861052186105https://bugzilla.redhat.com/21861062186106https://bugzilla.redhat.com/21861092186109https://bugzilla.redhat.com/21861102186110https://bugzilla.redhat.com/21861112186111https://bugzilla.redhat.com/21867342186734https://bugzilla.redhat.com/21867352186735https://errata.almalinux.org/9/ALSA-2023-1809.htmlALSA-2023:1809ALSA-2023:1809
9�mthunderbird-102.10.0-2.el9_1.alma.x86_64.rpm9�mthunderbird-102.10.0-2.el9_1.alma.x86_64.rpm�����
	��6��dBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update��~�https://access.redhat.com/errata/RHSA-2023:1879RHSA-2023:1879RHSA-2023:1879https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1879.htmlALSA-2023:1879ALSA-2023:1879
	��.java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-demo-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-devel-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-jmods-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-headless-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-src-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1.x86_64.rpm	��.java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-demo-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-devel-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-jmods-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-headless-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-src-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-17.0.7.0.7-1.el9_1.x86_64.rpm��.java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1.x86_64.rpm�����
	��	��wBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update���2https://access.redhat.com/errata/RHSA-2023:1880RHSA-2023:1880RHSA-2023:1880https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1880.htmlALSA-2023:1880ALSA-2023:1880
	�I�java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.x86_64.rpm�F�java-11-openjdk-devel-11.0.19.0.7-1.el9_1.x86_64.rpm�J�java-11-openjdk-jmods-11.0.19.0.7-1.el9_1.x86_64.rpm�G�java-11-openjdk-headless-11.0.19.0.7-1.el9_1.x86_64.rpm�D�java-11-openjdk-11.0.19.0.7-1.el9_1.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.x86_64.rpm�K�java-11-openjdk-src-11.0.19.0.7-1.el9_1.x86_64.rpm�E�java-11-openjdk-demo-11.0.19.0.7-1.el9_1.x86_64.rpm	�I�java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.x86_64.rpm�F�java-11-openjdk-devel-11.0.19.0.7-1.el9_1.x86_64.rpm�J�java-11-openjdk-jmods-11.0.19.0.7-1.el9_1.x86_64.rpm�G�java-11-openjdk-headless-11.0.19.0.7-1.el9_1.x86_64.rpm�D�java-11-openjdk-11.0.19.0.7-1.el9_1.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.x86_64.rpm�K�java-11-openjdk-src-11.0.19.0.7-1.el9_1.x86_64.rpm�E�java-11-openjdk-demo-11.0.19.0.7-1.el9_1.x86_64.rpm����u�
	����JBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix update��L�Thttps://access.redhat.com/errata/RHSA-2023:1909RHSA-2023:1909RHSA-2023:1909https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1909.htmlALSA-2023:1909ALSA-2023:1909
�7�kjava-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm�V�kjava-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.x86_64.rpm�U�kjava-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.x86_64.rpm�X�kjava-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.x86_64.rpm�T�kjava-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.x86_64.rpm�W�kjava-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.x86_64.rpm�8�kjava-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm�7�kjava-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm�V�kjava-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.x86_64.rpm�U�kjava-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.x86_64.rpm�X�kjava-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.x86_64.rpm�T�kjava-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.x86_64.rpm�W�kjava-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.x86_64.rpm�8�kjava-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm��ƷJ�
	��#��WBBBBBBBBBBsecurityImportant: webkit2gtk3 security update�� �xhttps://access.redhat.com/errata/RHSA-2023:1918RHSA-2023:1918RHSA-2023:1918https://access.redhat.com/security/cve/CVE-2023-28205CVE-2023-28205CVE-2023-28205https://bugzilla.redhat.com/21857242185724https://errata.almalinux.org/9/ALSA-2023-1918.htmlALSA-2023:1918ALSA-2023:1918
2�,webkit2gtk3-jsc-2.36.7-1.el9_1.3.x86_64.rpm0�,webkit2gtk3-2.36.7-1.el9_1.3.x86_64.rpm1�,webkit2gtk3-devel-2.36.7-1.el9_1.3.i686.rpm2�,webkit2gtk3-jsc-2.36.7-1.el9_1.3.i686.rpm3�,webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.i686.rpm0�,webkit2gtk3-2.36.7-1.el9_1.3.i686.rpm1�,webkit2gtk3-devel-2.36.7-1.el9_1.3.x86_64.rpm3�,webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.x86_64.rpm2�,webkit2gtk3-jsc-2.36.7-1.el9_1.3.x86_64.rpm0�,webkit2gtk3-2.36.7-1.el9_1.3.x86_64.rpm1�,webkit2gtk3-devel-2.36.7-1.el9_1.3.i686.rpm2�,webkit2gtk3-jsc-2.36.7-1.el9_1.3.i686.rpm3�,webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.i686.rpm0�,webkit2gtk3-2.36.7-1.el9_1.3.i686.rpm1�,webkit2gtk3-devel-2.36.7-1.el9_1.3.x86_64.rpm3�,webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.x86_64.rpm����t�
	��-��dBBBBBBBsecurityImportant: emacs security update���Rhttps://access.redhat.com/errata/RHSA-2023:2074RHSA-2023:2074RHSA-2023:2074https://access.redhat.com/security/cve/CVE-2023-28617CVE-2023-28617CVE-2023-28617https://bugzilla.redhat.com/21805442180544https://errata.almalinux.org/9/ALSA-2023-2074.htmlALSA-2023:2074ALSA-2023:2074
�]�emacs-27.2-6.el9_1.1.x86_64.rpm�^�emacs-common-27.2-6.el9_1.1.x86_64.rpm�`�emacs-nox-27.2-6.el9_1.1.x86_64.rpm�`�emacs-filesystem-27.2-6.el9_1.1.noarch.rpm�_�emacs-lucid-27.2-6.el9_1.1.x86_64.rpm�]�emacs-27.2-6.el9_1.1.x86_64.rpm�^�emacs-common-27.2-6.el9_1.1.x86_64.rpm�`�emacs-nox-27.2-6.el9_1.1.x86_64.rpm�`�emacs-filesystem-27.2-6.el9_1.1.noarch.rpm�_�emacs-lucid-27.2-6.el9_1.1.x86_64.rpm��ȭ�
	��4��nBBBBsecurityImportant: libwebp security update��j�*https://access.redhat.com/errata/RHSA-2023:2078RHSA-2023:2078RHSA-2023:2078https://access.redhat.com/security/cve/CVE-2023-1999CVE-2023-1999CVE-2023-1999https://bugzilla.redhat.com/21861022186102https://errata.almalinux.org/9/ALSA-2023-2078.htmlALSA-2023:2078ALSA-2023:2078
�E�Wlibwebp-devel-1.2.0-6.el9_1.x86_64.rpm�D�Wlibwebp-1.2.0-6.el9_1.i686.rpm�D�Wlibwebp-1.2.0-6.el9_1.x86_64.rpm�E�Wlibwebp-devel-1.2.0-6.el9_1.i686.rpm�E�Wlibwebp-devel-1.2.0-6.el9_1.x86_64.rpm�D�Wlibwebp-1.2.0-6.el9_1.i686.rpm�D�Wlibwebp-1.2.0-6.el9_1.x86_64.rpm�E�Wlibwebp-devel-1.2.0-6.el9_1.i686.rpm��ȩV�
	����uBBBBBBBBBBsecurityImportant: samba security update���https://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127
�Q�Asamba-winbind-clients-4.16.4-103.el9_1.x86_64.rpm�R�Asamba-winbind-krb5-locator-4.16.4-103.el9_1.x86_64.rpm�N�Asamba-client-4.16.4-103.el9_1.x86_64.rpm�O�Asamba-krb5-printing-4.16.4-103.el9_1.x86_64.rpm�S�Asamba-winexe-4.16.4-103.el9_1.x86_64.rpm�P�Asamba-vfs-iouring-4.16.4-103.el9_1.x86_64.rpm�Q�Asamba-winbind-clients-4.16.4-103.el9_1.x86_64.rpm�R�Asamba-winbind-krb5-locator-4.16.4-103.el9_1.x86_64.rpm�N�Asamba-client-4.16.4-103.el9_1.x86_64.rpm�O�Asamba-krb5-printing-4.16.4-103.el9_1.x86_64.rpm�S�Asamba-winexe-4.16.4-103.el9_1.x86_64.rpm�P�Asamba-vfs-iouring-4.16.4-103.el9_1.x86_64.rpm��ӿ!�
	����BBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security and bug fix update��(�https://access.redhat.com/errata/RHSA-2023:2161RHSA-2023:2161RHSA-2023:2161https://access.redhat.com/security/cve/CVE-2022-36087CVE-2022-36087CVE-2022-36087https://bugzilla.redhat.com/21284252128425https://errata.almalinux.org/9/ALSA-2023-2161.htmlALSA-2023:2161ALSA-2023:2161

�$�$fence-agents-ibm-powervs-4.10.0-43.el9.noarch.rpm�d�$fence-virt-4.10.0-43.el9.x86_64.rpm�i�$fence-virtd-serial-4.10.0-43.el9.x86_64.rpm�g�$fence-virtd-libvirt-4.10.0-43.el9.x86_64.rpm�j�$fence-virtd-tcp-4.10.0-43.el9.x86_64.rpm�h�$fence-virtd-multicast-4.10.0-43.el9.x86_64.rpm�#�$fence-agents-common-4.10.0-43.el9.noarch.rpm�&�$fence-agents-virsh-4.10.0-43.el9.noarch.rpm�b�$fence-agents-compute-4.10.0-43.el9.x86_64.rpm�f�$fence-virtd-cpg-4.10.0-43.el9.x86_64.rpm�c�$fence-agents-kubevirt-4.10.0-43.el9.x86_64.rpm�e�$fence-virtd-4.10.0-43.el9.x86_64.rpm�%�$fence-agents-ibm-vpc-4.10.0-43.el9.noarch.rpm
�$�$fence-agents-ibm-powervs-4.10.0-43.el9.noarch.rpm�d�$fence-virt-4.10.0-43.el9.x86_64.rpm�i�$fence-virtd-serial-4.10.0-43.el9.x86_64.rpm�g�$fence-virtd-libvirt-4.10.0-43.el9.x86_64.rpm�j�$fence-virtd-tcp-4.10.0-43.el9.x86_64.rpm�h�$fence-virtd-multicast-4.10.0-43.el9.x86_64.rpm�#�$fence-agents-common-4.10.0-43.el9.noarch.rpm�&�$fence-agents-virsh-4.10.0-43.el9.noarch.rpm�b�$fence-agents-compute-4.10.0-43.el9.x86_64.rpm�f�$fence-virtd-cpg-4.10.0-43.el9.x86_64.rpm�c�$fence-agents-kubevirt-4.10.0-43.el9.x86_64.rpm�e�$fence-virtd-4.10.0-43.el9.x86_64.rpm�%�$fence-agents-ibm-vpc-4.10.0-43.el9.noarch.rpm���j�
	��=��YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement update��.�lhttps://access.redhat.com/errata/RHSA-2023:2162RHSA-2023:2162RHSA-2023:2162https://access.redhat.com/security/cve/CVE-2022-3165CVE-2022-3165CVE-2022-3165https://access.redhat.com/security/cve/CVE-2022-4172CVE-2022-4172CVE-2022-4172https://bugzilla.redhat.com/21297392129739https://bugzilla.redhat.com/21491052149105https://errata.almalinux.org/9/ALSA-2023-2162.htmlALSA-2023:2162ALSA-2023:2162
�0aqemu-guest-agent-7.2.0-14.el9_2.x86_64.rpm�6aqemu-kvm-common-7.2.0-14.el9_2.x86_64.rpm�1aqemu-img-7.2.0-14.el9_2.x86_64.rpm�5aqemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpm�;aqemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpm�3aqemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpm�2aqemu-kvm-7.2.0-14.el9_2.x86_64.rpm�=aqemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpm�4aqemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpm�?aqemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpm�9aqemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm�Aaqemu-pr-helper-7.2.0-14.el9_2.x86_64.rpm�8aqemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpm�>aqemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm�@aqemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpm�7aqemu-kvm-core-7.2.0-14.el9_2.x86_64.rpm�<aqemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpm�:aqemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpm�0aqemu-guest-agent-7.2.0-14.el9_2.x86_64.rpm�6aqemu-kvm-common-7.2.0-14.el9_2.x86_64.rpm�1aqemu-img-7.2.0-14.el9_2.x86_64.rpm�5aqemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpm�;aqemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpm�3aqemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpm�2aqemu-kvm-7.2.0-14.el9_2.x86_64.rpm�=aqemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpm�4aqemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpm�?aqemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpm�9aqemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm�Aaqemu-pr-helper-7.2.0-14.el9_2.x86_64.rpm�8aqemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpm�>aqemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm�@aqemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpm�7aqemu-kvm-core-7.2.0-14.el9_2.x86_64.rpm�<aqemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpm�:aqemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpm����
	��?��>securityImportant: edk2 security, bug fix, and enhancement update���https://access.redhat.com/errata/RHSA-2023:2165RHSA-2023:2165RHSA-2023:2165https://access.redhat.com/security/cve/CVE-2021-38578CVE-2021-38578CVE-2021-38578https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/19603211960321https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://errata.almalinux.org/9/ALSA-2023-2165.htmlALSA-2023:2165ALSA-2023:2165
�g�}edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpm�g�}edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpm����� 
	����@BBBBBBBBBBBBsecurityModerate: freeradius security and bug fix update��)�fhttps://access.redhat.com/errata/RHSA-2023:2166RHSA-2023:2166RHSA-2023:2166https://access.redhat.com/security/cve/CVE-2022-41859CVE-2022-41859CVE-2022-41859https://access.redhat.com/security/cve/CVE-2022-41860CVE-2022-41860CVE-2022-41860https://access.redhat.com/security/cve/CVE-2022-41861CVE-2022-41861CVE-2022-41861https://bugzilla.redhat.com/20784832078483https://bugzilla.redhat.com/20784852078485https://bugzilla.redhat.com/20784872078487https://errata.almalinux.org/9/ALSA-2023-2166.htmlALSA-2023:2166ALSA-2023:2166
�P�Dfreeradius-devel-3.0.21-37.el9.x86_64.rpm�T�Dfreeradius-utils-3.0.21-37.el9.x86_64.rpm�S�Dfreeradius-ldap-3.0.21-37.el9.x86_64.rpm�O�Dfreeradius-3.0.21-37.el9.x86_64.rpm�Q�Dfreeradius-doc-3.0.21-37.el9.x86_64.rpm�	�Dpython3-freeradius-3.0.21-37.el9.x86_64.rpm�R�Dfreeradius-krb5-3.0.21-37.el9.x86_64.rpm�P�Dfreeradius-devel-3.0.21-37.el9.x86_64.rpm�T�Dfreeradius-utils-3.0.21-37.el9.x86_64.rpm�S�Dfreeradius-ldap-3.0.21-37.el9.x86_64.rpm�O�Dfreeradius-3.0.21-37.el9.x86_64.rpm�Q�Dfreeradius-doc-3.0.21-37.el9.x86_64.rpm�	�Dpython3-freeradius-3.0.21-37.el9.x86_64.rpm�R�Dfreeradius-krb5-3.0.21-37.el9.x86_64.rpm����:�!
	����OsecurityModerate: grafana security and enhancement update���https://access.redhat.com/errata/RHSA-2023:2167RHSA-2023:2167RHSA-2023:2167https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-35957CVE-2022-35957CVE-2022-35957https://access.redhat.com/security/cve/CVE-2022-39229CVE-2022-39229CVE-2022-39229https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21255142125514https://bugzilla.redhat.com/21311492131149https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-2167.htmlALSA-2023:2167ALSA-2023:2167
�I�Ygrafana-9.0.9-2.el9.x86_64.rpm�I�Ygrafana-9.0.9-2.el9.x86_64.rpm����=�"
	����RsecurityModerate: grafana-pcp security and enhancement update���{https://access.redhat.com/errata/RHSA-2023:2177RHSA-2023:2177RHSA-2023:2177https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://bugzilla.redhat.com/21246692124669https://errata.almalinux.org/9/ALSA-2023-2177.htmlALSA-2023:2177ALSA-2023:2177
�~�-grafana-pcp-5.1.1-1.el9.x86_64.rpm�~�-grafana-pcp-5.1.1-1.el9.x86_64.rpm�����#
	����UsecurityModerate: libguestfs-winsupport security update���
https://access.redhat.com/errata/RHSA-2023:2179RHSA-2023:2179RHSA-2023:2179https://access.redhat.com/security/cve/CVE-2021-46790CVE-2021-46790CVE-2021-46790https://access.redhat.com/security/cve/CVE-2022-30784CVE-2022-30784CVE-2022-30784https://access.redhat.com/security/cve/CVE-2022-30786CVE-2022-30786CVE-2022-30786https://access.redhat.com/security/cve/CVE-2022-30788CVE-2022-30788CVE-2022-30788https://access.redhat.com/security/cve/CVE-2022-30789CVE-2022-30789CVE-2022-30789https://bugzilla.redhat.com/20933142093314https://bugzilla.redhat.com/20933262093326https://bugzilla.redhat.com/20933402093340https://bugzilla.redhat.com/20933482093348https://bugzilla.redhat.com/20933582093358https://errata.almalinux.org/9/ALSA-2023-2179.htmlALSA-2023:2179ALSA-2023:2179
�y�\libguestfs-winsupport-9.2-1.el9.x86_64.rpm�y�\libguestfs-winsupport-9.2-1.el9.x86_64.rpm�����$
	����XsecurityModerate: butane security, bug fix, and enhancement update��%�Ehttps://access.redhat.com/errata/RHSA-2023:2193RHSA-2023:2193RHSA-2023:2193https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://errata.almalinux.org/9/ALSA-2023-2193.htmlALSA-2023:2193ALSA-2023:2193
��=butane-0.16.0-1.el9.x86_64.rpm��=butane-0.16.0-1.el9.x86_64.rpm�����%
	����[BsecurityModerate: frr security, bug fix, and enhancement update��j�Thttps://access.redhat.com/errata/RHSA-2023:2202RHSA-2023:2202RHSA-2023:2202https://access.redhat.com/security/cve/CVE-2022-37032CVE-2022-37032CVE-2022-37032https://bugzilla.redhat.com/21287132128713https://errata.almalinux.org/9/ALSA-2023-2202.htmlALSA-2023:2202ALSA-2023:2202
�9�frr-8.3.1-5.el9.x86_64.rpm�6�frr-selinux-8.3.1-5.el9.noarch.rpm�9�frr-8.3.1-5.el9.x86_64.rpm�6�frr-selinux-8.3.1-5.el9.noarch.rpm����9�&
	��)��_BBBBBBBBsecurityModerate: Image Builder security, bug fix, and enhancement update��>�Ghttps://access.redhat.com/errata/RHSA-2023:2204RHSA-2023:2204RHSA-2023:2204https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2204.htmlALSA-2023:2204ALSA-2023:2204
�x�Sosbuild-composer-core-76-2.el9_2.alma.x86_64.rpm��weldr-client-35.9-1.el9.x86_64.rpm�y�Sosbuild-composer-worker-76-2.el9_2.alma.x86_64.rpm�w�Sosbuild-composer-76-2.el9_2.alma.x86_64.rpm��Sosbuild-composer-dnf-json-76-2.el9_2.alma.x86_64.rpm�x�Sosbuild-composer-core-76-2.el9_2.alma.x86_64.rpm��weldr-client-35.9-1.el9.x86_64.rpm�y�Sosbuild-composer-worker-76-2.el9_2.alma.x86_64.rpm�w�Sosbuild-composer-76-2.el9_2.alma.x86_64.rpm��Sosbuild-composer-dnf-json-76-2.el9_2.alma.x86_64.rpm����T�'
	��3��jBBBBBBBsecurityModerate: gdk-pixbuf2 security update���`https://access.redhat.com/errata/RHSA-2023:2216RHSA-2023:2216RHSA-2023:2216https://access.redhat.com/security/cve/CVE-2021-44648CVE-2021-44648CVE-2021-44648https://access.redhat.com/security/cve/CVE-2021-46829CVE-2021-46829CVE-2021-46829https://bugzilla.redhat.com/20437222043722https://bugzilla.redhat.com/21149402114940https://errata.almalinux.org/9/ALSA-2023-2216.htmlALSA-2023:2216ALSA-2023:2216
�9�]gdk-pixbuf2-modules-2.42.6-3.el9.x86_64.rpm�7�]gdk-pixbuf2-2.42.6-3.el9.x86_64.rpm�7�]gdk-pixbuf2-2.42.6-3.el9.i686.rpm�8�]gdk-pixbuf2-devel-2.42.6-3.el9.x86_64.rpm�9�]gdk-pixbuf2-modules-2.42.6-3.el9.i686.rpm�8�]gdk-pixbuf2-devel-2.42.6-3.el9.i686.rpm�9�]gdk-pixbuf2-modules-2.42.6-3.el9.x86_64.rpm�7�]gdk-pixbuf2-2.42.6-3.el9.x86_64.rpm�7�]gdk-pixbuf2-2.42.6-3.el9.i686.rpm�8�]gdk-pixbuf2-devel-2.42.6-3.el9.x86_64.rpm�9�]gdk-pixbuf2-modules-2.42.6-3.el9.i686.rpm�8�]gdk-pixbuf2-devel-2.42.6-3.el9.i686.rpm����#�(
	��6��tsecurityModerate: conmon security and bug fix update��e�shttps://access.redhat.com/errata/RHSA-2023:2222RHSA-2023:2222RHSA-2023:2222https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2222.htmlALSA-2023:2222ALSA-2023:2222
��pconmon-2.1.7-1.el9_2.x86_64.rpm��pconmon-2.1.7-1.el9_2.x86_64.rpm�����)
	��9��wsecurityModerate: sysstat security and bug fix update��X�Hhttps://access.redhat.com/errata/RHSA-2023:2234RHSA-2023:2234RHSA-2023:2234https://access.redhat.com/security/cve/CVE-2022-39377CVE-2022-39377CVE-2022-39377https://bugzilla.redhat.com/21412072141207https://errata.almalinux.org/9/ALSA-2023-2234.htmlALSA-2023:2234ALSA-2023:2234
��sysstat-12.5.4-5.el9.x86_64.rpm��sysstat-12.5.4-5.el9.x86_64.rpm�����*
	��>��zBBsecurityModerate: toolbox security and bug fix update�� �https://access.redhat.com/errata/RHSA-2023:2236RHSA-2023:2236RHSA-2023:2236https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2236.htmlALSA-2023:2236ALSA-2023:2236
�
�atoolbox-tests-0.0.99.3-9.el9.x86_64.rpm��atoolbox-0.0.99.3-9.el9.x86_64.rpm�
�atoolbox-tests-0.0.99.3-9.el9.x86_64.rpm��atoolbox-0.0.99.3-9.el9.x86_64.rpm�����+
	����BBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update��/�Ohttps://access.redhat.com/errata/RHSA-2023:2248RHSA-2023:2248RHSA-2023:2248https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2248.htmlALSA-2023:2248ALSA-2023:2248
�� xorg-x11-server-Xvfb-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-common-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xephyr-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xorg-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xdmx-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xnest-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xvfb-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-common-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xephyr-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xorg-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xdmx-1.20.11-17.el9.x86_64.rpm�� xorg-x11-server-Xnest-1.20.11-17.el9.x86_64.rpm�����,
	����LsecurityModerate: xorg-x11-server-Xwayland security update��~�`https://access.redhat.com/errata/RHSA-2023:2249RHSA-2023:2249RHSA-2023:2249https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2249.htmlALSA-2023:2249ALSA-2023:2249
��cxorg-x11-server-Xwayland-21.1.3-7.el9.x86_64.rpm��cxorg-x11-server-Xwayland-21.1.3-7.el9.x86_64.rpm����7�-
	����OBBsecurityModerate: buildah security and bug fix update��^�https://access.redhat.com/errata/RHSA-2023:2253RHSA-2023:2253RHSA-2023:2253https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2253.htmlALSA-2023:2253ALSA-2023:2253
�/�buildah-1.29.1-1.el9.x86_64.rpm�0�buildah-tests-1.29.1-1.el9.x86_64.rpm�/�buildah-1.29.1-1.el9.x86_64.rpm�0�buildah-tests-1.29.1-1.el9.x86_64.rpm�����.
	�� ��TBBBBBBBBBBsecurityImportant: webkit2gtk3 security and bug fix update��c�X.https://access.redhat.com/errata/RHSA-2023:2256RHSA-2023:2256RHSA-2023:2256https://access.redhat.com/security/cve/CVE-2022-32886CVE-2022-32886CVE-2022-32886https://access.redhat.com/security/cve/CVE-2022-32888CVE-2022-32888CVE-2022-32888https://access.redhat.com/security/cve/CVE-2022-32923CVE-2022-32923CVE-2022-32923https://access.redhat.com/security/cve/CVE-2022-42799CVE-2022-42799CVE-2022-42799https://access.redhat.com/security/cve/CVE-2022-42823CVE-2022-42823CVE-2022-42823https://access.redhat.com/security/cve/CVE-2022-42824CVE-2022-42824CVE-2022-42824https://access.redhat.com/security/cve/CVE-2022-42826CVE-2022-42826CVE-2022-42826https://access.redhat.com/security/cve/CVE-2022-42852CVE-2022-42852CVE-2022-42852https://access.redhat.com/security/cve/CVE-2022-42863CVE-2022-42863CVE-2022-42863https://access.redhat.com/security/cve/CVE-2022-42867CVE-2022-42867CVE-2022-42867https://access.redhat.com/security/cve/CVE-2022-46691CVE-2022-46691CVE-2022-46691https://access.redhat.com/security/cve/CVE-2022-46692CVE-2022-46692CVE-2022-46692https://access.redhat.com/security/cve/CVE-2022-46698CVE-2022-46698CVE-2022-46698https://access.redhat.com/security/cve/CVE-2022-46699CVE-2022-46699CVE-2022-46699https://access.redhat.com/security/cve/CVE-2022-46700CVE-2022-46700CVE-2022-46700https://access.redhat.com/security/cve/CVE-2023-23517CVE-2023-23517CVE-2023-23517https://access.redhat.com/security/cve/CVE-2023-23518CVE-2023-23518CVE-2023-23518https://access.redhat.com/security/cve/CVE-2023-25358CVE-2023-25358CVE-2023-25358https://access.redhat.com/security/cve/CVE-2023-25360CVE-2023-25360CVE-2023-25360https://access.redhat.com/security/cve/CVE-2023-25361CVE-2023-25361CVE-2023-25361https://access.redhat.com/security/cve/CVE-2023-25362CVE-2023-25362CVE-2023-25362https://access.redhat.com/security/cve/CVE-2023-25363CVE-2023-25363CVE-2023-25363https://bugzilla.redhat.com/21286432128643https://bugzilla.redhat.com/21405012140501https://bugzilla.redhat.com/21405022140502https://bugzilla.redhat.com/21405032140503https://bugzilla.redhat.com/21405042140504https://bugzilla.redhat.com/21405052140505https://bugzilla.redhat.com/21569862156986https://bugzilla.redhat.com/21569872156987https://bugzilla.redhat.com/21569892156989https://bugzilla.redhat.com/21569902156990https://bugzilla.redhat.com/21569912156991https://bugzilla.redhat.com/21569922156992https://bugzilla.redhat.com/21569932156993https://bugzilla.redhat.com/21569942156994https://bugzilla.redhat.com/21677152167715https://bugzilla.redhat.com/21677162167716https://bugzilla.redhat.com/21677172167717https://bugzilla.redhat.com/21750992175099https://bugzilla.redhat.com/21751012175101https://bugzilla.redhat.com/21751032175103https://bugzilla.redhat.com/21751052175105https://bugzilla.redhat.com/21751072175107https://errata.almalinux.org/9/ALSA-2023-2256.htmlALSA-2023:2256ALSA-2023:2256
2�-webkit2gtk3-jsc-2.38.5-1.el9.i686.rpm0�-webkit2gtk3-2.38.5-1.el9.i686.rpm1�-webkit2gtk3-devel-2.38.5-1.el9.x86_64.rpm3�-webkit2gtk3-jsc-devel-2.38.5-1.el9.x86_64.rpm1�-webkit2gtk3-devel-2.38.5-1.el9.i686.rpm2�-webkit2gtk3-jsc-2.38.5-1.el9.x86_64.rpm3�-webkit2gtk3-jsc-devel-2.38.5-1.el9.i686.rpm0�-webkit2gtk3-2.38.5-1.el9.x86_64.rpm2�-webkit2gtk3-jsc-2.38.5-1.el9.i686.rpm0�-webkit2gtk3-2.38.5-1.el9.i686.rpm1�-webkit2gtk3-devel-2.38.5-1.el9.x86_64.rpm3�-webkit2gtk3-jsc-devel-2.38.5-1.el9.x86_64.rpm1�-webkit2gtk3-devel-2.38.5-1.el9.i686.rpm2�-webkit2gtk3-jsc-2.38.5-1.el9.x86_64.rpm3�-webkit2gtk3-jsc-devel-2.38.5-1.el9.i686.rpm0�-webkit2gtk3-2.38.5-1.el9.x86_64.rpm����w�/
	��,��aBBBBBBBBBsecurityModerate: tigervnc security and bug fix update��;�8https://access.redhat.com/errata/RHSA-2023:2257RHSA-2023:2257RHSA-2023:2257https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://errata.almalinux.org/9/ALSA-2023-2257.htmlALSA-2023:2257ALSA-2023:2257
�Z�tigervnc-server-module-1.12.0-13.el9_2.x86_64.rpm�W�tigervnc-1.12.0-13.el9_2.x86_64.rpm�X�tigervnc-server-1.12.0-13.el9_2.x86_64.rpm��tigervnc-icons-1.12.0-13.el9_2.noarch.rpm��tigervnc-license-1.12.0-13.el9_2.noarch.rpm�Y�tigervnc-server-minimal-1.12.0-13.el9_2.x86_64.rpm��tigervnc-selinux-1.12.0-13.el9_2.noarch.rpm�Z�tigervnc-server-module-1.12.0-13.el9_2.x86_64.rpm�W�tigervnc-1.12.0-13.el9_2.x86_64.rpm�X�tigervnc-server-1.12.0-13.el9_2.x86_64.rpm��tigervnc-icons-1.12.0-13.el9_2.noarch.rpm��tigervnc-license-1.12.0-13.el9_2.noarch.rpm�Y�tigervnc-server-minimal-1.12.0-13.el9_2.x86_64.rpm��tigervnc-selinux-1.12.0-13.el9_2.noarch.rpm����
�0
	��.��-securityModerate: python-mako security update��s�'https://access.redhat.com/errata/RHSA-2023:2258RHSA-2023:2258RHSA-2023:2258https://access.redhat.com/security/cve/CVE-2022-40023CVE-2022-40023CVE-2022-40023https://bugzilla.redhat.com/21289772128977https://errata.almalinux.org/9/ALSA-2023-2258.htmlALSA-2023:2258ALSA-2023:2258
�<�$python3-mako-1.1.4-6.el9.noarch.rpm�<�$python3-mako-1.1.4-6.el9.noarch.rpm����t�1
	��=��oBBBBBBBBBBBBsecurityModerate: poppler security and bug fix update���https://access.redhat.com/errata/RHSA-2023:2259RHSA-2023:2259RHSA-2023:2259https://access.redhat.com/security/cve/CVE-2022-38784CVE-2022-38784CVE-2022-38784https://bugzilla.redhat.com/21245272124527https://errata.almalinux.org/9/ALSA-2023-2259.htmlALSA-2023:2259ALSA-2023:2259
	�H�Bpoppler-utils-21.01.0-14.el9.x86_64.rpm�?�Bpoppler-21.01.0-14.el9.i686.rpm�@�Bpoppler-cpp-21.01.0-14.el9.i686.rpm�A�Bpoppler-glib-21.01.0-14.el9.x86_64.rpm�B�Bpoppler-qt5-21.01.0-14.el9.i686.rpm�B�Bpoppler-qt5-21.01.0-14.el9.x86_64.rpm�?�Bpoppler-21.01.0-14.el9.x86_64.rpm�A�Bpoppler-glib-21.01.0-14.el9.i686.rpm�@�Bpoppler-cpp-21.01.0-14.el9.x86_64.rpm	�H�Bpoppler-utils-21.01.0-14.el9.x86_64.rpm�?�Bpoppler-21.01.0-14.el9.i686.rpm�@�Bpoppler-cpp-21.01.0-14.el9.i686.rpm�A�Bpoppler-glib-21.01.0-14.el9.x86_64.rpm�B�Bpoppler-qt5-21.01.0-14.el9.i686.rpm�B�Bpoppler-qt5-21.01.0-14.el9.x86_64.rpm�?�Bpoppler-21.01.0-14.el9.x86_64.rpm�A�Bpoppler-glib-21.01.0-14.el9.i686.rpm�@�Bpoppler-cpp-21.01.0-14.el9.x86_64.rpm����T�2
	����~BBBBsecurityModerate: gstreamer1-plugins-good security update��3�Ghttps://access.redhat.com/errata/RHSA-2023:2260RHSA-2023:2260RHSA-2023:2260https://access.redhat.com/security/cve/CVE-2022-1920CVE-2022-1920CVE-2022-1920https://access.redhat.com/security/cve/CVE-2022-1921CVE-2022-1921CVE-2022-1921https://access.redhat.com/security/cve/CVE-2022-1922CVE-2022-1922CVE-2022-1922https://access.redhat.com/security/cve/CVE-2022-1923CVE-2022-1923CVE-2022-1923https://access.redhat.com/security/cve/CVE-2022-1924CVE-2022-1924CVE-2022-1924https://access.redhat.com/security/cve/CVE-2022-1925CVE-2022-1925CVE-2022-1925https://access.redhat.com/security/cve/CVE-2022-2122CVE-2022-2122CVE-2022-2122https://bugzilla.redhat.com/21309352130935https://bugzilla.redhat.com/21309492130949https://bugzilla.redhat.com/21309552130955https://bugzilla.redhat.com/21309592130959https://bugzilla.redhat.com/21310032131003https://bugzilla.redhat.com/21310072131007https://bugzilla.redhat.com/21310182131018https://errata.almalinux.org/9/ALSA-2023-2260.htmlALSA-2023:2260ALSA-2023:2260
�
�Vgstreamer1-plugins-good-1.18.4-6.el9.i686.rpm�
�Vgstreamer1-plugins-good-1.18.4-6.el9.x86_64.rpm��Vgstreamer1-plugins-good-gtk-1.18.4-6.el9.i686.rpm��Vgstreamer1-plugins-good-gtk-1.18.4-6.el9.x86_64.rpm�
�Vgstreamer1-plugins-good-1.18.4-6.el9.i686.rpm�
�Vgstreamer1-plugins-good-1.18.4-6.el9.x86_64.rpm��Vgstreamer1-plugins-good-gtk-1.18.4-6.el9.i686.rpm��Vgstreamer1-plugins-good-gtk-1.18.4-6.el9.x86_64.rpm����k�3
	����EBBBBBBBBBBBsecurityModerate: bind security and bug fix update��z�J
https://access.redhat.com/errata/RHSA-2023:2261RHSA-2023:2261RHSA-2023:2261https://access.redhat.com/security/cve/CVE-2022-2795CVE-2022-2795CVE-2022-2795https://access.redhat.com/security/cve/CVE-2022-3094CVE-2022-3094CVE-2022-3094https://access.redhat.com/security/cve/CVE-2022-3736CVE-2022-3736CVE-2022-3736https://access.redhat.com/security/cve/CVE-2022-3924CVE-2022-3924CVE-2022-3924https://bugzilla.redhat.com/21285842128584https://bugzilla.redhat.com/21640322164032https://bugzilla.redhat.com/21640382164038https://bugzilla.redhat.com/21640392164039https://errata.almalinux.org/9/ALSA-2023-2261.htmlALSA-2023:2261ALSA-2023:2261
�"�bind-license-9.16.23-11.el9.noarch.rpm�'�python3-bind-9.16.23-11.el9.noarch.rpm�]�bind-libs-9.16.23-11.el9.x86_64.rpm�!�bind-dnssec-doc-9.16.23-11.el9.noarch.rpm�Z�bind-9.16.23-11.el9.x86_64.rpm�[�bind-chroot-9.16.23-11.el9.x86_64.rpm�\�bind-dnssec-utils-9.16.23-11.el9.x86_64.rpm�^�bind-utils-9.16.23-11.el9.x86_64.rpm�"�bind-license-9.16.23-11.el9.noarch.rpm�'�python3-bind-9.16.23-11.el9.noarch.rpm�]�bind-libs-9.16.23-11.el9.x86_64.rpm�!�bind-dnssec-doc-9.16.23-11.el9.noarch.rpm�Z�bind-9.16.23-11.el9.x86_64.rpm�[�bind-chroot-9.16.23-11.el9.x86_64.rpm�\�bind-dnssec-utils-9.16.23-11.el9.x86_64.rpm�^�bind-utils-9.16.23-11.el9.x86_64.rpm����f�4
	����SBBBBBBBBBsecurityModerate: podman security and bug fix update��D�Yhttps://access.redhat.com/errata/RHSA-2023:2282RHSA-2023:2282RHSA-2023:2282https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2282.htmlALSA-2023:2282ALSA-2023:2282
�2�podman-plugins-4.4.1-3.el9.x86_64.rpm�4�podman-tests-4.4.1-3.el9.x86_64.rpm�M�podman-gvproxy-4.4.1-3.el9.x86_64.rpm�3�podman-remote-4.4.1-3.el9.x86_64.rpmh�podman-docker-4.4.1-3.el9.noarch.rpm�1�podman-4.4.1-3.el9.x86_64.rpm�2�podman-plugins-4.4.1-3.el9.x86_64.rpm�4�podman-tests-4.4.1-3.el9.x86_64.rpm�M�podman-gvproxy-4.4.1-3.el9.x86_64.rpm�3�podman-remote-4.4.1-3.el9.x86_64.rpmh�podman-docker-4.4.1-3.el9.noarch.rpm�1�podman-4.4.1-3.el9.x86_64.rpm����n�5
	��#��_BBsecurityModerate: skopeo security and bug fix update���2https://access.redhat.com/errata/RHSA-2023:2283RHSA-2023:2283RHSA-2023:2283https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2283.htmlALSA-2023:2283ALSA-2023:2283
�d�.skopeo-tests-1.11.2-0.1.el9.x86_64.rpm�c�.skopeo-1.11.2-0.1.el9.x86_64.rpm�d�.skopeo-tests-1.11.2-0.1.el9.x86_64.rpm�c�.skopeo-1.11.2-0.1.el9.x86_64.rpm����(�6
	��.��dBBBBBBBBsecurityModerate: pki-core security, bug fix, and enhancement update��O�lhttps://access.redhat.com/errata/RHSA-2023:2293RHSA-2023:2293RHSA-2023:2293https://access.redhat.com/security/cve/CVE-2022-2393CVE-2022-2393CVE-2022-2393https://bugzilla.redhat.com/21010462101046https://errata.almalinux.org/9/ALSA-2023-2293.htmlALSA-2023:2293ALSA-2023:2293
	�X�&idm-pki-ca-11.3.0-1.el9.noarch.rpm�]�&idm-pki-tools-11.3.0-1.el9.x86_64.rpm�W�&idm-pki-base-11.3.0-1.el9.noarch.rpm�\�&idm-pki-server-11.3.0-1.el9.noarch.rpm�[�&idm-pki-kra-11.3.0-1.el9.noarch.rpm�
�&python3-idm-pki-11.3.0-1.el9.noarch.rpm�Y�&idm-pki-est-11.3.0-1.el9.noarch.rpm�Z�&idm-pki-java-11.3.0-1.el9.noarch.rpm�V�&idm-pki-acme-11.3.0-1.el9.noarch.rpm	�X�&idm-pki-ca-11.3.0-1.el9.noarch.rpm�]�&idm-pki-tools-11.3.0-1.el9.x86_64.rpm�W�&idm-pki-base-11.3.0-1.el9.noarch.rpm�\�&idm-pki-server-11.3.0-1.el9.noarch.rpm�[�&idm-pki-kra-11.3.0-1.el9.noarch.rpm�
�&python3-idm-pki-11.3.0-1.el9.noarch.rpm�Y�&idm-pki-est-11.3.0-1.el9.noarch.rpm�Z�&idm-pki-java-11.3.0-1.el9.noarch.rpm�V�&idm-pki-acme-11.3.0-1.el9.noarch.rpm����*�7
	��0��/securityModerate: jackson security update��;�!https://access.redhat.com/errata/RHSA-2023:2312RHSA-2023:2312RHSA-2023:2312https://access.redhat.com/security/cve/CVE-2020-36518CVE-2020-36518CVE-2020-36518https://bugzilla.redhat.com/20646982064698https://errata.almalinux.org/9/ALSA-2023-2312.htmlALSA-2023:2312ALSA-2023:2312
��kpki-jackson-databind-2.14.1-2.el9.noarch.rpm��kpki-jackson-databind-2.14.1-2.el9.noarch.rpm����\�8
	����qBBBBBBBBBBBBBBBBBBsecurityModerate: git security and bug fix update��\�5
https://access.redhat.com/errata/RHSA-2023:2319RHSA-2023:2319RHSA-2023:2319https://access.redhat.com/security/cve/CVE-2022-24765CVE-2022-24765CVE-2022-24765https://access.redhat.com/security/cve/CVE-2022-29187CVE-2022-29187CVE-2022-29187https://access.redhat.com/security/cve/CVE-2022-39253CVE-2022-39253CVE-2022-39253https://access.redhat.com/security/cve/CVE-2022-39260CVE-2022-39260CVE-2022-39260https://bugzilla.redhat.com/20734142073414https://bugzilla.redhat.com/21074392107439https://bugzilla.redhat.com/21374222137422https://bugzilla.redhat.com/21374232137423https://errata.almalinux.org/9/ALSA-2023-2319.htmlALSA-2023:2319ALSA-2023:2319
�"�git-email-2.39.1-1.el9.noarch.rpm� �git-all-2.39.1-1.el9.noarch.rpm�!�git-core-doc-2.39.1-1.el9.noarch.rpm�%�git-svn-2.39.1-1.el9.noarch.rpm�'�gitweb-2.39.1-1.el9.noarch.rpm�=�git-daemon-2.39.1-1.el9.x86_64.rpm�#�git-gui-2.39.1-1.el9.noarch.rpm�;�git-core-2.39.1-1.el9.x86_64.rpm�$�git-instaweb-2.39.1-1.el9.noarch.rpm�:�git-2.39.1-1.el9.x86_64.rpm�.�perl-Git-SVN-2.39.1-1.el9.noarch.rpm�-�perl-Git-2.39.1-1.el9.noarch.rpm�>�git-subtree-2.39.1-1.el9.x86_64.rpm�&�gitk-2.39.1-1.el9.noarch.rpm�<�git-credential-libsecret-2.39.1-1.el9.x86_64.rpm�"�git-email-2.39.1-1.el9.noarch.rpm� �git-all-2.39.1-1.el9.noarch.rpm�!�git-core-doc-2.39.1-1.el9.noarch.rpm�%�git-svn-2.39.1-1.el9.noarch.rpm�'�gitweb-2.39.1-1.el9.noarch.rpm�=�git-daemon-2.39.1-1.el9.x86_64.rpm�#�git-gui-2.39.1-1.el9.noarch.rpm�;�git-core-2.39.1-1.el9.x86_64.rpm�$�git-instaweb-2.39.1-1.el9.noarch.rpm�:�git-2.39.1-1.el9.x86_64.rpm�.�perl-Git-SVN-2.39.1-1.el9.noarch.rpm�-�perl-Git-2.39.1-1.el9.noarch.rpm�>�git-subtree-2.39.1-1.el9.x86_64.rpm�&�gitk-2.39.1-1.el9.noarch.rpm�<�git-credential-libsecret-2.39.1-1.el9.x86_64.rpm����`�9
	����FBBBBBBsecurityModerate: freerdp security update���fhttps://access.redhat.com/errata/RHSA-2023:2326RHSA-2023:2326RHSA-2023:2326https://access.redhat.com/security/cve/CVE-2022-39282CVE-2022-39282CVE-2022-39282https://access.redhat.com/security/cve/CVE-2022-39283CVE-2022-39283CVE-2022-39283https://access.redhat.com/security/cve/CVE-2022-39316CVE-2022-39316CVE-2022-39316https://access.redhat.com/security/cve/CVE-2022-39317CVE-2022-39317CVE-2022-39317https://access.redhat.com/security/cve/CVE-2022-39318CVE-2022-39318CVE-2022-39318https://access.redhat.com/security/cve/CVE-2022-39319CVE-2022-39319CVE-2022-39319https://access.redhat.com/security/cve/CVE-2022-39320CVE-2022-39320CVE-2022-39320https://access.redhat.com/security/cve/CVE-2022-39347CVE-2022-39347CVE-2022-39347https://access.redhat.com/security/cve/CVE-2022-41877CVE-2022-41877CVE-2022-41877https://bugzilla.redhat.com/21347132134713https://bugzilla.redhat.com/21347172134717https://bugzilla.redhat.com/21436422143642https://bugzilla.redhat.com/21436432143643https://bugzilla.redhat.com/21436442143644https://bugzilla.redhat.com/21436452143645https://bugzilla.redhat.com/21436462143646https://bugzilla.redhat.com/21436472143647https://bugzilla.redhat.com/21436482143648https://errata.almalinux.org/9/ALSA-2023-2326.htmlALSA-2023:2326ALSA-2023:2326
�h�qlibwinpr-2.4.1-5.el9.i686.rpm��qfreerdp-2.4.1-5.el9.x86_64.rpm�`�qfreerdp-libs-2.4.1-5.el9.i686.rpm�`�qfreerdp-libs-2.4.1-5.el9.x86_64.rpm�h�qlibwinpr-2.4.1-5.el9.x86_64.rpm�h�qlibwinpr-2.4.1-5.el9.i686.rpm��qfreerdp-2.4.1-5.el9.x86_64.rpm�`�qfreerdp-libs-2.4.1-5.el9.i686.rpm�`�qfreerdp-libs-2.4.1-5.el9.x86_64.rpm�h�qlibwinpr-2.4.1-5.el9.x86_64.rpm����%�:
	����OBBBBsecurityModerate: libtiff security update��w�>https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340
�D� libtiff-devel-4.4.0-7.el9.i686.rpm�C� libtiff-4.4.0-7.el9.x86_64.rpm�C� libtiff-4.4.0-7.el9.i686.rpm�D� libtiff-devel-4.4.0-7.el9.x86_64.rpm�D� libtiff-devel-4.4.0-7.el9.i686.rpm�C� libtiff-4.4.0-7.el9.x86_64.rpm�C� libtiff-4.4.0-7.el9.i686.rpm�D� libtiff-devel-4.4.0-7.el9.x86_64.rpm����8�;
	����VsecurityModerate: git-lfs security and bug fix update��5�Mhttps://access.redhat.com/errata/RHSA-2023:2357RHSA-2023:2357RHSA-2023:2357https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2357.htmlALSA-2023:2357ALSA-2023:2357
�l�xgit-lfs-3.2.0-1.el9.x86_64.rpm�l�xgit-lfs-3.2.0-1.el9.x86_64.rpm����p�<
	��"��YBBBBBBBsecurityModerate: emacs security and bug fix update���ahttps://access.redhat.com/errata/RHSA-2023:2366RHSA-2023:2366RHSA-2023:2366https://access.redhat.com/security/cve/CVE-2022-45939CVE-2022-45939CVE-2022-45939https://bugzilla.redhat.com/21493802149380https://errata.almalinux.org/9/ALSA-2023-2366.htmlALSA-2023:2366ALSA-2023:2366
�_�emacs-lucid-27.2-8.el9.x86_64.rpm�^�emacs-common-27.2-8.el9.x86_64.rpm�`�emacs-filesystem-27.2-8.el9.noarch.rpm�`�emacs-nox-27.2-8.el9.x86_64.rpm�]�emacs-27.2-8.el9.x86_64.rpm�_�emacs-lucid-27.2-8.el9.x86_64.rpm�^�emacs-common-27.2-8.el9.x86_64.rpm�`�emacs-filesystem-27.2-8.el9.noarch.rpm�`�emacs-nox-27.2-8.el9.x86_64.rpm�]�emacs-27.2-8.el9.x86_64.rpm����S�=
	��%��csecurityModerate: containernetworking-plugins security and bug fix update��c�https://access.redhat.com/errata/RHSA-2023:2367RHSA-2023:2367RHSA-2023:2367https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2367.htmlALSA-2023:2367ALSA-2023:2367
�_�containernetworking-plugins-1.2.0-1.el9.x86_64.rpm�_�containernetworking-plugins-1.2.0-1.el9.x86_64.rpm�����>
	��-��fBBBBBsecurityModerate: unbound security update��d�9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370
�U�unbound-1.16.2-3.el9.x86_64.rpm��unbound-libs-1.16.2-3.el9.x86_64.rpm��unbound-libs-1.16.2-3.el9.i686.rpm�P�python3-unbound-1.16.2-3.el9.x86_64.rpm�U�unbound-1.16.2-3.el9.x86_64.rpm��unbound-libs-1.16.2-3.el9.x86_64.rpm��unbound-libs-1.16.2-3.el9.i686.rpm�P�python3-unbound-1.16.2-3.el9.x86_64.rpm����F�?
	��3��nBBBsecurityModerate: wireshark security and bug fix update���4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373
��rwireshark-3.4.10-4.el9.x86_64.rpm�N�rwireshark-cli-3.4.10-4.el9.i686.rpm�N�rwireshark-cli-3.4.10-4.el9.x86_64.rpm��rwireshark-3.4.10-4.el9.x86_64.rpm�N�rwireshark-cli-3.4.10-4.el9.i686.rpm�N�rwireshark-cli-3.4.10-4.el9.x86_64.rpm�����@
	��5��4securityModerate: postgresql-jdbc security update��Q�https://access.redhat.com/errata/RHSA-2023:2378RHSA-2023:2378RHSA-2023:2378https://access.redhat.com/security/cve/CVE-2022-41946CVE-2022-41946CVE-2022-41946https://bugzilla.redhat.com/21533992153399https://errata.almalinux.org/9/ALSA-2023-2378.htmlALSA-2023:2378ALSA-2023:2378
�Z�postgresql-jdbc-42.2.27-1.el9.noarch.rpm�Z�postgresql-jdbc-42.2.27-1.el9.noarch.rpm�����A
	��(�~BBBBBBBB_B�RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update��c�Zhttps://access.redhat.com/errata/RHSA-2023:2417RHSA-2023:2417RHSA-2023:2417https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-2417.htmlALSA-2023:2417ALSA-2023:2417
��j�;*�Ephp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�U�(php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�	Ephp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�
Ephp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�
Ephp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�Ephp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm��j�;*�Ephp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�U�(php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�	Ephp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�
Ephp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�
Ephp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�Ephp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�Ephp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Ephp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm����b�B
	��:��iBBBBBBBBBBBBBBBsecurityModerate: net-snmp security and bug fix update��=�vhttps://access.redhat.com/errata/RHSA-2023:2444RHSA-2023:2444RHSA-2023:2444https://access.redhat.com/security/cve/CVE-2022-44792CVE-2022-44792CVE-2022-44792https://access.redhat.com/security/cve/CVE-2022-44793CVE-2022-44793CVE-2022-44793https://bugzilla.redhat.com/21418972141897https://bugzilla.redhat.com/21418982141898https://errata.almalinux.org/9/ALSA-2023-2444.htmlALSA-2023:2444ALSA-2023:2444

��net-snmp-5.9.1-9.el9.x86_64.rpm�@�net-snmp-devel-5.9.1-9.el9.i686.rpm�?�net-snmp-agent-libs-5.9.1-9.el9.i686.rpm��net-snmp-perl-5.9.1-9.el9.x86_64.rpm�@�net-snmp-devel-5.9.1-9.el9.x86_64.rpm�
�python3-net-snmp-5.9.1-9.el9.x86_64.rpm�	�net-snmp-utils-5.9.1-9.el9.x86_64.rpm�?�net-snmp-agent-libs-5.9.1-9.el9.x86_64.rpm�A�net-snmp-libs-5.9.1-9.el9.i686.rpm�A�net-snmp-libs-5.9.1-9.el9.x86_64.rpm
��net-snmp-5.9.1-9.el9.x86_64.rpm�@�net-snmp-devel-5.9.1-9.el9.i686.rpm�?�net-snmp-agent-libs-5.9.1-9.el9.i686.rpm��net-snmp-perl-5.9.1-9.el9.x86_64.rpm�@�net-snmp-devel-5.9.1-9.el9.x86_64.rpm�
�python3-net-snmp-5.9.1-9.el9.x86_64.rpm�	�net-snmp-utils-5.9.1-9.el9.x86_64.rpm�?�net-snmp-agent-libs-5.9.1-9.el9.x86_64.rpm�A�net-snmp-libs-5.9.1-9.el9.i686.rpm�A�net-snmp-libs-5.9.1-9.el9.x86_64.rpm�����C
	��>��{BsecurityModerate: libtpms security update��3�khttps://access.redhat.com/errata/RHSA-2023:2453RHSA-2023:2453RHSA-2023:2453https://access.redhat.com/security/cve/CVE-2023-1017CVE-2023-1017CVE-2023-1017https://access.redhat.com/security/cve/CVE-2023-1018CVE-2023-1018CVE-2023-1018https://bugzilla.redhat.com/21494162149416https://bugzilla.redhat.com/21494202149420https://errata.almalinux.org/9/ALSA-2023-2453.htmlALSA-2023:2453ALSA-2023:2453
�C�libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.i686.rpm�C�libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.x86_64.rpm�C�libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.i686.rpm�C�libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.x86_64.rpm����F�D
	����BBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update���SRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458
$�^kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm)�^rtla-5.14.0-284.11.1.el9_2.x86_64.rpm�^kernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm&�^kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm'�^perf-5.14.0-284.11.1.el9_2.x86_64.rpm%�^kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm#�^kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpm$�^kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm)�^rtla-5.14.0-284.11.1.el9_2.x86_64.rpm�^kernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm&�^kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm'�^perf-5.14.0-284.11.1.el9_2.x86_64.rpm%�^kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm#�^kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpm����X�E
	����MBsecurityLow: curl security update�6��q�"https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478
��libcurl-devel-7.76.1-23.el9.i686.rpm��libcurl-devel-7.76.1-23.el9.x86_64.rpm��libcurl-devel-7.76.1-23.el9.i686.rpm��libcurl-devel-7.76.1-23.el9.x86_64.rpm����b�F
	����QsecurityModerate: fwupd security and bug fix update���M
https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487
��efwupd-plugin-flashrom-1.8.10-2.el9.alma.x86_64.rpm��efwupd-plugin-flashrom-1.8.10-2.el9.alma.x86_64.rpm����}�G
	�� ��TBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update�6��`�https://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519
�O�Bsamba-krb5-printing-4.17.5-102.el9.x86_64.rpm�P�Bsamba-vfs-iouring-4.17.5-102.el9.x86_64.rpm�Q�Bsamba-winbind-clients-4.17.5-102.el9.x86_64.rpm�S�Bsamba-winexe-4.17.5-102.el9.x86_64.rpm�N�Bsamba-client-4.17.5-102.el9.x86_64.rpm�R�Bsamba-winbind-krb5-locator-4.17.5-102.el9.x86_64.rpm�O�Bsamba-krb5-printing-4.17.5-102.el9.x86_64.rpm�P�Bsamba-vfs-iouring-4.17.5-102.el9.x86_64.rpm�Q�Bsamba-winbind-clients-4.17.5-102.el9.x86_64.rpm�S�Bsamba-winexe-4.17.5-102.el9.x86_64.rpm�N�Bsamba-client-4.17.5-102.el9.x86_64.rpm�R�Bsamba-winbind-krb5-locator-4.17.5-102.el9.x86_64.rpm����V�H
	��&��aBBBsecurityLow: openssl security and bug fix update�6��d�phttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523
��oopenssl-perl-3.0.7-6.el9_2.x86_64.rpm��oopenssl-devel-3.0.7-6.el9_2.x86_64.rpm��oopenssl-devel-3.0.7-6.el9_2.i686.rpm��oopenssl-perl-3.0.7-6.el9_2.x86_64.rpm��oopenssl-devel-3.0.7-6.el9_2.x86_64.rpm��oopenssl-devel-3.0.7-6.el9_2.i686.rpm����C�I
	��)��gsecurityLow: libarchive security update�6��T�Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532
�*�bsdtar-3.5.3-4.el9.x86_64.rpm�*�bsdtar-3.5.3-4.el9.x86_64.rpm�����J
	��-��jBsecurityModerate: krb5 security, bug fix, and enhancement update��-�Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570
�d�*krb5-devel-1.20.1-8.el9.i686.rpm�d�*krb5-devel-1.20.1-8.el9.x86_64.rpm�d�*krb5-devel-1.20.1-8.el9.i686.rpm�d�*krb5-devel-1.20.1-8.el9.x86_64.rpm����)�K
	��0��nsecurityLow: lua security update�6���Rhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582
�}�7lua-5.4.4-3.el9.x86_64.rpm�}�7lua-5.4.4-3.el9.x86_64.rpm����k�L
	��9��qBBBBBBsecurityImportant: mysql security update��V�Lhttps://access.redhat.com/errata/RHSA-2023:2621RHSA-2023:2621RHSA-2023:2621https://access.redhat.com/security/cve/CVE-2022-21594CVE-2022-21594CVE-2022-21594https://access.redhat.com/security/cve/CVE-2022-21599CVE-2022-21599CVE-2022-21599https://access.redhat.com/security/cve/CVE-2022-21604CVE-2022-21604CVE-2022-21604https://access.redhat.com/security/cve/CVE-2022-21608CVE-2022-21608CVE-2022-21608https://access.redhat.com/security/cve/CVE-2022-21611CVE-2022-21611CVE-2022-21611https://access.redhat.com/security/cve/CVE-2022-21617CVE-2022-21617CVE-2022-21617https://access.redhat.com/security/cve/CVE-2022-21625CVE-2022-21625CVE-2022-21625https://access.redhat.com/security/cve/CVE-2022-21632CVE-2022-21632CVE-2022-21632https://access.redhat.com/security/cve/CVE-2022-21633CVE-2022-21633CVE-2022-21633https://access.redhat.com/security/cve/CVE-2022-21637CVE-2022-21637CVE-2022-21637https://access.redhat.com/security/cve/CVE-2022-21640CVE-2022-21640CVE-2022-21640https://access.redhat.com/security/cve/CVE-2022-39400CVE-2022-39400CVE-2022-39400https://access.redhat.com/security/cve/CVE-2022-39408CVE-2022-39408CVE-2022-39408https://access.redhat.com/security/cve/CVE-2022-39410CVE-2022-39410CVE-2022-39410https://access.redhat.com/security/cve/CVE-2023-21836CVE-2023-21836CVE-2023-21836https://access.redhat.com/security/cve/CVE-2023-21863CVE-2023-21863CVE-2023-21863https://access.redhat.com/security/cve/CVE-2023-21864CVE-2023-21864CVE-2023-21864https://access.redhat.com/security/cve/CVE-2023-21865CVE-2023-21865CVE-2023-21865https://access.redhat.com/security/cve/CVE-2023-21867CVE-2023-21867CVE-2023-21867https://access.redhat.com/security/cve/CVE-2023-21868CVE-2023-21868CVE-2023-21868https://access.redhat.com/security/cve/CVE-2023-21869CVE-2023-21869CVE-2023-21869https://access.redhat.com/security/cve/CVE-2023-21870CVE-2023-21870CVE-2023-21870https://access.redhat.com/security/cve/CVE-2023-21871CVE-2023-21871CVE-2023-21871https://access.redhat.com/security/cve/CVE-2023-21873CVE-2023-21873CVE-2023-21873https://access.redhat.com/security/cve/CVE-2023-21874CVE-2023-21874CVE-2023-21874https://access.redhat.com/security/cve/CVE-2023-21875CVE-2023-21875CVE-2023-21875https://access.redhat.com/security/cve/CVE-2023-21876CVE-2023-21876CVE-2023-21876https://access.redhat.com/security/cve/CVE-2023-21877CVE-2023-21877CVE-2023-21877https://access.redhat.com/security/cve/CVE-2023-21878CVE-2023-21878CVE-2023-21878https://access.redhat.com/security/cve/CVE-2023-21879CVE-2023-21879CVE-2023-21879https://access.redhat.com/security/cve/CVE-2023-21880CVE-2023-21880CVE-2023-21880https://access.redhat.com/security/cve/CVE-2023-21881CVE-2023-21881CVE-2023-21881https://access.redhat.com/security/cve/CVE-2023-21882CVE-2023-21882CVE-2023-21882https://access.redhat.com/security/cve/CVE-2023-21883CVE-2023-21883CVE-2023-21883https://access.redhat.com/security/cve/CVE-2023-21887CVE-2023-21887CVE-2023-21887https://access.redhat.com/security/cve/CVE-2023-21912CVE-2023-21912CVE-2023-21912https://access.redhat.com/security/cve/CVE-2023-21917CVE-2023-21917CVE-2023-21917https://bugzilla.redhat.com/21428612142861https://bugzilla.redhat.com/21428632142863https://bugzilla.redhat.com/21428652142865https://bugzilla.redhat.com/21428682142868https://bugzilla.redhat.com/21428692142869https://bugzilla.redhat.com/21428702142870https://bugzilla.redhat.com/21428712142871https://bugzilla.redhat.com/21428722142872https://bugzilla.redhat.com/21428732142873https://bugzilla.redhat.com/21428752142875https://bugzilla.redhat.com/21428772142877https://bugzilla.redhat.com/21428792142879https://bugzilla.redhat.com/21428802142880https://bugzilla.redhat.com/21428812142881https://bugzilla.redhat.com/21622682162268https://bugzilla.redhat.com/21622702162270https://bugzilla.redhat.com/21622712162271https://bugzilla.redhat.com/21622722162272https://bugzilla.redhat.com/21622742162274https://bugzilla.redhat.com/21622752162275https://bugzilla.redhat.com/21622762162276https://bugzilla.redhat.com/21622772162277https://bugzilla.redhat.com/21622782162278https://bugzilla.redhat.com/21622802162280https://bugzilla.redhat.com/21622812162281https://bugzilla.redhat.com/21622822162282https://bugzilla.redhat.com/21622832162283https://bugzilla.redhat.com/21622842162284https://bugzilla.redhat.com/21622852162285https://bugzilla.redhat.com/21622862162286https://bugzilla.redhat.com/21622872162287https://bugzilla.redhat.com/21622882162288https://bugzilla.redhat.com/21622892162289https://bugzilla.redhat.com/21622902162290https://bugzilla.redhat.com/21622912162291https://bugzilla.redhat.com/21881102188110https://bugzilla.redhat.com/21881122188112https://errata.almalinux.org/9/ALSA-2023-2621.htmlALSA-2023:2621ALSA-2023:2621
��Zmysql-errmsg-8.0.32-1.el9_2.x86_64.rpm��Zmysql-common-8.0.32-1.el9_2.x86_64.rpm�V�Zmysql-8.0.32-1.el9_2.x86_64.rpm�R�Zmysql-server-8.0.32-1.el9_2.x86_64.rpm��Zmysql-errmsg-8.0.32-1.el9_2.x86_64.rpm��Zmysql-common-8.0.32-1.el9_2.x86_64.rpm�V�Zmysql-8.0.32-1.el9_2.x86_64.rpm�R�Zmysql-server-8.0.32-1.el9_2.x86_64.rpm����i�M
	����zBBBBBBBsecurityImportant: emacs security update��U�,
https://access.redhat.com/errata/RHSA-2023:2626RHSA-2023:2626RHSA-2023:2626https://access.redhat.com/security/cve/CVE-2022-48337CVE-2022-48337CVE-2022-48337https://access.redhat.com/security/cve/CVE-2022-48338CVE-2022-48338CVE-2022-48338https://access.redhat.com/security/cve/CVE-2022-48339CVE-2022-48339CVE-2022-48339https://access.redhat.com/security/cve/CVE-2023-2491CVE-2023-2491CVE-2023-2491https://bugzilla.redhat.com/21719872171987https://bugzilla.redhat.com/21719882171988https://bugzilla.redhat.com/21719892171989https://bugzilla.redhat.com/21928732192873https://errata.almalinux.org/9/ALSA-2023-2626.htmlALSA-2023:2626ALSA-2023:2626
�_�emacs-lucid-27.2-8.el9_2.1.x86_64.rpm�^�emacs-common-27.2-8.el9_2.1.x86_64.rpm�`�emacs-nox-27.2-8.el9_2.1.x86_64.rpm�`�emacs-filesystem-27.2-8.el9_2.1.noarch.rpm�]�emacs-27.2-8.el9_2.1.x86_64.rpm�_�emacs-lucid-27.2-8.el9_2.1.x86_64.rpm�^�emacs-common-27.2-8.el9_2.1.x86_64.rpm�`�emacs-nox-27.2-8.el9_2.1.x86_64.rpm�`�emacs-filesystem-27.2-8.el9_2.1.noarch.rpm�]�emacs-27.2-8.el9_2.1.x86_64.rpm����`�N
	����DsecurityModerate: libreswan security update���_https://access.redhat.com/errata/RHSA-2023:2633RHSA-2023:2633RHSA-2023:2633https://access.redhat.com/security/cve/CVE-2023-23009CVE-2023-23009CVE-2023-23009https://bugzilla.redhat.com/21736102173610https://errata.almalinux.org/9/ALSA-2023-2633.htmlALSA-2023:2633ALSA-2023:2633
�J�libreswan-4.9-2.el9_2.x86_64.rpm�J�libreswan-4.9-2.el9_2.x86_64.rpm����v�O
	����GBBsecurityModerate: openssh security update��`�https://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645
��.pam_ssh_agent_auth-0.10.4-5.29.el9_2.x86_64.rpm��Popenssh-askpass-8.7p1-29.el9_2.x86_64.rpm��.pam_ssh_agent_auth-0.10.4-5.29.el9_2.x86_64.rpm��Popenssh-askpass-8.7p1-29.el9_2.x86_64.rpm����H�P
	����LBsecurityModerate: curl security update��h�(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650
��
libcurl-devel-7.76.1-23.el9_2.1.i686.rpm��
libcurl-devel-7.76.1-23.el9_2.1.x86_64.rpm��
libcurl-devel-7.76.1-23.el9_2.1.i686.rpm��
libcurl-devel-7.76.1-23.el9_2.1.x86_64.rpm����A�Q
	����PBBBBBBBBBBsecurityImportant: webkit2gtk3 security update���zhttps://access.redhat.com/errata/RHSA-2023:2653RHSA-2023:2653RHSA-2023:2653https://access.redhat.com/security/cve/CVE-2023-2203CVE-2023-2203CVE-2023-2203https://bugzilla.redhat.com/21885432188543https://errata.almalinux.org/9/ALSA-2023-2653.htmlALSA-2023:2653ALSA-2023:2653
1�.webkit2gtk3-devel-2.38.5-1.el9_2.1.x86_64.rpm0�.webkit2gtk3-2.38.5-1.el9_2.1.x86_64.rpm3�.webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.i686.rpm1�.webkit2gtk3-devel-2.38.5-1.el9_2.1.i686.rpm2�.webkit2gtk3-jsc-2.38.5-1.el9_2.1.i686.rpm3�.webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.x86_64.rpm2�.webkit2gtk3-jsc-2.38.5-1.el9_2.1.x86_64.rpm0�.webkit2gtk3-2.38.5-1.el9_2.1.i686.rpm1�.webkit2gtk3-devel-2.38.5-1.el9_2.1.x86_64.rpm0�.webkit2gtk3-2.38.5-1.el9_2.1.x86_64.rpm3�.webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.i686.rpm1�.webkit2gtk3-devel-2.38.5-1.el9_2.1.i686.rpm2�.webkit2gtk3-jsc-2.38.5-1.el9_2.1.i686.rpm3�.webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.x86_64.rpm2�.webkit2gtk3-jsc-2.38.5-1.el9_2.1.x86_64.rpm0�.webkit2gtk3-2.38.5-1.el9_2.1.i686.rpm����C�R
	��&�aB�E�xBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update��
�|https://access.redhat.com/errata/RHSA-2023:2654RHSA-2023:2654RHSA-2023:2654https://access.redhat.com/security/cve/CVE-2021-35065CVE-2021-35065CVE-2021-35065https://access.redhat.com/security/cve/CVE-2022-25881CVE-2022-25881CVE-2022-25881https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-23918CVE-2023-23918CVE-2023-23918https://access.redhat.com/security/cve/CVE-2023-23919CVE-2023-23919CVE-2023-23919https://access.redhat.com/security/cve/CVE-2023-23920CVE-2023-23920CVE-2023-23920https://access.redhat.com/security/cve/CVE-2023-23936CVE-2023-23936CVE-2023-23936https://access.redhat.com/security/cve/CVE-2023-24807CVE-2023-24807CVE-2023-24807https://bugzilla.redhat.com/21563242156324https://bugzilla.redhat.com/21658242165824https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/21719352171935https://bugzilla.redhat.com/21721702172170https://bugzilla.redhat.com/21721902172190https://bugzilla.redhat.com/21722042172204https://bugzilla.redhat.com/21722172172217https://errata.almalinux.org/9/ALSA-2023-2654.htmlALSA-2023:2654ALSA-2023:2654
,��<*d�>npm-9.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b.x86_64.rpm>�nodejs-docs-18.14.2-2.module_el9.2.0+29+de583a0b.noarch.rpm,�nodejs-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpml�Hnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm�#�nodejs-devel-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm,��<*d�>npm-9.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b.x86_64.rpm>�nodejs-docs-18.14.2-2.module_el9.2.0+29+de583a0b.noarch.rpm,�nodejs-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpml�Hnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm�#�nodejs-devel-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm�����S
	��1��gBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security, bug fix, and enhancement update���}https://access.redhat.com/errata/RHSA-2023:2655RHSA-2023:2655RHSA-2023:2655https://access.redhat.com/security/cve/CVE-2022-25881CVE-2022-25881CVE-2022-25881https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-23918CVE-2023-23918CVE-2023-23918https://access.redhat.com/security/cve/CVE-2023-23920CVE-2023-23920CVE-2023-23920https://access.redhat.com/security/cve/CVE-2023-23936CVE-2023-23936CVE-2023-23936https://access.redhat.com/security/cve/CVE-2023-24807CVE-2023-24807CVE-2023-24807https://bugzilla.redhat.com/21658242165824https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/21719352171935https://bugzilla.redhat.com/21721902172190https://bugzilla.redhat.com/21722042172204https://bugzilla.redhat.com/21722172172217https://errata.almalinux.org/9/ALSA-2023-2655.htmlALSA-2023:2655ALSA-2023:2655
��^nodejs-libs-16.19.1-1.el9_2.x86_64.rpmd�7npm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpme�^nodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm,�^nodejs-16.19.1-1.el9_2.x86_64.rpm��^nodejs-libs-16.19.1-1.el9_2.i686.rpm>�^nodejs-docs-16.19.1-1.el9_2.noarch.rpm��^nodejs-libs-16.19.1-1.el9_2.x86_64.rpmd�7npm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpme�^nodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm,�^nodejs-16.19.1-1.el9_2.x86_64.rpm��^nodejs-libs-16.19.1-1.el9_2.i686.rpm>�^nodejs-docs-16.19.1-1.el9_2.noarch.rpm����t�T
	��6��rBBsecurityImportant: firefox security update���https://access.redhat.com/errata/RHSA-2023:3143RHSA-2023:3143RHSA-2023:3143https://access.redhat.com/security/cve/CVE-2023-32205CVE-2023-32205CVE-2023-32205https://access.redhat.com/security/cve/CVE-2023-32206CVE-2023-32206CVE-2023-32206https://access.redhat.com/security/cve/CVE-2023-32207CVE-2023-32207CVE-2023-32207https://access.redhat.com/security/cve/CVE-2023-32211CVE-2023-32211CVE-2023-32211https://access.redhat.com/security/cve/CVE-2023-32212CVE-2023-32212CVE-2023-32212https://access.redhat.com/security/cve/CVE-2023-32213CVE-2023-32213CVE-2023-32213https://access.redhat.com/security/cve/CVE-2023-32215CVE-2023-32215CVE-2023-32215https://bugzilla.redhat.com/21967362196736https://bugzilla.redhat.com/21967372196737https://bugzilla.redhat.com/21967382196738https://bugzilla.redhat.com/21967402196740https://bugzilla.redhat.com/21967412196741https://bugzilla.redhat.com/21967422196742https://bugzilla.redhat.com/21967532196753https://errata.almalinux.org/9/ALSA-2023-3143.htmlALSA-2023:3143ALSA-2023:3143
P�|firefox-x11-102.11.0-2.el9_2.alma.x86_64.rpm8�|firefox-102.11.0-2.el9_2.alma.x86_64.rpmP�|firefox-x11-102.11.0-2.el9_2.alma.x86_64.rpm8�|firefox-102.11.0-2.el9_2.alma.x86_64.rpm�����U
	����wBBBBBBBBBBBBBBBBBBBsecurityImportant: apr-util security update���%https://access.redhat.com/errata/RHSA-2023:3147RHSA-2023:3147RHSA-2023:3147https://access.redhat.com/security/cve/CVE-2022-25147CVE-2022-25147CVE-2022-25147https://bugzilla.redhat.com/21696522169652https://errata.almalinux.org/9/ALSA-2023-3147.htmlALSA-2023:3147ALSA-2023:3147
�!�5apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm�q�5apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpm� �5apr-util-1.6.1-20.el9_2.1.i686.rpm� �5apr-util-1.6.1-20.el9_2.1.x86_64.rpm�s�5apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpm�"�5apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm�u�5apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm�r�5apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpm�!�5apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm�t�5apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm�p�5apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpm�"�5apr-util-devel-1.6.1-20.el9_2.1.i686.rpm�!�5apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm�q�5apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpm� �5apr-util-1.6.1-20.el9_2.1.i686.rpm� �5apr-util-1.6.1-20.el9_2.1.x86_64.rpm�s�5apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpm�"�5apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm�u�5apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm�r�5apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpm�!�5apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm�t�5apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm�p�5apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpm�"�5apr-util-devel-1.6.1-20.el9_2.1.i686.rpm����?�V
	����MsecurityImportant: libreswan security update��<�Nhttps://access.redhat.com/errata/RHSA-2023:3148RHSA-2023:3148RHSA-2023:3148https://access.redhat.com/security/cve/CVE-2023-2295CVE-2023-2295CVE-2023-2295https://bugzilla.redhat.com/21897772189777https://errata.almalinux.org/9/ALSA-2023-3148.htmlALSA-2023:3148ALSA-2023:3148
�J�libreswan-4.9-4.el9_2.x86_64.rpm�J�libreswan-4.9-4.el9_2.x86_64.rpm����m�W
	����PsecurityImportant: thunderbird security update��
�chttps://access.redhat.com/errata/RHSA-2023:3150RHSA-2023:3150RHSA-2023:3150https://access.redhat.com/security/cve/CVE-2023-32205CVE-2023-32205CVE-2023-32205https://access.redhat.com/security/cve/CVE-2023-32206CVE-2023-32206CVE-2023-32206https://access.redhat.com/security/cve/CVE-2023-32207CVE-2023-32207CVE-2023-32207https://access.redhat.com/security/cve/CVE-2023-32211CVE-2023-32211CVE-2023-32211https://access.redhat.com/security/cve/CVE-2023-32212CVE-2023-32212CVE-2023-32212https://access.redhat.com/security/cve/CVE-2023-32213CVE-2023-32213CVE-2023-32213https://access.redhat.com/security/cve/CVE-2023-32215CVE-2023-32215CVE-2023-32215https://bugzilla.redhat.com/21967362196736https://bugzilla.redhat.com/21967372196737https://bugzilla.redhat.com/21967382196738https://bugzilla.redhat.com/21967402196740https://bugzilla.redhat.com/21967412196741https://bugzilla.redhat.com/21967422196742https://bugzilla.redhat.com/21967532196753https://errata.almalinux.org/9/ALSA-2023-3150.htmlALSA-2023:3150ALSA-2023:3150
9�nthunderbird-102.11.0-1.el9_2.alma.x86_64.rpm9�nthunderbird-102.11.0-1.el9_2.alma.x86_64.rpm����m�X
	��'��SBBBBBBBBBBBBBBBBBBsecurityImportant: git security update��m�https://access.redhat.com/errata/RHSA-2023:3245RHSA-2023:3245RHSA-2023:3245https://access.redhat.com/security/cve/CVE-2023-22490CVE-2023-22490CVE-2023-22490https://access.redhat.com/security/cve/CVE-2023-23946CVE-2023-23946CVE-2023-23946https://access.redhat.com/security/cve/CVE-2023-25652CVE-2023-25652CVE-2023-25652https://access.redhat.com/security/cve/CVE-2023-25815CVE-2023-25815CVE-2023-25815https://access.redhat.com/security/cve/CVE-2023-29007CVE-2023-29007CVE-2023-29007https://bugzilla.redhat.com/21681602168160https://bugzilla.redhat.com/21681612168161https://bugzilla.redhat.com/21883332188333https://bugzilla.redhat.com/21883372188337https://bugzilla.redhat.com/21883382188338https://errata.almalinux.org/9/ALSA-2023-3245.htmlALSA-2023:3245ALSA-2023:3245
�;�git-core-2.39.3-1.el9_2.x86_64.rpm�&�gitk-2.39.3-1.el9_2.noarch.rpm�%�git-svn-2.39.3-1.el9_2.noarch.rpm�!�git-core-doc-2.39.3-1.el9_2.noarch.rpm� �git-all-2.39.3-1.el9_2.noarch.rpm�>�git-subtree-2.39.3-1.el9_2.x86_64.rpm�=�git-daemon-2.39.3-1.el9_2.x86_64.rpm�$�git-instaweb-2.39.3-1.el9_2.noarch.rpm�:�git-2.39.3-1.el9_2.x86_64.rpm�'�gitweb-2.39.3-1.el9_2.noarch.rpm�"�git-email-2.39.3-1.el9_2.noarch.rpm�<�git-credential-libsecret-2.39.3-1.el9_2.x86_64.rpm�-�perl-Git-2.39.3-1.el9_2.noarch.rpm�.�perl-Git-SVN-2.39.3-1.el9_2.noarch.rpm�#�git-gui-2.39.3-1.el9_2.noarch.rpm�;�git-core-2.39.3-1.el9_2.x86_64.rpm�&�gitk-2.39.3-1.el9_2.noarch.rpm�%�git-svn-2.39.3-1.el9_2.noarch.rpm�!�git-core-doc-2.39.3-1.el9_2.noarch.rpm� �git-all-2.39.3-1.el9_2.noarch.rpm�>�git-subtree-2.39.3-1.el9_2.x86_64.rpm�=�git-daemon-2.39.3-1.el9_2.x86_64.rpm�$�git-instaweb-2.39.3-1.el9_2.noarch.rpm�:�git-2.39.3-1.el9_2.x86_64.rpm�'�gitweb-2.39.3-1.el9_2.noarch.rpm�"�git-email-2.39.3-1.el9_2.noarch.rpm�<�git-credential-libsecret-2.39.3-1.el9_2.x86_64.rpm�-�perl-Git-2.39.3-1.el9_2.noarch.rpm�.�perl-Git-SVN-2.39.3-1.el9_2.noarch.rpm�#�git-gui-2.39.3-1.el9_2.noarch.rpm����x�Y
	��4��hBBBBBBBBBBsecurityImportant: go-toolset and golang security update��p�Uhttps://access.redhat.com/errata/RHSA-2023:3318RHSA-2023:3318RHSA-2023:3318https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://bugzilla.redhat.com/21960272196027https://errata.almalinux.org/9/ALSA-2023-3318.htmlALSA-2023:3318ALSA-2023:3318
�G�golang-1.19.9-2.el9_2.x86_64.rpm�H�golang-bin-1.19.9-2.el9_2.x86_64.rpmp�golang-tests-1.19.9-2.el9_2.noarch.rpm�T�golang-race-1.19.9-2.el9_2.x86_64.rpmo�golang-src-1.19.9-2.el9_2.noarch.rpmm�golang-docs-1.19.9-2.el9_2.noarch.rpm�N�Mgo-toolset-1.19.9-1.el9_2.x86_64.rpmn�golang-misc-1.19.9-2.el9_2.noarch.rpm�G�golang-1.19.9-2.el9_2.x86_64.rpm�H�golang-bin-1.19.9-2.el9_2.x86_64.rpmp�golang-tests-1.19.9-2.el9_2.noarch.rpm�T�golang-race-1.19.9-2.el9_2.x86_64.rpmo�golang-src-1.19.9-2.el9_2.noarch.rpmm�golang-docs-1.19.9-2.el9_2.noarch.rpm�N�Mgo-toolset-1.19.9-1.el9_2.x86_64.rpmn�golang-misc-1.19.9-2.el9_2.noarch.rpm����r�Z
	��:��uBBBsecurityImportant: cups-filters security update��E�ihttps://access.redhat.com/errata/RHSA-2023:3423RHSA-2023:3423RHSA-2023:3423https://access.redhat.com/security/cve/CVE-2023-24805CVE-2023-24805CVE-2023-24805https://bugzilla.redhat.com/22030512203051https://errata.almalinux.org/9/ALSA-2023-3423.htmlALSA-2023:3423ALSA-2023:3423
�#�acups-filters-libs-1.28.7-11.el9_2.1.i686.rpm�#�acups-filters-libs-1.28.7-11.el9_2.1.x86_64.rpm�H�acups-filters-1.28.7-11.el9_2.1.x86_64.rpm�#�acups-filters-libs-1.28.7-11.el9_2.1.i686.rpm�#�acups-filters-libs-1.28.7-11.el9_2.1.x86_64.rpm�H�acups-filters-1.28.7-11.el9_2.1.x86_64.rpm�����[
	����{BBBBBBBBBBsecurityImportant: webkit2gtk3 security update��.�^https://access.redhat.com/errata/RHSA-2023:3432RHSA-2023:3432RHSA-2023:3432https://access.redhat.com/security/cve/CVE-2023-28204CVE-2023-28204CVE-2023-28204https://access.redhat.com/security/cve/CVE-2023-32373CVE-2023-32373CVE-2023-32373https://bugzilla.redhat.com/22092082209208https://bugzilla.redhat.com/22092142209214https://errata.almalinux.org/9/ALSA-2023-3432.htmlALSA-2023:3432ALSA-2023:3432
0�/webkit2gtk3-2.38.5-1.el9_2.2.i686.rpm2�/webkit2gtk3-jsc-2.38.5-1.el9_2.2.i686.rpm1�/webkit2gtk3-devel-2.38.5-1.el9_2.2.x86_64.rpm1�/webkit2gtk3-devel-2.38.5-1.el9_2.2.i686.rpm0�/webkit2gtk3-2.38.5-1.el9_2.2.x86_64.rpm3�/webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.i686.rpm3�/webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.x86_64.rpm2�/webkit2gtk3-jsc-2.38.5-1.el9_2.2.x86_64.rpm0�/webkit2gtk3-2.38.5-1.el9_2.2.i686.rpm2�/webkit2gtk3-jsc-2.38.5-1.el9_2.2.i686.rpm1�/webkit2gtk3-devel-2.38.5-1.el9_2.2.x86_64.rpm1�/webkit2gtk3-devel-2.38.5-1.el9_2.2.i686.rpm0�/webkit2gtk3-2.38.5-1.el9_2.2.x86_64.rpm3�/webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.i686.rpm3�/webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.x86_64.rpm2�/webkit2gtk3-jsc-2.38.5-1.el9_2.2.x86_64.rpm����|�\
	����HBsecurityImportant: c-ares security update���https://access.redhat.com/errata/RHSA-2023:3559RHSA-2023:3559RHSA-2023:3559https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3559.htmlALSA-2023:3559ALSA-2023:3559
�5�%c-ares-devel-1.17.1-5.el9_2.1.i686.rpm�5�%c-ares-devel-1.17.1-5.el9_2.1.x86_64.rpm�5�%c-ares-devel-1.17.1-5.el9_2.1.i686.rpm�5�%c-ares-devel-1.17.1-5.el9_2.1.x86_64.rpm����|�]
	���aB�E�gBBBBBBBsecurityImportant: nodejs:18 security update���
https://access.redhat.com/errata/RHSA-2023:3577RHSA-2023:3577RHSA-2023:3577https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3577.htmlALSA-2023:3577ALSA-2023:3577
,��=*>�nodejs-docs-18.14.2-3.module_el9.2.0+30+e3312493.noarch.rpm,�nodejs-18.14.2-3.module_el9.2.0+30+e3312493.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.14.2-3.module_el9.2.0+30+e3312493.x86_64.rpmd�?npm-9.5.0-1.18.14.2.3.module_el9.2.0+30+e3312493.x86_64.rpm�#�nodejs-devel-18.14.2-3.module_el9.2.0+30+e3312493.x86_64.rpml�Hnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm,��=*>�nodejs-docs-18.14.2-3.module_el9.2.0+30+e3312493.noarch.rpm,�nodejs-18.14.2-3.module_el9.2.0+30+e3312493.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.14.2-3.module_el9.2.0+30+e3312493.x86_64.rpmd�?npm-9.5.0-1.18.14.2.3.module_el9.2.0+30+e3312493.x86_64.rpm�#�nodejs-devel-18.14.2-3.module_el9.2.0+30+e3312493.x86_64.rpml�Hnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm����o�^
	��&��VBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement update���
https://access.redhat.com/errata/RHSA-2023:3581RHSA-2023:3581RHSA-2023:3581https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3581.htmlALSA-2023:3581ALSA-2023:3581
�R�Idotnet-targeting-pack-6.0-6.0.18-1.el9_2.x86_64.rpm�N�Idotnet-apphost-pack-6.0-6.0.18-1.el9_2.x86_64.rpm�Q�Vdotnet-sdk-6.0-6.0.118-1.el9_2.x86_64.rpm�L�Iaspnetcore-runtime-6.0-6.0.18-1.el9_2.x86_64.rpm�O�Idotnet-hostfxr-6.0-6.0.18-1.el9_2.x86_64.rpm�S�Vdotnet-templates-6.0-6.0.118-1.el9_2.x86_64.rpm�M�Iaspnetcore-targeting-pack-6.0-6.0.18-1.el9_2.x86_64.rpm�P�Idotnet-runtime-6.0-6.0.18-1.el9_2.x86_64.rpm�R�Idotnet-targeting-pack-6.0-6.0.18-1.el9_2.x86_64.rpm�N�Idotnet-apphost-pack-6.0-6.0.18-1.el9_2.x86_64.rpm�Q�Vdotnet-sdk-6.0-6.0.118-1.el9_2.x86_64.rpm�L�Iaspnetcore-runtime-6.0-6.0.18-1.el9_2.x86_64.rpm�O�Idotnet-hostfxr-6.0-6.0.18-1.el9_2.x86_64.rpm�S�Vdotnet-templates-6.0-6.0.118-1.el9_2.x86_64.rpm�M�Iaspnetcore-targeting-pack-6.0-6.0.18-1.el9_2.x86_64.rpm�P�Idotnet-runtime-6.0-6.0.18-1.el9_2.x86_64.rpm����0�_
	��1��gBBBBBBBBsecurityImportant: python3.11 security update��,�yhttps://access.redhat.com/errata/RHSA-2023:3585RHSA-2023:3585RHSA-2023:3585https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3585.htmlALSA-2023:3585ALSA-2023:3585
�Q�$python3.11-tkinter-3.11.2-2.el9_2.1.x86_64.rpm[�$python3.11-devel-3.11.2-2.el9_2.1.x86_64.rpm[�$python3.11-devel-3.11.2-2.el9_2.1.i686.rpm�P�$python3.11-3.11.2-2.el9_2.1.x86_64.rpm\�$python3.11-libs-3.11.2-2.el9_2.1.x86_64.rpm\�$python3.11-libs-3.11.2-2.el9_2.1.i686.rpm�Q�$python3.11-tkinter-3.11.2-2.el9_2.1.x86_64.rpm[�$python3.11-devel-3.11.2-2.el9_2.1.x86_64.rpm[�$python3.11-devel-3.11.2-2.el9_2.1.i686.rpm�P�$python3.11-3.11.2-2.el9_2.1.x86_64.rpm\�$python3.11-libs-3.11.2-2.el9_2.1.x86_64.rpm\�$python3.11-libs-3.11.2-2.el9_2.1.i686.rpm�����`
	��<��rBBBBBBBBsecurityImportant: nodejs security update��%�
https://access.redhat.com/errata/RHSA-2023:3586RHSA-2023:3586RHSA-2023:3586https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3586.htmlALSA-2023:3586ALSA-2023:3586
e�_nodejs-full-i18n-16.19.1-2.el9_2.x86_64.rpm��_nodejs-libs-16.19.1-2.el9_2.x86_64.rpm��_nodejs-libs-16.19.1-2.el9_2.i686.rpmd�8npm-8.19.3-1.16.19.1.2.el9_2.x86_64.rpm>�_nodejs-docs-16.19.1-2.el9_2.noarch.rpm,�_nodejs-16.19.1-2.el9_2.x86_64.rpme�_nodejs-full-i18n-16.19.1-2.el9_2.x86_64.rpm��_nodejs-libs-16.19.1-2.el9_2.x86_64.rpm��_nodejs-libs-16.19.1-2.el9_2.i686.rpmd�8npm-8.19.3-1.16.19.1.2.el9_2.x86_64.rpm>�_nodejs-docs-16.19.1-2.el9_2.noarch.rpm,�_nodejs-16.19.1-2.el9_2.x86_64.rpm�����a
	��?��}securityImportant: thunderbird security update��3�zhttps://access.redhat.com/errata/RHSA-2023:3587RHSA-2023:3587RHSA-2023:3587https://access.redhat.com/security/cve/CVE-2023-34414CVE-2023-34414CVE-2023-34414https://access.redhat.com/security/cve/CVE-2023-34416CVE-2023-34416CVE-2023-34416https://bugzilla.redhat.com/22128412212841https://bugzilla.redhat.com/22128422212842https://errata.almalinux.org/9/ALSA-2023-3587.htmlALSA-2023:3587ALSA-2023:3587
9�[thunderbird-102.12.0-1.el9_2.alma.x86_64.rpm9�[thunderbird-102.12.0-1.el9_2.alma.x86_64.rpm��ΝZ�b
	����@BBsecurityImportant: firefox security update��-�+https://access.redhat.com/errata/RHSA-2023:3589RHSA-2023:3589RHSA-2023:3589https://access.redhat.com/security/cve/CVE-2023-34414CVE-2023-34414CVE-2023-34414https://access.redhat.com/security/cve/CVE-2023-34416CVE-2023-34416CVE-2023-34416https://bugzilla.redhat.com/22128412212841https://bugzilla.redhat.com/22128422212842https://errata.almalinux.org/9/ALSA-2023-3589.htmlALSA-2023:3589ALSA-2023:3589
8�[firefox-102.12.0-1.el9_2.alma.x86_64.rpmP�[firefox-x11-102.12.0-1.el9_2.alma.x86_64.rpm8�[firefox-102.12.0-1.el9_2.alma.x86_64.rpmP�[firefox-x11-102.12.0-1.el9_2.alma.x86_64.rpm��Κ{�c
	����EBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement update��X�https://access.redhat.com/errata/RHSA-2023:3592RHSA-2023:3592RHSA-2023:3592https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-32032CVE-2023-32032CVE-2023-32032https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126152212615https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3592.htmlALSA-2023:3592ALSA-2023:3592

�{�Odotnet-runtime-7.0-7.0.7-1.el9_2.x86_64.rpm�}�Odotnet-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpm�x�Oaspnetcore-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpm�~�	dotnet-templates-7.0-7.0.107-1.el9_2.x86_64.rpm�"�	netstandard-targeting-pack-2.1-7.0.107-1.el9_2.x86_64.rpm�y�Odotnet-apphost-pack-7.0-7.0.7-1.el9_2.x86_64.rpm�w�Oaspnetcore-runtime-7.0-7.0.7-1.el9_2.x86_64.rpm�!�Odotnet-host-7.0.7-1.el9_2.x86_64.rpm�|�	dotnet-sdk-7.0-7.0.107-1.el9_2.x86_64.rpm�z�Odotnet-hostfxr-7.0-7.0.7-1.el9_2.x86_64.rpm
�{�Odotnet-runtime-7.0-7.0.7-1.el9_2.x86_64.rpm�}�Odotnet-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpm�x�Oaspnetcore-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpm�~�	dotnet-templates-7.0-7.0.107-1.el9_2.x86_64.rpm�"�	netstandard-targeting-pack-2.1-7.0.107-1.el9_2.x86_64.rpm�y�Odotnet-apphost-pack-7.0-7.0.7-1.el9_2.x86_64.rpm�w�Oaspnetcore-runtime-7.0-7.0.7-1.el9_2.x86_64.rpm�!�Odotnet-host-7.0.7-1.el9_2.x86_64.rpm�|�	dotnet-sdk-7.0-7.0.107-1.el9_2.x86_64.rpm�z�Odotnet-hostfxr-7.0-7.0.7-1.el9_2.x86_64.rpm����!�d
	�� ��ZBBBBsecurityImportant: python3.9 security update��_�+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595
Q�python3-devel-3.9.16-1.el9_2.1.x86_64.rpmQ�python3-devel-3.9.16-1.el9_2.1.i686.rpmf�python-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm�+�python3-tkinter-3.9.16-1.el9_2.1.x86_64.rpmQ�python3-devel-3.9.16-1.el9_2.1.x86_64.rpmQ�python3-devel-3.9.16-1.el9_2.1.i686.rpmf�python-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm�+�python3-tkinter-3.9.16-1.el9_2.1.x86_64.rpm����}�e
	��(��aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: texlive security update��
�
https://access.redhat.com/errata/RHSA-2023:3661RHSA-2023:3661RHSA-2023:3661https://access.redhat.com/security/cve/CVE-2023-32700CVE-2023-32700CVE-2023-32700https://bugzilla.redhat.com/22089432208943https://errata.almalinux.org/9/ALSA-2023-3661.htmlALSA-2023:3661ALSA-2023:3661
�r�texlive-cm-lgc-20200406-26.el9_2.noarch.rpm�jtexlive-tex-ini-files-20200406-26.el9_2.noarch.rpm�qtexlive-texlive.infra-20200406-26.el9_2.noarch.rpm�]texlive-soul-20200406-26.el9_2.noarch.rpm�texlive-colortbl-20200406-26.el9_2.noarch.rpm�stexlive-textpos-20200406-26.el9_2.noarch.rpm�texlive-marvosym-20200406-26.el9_2.noarch.rpm�itexlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm�]texlive-jadetex-20200406-26.el9_2.noarch.rpm�-texlive-fancyhdr-20200406-26.el9_2.noarch.rpm�texlive-mathspec-20200406-26.el9_2.noarch.rpm�ctexlive-koma-script-20200406-26.el9_2.noarch.rpm�texlive-ulem-20200406-26.el9_2.noarch.rpm�btexlive-makeindex-20200406-26.el9_2.x86_64.rpm�Xtexlive-sectsty-20200406-26.el9_2.noarch.rpm�texlive-mptopdf-20200406-26.el9_2.noarch.rpm�[texlive-infwarerr-20200406-26.el9_2.noarch.rpm�Ltexlive-helvetic-20200406-26.el9_2.noarch.rpm�ctexlive-svn-prov-20200406-26.el9_2.noarch.rpm�=texlive-pst-coil-20200406-26.el9_2.noarch.rpm�ttexlive-threeparttable-20200406-26.el9_2.noarch.rpm�gtexlive-tabulary-20200406-26.el9_2.noarch.rpm�4texlive-fixlatvian-20200406-26.el9_2.noarch.rpm�=texlive-footmisc-20200406-26.el9_2.noarch.rpm�Ytexlive-import-20200406-26.el9_2.noarch.rpm�ytexlive-titling-20200406-26.el9_2.noarch.rpm�Ntexlive-hologo-20200406-26.el9_2.noarch.rpm�texlive-needspace-20200406-26.el9_2.noarch.rpm�texlive-mflogo-font-20200406-26.el9_2.noarch.rpm�Qtexlive-hyph-utf8-20200406-26.el9_2.noarch.rpm�btexlive-knuth-local-20200406-26.el9_2.noarch.rpm�~texlive-txfonts-20200406-26.el9_2.noarch.rpm�Mtexlive-ragged2e-20200406-26.el9_2.noarch.rpm�Mtexlive-hobsub-20200406-26.el9_2.noarch.rpm�\texlive-showexpl-20200406-26.el9_2.noarch.rpm�"texlive-xifthen-20200406-26.el9_2.noarch.rpm�ltexlive-latex-20200406-26.el9_2.noarch.rpm�stexlive-linegoal-20200406-26.el9_2.noarch.rpm�texlive-context-20200406-26.el9_2.noarch.rpm�atexlive-luatex-20200406-26.el9_2.x86_64.rpm�Ztexlive-appendix-20200406-26.el9_2.noarch.rpm� texlive-eqparbox-20200406-26.el9_2.noarch.rpm�Otexlive-realscripts-20200406-26.el9_2.noarch.rpm�ztexlive-tocloft-20200406-26.el9_2.noarch.rpm�texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm�gtexlive-l3backend-20200406-26.el9_2.noarch.rpm�Vtexlive-amsfonts-20200406-26.el9_2.noarch.rpm�Dtexlive-pst-slpe-20200406-26.el9_2.noarch.rpm�texlive-modes-20200406-26.el9_2.noarch.rpm�0texlive-philokalia-20200406-26.el9_2.noarch.rpm�texlive-ms-20200406-26.el9_2.noarch.rpm�itexlive-xdvi-20200406-26.el9_2.x86_64.rpm� texlive-notoccite-20200406-26.el9_2.noarch.rpm�ltexlive-texlive-docindex-20200406-26.el9_2.noarch.rpm�texlive-lib-20200406-26.el9_2.x86_64.rpm�	texlive-mathtools-20200406-26.el9_2.noarch.rpm�Ytexlive-anysize-20200406-26.el9_2.noarch.rpm�texlive-classpack-20200406-26.el9_2.noarch.rpm�Ktexlive-hanging-20200406-26.el9_2.noarch.rpm�&texlive-xmltexconfig-20200406-26.el9_2.noarch.rpm�
texlive-mflogo-20200406-26.el9_2.noarch.rpm�texlive-upquote-20200406-26.el9_2.noarch.rpm�_texlive-kastrup-20200406-26.el9_2.noarch.rpm�Ttexlive-hyphenex-20200406-26.el9_2.noarch.rpm�+texlive-extsizes-20200406-26.el9_2.noarch.rpm�dtexlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm�rtexlive-booktabs-20200406-26.el9_2.noarch.rpm�Wtexlive-amsmath-20200406-26.el9_2.noarch.rpm�!texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm�vtexlive-times-20200406-26.el9_2.noarch.rpm�mtexlive-texlive-en-20200406-26.el9_2.noarch.rpm�texlive-datetime-20200406-26.el9_2.noarch.rpm�`texlive-atveryend-20200406-26.el9_2.noarch.rpm�mtexlive-bigfoot-20200406-26.el9_2.noarch.rpm�'texlive-parallel-20200406-26.el9_2.noarch.rpm�4texlive-powerdot-20200406-26.el9_2.noarch.rpm�(texlive-euler-20200406-26.el9_2.noarch.rpm�;texlive-pst-arrow-20200406-26.el9_2.noarch.rpm�8texlive-fontawesome-20200406-26.el9_2.noarch.rpm�Dtexlive-gettitlestring-20200406-26.el9_2.noarch.rpm�Ktexlive-pxfonts-20200406-26.el9_2.noarch.rpm�?texlive-fp-20200406-26.el9_2.noarch.rpm�#texlive-etex-pkg-20200406-26.el9_2.noarch.rpm�texlive-metalogo-20200406-26.el9_2.noarch.rpm�)texlive-passivetex-20200406-26.el9_2.noarch.rpm�otexlive-texlive-scripts-20200406-26.el9_2.noarch.rpm�otexlive-latexbug-20200406-26.el9_2.noarch.rpm�utexlive-thumbpdf-20200406-26.el9_2.noarch.rpm�/texlive-fancyvrb-20200406-26.el9_2.noarch.rpm�texlive-xesearch-20200406-26.el9_2.noarch.rpm�texlive-multirow-20200406-26.el9_2.noarch.rpm�texlive-xetex-itrans-20200406-26.el9_2.noarch.rpm�texlive-mathpazo-20200406-26.el9_2.noarch.rpm�texlive-manfnt-font-20200406-26.el9_2.noarch.rpm�Wtexlive-ifplatform-20200406-26.el9_2.noarch.rpm�	texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpm�*texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm�etexlive-babel-english-20200406-26.el9_2.noarch.rpm�1texlive-filehook-20200406-26.el9_2.noarch.rpm�Ttexlive-sansmathaccent-20200406-26.el9_2.noarch.rpm�+texlive-pdfescape-20200406-26.el9_2.noarch.rpm�dtexlive-metapost-20200406-26.el9_2.x86_64.rpm�ptexlive-bookman-20200406-26.el9_2.noarch.rpm�>texlive-pst-eps-20200406-26.el9_2.noarch.rpm�Ttexlive-alphalph-20200406-26.el9_2.noarch.rpm�texlive-cns-20200406-26.el9_2.noarch.rpm�texlive-enctex-20200406-26.el9_2.noarch.rpm�.texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm�texlive-xeindex-20200406-26.el9_2.noarch.rpm�dtexlive-babel-20200406-26.el9_2.noarch.rpm�texlive-luaotfload-20200406-26.el9_2.noarch.rpm�texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpm�texlive-norasi-c90-20200406-26.el9_2.noarch.rpm�texlive-currfile-20200406-26.el9_2.noarch.rpm�Ftexlive-graphics-20200406-26.el9_2.noarch.rpm�texlive-epstopdf-20200406-26.el9_2.noarch.rpm�[texlive-dvips-20200406-26.el9_2.x86_64.rpm�,texlive-fancybox-20200406-26.el9_2.noarch.rpm�texlive-enumitem-20200406-26.el9_2.noarch.rpm�itexlive-l3kernel-20200406-26.el9_2.noarch.rpm�/texlive-pgf-20200406-26.el9_2.noarch.rpm�texlive-newfloat-20200406-26.el9_2.noarch.rpm�:texlive-pst-3d-20200406-26.el9_2.noarch.rpm�%texlive-etoc-20200406-26.el9_2.noarch.rpm�,texlive-zref-20200406-26.el9_2.noarch.rpm�texlive-utopia-20200406-26.el9_2.noarch.rpm�jtexlive-l3packages-20200406-26.el9_2.noarch.rpm�texlive-ncntrsbk-20200406-26.el9_2.noarch.rpm�Btexlive-pst-node-20200406-26.el9_2.noarch.rpm�]texlive-atbegshi-20200406-26.el9_2.noarch.rpm�<texlive-fontwrap-20200406-26.el9_2.noarch.rpm�{texlive-charter-20200406-26.el9_2.noarch.rpm�mtexlive-latex-fonts-20200406-26.el9_2.noarch.rpm�Stexlive-hyphenat-20200406-26.el9_2.noarch.rpm�texlive-epsf-20200406-26.el9_2.noarch.rpm�vtexlive-caption-20200406-26.el9_2.noarch.rpm�texlive-mparhack-20200406-26.el9_2.noarch.rpm�etexlive-mfware-20200406-26.el9_2.x86_64.rpm� texlive-xetexconfig-20200406-26.el9_2.noarch.rpm�'texlive-euenc-20200406-26.el9_2.noarch.rpm�texlive-ec-20200406-26.el9_2.noarch.rpm�^texlive-attachfile-20200406-26.el9_2.noarch.rpm�texlive-cm-20200406-26.el9_2.noarch.rpm�[texlive-setspace-20200406-26.el9_2.noarch.rpm�-texlive-pdfpages-20200406-26.el9_2.noarch.rpm�>texlive-footnotehyper-20200406-26.el9_2.noarch.rpm�ktexlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm�ftexlive-pdftex-20200406-26.el9_2.x86_64.rpm�6texlive-psfrag-20200406-26.el9_2.noarch.rpm�!texlive-eso-pic-20200406-26.el9_2.noarch.rpm�8texlive-psnfss-20200406-26.el9_2.noarch.rpm�<texlive-pst-blur-20200406-26.el9_2.noarch.rpm�%texlive-xmltex-20200406-26.el9_2.noarch.rpm�Htexlive-graphics-def-20200406-26.el9_2.noarch.rpm�7texlive-fncychap-20200406-26.el9_2.noarch.rpm�ftexlive-babelbib-20200406-26.el9_2.noarch.rpm�
texlive-colorprofiles-20200406-26.el9_2.noarch.rpm�Ptexlive-hyperref-20200406-26.el9_2.noarch.rpm�Utexlive-amscls-20200406-26.el9_2.noarch.rpm�texlive-wasy-type1-20200406-26.el9_2.noarch.rpm�texlive-cm-super-20200406-26.el9_2.noarch.rpm�"texlive-etex-20200406-26.el9_2.noarch.rpm�5texlive-preprint-20200406-26.el9_2.noarch.rpm�}texlive-cite-20200406-26.el9_2.noarch.rpm�_texlive-kpathsea-20200406-26.el9_2.x86_64.rpm�texlive-collection-basic-20200406-26.el9_2.noarch.rpm�@texlive-fpl-20200406-26.el9_2.noarch.rpm�texlive-ucs-20200406-26.el9_2.noarch.rpm�texlive-wasy-20200406-26.el9_2.noarch.rpm�ntexlive-latex2man-20200406-26.el9_2.noarch.rpm�xtexlive-catchfile-20200406-26.el9_2.noarch.rpm�,texlive-pdflscape-20200406-26.el9_2.noarch.rpm�qtexlive-bookmark-20200406-26.el9_2.noarch.rpm�wtexlive-lm-20200406-26.el9_2.noarch.rpm�@texlive-pst-grad-20200406-26.el9_2.noarch.rpm�etexlive-kvoptions-20200406-26.el9_2.noarch.rpm�Qtexlive-adjustbox-20200406-26.el9_2.noarch.rpm�texlive-unicode-data-20200406-26.el9_2.noarch.rpm�texlive-microtype-20200406-26.el9_2.noarch.rpm�Gtexlive-pst-tree-20200406-26.el9_2.noarch.rpm�ctexlive-awesomebox-20200406-26.el9_2.noarch.rpm�atexlive-auxhook-20200406-26.el9_2.noarch.rpm�&texlive-paralist-20200406-26.el9_2.noarch.rpm�texlive-wadalab-20200406-26.el9_2.noarch.rpm�Ftexlive-pst-tools-20200406-26.el9_2.noarch.rpm�Qtexlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm�texlive-ctablestack-20200406-26.el9_2.noarch.rpm�ttexlive-breqn-20200406-26.el9_2.noarch.rpm�Ztexlive-dvipng-20200406-26.el9_2.x86_64.rpm�Etexlive-pst-text-20200406-26.el9_2.noarch.rpm�ftexlive-kvsetkeys-20200406-26.el9_2.noarch.rpm�_texlive-stmaryrd-20200406-26.el9_2.noarch.rpm�)texlive-euro-20200406-26.el9_2.noarch.rpm�texlive-newunicodechar-20200406-26.el9_2.noarch.rpm�texlive-csquotes-20200406-26.el9_2.noarch.rpm�htexlive-beamer-20200406-26.el9_2.noarch.rpm�Ztexlive-sepnum-20200406-26.el9_2.noarch.rpm�&texlive-etoolbox-20200406-26.el9_2.noarch.rpm�Wtexlive-section-20200406-26.el9_2.noarch.rpm�Ntexlive-rcs-20200406-26.el9_2.noarch.rpm�9texlive-pspicture-20200406-26.el9_2.noarch.rpm�Xtexlive-iftex-20200406-26.el9_2.noarch.rpm�Vtexlive-scheme-basic-20200406-26.el9_2.noarch.rpm�texlive-underscore-20200406-26.el9_2.noarch.rpm�`texlive-luahbtex-20200406-26.el9_2.x86_64.rpm�qtexlive-letltxmacro-20200406-26.el9_2.noarch.rpm�Ytexlive-seminar-20200406-26.el9_2.noarch.rpm�0texlive-filecontents-20200406-26.el9_2.noarch.rpm�texlive-ctable-20200406-26.el9_2.noarch.rpm�texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm�texlive-varwidth-20200406-26.el9_2.noarch.rpm�texlive-ucharclasses-20200406-26.el9_2.noarch.rpm�htexlive-tex4ht-20200406-26.el9_2.x86_64.rpm�3texlive-fix2col-20200406-26.el9_2.noarch.rpm�~texlive-cjk-20200406-26.el9_2.noarch.rpm�|texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpm�3texlive-polyglossia-20200406-26.el9_2.noarch.rpm�Atexlive-pst-math-20200406-26.el9_2.noarch.rpm�ktexlive-bibtopic-20200406-26.el9_2.noarch.rpm�texlive-makecmds-20200406-26.el9_2.noarch.rpm�ntexlive-bigintcalc-20200406-26.el9_2.noarch.rpm�texlive-ucharcat-20200406-26.el9_2.noarch.rpm�Htexlive-pstricks-20200406-26.el9_2.noarch.rpm�texlive-luatex85-20200406-26.el9_2.noarch.rpm�texlive-lwarp-20200406-26.el9_2.noarch.rpm�[texlive-arabxetex-20200406-26.el9_2.noarch.rpm�texlive-minitoc-20200406-26.el9_2.noarch.rpm�texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm�ytexlive-changebar-20200406-26.el9_2.noarch.rpm�texlive-wasysym-20200406-26.el9_2.noarch.rpm�texlive-xecyr-20200406-26.el9_2.noarch.rpm�texlive-collectbox-20200406-26.el9_2.noarch.rpm�?texlive-pst-fill-20200406-26.el9_2.noarch.rpm�texlive-cmextra-20200406-26.el9_2.noarch.rpm�ltexlive-bidi-20200406-26.el9_2.noarch.rpm�+texlive-zapfding-20200406-26.el9_2.noarch.rpm�texlive-environ-20200406-26.el9_2.noarch.rpm�Utexlive-sauerj-20200406-26.el9_2.noarch.rpm�texlive-xepersian-20200406-26.el9_2.noarch.rpm�^texlive-jknapltx-20200406-26.el9_2.noarch.rpm�jtexlive-xetex-20200406-26.el9_2.x86_64.rpm�'texlive-xstring-20200406-26.el9_2.noarch.rpm�jtexlive-beton-20200406-26.el9_2.noarch.rpm�texlive-collection-xetex-20200406-26.el9_2.noarch.rpm�Rtexlive-rsfs-20200406-26.el9_2.noarch.rpm�{texlive-tools-20200406-26.el9_2.noarch.rpm�%texlive-palatino-20200406-26.el9_2.noarch.rpm�htexlive-tex-gyre-20200406-26.el9_2.noarch.rpm�texlive-xecjk-20200406-26.el9_2.noarch.rpm�Jtexlive-ptext-20200406-26.el9_2.noarch.rpm�ttexlive-lineno-20200406-26.el9_2.noarch.rpm�texlive-courier-20200406-26.el9_2.noarch.rpm�dtexlive-symbol-20200406-26.el9_2.noarch.rpm�\texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm�utexlive-listings-20200406-26.el9_2.noarch.rpm�.texlive-fancyref-20200406-26.el9_2.noarch.rpm�Btexlive-garuda-c90-20200406-26.el9_2.noarch.rpm�btexlive-subfigure-20200406-26.el9_2.noarch.rpm�Gtexlive-graphics-cfg-20200406-26.el9_2.noarch.rpm�texlive-xecolor-20200406-26.el9_2.noarch.rpm�btexlive-avantgar-20200406-26.el9_2.noarch.rpm�ftexlive-tabu-20200406-26.el9_2.noarch.rpm�Utexlive-ifmtarg-20200406-26.el9_2.noarch.rpm�Stexlive-sansmath-20200406-26.el9_2.noarch.rpm�Ltexlive-qstest-20200406-26.el9_2.noarch.rpm�ktexlive-lastpage-20200406-26.el9_2.noarch.rpm�texlive-crop-20200406-26.el9_2.noarch.rpm�texlive-ncctools-20200406-26.el9_2.noarch.rpm�etexlive-t2-20200406-26.el9_2.noarch.rpm�texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm�
texlive-url-20200406-26.el9_2.noarch.rpm�]texlive-fontware-20200406-26.el9_2.x86_64.rpm�texlive-mnsymbol-20200406-26.el9_2.noarch.rpm�*texlive-zapfchan-20200406-26.el9_2.noarch.rpm�texlive-multido-20200406-26.el9_2.noarch.rpm�texlive-lib-20200406-26.el9_2.i686.rpm�6texlive-fmtcount-20200406-26.el9_2.noarch.rpm�Ptexlive-refcount-20200406-26.el9_2.noarch.rpm�texlive-updmap-map-20200406-26.el9_2.noarch.rpm�vtexlive-listofitems-20200406-26.el9_2.noarch.rpm�_texlive-attachfile2-20200406-26.el9_2.noarch.rpm�Rtexlive-hyphen-base-20200406-26.el9_2.noarch.rpm�Ytexlive-dvipdfmx-20200406-26.el9_2.x86_64.rpm�Itexlive-grfext-20200406-26.el9_2.noarch.rpm�xtexlive-titlesec-20200406-26.el9_2.noarch.rpm�#texlive-obsolete-20200406-26.el9_2.noarch.rpm�`texlive-stringenc-20200406-26.el9_2.noarch.rpm�texlive-wrapfig-20200406-26.el9_2.noarch.rpm�
texlive-mdwtools-20200406-26.el9_2.noarch.rpm�)texlive-xunicode-20200406-26.el9_2.noarch.rpm�9texlive-fontbook-20200406-26.el9_2.noarch.rpm�$texlive-xltxtra-20200406-26.el9_2.noarch.rpm�2texlive-finstrut-20200406-26.el9_2.noarch.rpm�$texlive-overpic-20200406-26.el9_2.noarch.rpm�gtexlive-base-20200406-26.el9_2.noarch.rpm�texlive-typehtml-20200406-26.el9_2.noarch.rpm�~texlive-lualibs-20200406-26.el9_2.noarch.rpm�xtexlive-lm-math-20200406-26.el9_2.noarch.rpm�\texlive-intcalc-20200406-26.el9_2.noarch.rpm�|texlive-chngcntr-20200406-26.el9_2.noarch.rpm�ntexlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm�texlive-mfnfss-20200406-26.el9_2.noarch.rpm�{texlive-ltxmisc-20200406-26.el9_2.noarch.rpm�}texlive-trimspaces-20200406-26.el9_2.noarch.rpm�rtexlive-lettrine-20200406-26.el9_2.noarch.rpm�rtexlive-textcase-20200406-26.el9_2.noarch.rpm�Etexlive-glyphlist-20200406-26.el9_2.noarch.rpm�Stexlive-algorithms-20200406-26.el9_2.noarch.rpm�:texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpm�Itexlive-pstricks-add-20200406-26.el9_2.noarch.rpm�texlive-cmap-20200406-26.el9_2.noarch.rpm�wtexlive-carlisle-20200406-26.el9_2.noarch.rpm�gtexlive-tex-20200406-26.el9_2.x86_64.rpm�|texlive-translator-20200406-26.el9_2.noarch.rpm�Otexlive-hycolor-20200406-26.el9_2.noarch.rpm�texlive-marginnote-20200406-26.el9_2.noarch.rpm�!texlive-ntgclass-20200406-26.el9_2.noarch.rpm�Atexlive-framed-20200406-26.el9_2.noarch.rpm�texlive-memoir-20200406-26.el9_2.noarch.rpm�\texlive-arphic-20200406-26.el9_2.noarch.rpm�Ctexlive-geometry-20200406-26.el9_2.noarch.rpm�(texlive-xtab-20200406-26.el9_2.noarch.rpm�	texlive-uniquecounter-20200406-26.el9_2.noarch.rpm�atexlive-knuth-lib-20200406-26.el9_2.noarch.rpm�htexlive-l3experimental-20200406-26.el9_2.noarch.rpm�"texlive-oberdiek-20200406-26.el9_2.noarch.rpm�*texlive-eurosym-20200406-26.el9_2.noarch.rpm�^texlive-gsftopk-20200406-26.el9_2.x86_64.rpm�`texlive-kerkis-20200406-26.el9_2.noarch.rpm�Ctexlive-pst-plot-20200406-26.el9_2.noarch.rpm�Wtexlive-20200406-26.el9_2.x86_64.rpm�Xtexlive-bibtex-20200406-26.el9_2.x86_64.rpm�texlive-type1cm-20200406-26.el9_2.noarch.rpm�
texlive-collection-latex-20200406-26.el9_2.noarch.rpm�ztexlive-ltxcmds-20200406-26.el9_2.noarch.rpm�2texlive-plain-20200406-26.el9_2.noarch.rpm�Ztexlive-index-20200406-26.el9_2.noarch.rpm�7texlive-pslatex-20200406-26.el9_2.noarch.rpm�texlive-luatexbase-20200406-26.el9_2.noarch.rpm�^texlive-stackengine-20200406-26.el9_2.noarch.rpm�Rtexlive-ae-20200406-26.el9_2.noarch.rpm�ytexlive-ltabptch-20200406-26.el9_2.noarch.rpm�5texlive-float-20200406-26.el9_2.noarch.rpm�texlive-uhc-20200406-26.el9_2.noarch.rpm�otexlive-bitset-20200406-26.el9_2.noarch.rpm�texlive-natbib-20200406-26.el9_2.noarch.rpm�ctexlive-metafont-20200406-26.el9_2.x86_64.rpm�Xtexlive-anyfontsize-20200406-26.el9_2.noarch.rpm�ptexlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpm�Vtexlive-ifoddpage-20200406-26.el9_2.noarch.rpm�$texlive-etexcmds-20200406-26.el9_2.noarch.rpm�texlive-eepic-20200406-26.el9_2.noarch.rpm�;texlive-fontspec-20200406-26.el9_2.noarch.rpm�
texlive-unisugar-20200406-26.el9_2.noarch.rpm�#texlive-xkeyval-20200406-26.el9_2.noarch.rpm�texlive-was-20200406-26.el9_2.noarch.rpm�texlive-dehyph-20200406-26.el9_2.noarch.rpm�texlive-unicode-math-20200406-26.el9_2.noarch.rpm�}texlive-lualatex-math-20200406-26.el9_2.noarch.rpm�itexlive-bera-20200406-26.el9_2.noarch.rpm�stexlive-breakurl-20200406-26.el9_2.noarch.rpm�texlive-xcolor-20200406-26.el9_2.noarch.rpm�atexlive-subfig-20200406-26.el9_2.noarch.rpm�ptexlive-latexconfig-20200406-26.el9_2.noarch.rpm�1texlive-placeins-20200406-26.el9_2.noarch.rpm�wtexlive-tipa-20200406-26.el9_2.noarch.rpm�Jtexlive-grffile-20200406-26.el9_2.noarch.rpm�utexlive-capt-of-20200406-26.el9_2.noarch.rpm�ztexlive-changepage-20200406-26.el9_2.noarch.rpm�(texlive-parskip-20200406-26.el9_2.noarch.rpm�r�texlive-cm-lgc-20200406-26.el9_2.noarch.rpm�jtexlive-tex-ini-files-20200406-26.el9_2.noarch.rpm�qtexlive-texlive.infra-20200406-26.el9_2.noarch.rpm�]texlive-soul-20200406-26.el9_2.noarch.rpm�texlive-colortbl-20200406-26.el9_2.noarch.rpm�stexlive-textpos-20200406-26.el9_2.noarch.rpm�texlive-marvosym-20200406-26.el9_2.noarch.rpm�itexlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm�]texlive-jadetex-20200406-26.el9_2.noarch.rpm�-texlive-fancyhdr-20200406-26.el9_2.noarch.rpm�texlive-mathspec-20200406-26.el9_2.noarch.rpm�ctexlive-koma-script-20200406-26.el9_2.noarch.rpm�texlive-ulem-20200406-26.el9_2.noarch.rpm�btexlive-makeindex-20200406-26.el9_2.x86_64.rpm�Xtexlive-sectsty-20200406-26.el9_2.noarch.rpm�texlive-mptopdf-20200406-26.el9_2.noarch.rpm�[texlive-infwarerr-20200406-26.el9_2.noarch.rpm�Ltexlive-helvetic-20200406-26.el9_2.noarch.rpm�ctexlive-svn-prov-20200406-26.el9_2.noarch.rpm�=texlive-pst-coil-20200406-26.el9_2.noarch.rpm�ttexlive-threeparttable-20200406-26.el9_2.noarch.rpm�gtexlive-tabulary-20200406-26.el9_2.noarch.rpm�4texlive-fixlatvian-20200406-26.el9_2.noarch.rpm�=texlive-footmisc-20200406-26.el9_2.noarch.rpm�Ytexlive-import-20200406-26.el9_2.noarch.rpm�ytexlive-titling-20200406-26.el9_2.noarch.rpm�Ntexlive-hologo-20200406-26.el9_2.noarch.rpm�texlive-needspace-20200406-26.el9_2.noarch.rpm�texlive-mflogo-font-20200406-26.el9_2.noarch.rpm�Qtexlive-hyph-utf8-20200406-26.el9_2.noarch.rpm�btexlive-knuth-local-20200406-26.el9_2.noarch.rpm�~texlive-txfonts-20200406-26.el9_2.noarch.rpm�Mtexlive-ragged2e-20200406-26.el9_2.noarch.rpm�Mtexlive-hobsub-20200406-26.el9_2.noarch.rpm�\texlive-showexpl-20200406-26.el9_2.noarch.rpm�"texlive-xifthen-20200406-26.el9_2.noarch.rpm�ltexlive-latex-20200406-26.el9_2.noarch.rpm�stexlive-linegoal-20200406-26.el9_2.noarch.rpm�texlive-context-20200406-26.el9_2.noarch.rpm�atexlive-luatex-20200406-26.el9_2.x86_64.rpm�Ztexlive-appendix-20200406-26.el9_2.noarch.rpm� texlive-eqparbox-20200406-26.el9_2.noarch.rpm�Otexlive-realscripts-20200406-26.el9_2.noarch.rpm�ztexlive-tocloft-20200406-26.el9_2.noarch.rpm�texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm�gtexlive-l3backend-20200406-26.el9_2.noarch.rpm�Vtexlive-amsfonts-20200406-26.el9_2.noarch.rpm�Dtexlive-pst-slpe-20200406-26.el9_2.noarch.rpm�texlive-modes-20200406-26.el9_2.noarch.rpm�0texlive-philokalia-20200406-26.el9_2.noarch.rpm�texlive-ms-20200406-26.el9_2.noarch.rpm�itexlive-xdvi-20200406-26.el9_2.x86_64.rpm� texlive-notoccite-20200406-26.el9_2.noarch.rpm�ltexlive-texlive-docindex-20200406-26.el9_2.noarch.rpm�texlive-lib-20200406-26.el9_2.x86_64.rpm�	texlive-mathtools-20200406-26.el9_2.noarch.rpm�Ytexlive-anysize-20200406-26.el9_2.noarch.rpm�texlive-classpack-20200406-26.el9_2.noarch.rpm�Ktexlive-hanging-20200406-26.el9_2.noarch.rpm�&texlive-xmltexconfig-20200406-26.el9_2.noarch.rpm�
texlive-mflogo-20200406-26.el9_2.noarch.rpm�texlive-upquote-20200406-26.el9_2.noarch.rpm�_texlive-kastrup-20200406-26.el9_2.noarch.rpm�Ttexlive-hyphenex-20200406-26.el9_2.noarch.rpm�+texlive-extsizes-20200406-26.el9_2.noarch.rpm�dtexlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm�rtexlive-booktabs-20200406-26.el9_2.noarch.rpm�Wtexlive-amsmath-20200406-26.el9_2.noarch.rpm�!texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm�vtexlive-times-20200406-26.el9_2.noarch.rpm�mtexlive-texlive-en-20200406-26.el9_2.noarch.rpm�texlive-datetime-20200406-26.el9_2.noarch.rpm�`texlive-atveryend-20200406-26.el9_2.noarch.rpm�mtexlive-bigfoot-20200406-26.el9_2.noarch.rpm�'texlive-parallel-20200406-26.el9_2.noarch.rpm�4texlive-powerdot-20200406-26.el9_2.noarch.rpm�(texlive-euler-20200406-26.el9_2.noarch.rpm�;texlive-pst-arrow-20200406-26.el9_2.noarch.rpm�8texlive-fontawesome-20200406-26.el9_2.noarch.rpm�Dtexlive-gettitlestring-20200406-26.el9_2.noarch.rpm�Ktexlive-pxfonts-20200406-26.el9_2.noarch.rpm�?texlive-fp-20200406-26.el9_2.noarch.rpm�#texlive-etex-pkg-20200406-26.el9_2.noarch.rpm�texlive-metalogo-20200406-26.el9_2.noarch.rpm�)texlive-passivetex-20200406-26.el9_2.noarch.rpm�otexlive-texlive-scripts-20200406-26.el9_2.noarch.rpm�otexlive-latexbug-20200406-26.el9_2.noarch.rpm�utexlive-thumbpdf-20200406-26.el9_2.noarch.rpm�/texlive-fancyvrb-20200406-26.el9_2.noarch.rpm�texlive-xesearch-20200406-26.el9_2.noarch.rpm�texlive-multirow-20200406-26.el9_2.noarch.rpm�texlive-xetex-itrans-20200406-26.el9_2.noarch.rpm�texlive-mathpazo-20200406-26.el9_2.noarch.rpm�texlive-manfnt-font-20200406-26.el9_2.noarch.rpm�Wtexlive-ifplatform-20200406-26.el9_2.noarch.rpm�	texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpm�*texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm�etexlive-babel-english-20200406-26.el9_2.noarch.rpm�1texlive-filehook-20200406-26.el9_2.noarch.rpm�Ttexlive-sansmathaccent-20200406-26.el9_2.noarch.rpm�+texlive-pdfescape-20200406-26.el9_2.noarch.rpm�dtexlive-metapost-20200406-26.el9_2.x86_64.rpm�ptexlive-bookman-20200406-26.el9_2.noarch.rpm�>texlive-pst-eps-20200406-26.el9_2.noarch.rpm�Ttexlive-alphalph-20200406-26.el9_2.noarch.rpm�texlive-cns-20200406-26.el9_2.noarch.rpm�texlive-enctex-20200406-26.el9_2.noarch.rpm�.texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm�texlive-xeindex-20200406-26.el9_2.noarch.rpm�dtexlive-babel-20200406-26.el9_2.noarch.rpm�texlive-luaotfload-20200406-26.el9_2.noarch.rpm�texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpm�texlive-norasi-c90-20200406-26.el9_2.noarch.rpm�texlive-currfile-20200406-26.el9_2.noarch.rpm�Ftexlive-graphics-20200406-26.el9_2.noarch.rpm�texlive-epstopdf-20200406-26.el9_2.noarch.rpm�[texlive-dvips-20200406-26.el9_2.x86_64.rpm�,texlive-fancybox-20200406-26.el9_2.noarch.rpm�texlive-enumitem-20200406-26.el9_2.noarch.rpm�itexlive-l3kernel-20200406-26.el9_2.noarch.rpm�/texlive-pgf-20200406-26.el9_2.noarch.rpm�texlive-newfloat-20200406-26.el9_2.noarch.rpm�:texlive-pst-3d-20200406-26.el9_2.noarch.rpm�%texlive-etoc-20200406-26.el9_2.noarch.rpm�,texlive-zref-20200406-26.el9_2.noarch.rpm�texlive-utopia-20200406-26.el9_2.noarch.rpm�jtexlive-l3packages-20200406-26.el9_2.noarch.rpm�texlive-ncntrsbk-20200406-26.el9_2.noarch.rpm�Btexlive-pst-node-20200406-26.el9_2.noarch.rpm�]texlive-atbegshi-20200406-26.el9_2.noarch.rpm�<texlive-fontwrap-20200406-26.el9_2.noarch.rpm�{texlive-charter-20200406-26.el9_2.noarch.rpm�mtexlive-latex-fonts-20200406-26.el9_2.noarch.rpm�Stexlive-hyphenat-20200406-26.el9_2.noarch.rpm�texlive-epsf-20200406-26.el9_2.noarch.rpm�vtexlive-caption-20200406-26.el9_2.noarch.rpm�texlive-mparhack-20200406-26.el9_2.noarch.rpm�etexlive-mfware-20200406-26.el9_2.x86_64.rpm� texlive-xetexconfig-20200406-26.el9_2.noarch.rpm�'texlive-euenc-20200406-26.el9_2.noarch.rpm�texlive-ec-20200406-26.el9_2.noarch.rpm�^texlive-attachfile-20200406-26.el9_2.noarch.rpm�texlive-cm-20200406-26.el9_2.noarch.rpm�[texlive-setspace-20200406-26.el9_2.noarch.rpm�-texlive-pdfpages-20200406-26.el9_2.noarch.rpm�>texlive-footnotehyper-20200406-26.el9_2.noarch.rpm�ktexlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm�ftexlive-pdftex-20200406-26.el9_2.x86_64.rpm�6texlive-psfrag-20200406-26.el9_2.noarch.rpm�!texlive-eso-pic-20200406-26.el9_2.noarch.rpm�8texlive-psnfss-20200406-26.el9_2.noarch.rpm�<texlive-pst-blur-20200406-26.el9_2.noarch.rpm�%texlive-xmltex-20200406-26.el9_2.noarch.rpm�Htexlive-graphics-def-20200406-26.el9_2.noarch.rpm�7texlive-fncychap-20200406-26.el9_2.noarch.rpm�ftexlive-babelbib-20200406-26.el9_2.noarch.rpm�
texlive-colorprofiles-20200406-26.el9_2.noarch.rpm�Ptexlive-hyperref-20200406-26.el9_2.noarch.rpm�Utexlive-amscls-20200406-26.el9_2.noarch.rpm�texlive-wasy-type1-20200406-26.el9_2.noarch.rpm�texlive-cm-super-20200406-26.el9_2.noarch.rpm�"texlive-etex-20200406-26.el9_2.noarch.rpm�5texlive-preprint-20200406-26.el9_2.noarch.rpm�}texlive-cite-20200406-26.el9_2.noarch.rpm�_texlive-kpathsea-20200406-26.el9_2.x86_64.rpm�texlive-collection-basic-20200406-26.el9_2.noarch.rpm�@texlive-fpl-20200406-26.el9_2.noarch.rpm�texlive-ucs-20200406-26.el9_2.noarch.rpm�texlive-wasy-20200406-26.el9_2.noarch.rpm�ntexlive-latex2man-20200406-26.el9_2.noarch.rpm�xtexlive-catchfile-20200406-26.el9_2.noarch.rpm�,texlive-pdflscape-20200406-26.el9_2.noarch.rpm�qtexlive-bookmark-20200406-26.el9_2.noarch.rpm�wtexlive-lm-20200406-26.el9_2.noarch.rpm�@texlive-pst-grad-20200406-26.el9_2.noarch.rpm�etexlive-kvoptions-20200406-26.el9_2.noarch.rpm�Qtexlive-adjustbox-20200406-26.el9_2.noarch.rpm�texlive-unicode-data-20200406-26.el9_2.noarch.rpm�texlive-microtype-20200406-26.el9_2.noarch.rpm�Gtexlive-pst-tree-20200406-26.el9_2.noarch.rpm�ctexlive-awesomebox-20200406-26.el9_2.noarch.rpm�atexlive-auxhook-20200406-26.el9_2.noarch.rpm�&texlive-paralist-20200406-26.el9_2.noarch.rpm�texlive-wadalab-20200406-26.el9_2.noarch.rpm�Ftexlive-pst-tools-20200406-26.el9_2.noarch.rpm�Qtexlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm�texlive-ctablestack-20200406-26.el9_2.noarch.rpm�ttexlive-breqn-20200406-26.el9_2.noarch.rpm�Ztexlive-dvipng-20200406-26.el9_2.x86_64.rpm�Etexlive-pst-text-20200406-26.el9_2.noarch.rpm�ftexlive-kvsetkeys-20200406-26.el9_2.noarch.rpm�_texlive-stmaryrd-20200406-26.el9_2.noarch.rpm�)texlive-euro-20200406-26.el9_2.noarch.rpm�texlive-newunicodechar-20200406-26.el9_2.noarch.rpm�texlive-csquotes-20200406-26.el9_2.noarch.rpm�htexlive-beamer-20200406-26.el9_2.noarch.rpm�Ztexlive-sepnum-20200406-26.el9_2.noarch.rpm�&texlive-etoolbox-20200406-26.el9_2.noarch.rpm�Wtexlive-section-20200406-26.el9_2.noarch.rpm�Ntexlive-rcs-20200406-26.el9_2.noarch.rpm�9texlive-pspicture-20200406-26.el9_2.noarch.rpm�Xtexlive-iftex-20200406-26.el9_2.noarch.rpm�Vtexlive-scheme-basic-20200406-26.el9_2.noarch.rpm�texlive-underscore-20200406-26.el9_2.noarch.rpm�`texlive-luahbtex-20200406-26.el9_2.x86_64.rpm�qtexlive-letltxmacro-20200406-26.el9_2.noarch.rpm�Ytexlive-seminar-20200406-26.el9_2.noarch.rpm�0texlive-filecontents-20200406-26.el9_2.noarch.rpm�texlive-ctable-20200406-26.el9_2.noarch.rpm�texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm�texlive-varwidth-20200406-26.el9_2.noarch.rpm�texlive-ucharclasses-20200406-26.el9_2.noarch.rpm�htexlive-tex4ht-20200406-26.el9_2.x86_64.rpm�3texlive-fix2col-20200406-26.el9_2.noarch.rpm�~texlive-cjk-20200406-26.el9_2.noarch.rpm�|texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpm�3texlive-polyglossia-20200406-26.el9_2.noarch.rpm�Atexlive-pst-math-20200406-26.el9_2.noarch.rpm�ktexlive-bibtopic-20200406-26.el9_2.noarch.rpm�texlive-makecmds-20200406-26.el9_2.noarch.rpm�ntexlive-bigintcalc-20200406-26.el9_2.noarch.rpm�texlive-ucharcat-20200406-26.el9_2.noarch.rpm�Htexlive-pstricks-20200406-26.el9_2.noarch.rpm�texlive-luatex85-20200406-26.el9_2.noarch.rpm�texlive-lwarp-20200406-26.el9_2.noarch.rpm�[texlive-arabxetex-20200406-26.el9_2.noarch.rpm�texlive-minitoc-20200406-26.el9_2.noarch.rpm�texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm�ytexlive-changebar-20200406-26.el9_2.noarch.rpm�texlive-wasysym-20200406-26.el9_2.noarch.rpm�texlive-xecyr-20200406-26.el9_2.noarch.rpm�texlive-collectbox-20200406-26.el9_2.noarch.rpm�?texlive-pst-fill-20200406-26.el9_2.noarch.rpm�texlive-cmextra-20200406-26.el9_2.noarch.rpm�ltexlive-bidi-20200406-26.el9_2.noarch.rpm�+texlive-zapfding-20200406-26.el9_2.noarch.rpm�texlive-environ-20200406-26.el9_2.noarch.rpm�Utexlive-sauerj-20200406-26.el9_2.noarch.rpm�texlive-xepersian-20200406-26.el9_2.noarch.rpm�^texlive-jknapltx-20200406-26.el9_2.noarch.rpm�jtexlive-xetex-20200406-26.el9_2.x86_64.rpm�'texlive-xstring-20200406-26.el9_2.noarch.rpm�jtexlive-beton-20200406-26.el9_2.noarch.rpm�texlive-collection-xetex-20200406-26.el9_2.noarch.rpm�Rtexlive-rsfs-20200406-26.el9_2.noarch.rpm�{texlive-tools-20200406-26.el9_2.noarch.rpm�%texlive-palatino-20200406-26.el9_2.noarch.rpm�htexlive-tex-gyre-20200406-26.el9_2.noarch.rpm�texlive-xecjk-20200406-26.el9_2.noarch.rpm�Jtexlive-ptext-20200406-26.el9_2.noarch.rpm�ttexlive-lineno-20200406-26.el9_2.noarch.rpm�texlive-courier-20200406-26.el9_2.noarch.rpm�dtexlive-symbol-20200406-26.el9_2.noarch.rpm�\texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm�utexlive-listings-20200406-26.el9_2.noarch.rpm�.texlive-fancyref-20200406-26.el9_2.noarch.rpm�Btexlive-garuda-c90-20200406-26.el9_2.noarch.rpm�btexlive-subfigure-20200406-26.el9_2.noarch.rpm�Gtexlive-graphics-cfg-20200406-26.el9_2.noarch.rpm�texlive-xecolor-20200406-26.el9_2.noarch.rpm�btexlive-avantgar-20200406-26.el9_2.noarch.rpm�ftexlive-tabu-20200406-26.el9_2.noarch.rpm�Utexlive-ifmtarg-20200406-26.el9_2.noarch.rpm�Stexlive-sansmath-20200406-26.el9_2.noarch.rpm�Ltexlive-qstest-20200406-26.el9_2.noarch.rpm�ktexlive-lastpage-20200406-26.el9_2.noarch.rpm�texlive-crop-20200406-26.el9_2.noarch.rpm�texlive-ncctools-20200406-26.el9_2.noarch.rpm�etexlive-t2-20200406-26.el9_2.noarch.rpm�texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm�
texlive-url-20200406-26.el9_2.noarch.rpm�]texlive-fontware-20200406-26.el9_2.x86_64.rpm�texlive-mnsymbol-20200406-26.el9_2.noarch.rpm�*texlive-zapfchan-20200406-26.el9_2.noarch.rpm�texlive-multido-20200406-26.el9_2.noarch.rpm�texlive-lib-20200406-26.el9_2.i686.rpm�6texlive-fmtcount-20200406-26.el9_2.noarch.rpm�Ptexlive-refcount-20200406-26.el9_2.noarch.rpm�texlive-updmap-map-20200406-26.el9_2.noarch.rpm�vtexlive-listofitems-20200406-26.el9_2.noarch.rpm�_texlive-attachfile2-20200406-26.el9_2.noarch.rpm�Rtexlive-hyphen-base-20200406-26.el9_2.noarch.rpm�Ytexlive-dvipdfmx-20200406-26.el9_2.x86_64.rpm�Itexlive-grfext-20200406-26.el9_2.noarch.rpm�xtexlive-titlesec-20200406-26.el9_2.noarch.rpm�#texlive-obsolete-20200406-26.el9_2.noarch.rpm�`texlive-stringenc-20200406-26.el9_2.noarch.rpm�texlive-wrapfig-20200406-26.el9_2.noarch.rpm�
texlive-mdwtools-20200406-26.el9_2.noarch.rpm�)texlive-xunicode-20200406-26.el9_2.noarch.rpm�9texlive-fontbook-20200406-26.el9_2.noarch.rpm�$texlive-xltxtra-20200406-26.el9_2.noarch.rpm�2texlive-finstrut-20200406-26.el9_2.noarch.rpm�$texlive-overpic-20200406-26.el9_2.noarch.rpm�gtexlive-base-20200406-26.el9_2.noarch.rpm�texlive-typehtml-20200406-26.el9_2.noarch.rpm�~texlive-lualibs-20200406-26.el9_2.noarch.rpm�xtexlive-lm-math-20200406-26.el9_2.noarch.rpm�\texlive-intcalc-20200406-26.el9_2.noarch.rpm�|texlive-chngcntr-20200406-26.el9_2.noarch.rpm�ntexlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm�texlive-mfnfss-20200406-26.el9_2.noarch.rpm�{texlive-ltxmisc-20200406-26.el9_2.noarch.rpm�}texlive-trimspaces-20200406-26.el9_2.noarch.rpm�rtexlive-lettrine-20200406-26.el9_2.noarch.rpm�rtexlive-textcase-20200406-26.el9_2.noarch.rpm�Etexlive-glyphlist-20200406-26.el9_2.noarch.rpm�Stexlive-algorithms-20200406-26.el9_2.noarch.rpm�:texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpm�Itexlive-pstricks-add-20200406-26.el9_2.noarch.rpm�texlive-cmap-20200406-26.el9_2.noarch.rpm�wtexlive-carlisle-20200406-26.el9_2.noarch.rpm�gtexlive-tex-20200406-26.el9_2.x86_64.rpm�|texlive-translator-20200406-26.el9_2.noarch.rpm�Otexlive-hycolor-20200406-26.el9_2.noarch.rpm�texlive-marginnote-20200406-26.el9_2.noarch.rpm�!texlive-ntgclass-20200406-26.el9_2.noarch.rpm�Atexlive-framed-20200406-26.el9_2.noarch.rpm�texlive-memoir-20200406-26.el9_2.noarch.rpm�\texlive-arphic-20200406-26.el9_2.noarch.rpm�Ctexlive-geometry-20200406-26.el9_2.noarch.rpm�(texlive-xtab-20200406-26.el9_2.noarch.rpm�	texlive-uniquecounter-20200406-26.el9_2.noarch.rpm�atexlive-knuth-lib-20200406-26.el9_2.noarch.rpm�htexlive-l3experimental-20200406-26.el9_2.noarch.rpm�"texlive-oberdiek-20200406-26.el9_2.noarch.rpm�*texlive-eurosym-20200406-26.el9_2.noarch.rpm�^texlive-gsftopk-20200406-26.el9_2.x86_64.rpm�`texlive-kerkis-20200406-26.el9_2.noarch.rpm�Ctexlive-pst-plot-20200406-26.el9_2.noarch.rpm�Wtexlive-20200406-26.el9_2.x86_64.rpm�Xtexlive-bibtex-20200406-26.el9_2.x86_64.rpm�texlive-type1cm-20200406-26.el9_2.noarch.rpm�
texlive-collection-latex-20200406-26.el9_2.noarch.rpm�ztexlive-ltxcmds-20200406-26.el9_2.noarch.rpm�2texlive-plain-20200406-26.el9_2.noarch.rpm�Ztexlive-index-20200406-26.el9_2.noarch.rpm�7texlive-pslatex-20200406-26.el9_2.noarch.rpm�texlive-luatexbase-20200406-26.el9_2.noarch.rpm�^texlive-stackengine-20200406-26.el9_2.noarch.rpm�Rtexlive-ae-20200406-26.el9_2.noarch.rpm�ytexlive-ltabptch-20200406-26.el9_2.noarch.rpm�5texlive-float-20200406-26.el9_2.noarch.rpm�texlive-uhc-20200406-26.el9_2.noarch.rpm�otexlive-bitset-20200406-26.el9_2.noarch.rpm�texlive-natbib-20200406-26.el9_2.noarch.rpm�ctexlive-metafont-20200406-26.el9_2.x86_64.rpm�Xtexlive-anyfontsize-20200406-26.el9_2.noarch.rpm�ptexlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpm�Vtexlive-ifoddpage-20200406-26.el9_2.noarch.rpm�$texlive-etexcmds-20200406-26.el9_2.noarch.rpm�texlive-eepic-20200406-26.el9_2.noarch.rpm�;texlive-fontspec-20200406-26.el9_2.noarch.rpm�
texlive-unisugar-20200406-26.el9_2.noarch.rpm�#texlive-xkeyval-20200406-26.el9_2.noarch.rpm�texlive-was-20200406-26.el9_2.noarch.rpm�texlive-dehyph-20200406-26.el9_2.noarch.rpm�texlive-unicode-math-20200406-26.el9_2.noarch.rpm�}texlive-lualatex-math-20200406-26.el9_2.noarch.rpm�itexlive-bera-20200406-26.el9_2.noarch.rpm�stexlive-breakurl-20200406-26.el9_2.noarch.rpm�texlive-xcolor-20200406-26.el9_2.noarch.rpm�atexlive-subfig-20200406-26.el9_2.noarch.rpm�ptexlive-latexconfig-20200406-26.el9_2.noarch.rpm�1texlive-placeins-20200406-26.el9_2.noarch.rpm�wtexlive-tipa-20200406-26.el9_2.noarch.rpm�Jtexlive-grffile-20200406-26.el9_2.noarch.rpm�utexlive-capt-of-20200406-26.el9_2.noarch.rpm�ztexlive-changepage-20200406-26.el9_2.noarch.rpm�(texlive-parskip-20200406-26.el9_2.noarch.rpm����:�f
	��/��iBBBBsecurityModerate: libtiff security update���phttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711
�C�!libtiff-4.4.0-8.el9_2.i686.rpm�D�!libtiff-devel-4.4.0-8.el9_2.i686.rpm�D�!libtiff-devel-4.4.0-8.el9_2.x86_64.rpm�C�!libtiff-4.4.0-8.el9_2.x86_64.rpm�C�!libtiff-4.4.0-8.el9_2.i686.rpm�D�!libtiff-devel-4.4.0-8.el9_2.i686.rpm�D�!libtiff-devel-4.4.0-8.el9_2.x86_64.rpm�C�!libtiff-4.4.0-8.el9_2.x86_64.rpm���k�g
	����pBBBBBBBBBBBBBBsecurityModerate: postgresql security update���Shttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714
��9postgresql-server-13.11-1.el9_2.x86_64.rpm��9postgresql-private-libs-13.11-1.el9_2.x86_64.rpm��9postgresql-plperl-13.11-1.el9_2.x86_64.rpmZ�9postgresql-13.11-1.el9_2.x86_64.rpm��9postgresql-pltcl-13.11-1.el9_2.x86_64.rpm��9postgresql-contrib-13.11-1.el9_2.x86_64.rpm��9postgresql-upgrade-13.11-1.el9_2.x86_64.rpm��9postgresql-plpython3-13.11-1.el9_2.x86_64.rpm��9postgresql-server-13.11-1.el9_2.x86_64.rpm��9postgresql-private-libs-13.11-1.el9_2.x86_64.rpm��9postgresql-plperl-13.11-1.el9_2.x86_64.rpmZ�9postgresql-13.11-1.el9_2.x86_64.rpm��9postgresql-pltcl-13.11-1.el9_2.x86_64.rpm��9postgresql-contrib-13.11-1.el9_2.x86_64.rpm��9postgresql-upgrade-13.11-1.el9_2.x86_64.rpm��9postgresql-plpython3-13.11-1.el9_2.x86_64.rpm�����h
	��-��ABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update��Z�}https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715
�yUlibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpm�hUlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpm�tUlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpm�sUlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpm�qUlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpm�nUlibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm�uUlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpm�lUlibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpm�iUlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpm�fUlibvirt-9.0.0-10.2.el9_2.x86_64.rpm�vUlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpm�wUlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpm�jUlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm�gUlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpm�{Ulibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpm�mUlibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm�zUlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpm�pUlibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpm�xUlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpm�kUlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpm�rUlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpm�oUlibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm�yUlibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpm�hUlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpm�tUlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpm�sUlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpm�qUlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpm�nUlibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm�uUlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpm�lUlibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpm�iUlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpm�fUlibvirt-9.0.0-10.2.el9_2.x86_64.rpm�vUlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpm�wUlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpm�jUlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm�gUlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpm�{Ulibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpm�mUlibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm�zUlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpm�pUlibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpm�xUlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpm�kUlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpm�rUlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpm�oUlibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm�����i
	��3��nBBBsecurityModerate: openssl security and bug fix update��W�Vhttps://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722
��kopenssl-devel-3.0.7-16.el9_2.x86_64.rpm��kopenssl-devel-3.0.7-16.el9_2.i686.rpm��kopenssl-perl-3.0.7-16.el9_2.x86_64.rpm��kopenssl-devel-3.0.7-16.el9_2.x86_64.rpm��kopenssl-devel-3.0.7-16.el9_2.i686.rpm��kopenssl-perl-3.0.7-16.el9_2.x86_64.rpm����{�j
	����tBBBBBBBBBBsecurityImportant: kernel security and bug fix update��-�https://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723
'�Fperf-5.14.0-284.18.1.el9_2.x86_64.rpm$�Fkernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm)�Frtla-5.14.0-284.18.1.el9_2.x86_64.rpm&�Fkernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm%�Fkernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm#�Fkernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm'�Fperf-5.14.0-284.18.1.el9_2.x86_64.rpm$�Fkernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm)�Frtla-5.14.0-284.18.1.el9_2.x86_64.rpm&�Fkernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm%�Fkernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm#�Fkernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm����Y�k
	��
��ABBBBBBBBBBsecurityCritical: go-toolset and golang security update�S��;�x
https://access.redhat.com/errata/RHSA-2023:3923RHSA-2023:3923RHSA-2023:3923https://access.redhat.com/security/cve/CVE-2023-29402CVE-2023-29402CVE-2023-29402https://access.redhat.com/security/cve/CVE-2023-29403CVE-2023-29403CVE-2023-29403https://access.redhat.com/security/cve/CVE-2023-29404CVE-2023-29404CVE-2023-29404https://access.redhat.com/security/cve/CVE-2023-29405CVE-2023-29405CVE-2023-29405https://bugzilla.redhat.com/22169652216965https://bugzilla.redhat.com/22175622217562https://bugzilla.redhat.com/22175652217565https://bugzilla.redhat.com/22175692217569https://errata.almalinux.org/9/ALSA-2023-3923.htmlALSA-2023:3923ALSA-2023:3923
p�golang-tests-1.19.10-1.el9_2.noarch.rpmm�golang-docs-1.19.10-1.el9_2.noarch.rpm�H�golang-bin-1.19.10-1.el9_2.x86_64.rpm�G�golang-1.19.10-1.el9_2.x86_64.rpm�T�golang-race-1.19.10-1.el9_2.x86_64.rpm�N�go-toolset-1.19.10-1.el9_2.x86_64.rpmn�golang-misc-1.19.10-1.el9_2.noarch.rpmo�golang-src-1.19.10-1.el9_2.noarch.rpmp�golang-tests-1.19.10-1.el9_2.noarch.rpmm�golang-docs-1.19.10-1.el9_2.noarch.rpm�H�golang-bin-1.19.10-1.el9_2.x86_64.rpm�G�golang-1.19.10-1.el9_2.x86_64.rpm�T�golang-race-1.19.10-1.el9_2.x86_64.rpm�N�go-toolset-1.19.10-1.el9_2.x86_64.rpmn�golang-misc-1.19.10-1.el9_2.noarch.rpmo�golang-src-1.19.10-1.el9_2.noarch.rpm����N�l
	����NBBBBBBBBsecurityLow: open-vm-tools security update�6��3�	https://access.redhat.com/errata/RHSA-2023:3948RHSA-2023:3948RHSA-2023:3948https://access.redhat.com/security/cve/CVE-2023-20867CVE-2023-20867CVE-2023-20867https://bugzilla.redhat.com/22130872213087https://errata.almalinux.org/9/ALSA-2023-3948.htmlALSA-2023:3948ALSA-2023:3948
�M�kopen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpm�
�kopen-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpm��kopen-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpm�	�kopen-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpm��kopen-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpm�M�kopen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpm�
�kopen-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpm��kopen-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpm�	�kopen-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpm��kopen-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpm����N�m
	����YsecurityCritical: grafana security update�S��<�https://access.redhat.com/errata/RHSA-2023:4030RHSA-2023:4030RHSA-2023:4030https://access.redhat.com/security/cve/CVE-2023-3128CVE-2023-3128CVE-2023-3128https://bugzilla.redhat.com/22136262213626https://errata.almalinux.org/9/ALSA-2023-4030.htmlALSA-2023:4030ALSA-2023:4030
�I�Zgrafana-9.0.9-3.el9_2.alma.x86_64.rpm�I�Zgrafana-9.0.9-3.el9_2.alma.x86_64.rpm����Z�n
	��0��\BBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement update��L�Ehttps://access.redhat.com/errata/RHSA-2023:4057RHSA-2023:4057RHSA-2023:4057https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4057.htmlALSA-2023:4057ALSA-2023:4057

�|�
dotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpm�"�
netstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpm�z�Pdotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpm�{�Pdotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm�}�Pdotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm�y�Pdotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpm�~�
dotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpm�w�Paspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm�x�Paspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm�!�Pdotnet-host-7.0.9-1.el9_2.x86_64.rpm
�|�
dotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpm�"�
netstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpm�z�Pdotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpm�{�Pdotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm�}�Pdotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm�y�Pdotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpm�~�
dotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpm�w�Paspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm�x�Paspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm�!�Pdotnet-host-7.0.9-1.el9_2.x86_64.rpm����E�o
	����qBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement update���Fhttps://access.redhat.com/errata/RHSA-2023:4060RHSA-2023:4060RHSA-2023:4060https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4060.htmlALSA-2023:4060ALSA-2023:4060
�P�Jdotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm�O�Jdotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpm�L�Jaspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm�R�Jdotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm�N�Jdotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpm�Q�Wdotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpm�S�Wdotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpm�M�Jaspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm�P�Jdotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm�O�Jdotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpm�L�Jaspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm�R�Jdotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm�N�Jdotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpm�Q�Wdotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpm�S�Wdotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpm�M�Jaspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm����;�p
	����BsecurityImportant: thunderbird security update��W�ghttps://access.redhat.com/errata/RHSA-2023:4064RHSA-2023:4064RHSA-2023:4064https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4064.htmlALSA-2023:4064ALSA-2023:4064
9�\thunderbird-102.13.0-2.el9_2.alma.x86_64.rpm9�\thunderbird-102.13.0-2.el9_2.alma.x86_64.rpm��ǔ�q
	��	��EBBsecurityImportant: firefox security update��>�https://access.redhat.com/errata/RHSA-2023:4071RHSA-2023:4071RHSA-2023:4071https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4071.htmlALSA-2023:4071ALSA-2023:4071
P�\firefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm8�\firefox-102.13.0-2.el9_2.alma.x86_64.rpmP�\firefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm8�\firefox-102.13.0-2.el9_2.alma.x86_64.rpm��Ǒ�r
	����JBBBBBBBBBBBsecurityImportant: bind security update��V�Nhttps://access.redhat.com/errata/RHSA-2023:4099RHSA-2023:4099RHSA-2023:4099https://access.redhat.com/security/cve/CVE-2023-2828CVE-2023-2828CVE-2023-2828https://bugzilla.redhat.com/22162272216227https://errata.almalinux.org/9/ALSA-2023-4099.htmlALSA-2023:4099ALSA-2023:4099
�]�
bind-libs-9.16.23-11.el9_2.1.x86_64.rpm�'�
python3-bind-9.16.23-11.el9_2.1.noarch.rpm�[�
bind-chroot-9.16.23-11.el9_2.1.x86_64.rpm�"�
bind-license-9.16.23-11.el9_2.1.noarch.rpm�^�
bind-utils-9.16.23-11.el9_2.1.x86_64.rpm�!�
bind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm�Z�
bind-9.16.23-11.el9_2.1.x86_64.rpm�\�
bind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpm�]�
bind-libs-9.16.23-11.el9_2.1.x86_64.rpm�'�
python3-bind-9.16.23-11.el9_2.1.noarch.rpm�[�
bind-chroot-9.16.23-11.el9_2.1.x86_64.rpm�"�
bind-license-9.16.23-11.el9_2.1.noarch.rpm�^�
bind-utils-9.16.23-11.el9_2.1.x86_64.rpm�!�
bind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm�Z�
bind-9.16.23-11.el9_2.1.x86_64.rpm�\�
bind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpm��ٟ�s
	��*��XBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update��$�"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158
	�L�java-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpm�K�java-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpm�D�java-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm	�L�java-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpm�K�java-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpm�D�java-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm����t
	��=��kBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update��F�Nhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177
	��/java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpm	��/java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm��/java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpm���z�u
	��
��~BBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update���yhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178
�V�ljava-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm�8�ljava-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm�U�ljava-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm�T�ljava-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm�W�ljava-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm�7�ljava-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm�X�ljava-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm�V�ljava-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm�8�ljava-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm�U�ljava-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm�T�ljava-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm�W�ljava-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm�7�ljava-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm�X�ljava-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm���;�v
	����KBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��
�Zhttps://access.redhat.com/errata/RHSA-2023:4201RHSA-2023:4201RHSA-2023:4201https://access.redhat.com/security/cve/CVE-2023-32435CVE-2023-32435CVE-2023-32435https://access.redhat.com/security/cve/CVE-2023-32439CVE-2023-32439CVE-2023-32439https://bugzilla.redhat.com/22186262218626https://bugzilla.redhat.com/22186402218640https://errata.almalinux.org/9/ALSA-2023-4201.htmlALSA-2023:4201ALSA-2023:4201
0�0webkit2gtk3-2.38.5-1.el9_2.3.i686.rpm0�0webkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm1�0webkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm2�0webkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm3�0webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm1�0webkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm3�0webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm2�0webkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm0�0webkit2gtk3-2.38.5-1.el9_2.3.i686.rpm0�0webkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm1�0webkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm2�0webkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm3�0webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm1�0webkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm3�0webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm2�0webkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm����t�w
	��$��XBBBBBBBBBBsecurityModerate: samba security and bug fix update��g�https://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325
�S�Csamba-winexe-4.17.5-103.el9_2.alma.x86_64.rpm�R�Csamba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpm�P�Csamba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpm�O�Csamba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpm�Q�Csamba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpm�N�Csamba-client-4.17.5-103.el9_2.alma.x86_64.rpm�S�Csamba-winexe-4.17.5-103.el9_2.alma.x86_64.rpm�R�Csamba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpm�P�Csamba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpm�O�Csamba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpm�Q�Csamba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpm�N�Csamba-client-4.17.5-103.el9_2.alma.x86_64.rpm����*�x
	���gBBBBB�zBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security update��o�Shttps://access.redhat.com/errata/RHSA-2023:4327RHSA-2023:4327RHSA-2023:4327https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-4327.htmlALSA-2023:4327ALSA-2023:4327
Z�L�:*�]vpostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�[�ppostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm�vpostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�_vpostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�Z�opgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm�vpostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�Y�lpg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm�\vpostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�avpostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�`vpostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�^vpostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�9vpostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpmZvpostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmZ�L�:*�]vpostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�[�ppostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm�vpostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�_vpostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�Z�opgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm�vpostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�Y�lpg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm�\vpostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�avpostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�`vpostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�^vpostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�vpostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm�9vpostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpmZvpostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm����y�y
	���aB�E�^BBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update��B�U
https://access.redhat.com/errata/RHSA-2023:4330RHSA-2023:4330RHSA-2023:4330https://access.redhat.com/security/cve/CVE-2023-30581CVE-2023-30581CVE-2023-30581https://access.redhat.com/security/cve/CVE-2023-30588CVE-2023-30588CVE-2023-30588https://access.redhat.com/security/cve/CVE-2023-30589CVE-2023-30589CVE-2023-30589https://access.redhat.com/security/cve/CVE-2023-30590CVE-2023-30590CVE-2023-30590https://bugzilla.redhat.com/22198242219824https://bugzilla.redhat.com/22198382219838https://bugzilla.redhat.com/22198412219841https://bugzilla.redhat.com/22198422219842https://errata.almalinux.org/9/ALSA-2023-4330.htmlALSA-2023:4330ALSA-2023:4330
,��>*d�@npm-9.5.1-1.18.16.1.1.module_el9.2.0+31+cbae0c8e.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm>�nodejs-docs-18.16.1-1.module_el9.2.0+31+cbae0c8e.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm�#�nodejs-devel-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpml�Hnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm,�nodejs-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm,��>*d�@npm-9.5.1-1.18.16.1.1.module_el9.2.0+31+cbae0c8e.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm>�nodejs-docs-18.16.1-1.module_el9.2.0+31+cbae0c8e.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�nodejs-full-i18n-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm�#�nodejs-devel-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpml�Hnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm,�nodejs-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm����;�z
	����MBBBBBBBBsecurityModerate: nodejs security, bug fix, and enhancement update���Z
https://access.redhat.com/errata/RHSA-2023:4331RHSA-2023:4331RHSA-2023:4331https://access.redhat.com/security/cve/CVE-2023-30581CVE-2023-30581CVE-2023-30581https://access.redhat.com/security/cve/CVE-2023-30588CVE-2023-30588CVE-2023-30588https://access.redhat.com/security/cve/CVE-2023-30589CVE-2023-30589CVE-2023-30589https://access.redhat.com/security/cve/CVE-2023-30590CVE-2023-30590CVE-2023-30590https://bugzilla.redhat.com/22198242219824https://bugzilla.redhat.com/22198382219838https://bugzilla.redhat.com/22198412219841https://bugzilla.redhat.com/22198422219842https://errata.almalinux.org/9/ALSA-2023-4331.htmlALSA-2023:4331ALSA-2023:4331
e�`nodejs-full-i18n-16.20.1-1.el9_2.x86_64.rpmd�9npm-8.19.4-1.16.20.1.1.el9_2.x86_64.rpm��`nodejs-libs-16.20.1-1.el9_2.i686.rpm��`nodejs-libs-16.20.1-1.el9_2.x86_64.rpm>�`nodejs-docs-16.20.1-1.el9_2.noarch.rpm,�`nodejs-16.20.1-1.el9_2.x86_64.rpme�`nodejs-full-i18n-16.20.1-1.el9_2.x86_64.rpmd�9npm-8.19.4-1.16.20.1.1.el9_2.x86_64.rpm��`nodejs-libs-16.20.1-1.el9_2.i686.rpm��`nodejs-libs-16.20.1-1.el9_2.x86_64.rpm>�`nodejs-docs-16.20.1-1.el9_2.noarch.rpm,�`nodejs-16.20.1-1.el9_2.x86_64.rpm����A�{
	����XBsecurityModerate: libxml2 security update��q�Nhttps://access.redhat.com/errata/RHSA-2023:4349RHSA-2023:4349RHSA-2023:4349https://access.redhat.com/security/cve/CVE-2023-28484CVE-2023-28484CVE-2023-28484https://access.redhat.com/security/cve/CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/21859842185984https://bugzilla.redhat.com/21859942185994https://errata.almalinux.org/9/ALSA-2023-4349.htmlALSA-2023:4349ALSA-2023:4349
�E�flibxml2-devel-2.9.13-3.el9_2.1.i686.rpm�E�flibxml2-devel-2.9.13-3.el9_2.1.x86_64.rpm�E�flibxml2-devel-2.9.13-3.el9_2.1.i686.rpm�E�flibxml2-devel-2.9.13-3.el9_2.1.x86_64.rpm�����|
	����\securityModerate: python-requests security update��?�https://access.redhat.com/errata/RHSA-2023:4350RHSA-2023:4350RHSA-2023:4350https://access.redhat.com/security/cve/CVE-2023-32681CVE-2023-32681CVE-2023-32681https://bugzilla.redhat.com/22094692209469https://errata.almalinux.org/9/ALSA-2023-4350.htmlALSA-2023:4350ALSA-2023:4350
�\�python3-requests+security-2.25.1-7.el9_2.noarch.rpm�]�python3-requests+socks-2.25.1-7.el9_2.noarch.rpm�\�python3-requests+security-2.25.1-7.el9_2.noarch.rpm�]�python3-requests+socks-2.25.1-7.el9_2.noarch.rpm����Q�}
	��"��_BsecurityModerate: curl security update��F�~https://access.redhat.com/errata/RHSA-2023:4354RHSA-2023:4354RHSA-2023:4354https://access.redhat.com/security/cve/CVE-2023-28321CVE-2023-28321CVE-2023-28321https://access.redhat.com/security/cve/CVE-2023-28322CVE-2023-28322CVE-2023-28322https://bugzilla.redhat.com/21967862196786https://bugzilla.redhat.com/21967932196793https://errata.almalinux.org/9/ALSA-2023-4354.htmlALSA-2023:4354ALSA-2023:4354
��libcurl-devel-7.76.1-23.el9_2.2.x86_64.rpm��libcurl-devel-7.76.1-23.el9_2.2.i686.rpm��libcurl-devel-7.76.1-23.el9_2.2.x86_64.rpm��libcurl-devel-7.76.1-23.el9_2.2.i686.rpm����h�~
	��0��cBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update��D�0https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377
$�_kernel-debug-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm'�_perf-5.14.0-284.25.1.el9_2.x86_64.rpm#�_kernel-debug-devel-5.14.0-284.25.1.el9_2.x86_64.rpm�_kernel-doc-5.14.0-284.25.1.el9_2.noarch.rpm)�_rtla-5.14.0-284.25.1.el9_2.x86_64.rpm%�_kernel-devel-5.14.0-284.25.1.el9_2.x86_64.rpm&�_kernel-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm$�_kernel-debug-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm'�_perf-5.14.0-284.25.1.el9_2.x86_64.rpm#�_kernel-debug-devel-5.14.0-284.25.1.el9_2.x86_64.rpm�_kernel-doc-5.14.0-284.25.1.el9_2.noarch.rpm)�_rtla-5.14.0-284.25.1.el9_2.x86_64.rpm%�_kernel-devel-5.14.0-284.25.1.el9_2.x86_64.rpm&�_kernel-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm���5�
	��4��qBsecurityImportant: cjose security update��t�https://access.redhat.com/errata/RHSA-2023:4411RHSA-2023:4411RHSA-2023:4411https://access.redhat.com/security/cve/CVE-2023-37464CVE-2023-37464CVE-2023-37464https://bugzilla.redhat.com/22232952223295https://errata.almalinux.org/9/ALSA-2023-4411.htmlALSA-2023:4411ALSA-2023:4411
�'�cjose-0.6.1-13.el9_2.alma.i686.rpm�'�cjose-0.6.1-13.el9_2.alma.x86_64.rpm�'�cjose-0.6.1-13.el9_2.alma.i686.rpm�'�cjose-0.6.1-13.el9_2.alma.x86_64.rpm����R�
	��9��uBBsecurityImportant: openssh security update���]https://access.redhat.com/errata/RHSA-2023:4412RHSA-2023:4412RHSA-2023:4412https://access.redhat.com/security/cve/CVE-2023-38408CVE-2023-38408CVE-2023-38408https://bugzilla.redhat.com/22241732224173https://errata.almalinux.org/9/ALSA-2023-4412.htmlALSA-2023:4412ALSA-2023:4412
��Qopenssh-askpass-8.7p1-30.el9_2.x86_64.rpm��/pam_ssh_agent_auth-0.10.4-5.30.el9_2.x86_64.rpm��Qopenssh-askpass-8.7p1-30.el9_2.x86_64.rpm��/pam_ssh_agent_auth-0.10.4-5.30.el9_2.x86_64.rpm�����
	��>��zBBsecurityImportant: firefox security update��p�*https://access.redhat.com/errata/RHSA-2023:4462RHSA-2023:4462RHSA-2023:4462https://access.redhat.com/security/cve/CVE-2023-4045CVE-2023-4045CVE-2023-4045https://access.redhat.com/security/cve/CVE-2023-4046CVE-2023-4046CVE-2023-4046https://access.redhat.com/security/cve/CVE-2023-4047CVE-2023-4047CVE-2023-4047https://access.redhat.com/security/cve/CVE-2023-4048CVE-2023-4048CVE-2023-4048https://access.redhat.com/security/cve/CVE-2023-4049CVE-2023-4049CVE-2023-4049https://access.redhat.com/security/cve/CVE-2023-4050CVE-2023-4050CVE-2023-4050https://access.redhat.com/security/cve/CVE-2023-4055CVE-2023-4055CVE-2023-4055https://access.redhat.com/security/cve/CVE-2023-4056CVE-2023-4056CVE-2023-4056https://access.redhat.com/security/cve/CVE-2023-4057CVE-2023-4057CVE-2023-4057https://bugzilla.redhat.com/22283602228360https://bugzilla.redhat.com/22283612228361https://bugzilla.redhat.com/22283622228362https://bugzilla.redhat.com/22283632228363https://bugzilla.redhat.com/22283642228364https://bugzilla.redhat.com/22283652228365https://bugzilla.redhat.com/22283672228367https://bugzilla.redhat.com/22283702228370https://bugzilla.redhat.com/22283712228371https://errata.almalinux.org/9/ALSA-2023-4462.htmlALSA-2023:4462ALSA-2023:4462
P�]firefox-x11-102.14.0-1.el9_2.alma.x86_64.rpm8�]firefox-102.14.0-1.el9_2.alma.x86_64.rpmP�]firefox-x11-102.14.0-1.el9_2.alma.x86_64.rpm8�]firefox-102.14.0-1.el9_2.alma.x86_64.rpm����G�
	����securityImportant: thunderbird security update���Ohttps://access.redhat.com/errata/RHSA-2023:4499RHSA-2023:4499RHSA-2023:4499https://access.redhat.com/security/cve/CVE-2023-3417CVE-2023-3417CVE-2023-3417https://access.redhat.com/security/cve/CVE-2023-4045CVE-2023-4045CVE-2023-4045https://access.redhat.com/security/cve/CVE-2023-4046CVE-2023-4046CVE-2023-4046https://access.redhat.com/security/cve/CVE-2023-4047CVE-2023-4047CVE-2023-4047https://access.redhat.com/security/cve/CVE-2023-4048CVE-2023-4048CVE-2023-4048https://access.redhat.com/security/cve/CVE-2023-4049CVE-2023-4049CVE-2023-4049https://access.redhat.com/security/cve/CVE-2023-4050CVE-2023-4050CVE-2023-4050https://access.redhat.com/security/cve/CVE-2023-4055CVE-2023-4055CVE-2023-4055https://access.redhat.com/security/cve/CVE-2023-4056CVE-2023-4056CVE-2023-4056https://access.redhat.com/security/cve/CVE-2023-4057CVE-2023-4057CVE-2023-4057https://bugzilla.redhat.com/22253252225325https://bugzilla.redhat.com/22283602228360https://bugzilla.redhat.com/22283612228361https://bugzilla.redhat.com/22283622228362https://bugzilla.redhat.com/22283632228363https://bugzilla.redhat.com/22283642228364https://bugzilla.redhat.com/22283652228365https://bugzilla.redhat.com/22283672228367https://bugzilla.redhat.com/22283702228370https://bugzilla.redhat.com/22283712228371https://errata.almalinux.org/9/ALSA-2023-4499.htmlALSA-2023:4499ALSA-2023:4499
9�]thunderbird-102.14.0-1.el9_2.alma.x86_64.rpm9�]thunderbird-102.14.0-1.el9_2.alma.x86_64.rpm����Y�
	��	��BBBBBBsecurityModerate: dbus security update��i�https://access.redhat.com/errata/RHSA-2023:4569RHSA-2023:4569RHSA-2023:4569https://access.redhat.com/security/cve/CVE-2023-34969CVE-2023-34969CVE-2023-34969https://bugzilla.redhat.com/22131662213166https://errata.almalinux.org/9/ALSA-2023-4569.htmlALSA-2023:4569ALSA-2023:4569
�I�dbus-daemon-1.12.20-7.el9_2.1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_2.1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_2.1.i686.rpm�J�dbus-x11-1.12.20-7.el9_2.1.x86_64.rpm�I�dbus-daemon-1.12.20-7.el9_2.1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_2.1.x86_64.rpm�$�dbus-devel-1.12.20-7.el9_2.1.i686.rpm�J�dbus-x11-1.12.20-7.el9_2.1.x86_64.rpm�����
	��
��JBsecurityImportant: iperf3 security update��h�8https://access.redhat.com/errata/RHSA-2023:4571RHSA-2023:4571RHSA-2023:4571https://access.redhat.com/security/cve/CVE-2023-38403CVE-2023-38403CVE-2023-38403https://bugzilla.redhat.com/22222042222204https://errata.almalinux.org/9/ALSA-2023-4571.htmlALSA-2023:4571ALSA-2023:4571
�5�|iperf3-3.9-10.el9_2.alma.i686.rpm�5�|iperf3-3.9-10.el9_2.alma.x86_64.rpm�5�|iperf3-3.9-10.el9_2.alma.i686.rpm�5�|iperf3-3.9-10.el9_2.alma.x86_64.rpm����o�
	��'��NBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: rust security update�� �9https://access.redhat.com/errata/RHSA-2023:4634RHSA-2023:4634RHSA-2023:4634https://access.redhat.com/security/cve/CVE-2023-38497CVE-2023-38497CVE-2023-38497https://bugzilla.redhat.com/22280382228038https://errata.almalinux.org/9/ALSA-2023-4634.htmlALSA-2023:4634ALSA-2023:4634
�L�rust-doc-1.66.1-2.el9_2.x86_64.rpm�N�rust-src-1.66.1-2.el9_2.noarch.rpm��clippy-1.66.1-2.el9_2.x86_64.rpm��cargo-1.66.1-2.el9_2.x86_64.rpm�J�rust-analysis-1.66.1-2.el9_2.x86_64.rpm�P�rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpm�M�rust-lldb-1.66.1-2.el9_2.noarch.rpm��rust-std-static-1.66.1-2.el9_2.x86_64.rpm�L�rust-gdb-1.66.1-2.el9_2.noarch.rpm�M�rust-toolset-1.66.1-2.el9_2.x86_64.rpm�I�rust-1.66.1-2.el9_2.x86_64.rpm�K�rust-analyzer-1.66.1-2.el9_2.x86_64.rpm��rust-std-static-1.66.1-2.el9_2.i686.rpm�K�rust-debugger-common-1.66.1-2.el9_2.noarch.rpm�N�rustfmt-1.66.1-2.el9_2.x86_64.rpm�O�rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpm�L�rust-doc-1.66.1-2.el9_2.x86_64.rpm�N�rust-src-1.66.1-2.el9_2.noarch.rpm��clippy-1.66.1-2.el9_2.x86_64.rpm��cargo-1.66.1-2.el9_2.x86_64.rpm�J�rust-analysis-1.66.1-2.el9_2.x86_64.rpm�P�rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpm�M�rust-lldb-1.66.1-2.el9_2.noarch.rpm��rust-std-static-1.66.1-2.el9_2.x86_64.rpm�L�rust-gdb-1.66.1-2.el9_2.noarch.rpm�M�rust-toolset-1.66.1-2.el9_2.x86_64.rpm�I�rust-1.66.1-2.el9_2.x86_64.rpm�K�rust-analyzer-1.66.1-2.el9_2.x86_64.rpm��rust-std-static-1.66.1-2.el9_2.i686.rpm�K�rust-debugger-common-1.66.1-2.el9_2.noarch.rpm�N�rustfmt-1.66.1-2.el9_2.x86_64.rpm�O�rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpm���P�
	��<��hBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement update��Y�https://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642

�y�Kdotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpm�{�Kdotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm�x�Kaspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm�z�Kdotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpm�|�dotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpm�!�Kdotnet-host-7.0.10-1.el9_2.x86_64.rpm�}�Kdotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm�w�Kaspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpm�~�dotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm
�y�Kdotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpm�{�Kdotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm�x�Kaspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm�z�Kdotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpm�|�dotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpm�!�Kdotnet-host-7.0.10-1.el9_2.x86_64.rpm�}�Kdotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm�w�Kaspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpm�~�dotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm����
	��
��}BBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement update��p�https://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644
�L�Kaspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm�S�Xdotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpm�Q�Xdotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpm�M�Kaspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm�P�Kdotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm�O�Kdotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpm�N�Kdotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpm�R�Kdotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm�L�Kaspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm�S�Xdotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpm�Q�Xdotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpm�M�Kaspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm�P�Kdotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm�O�Kdotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpm�N�Kdotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpm�R�Kdotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm����0�
	����NBBBBBBBBBBBBsecurityImportant: cups security update���https://access.redhat.com/errata/RHSA-2023:4838RHSA-2023:4838RHSA-2023:4838https://access.redhat.com/security/cve/CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/22304952230495https://errata.almalinux.org/9/ALSA-2023-4838.htmlALSA-2023:4838ALSA-2023:4838
�-�ecups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm�,�ecups-client-2.3.3op2-16.el9_2.1.x86_64.rpm�.�ecups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm�+�ecups-2.3.3op2-16.el9_2.1.x86_64.rpm�f�ecups-devel-2.3.3op2-16.el9_2.1.i686.rpm��ecups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpm�f�ecups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm�/�ecups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpm�-�ecups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm�,�ecups-client-2.3.3op2-16.el9_2.1.x86_64.rpm�.�ecups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm�+�ecups-2.3.3op2-16.el9_2.1.x86_64.rpm�f�ecups-devel-2.3.3op2-16.el9_2.1.i686.rpm��ecups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpm�f�ecups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm�/�ecups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpm����M�	
	����]securityImportant: thunderbird security update��!�https://access.redhat.com/errata/RHSA-2023:4955RHSA-2023:4955RHSA-2023:4955https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4955.htmlALSA-2023:4955ALSA-2023:4955
9�^thunderbird-102.15.0-1.el9_2.alma.x86_64.rpm9�^thunderbird-102.15.0-1.el9_2.alma.x86_64.rpm���&�

	��$��`BBsecurityImportant: firefox security update�� �0https://access.redhat.com/errata/RHSA-2023:4958RHSA-2023:4958RHSA-2023:4958https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4958.htmlALSA-2023:4958ALSA-2023:4958
8�^firefox-102.15.0-1.el9_2.alma.x86_64.rpmP�^firefox-x11-102.15.0-1.el9_2.alma.x86_64.rpm8�^firefox-102.15.0-1.el9_2.alma.x86_64.rpmP�^firefox-x11-102.15.0-1.el9_2.alma.x86_64.rpm���M�
	��(��eBsecurityImportant: flac security update��P�whttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048
�%�5flac-libs-1.3.3-10.el9_2.1.x86_64.rpm�%�5flac-libs-1.3.3-10.el9_2.1.i686.rpm�%�5flac-libs-1.3.3-10.el9_2.1.x86_64.rpm�%�5flac-libs-1.3.3-10.el9_2.1.i686.rpm����5�
	��5��iBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update��G�_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069
'�Gperf-5.14.0-284.30.1.el9_2.x86_64.rpm#�Gkernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm$�Gkernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm&�Gkernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm%�Gkernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm)�Grtla-5.14.0-284.30.1.el9_2.x86_64.rpm'�Gperf-5.14.0-284.30.1.el9_2.x86_64.rpm#�Gkernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm$�Gkernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm&�Gkernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm%�Gkernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm)�Grtla-5.14.0-284.30.1.el9_2.x86_64.rpm�����

	��9��vBsecurityModerate: libcap security update��&�0https://access.redhat.com/errata/RHSA-2023:5071RHSA-2023:5071RHSA-2023:5071https://access.redhat.com/security/cve/CVE-2023-2602CVE-2023-2602CVE-2023-2602https://access.redhat.com/security/cve/CVE-2023-2603CVE-2023-2603CVE-2023-2603https://bugzilla.redhat.com/22091132209113https://bugzilla.redhat.com/22091142209114https://errata.almalinux.org/9/ALSA-2023-5071.htmlALSA-2023:5071ALSA-2023:5071
�>�Rlibcap-devel-2.48-9.el9_2.x86_64.rpm�>�Rlibcap-devel-2.48-9.el9_2.i686.rpm�>�Rlibcap-devel-2.48-9.el9_2.x86_64.rpm�>�Rlibcap-devel-2.48-9.el9_2.i686.rpm�����
	����zBBBBBBBBBBBsecurityModerate: keylime security update��V�hhttps://access.redhat.com/errata/RHSA-2023:5080RHSA-2023:5080RHSA-2023:5080https://access.redhat.com/security/cve/CVE-2023-38200CVE-2023-38200CVE-2023-38200https://access.redhat.com/security/cve/CVE-2023-38201CVE-2023-38201CVE-2023-38201https://bugzilla.redhat.com/22226922222692https://bugzilla.redhat.com/22226932222693https://errata.almalinux.org/9/ALSA-2023-5080.htmlALSA-2023:5080ALSA-2023:5080
�?�bkeylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm�@�bkeylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm�A�bkeylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpm�O�bpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpm�<�bkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpm�>�bkeylime-6.5.2-6.el9_2.alma.1.x86_64.rpm�B�bkeylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpm�?�bkeylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm�@�bkeylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm�A�bkeylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpm�O�bpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpm�<�bkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpm�>�bkeylime-6.5.2-6.el9_2.alma.1.x86_64.rpm�B�bkeylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpm�����
	����HBBBBBBsecurityModerate: librsvg2 security update��>�https://access.redhat.com/errata/RHSA-2023:5081RHSA-2023:5081RHSA-2023:5081https://access.redhat.com/security/cve/CVE-2023-38633CVE-2023-38633CVE-2023-38633https://bugzilla.redhat.com/22249452224945https://errata.almalinux.org/9/ALSA-2023-5081.htmlALSA-2023:5081ALSA-2023:5081
�|�glibrsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpm�b�glibrsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpm�a�glibrsvg2-2.50.7-1.el9_2.1.x86_64.rpm�b�glibrsvg2-devel-2.50.7-1.el9_2.1.i686.rpm�a�glibrsvg2-2.50.7-1.el9_2.1.i686.rpm�|�glibrsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpm�b�glibrsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpm�a�glibrsvg2-2.50.7-1.el9_2.1.x86_64.rpm�b�glibrsvg2-devel-2.50.7-1.el9_2.1.i686.rpm�a�glibrsvg2-2.50.7-1.el9_2.1.i686.rpm����]�
	��5��QBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security and bug fix update��N�Bhttps://access.redhat.com/errata/RHSA-2023:5094RHSA-2023:5094RHSA-2023:5094https://access.redhat.com/security/cve/CVE-2023-3354CVE-2023-3354CVE-2023-3354https://bugzilla.redhat.com/22164782216478https://errata.almalinux.org/9/ALSA-2023-5094.htmlALSA-2023:5094ALSA-2023:5094
�>bqemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�7bqemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�;bqemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�@bqemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�9bqemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�:bqemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�6bqemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�Abqemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�1bqemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�?bqemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�5bqemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�<bqemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�=bqemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�4bqemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�2bqemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�8bqemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�0bqemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�3bqemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�>bqemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�7bqemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�;bqemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�@bqemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�9bqemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�:bqemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�6bqemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�Abqemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�1bqemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�?bqemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�5bqemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�<bqemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�=bqemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�4bqemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�2bqemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�8bqemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�0bqemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�3bqemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpm�����
	����vBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security update���Rhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143
�O�Ldotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpm�R�Ldotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm�L�Laspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm�S�Ydotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpm�N�Ldotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpm�Q�Ydotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpm�M�Laspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm�P�Ldotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm�O�Ldotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpm�R�Ldotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm�L�Laspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm�S�Ydotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpm�N�Ldotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpm�Q�Ydotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpm�M�Laspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm�P�Ldotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm����~�
	����GBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security update��b�Rhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146

�!�Ldotnet-host-7.0.11-1.el9_2.x86_64.rpm�}�Ldotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpm�z�Ldotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpm�x�Laspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpm�~�dotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpm�y�Ldotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpm�|�dotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpm�{�Ldotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm�w�Laspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm
�!�Ldotnet-host-7.0.11-1.el9_2.x86_64.rpm�}�Ldotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpm�z�Ldotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpm�x�Laspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpm�~�dotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpm�y�Ldotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpm�|�dotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpm�{�Ldotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm�w�Laspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm����q�
	����\BsecurityImportant: frr security update��4�jhttps://access.redhat.com/errata/RHSA-2023:5194RHSA-2023:5194RHSA-2023:5194https://access.redhat.com/security/cve/CVE-2023-38802CVE-2023-38802CVE-2023-38802https://bugzilla.redhat.com/22309832230983https://errata.almalinux.org/9/ALSA-2023-5194.htmlALSA-2023:5194ALSA-2023:5194
�6�frr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpm�9�frr-8.3.1-5.el9_2.2.alma.x86_64.rpm�6�frr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpm�9�frr-8.3.1-5.el9_2.2.alma.x86_64.rpm����*�
	��$��`BBsecurityImportant: firefox security update���7https://access.redhat.com/errata/RHSA-2023:5200RHSA-2023:5200RHSA-2023:5200https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5200.htmlALSA-2023:5200ALSA-2023:5200
8�_firefox-102.15.1-1.el9_2.alma.x86_64.rpmP�_firefox-x11-102.15.1-1.el9_2.alma.x86_64.rpm8�_firefox-102.15.1-1.el9_2.alma.x86_64.rpmP�_firefox-x11-102.15.1-1.el9_2.alma.x86_64.rpm����M�
	��+��eBBBBsecurityImportant: libwebp security update��U�-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214
�E�Xlibwebp-devel-1.2.0-7.el9_2.i686.rpm�D�Xlibwebp-1.2.0-7.el9_2.i686.rpm�E�Xlibwebp-devel-1.2.0-7.el9_2.x86_64.rpm�D�Xlibwebp-1.2.0-7.el9_2.x86_64.rpm�E�Xlibwebp-devel-1.2.0-7.el9_2.i686.rpm�D�Xlibwebp-1.2.0-7.el9_2.i686.rpm�E�Xlibwebp-devel-1.2.0-7.el9_2.x86_64.rpm�D�Xlibwebp-1.2.0-7.el9_2.x86_64.rpm����^�
	��.��lsecurityImportant: thunderbird security update���https://access.redhat.com/errata/RHSA-2023:5224RHSA-2023:5224RHSA-2023:5224https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5224.htmlALSA-2023:5224ALSA-2023:5224
9�_thunderbird-102.15.1-1.el9_2.alma.x86_64.rpm9�_thunderbird-102.15.1-1.el9_2.alma.x86_64.rpm����p�
	��9��oBBBBBBBBsecurityImportant: open-vm-tools security update���lhttps://access.redhat.com/errata/RHSA-2023:5313RHSA-2023:5313RHSA-2023:5313https://access.redhat.com/security/cve/CVE-2023-20900CVE-2023-20900CVE-2023-20900https://bugzilla.redhat.com/22365422236542https://errata.almalinux.org/9/ALSA-2023-5313.htmlALSA-2023:5313ALSA-2023:5313
��lopen-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpm�
�lopen-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpm��lopen-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpm�	�lopen-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpm�M�lopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpm��lopen-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpm�
�lopen-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpm��lopen-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpm�	�lopen-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpm�M�lopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpm�����
	���aBF�TBBBBBBBsecurityImportant: nodejs:18 security, bug fix, and enhancement update��t�.
https://access.redhat.com/errata/RHSA-2023:5363RHSA-2023:5363RHSA-2023:5363https://access.redhat.com/security/cve/CVE-2022-25883CVE-2022-25883CVE-2022-25883https://access.redhat.com/security/cve/CVE-2023-32002CVE-2023-32002CVE-2023-32002https://access.redhat.com/security/cve/CVE-2023-32006CVE-2023-32006CVE-2023-32006https://access.redhat.com/security/cve/CVE-2023-32559CVE-2023-32559CVE-2023-32559https://bugzilla.redhat.com/22164752216475https://bugzilla.redhat.com/22309482230948https://bugzilla.redhat.com/22309552230955https://bugzilla.redhat.com/22309562230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlALSA-2023:5363ALSA-2023:5363
,��?*d�Anpm-9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5.x86_64.rpme� nodejs-full-i18n-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm,� nodejs-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm>� nodejs-docs-18.17.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�#� nodejs-devel-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm,��?*d�Anpm-9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5.x86_64.rpme� nodejs-full-i18n-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm,� nodejs-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm>� nodejs-docs-18.17.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�#� nodejs-devel-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm��Ѹ
�
	����DBBsecurityImportant: firefox security update��"�Whttps://access.redhat.com/errata/RHSA-2023:5434RHSA-2023:5434RHSA-2023:5434https://access.redhat.com/security/cve/CVE-2023-3600CVE-2023-3600CVE-2023-3600https://access.redhat.com/security/cve/CVE-2023-5169CVE-2023-5169CVE-2023-5169https://access.redhat.com/security/cve/CVE-2023-5171CVE-2023-5171CVE-2023-5171https://access.redhat.com/security/cve/CVE-2023-5176CVE-2023-5176CVE-2023-5176https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22226522222652https://bugzilla.redhat.com/22408932240893https://bugzilla.redhat.com/22408942240894https://bugzilla.redhat.com/22408962240896https://bugzilla.redhat.com/22411912241191https://errata.almalinux.org/9/ALSA-2023-5434.htmlALSA-2023:5434ALSA-2023:5434
8�firefox-115.3.1-1.el9_2.alma.1.x86_64.rpmP�firefox-x11-115.3.1-1.el9_2.alma.1.x86_64.rpm8�firefox-115.3.1-1.el9_2.alma.1.x86_64.rpmP�firefox-x11-115.3.1-1.el9_2.alma.1.x86_64.rpm����D�
	����IsecurityImportant: thunderbird security update��y�&https://access.redhat.com/errata/RHSA-2023:5435RHSA-2023:5435RHSA-2023:5435https://access.redhat.com/security/cve/CVE-2023-3600CVE-2023-3600CVE-2023-3600https://access.redhat.com/security/cve/CVE-2023-5169CVE-2023-5169CVE-2023-5169https://access.redhat.com/security/cve/CVE-2023-5171CVE-2023-5171CVE-2023-5171https://access.redhat.com/security/cve/CVE-2023-5176CVE-2023-5176CVE-2023-5176https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22226522222652https://bugzilla.redhat.com/22408932240893https://bugzilla.redhat.com/22408942240894https://bugzilla.redhat.com/22408962240896https://bugzilla.redhat.com/22411912241191https://errata.almalinux.org/9/ALSA-2023-5435.htmlALSA-2023:5435ALSA-2023:5435
9�thunderbird-115.3.1-1.el9_2.alma.x86_64.rpm9�thunderbird-115.3.1-1.el9_2.alma.x86_64.rpm����3�
	����LBBBBBBBBsecurityImportant: glibc security update���
https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453
�@�glibc-locale-source-2.34-60.el9_2.7.x86_64.rpm�h�glibc-devel-2.34-60.el9_2.7.x86_64.rpm�(�glibc-doc-2.34-60.el9_2.7.noarch.rpm�A�glibc-utils-2.34-60.el9_2.7.x86_64.rpm�h�glibc-devel-2.34-60.el9_2.7.i686.rpm�?�glibc-headers-2.34-60.el9_2.7.x86_64.rpm�@�glibc-locale-source-2.34-60.el9_2.7.x86_64.rpm�h�glibc-devel-2.34-60.el9_2.7.x86_64.rpm�(�glibc-doc-2.34-60.el9_2.7.noarch.rpm�A�glibc-utils-2.34-60.el9_2.7.x86_64.rpm�h�glibc-devel-2.34-60.el9_2.7.i686.rpm�?�glibc-headers-2.34-60.el9_2.7.x86_64.rpm����x�
	��!��WBBBBBBBBsecurityImportant: python3.11 security update��+�ihttps://access.redhat.com/errata/RHSA-2023:5456RHSA-2023:5456RHSA-2023:5456https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5456.htmlALSA-2023:5456ALSA-2023:5456
\�%python3.11-libs-3.11.2-2.el9_2.2.i686.rpm�P�%python3.11-3.11.2-2.el9_2.2.x86_64.rpm\�%python3.11-libs-3.11.2-2.el9_2.2.x86_64.rpm[�%python3.11-devel-3.11.2-2.el9_2.2.x86_64.rpm[�%python3.11-devel-3.11.2-2.el9_2.2.i686.rpm�Q�%python3.11-tkinter-3.11.2-2.el9_2.2.x86_64.rpm\�%python3.11-libs-3.11.2-2.el9_2.2.i686.rpm�P�%python3.11-3.11.2-2.el9_2.2.x86_64.rpm\�%python3.11-libs-3.11.2-2.el9_2.2.x86_64.rpm[�%python3.11-devel-3.11.2-2.el9_2.2.x86_64.rpm[�%python3.11-devel-3.11.2-2.el9_2.2.i686.rpm�Q�%python3.11-tkinter-3.11.2-2.el9_2.2.x86_64.rpm����=�
	��0��bBBBBBBBBBBBBsecurityImportant: ghostscript security update���https://access.redhat.com/errata/RHSA-2023:5459RHSA-2023:5459RHSA-2023:5459https://access.redhat.com/security/cve/CVE-2023-36664CVE-2023-36664CVE-2023-36664https://bugzilla.redhat.com/22177982217798https://errata.almalinux.org/9/ALSA-2023-5459.htmlALSA-2023:5459ALSA-2023:5459
��mghostscript-tools-fonts-9.54.0-10.el9_2.x86_64.rpm��mghostscript-9.54.0-10.el9_2.x86_64.rpm��mghostscript-x11-9.54.0-10.el9_2.x86_64.rpm�e�mlibgs-9.54.0-10.el9_2.x86_64.rpm�k�mghostscript-doc-9.54.0-10.el9_2.noarch.rpm��mghostscript-tools-printing-9.54.0-10.el9_2.x86_64.rpm��mghostscript-tools-dvipdf-9.54.0-10.el9_2.x86_64.rpm�e�mlibgs-9.54.0-10.el9_2.i686.rpm��mghostscript-tools-fonts-9.54.0-10.el9_2.x86_64.rpm��mghostscript-9.54.0-10.el9_2.x86_64.rpm��mghostscript-x11-9.54.0-10.el9_2.x86_64.rpm�e�mlibgs-9.54.0-10.el9_2.x86_64.rpm�k�mghostscript-doc-9.54.0-10.el9_2.noarch.rpm��mghostscript-tools-printing-9.54.0-10.el9_2.x86_64.rpm��mghostscript-tools-dvipdf-9.54.0-10.el9_2.x86_64.rpm�e�mlibgs-9.54.0-10.el9_2.i686.rpm����d�
	��7��qBBBBsecurityImportant: python3.9 security update��%�https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462
f�python-unversioned-command-3.9.16-1.el9_2.2.noarch.rpmQ�python3-devel-3.9.16-1.el9_2.2.i686.rpmQ�python3-devel-3.9.16-1.el9_2.2.x86_64.rpm�+�python3-tkinter-3.9.16-1.el9_2.2.x86_64.rpmf�python-unversioned-command-3.9.16-1.el9_2.2.noarch.rpmQ�python3-devel-3.9.16-1.el9_2.2.i686.rpmQ�python3-devel-3.9.16-1.el9_2.2.x86_64.rpm�+�python3-tkinter-3.9.16-1.el9_2.2.x86_64.rpm����O�
	����xBBBBBBBsecurityImportant: nodejs security and bug fix update��@�Thttps://access.redhat.com/errata/RHSA-2023:5532RHSA-2023:5532RHSA-2023:5532https://access.redhat.com/security/cve/CVE-2023-32002CVE-2023-32002CVE-2023-32002https://access.redhat.com/security/cve/CVE-2023-32006CVE-2023-32006CVE-2023-32006https://access.redhat.com/security/cve/CVE-2023-32559CVE-2023-32559CVE-2023-32559https://bugzilla.redhat.com/22309482230948https://bugzilla.redhat.com/22309552230955https://bugzilla.redhat.com/22309562230956https://errata.almalinux.org/9/ALSA-2023-5532.htmlALSA-2023:5532ALSA-2023:5532
,�nodejs-16.20.2-1.el9_2.x86_64.rpm��nodejs-libs-16.20.2-1.el9_2.x86_64.rpme�nodejs-full-i18n-16.20.2-1.el9_2.x86_64.rpmd�:npm-8.19.4-1.16.20.2.1.el9_2.x86_64.rpm>�nodejs-docs-16.20.2-1.el9_2.noarch.rpm,�nodejs-16.20.2-1.el9_2.x86_64.rpm��nodejs-libs-16.20.2-1.el9_2.x86_64.rpme�nodejs-full-i18n-16.20.2-1.el9_2.x86_64.rpmd�:npm-8.19.4-1.16.20.2.1.el9_2.x86_64.rpm>�nodejs-docs-16.20.2-1.el9_2.noarch.rpm����� 
	����BBsecurityImportant: libvpx security update���https://access.redhat.com/errata/RHSA-2023:5539RHSA-2023:5539RHSA-2023:5539https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22411912241191https://bugzilla.redhat.com/22418062241806https://errata.almalinux.org/9/ALSA-2023-5539.htmlALSA-2023:5539ALSA-2023:5539
�7�>libvpx-1.9.0-7.el9_2.alma.1.i686.rpm�7�>libvpx-1.9.0-7.el9_2.alma.1.x86_64.rpm�7�>libvpx-1.9.0-7.el9_2.alma.1.i686.rpm�7�>libvpx-1.9.0-7.el9_2.alma.1.x86_64.rpm����w�!
	����FBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: galera and mariadb security update���Uhttps://access.redhat.com/errata/RHSA-2023:5684RHSA-2023:5684RHSA-2023:5684https://access.redhat.com/security/cve/CVE-2022-32081CVE-2022-32081CVE-2022-32081https://access.redhat.com/security/cve/CVE-2022-32082CVE-2022-32082CVE-2022-32082https://access.redhat.com/security/cve/CVE-2022-32084CVE-2022-32084CVE-2022-32084https://access.redhat.com/security/cve/CVE-2022-32089CVE-2022-32089CVE-2022-32089https://access.redhat.com/security/cve/CVE-2022-32091CVE-2022-32091CVE-2022-32091https://access.redhat.com/security/cve/CVE-2022-38791CVE-2022-38791CVE-2022-38791https://access.redhat.com/security/cve/CVE-2022-47015CVE-2022-47015CVE-2022-47015https://access.redhat.com/security/cve/CVE-2023-5157CVE-2023-5157CVE-2023-5157https://bugzilla.redhat.com/21060282106028https://bugzilla.redhat.com/21060302106030https://bugzilla.redhat.com/21060342106034https://bugzilla.redhat.com/21060352106035https://bugzilla.redhat.com/21060422106042https://bugzilla.redhat.com/21301052130105https://bugzilla.redhat.com/21636092163609https://bugzilla.redhat.com/22402462240246https://errata.almalinux.org/9/ALSA-2023-5684.htmlALSA-2023:5684ALSA-2023:5684
�~�<mariadb-embedded-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-oqgraph-engine-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-pam-10.5.22-1.el9_2.alma.1.x86_64.rpm�9�lgalera-26.4.14-1.el9_2.alma.1.x86_64.rpm��<mariadb-server-galera-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-server-utils-10.5.22-1.el9_2.alma.1.x86_64.rpm�}�<mariadb-common-10.5.22-1.el9_2.alma.1.x86_64.rpm�|�<mariadb-backup-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-gssapi-server-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-server-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-errmsg-10.5.22-1.el9_2.alma.1.x86_64.rpm�~�<mariadb-embedded-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-oqgraph-engine-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-pam-10.5.22-1.el9_2.alma.1.x86_64.rpm�9�lgalera-26.4.14-1.el9_2.alma.1.x86_64.rpm��<mariadb-server-galera-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-server-utils-10.5.22-1.el9_2.alma.1.x86_64.rpm�}�<mariadb-common-10.5.22-1.el9_2.alma.1.x86_64.rpm�|�<mariadb-backup-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-gssapi-server-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-server-10.5.22-1.el9_2.alma.1.x86_64.rpm��<mariadb-errmsg-10.5.22-1.el9_2.alma.1.x86_64.rpm����;�"
	��,��_BBBBBBBBBBBsecurityImportant: bind security update��m�Ehttps://access.redhat.com/errata/RHSA-2023:5689RHSA-2023:5689RHSA-2023:5689https://access.redhat.com/security/cve/CVE-2023-3341CVE-2023-3341CVE-2023-3341https://bugzilla.redhat.com/22396212239621https://errata.almalinux.org/9/ALSA-2023-5689.htmlALSA-2023:5689ALSA-2023:5689
�"�bind-license-9.16.23-11.el9_2.2.noarch.rpm�'�python3-bind-9.16.23-11.el9_2.2.noarch.rpm�!�bind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpm�[�bind-chroot-9.16.23-11.el9_2.2.x86_64.rpm�\�bind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpm�^�bind-utils-9.16.23-11.el9_2.2.x86_64.rpm�Z�bind-9.16.23-11.el9_2.2.x86_64.rpm�]�bind-libs-9.16.23-11.el9_2.2.x86_64.rpm�"�bind-license-9.16.23-11.el9_2.2.noarch.rpm�'�python3-bind-9.16.23-11.el9_2.2.noarch.rpm�!�bind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpm�[�bind-chroot-9.16.23-11.el9_2.2.x86_64.rpm�\�bind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpm�^�bind-utils-9.16.23-11.el9_2.2.x86_64.rpm�Z�bind-9.16.23-11.el9_2.2.x86_64.rpm�]�bind-libs-9.16.23-11.el9_2.2.x86_64.rpm�����#
	��=��mBBBBBBBBBBBBBBsecurityImportant: dotnet6.0 security update��2�ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708
�Q�Zdotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpm�P�Mdotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm�S�Zdotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpm�L�Maspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm�N�Mdotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpm�O�Mdotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpm�M�Maspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm�R�Mdotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm�Q�Zdotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpm�P�Mdotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm�S�Zdotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpm�L�Maspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm�N�Mdotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpm�O�Mdotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpm�M�Maspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm�R�Mdotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm����r�$
	����~BBBBBBBBBBBBBBsecurityModerate: nginx security update��!�Qhttps://access.redhat.com/errata/RHSA-2023:5711RHSA-2023:5711RHSA-2023:5711https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5711.htmlALSA-2023:5711ALSA-2023:5711
	�G�jnginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpm��jnginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpm�H�jnginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpm�v�jnginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpm�O�jnginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpm	�G�jnginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpm��jnginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpm�H�jnginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpm�v�jnginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpm�O�jnginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpm��jnginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpm����H�%
	����OBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update��r�Ehttps://access.redhat.com/errata/RHSA-2023:5733RHSA-2023:5733RHSA-2023:5733https://access.redhat.com/security/cve/CVE-2022-40433CVE-2022-40433CVE-2022-40433https://access.redhat.com/security/cve/CVE-2023-22067CVE-2023-22067CVE-2023-22067https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22377092237709https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22436372243637https://errata.almalinux.org/9/ALSA-2023-5733.htmlALSA-2023:5733ALSA-2023:5733
�X�mjava-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpm�8�mjava-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpm�W�mjava-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpm�T�mjava-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpm�U�mjava-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpm�7�mjava-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpm�V�mjava-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpm�X�mjava-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpm�8�mjava-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpm�W�mjava-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpm�T�mjava-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpm�U�mjava-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpm�7�mjava-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpm�V�mjava-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpm���(�&
	��(��\BBBBBBBBBBsecurityImportant: go-toolset and golang security and bug fix update��7�https://access.redhat.com/errata/RHSA-2023:5738RHSA-2023:5738RHSA-2023:5738https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-5738.htmlALSA-2023:5738ALSA-2023:5738
o�golang-src-1.19.13-1.el9_2.noarch.rpm�G�golang-1.19.13-1.el9_2.x86_64.rpm�H�golang-bin-1.19.13-1.el9_2.x86_64.rpmm�golang-docs-1.19.13-1.el9_2.noarch.rpm�N�go-toolset-1.19.13-1.el9_2.x86_64.rpm�T�golang-race-1.19.13-1.el9_2.x86_64.rpmn�golang-misc-1.19.13-1.el9_2.noarch.rpmp�golang-tests-1.19.13-1.el9_2.noarch.rpmo�golang-src-1.19.13-1.el9_2.noarch.rpm�G�golang-1.19.13-1.el9_2.x86_64.rpm�H�golang-bin-1.19.13-1.el9_2.x86_64.rpmm�golang-docs-1.19.13-1.el9_2.noarch.rpm�N�go-toolset-1.19.13-1.el9_2.x86_64.rpm�T�golang-race-1.19.13-1.el9_2.x86_64.rpmn�golang-misc-1.19.13-1.el9_2.noarch.rpmp�golang-tests-1.19.13-1.el9_2.noarch.rpm����=�'
	��;��iBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update��=�&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744
	�I�java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpm�D�java-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpm�K�java-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm	�I�java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpm�D�java-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpm�K�java-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm��˶	�(
	����|BBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update��c�ohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749

�z�Mdotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpm�"�
netstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpm�{�Mdotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpm�|�
dotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpm�x�Maspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm�w�Maspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpm�~�
dotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpm�!�Mdotnet-host-7.0.12-1.el9_2.x86_64.rpm�}�Mdotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm�y�Mdotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpm
�z�Mdotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpm�"�
netstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpm�{�Mdotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpm�|�
dotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpm�x�Maspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm�w�Maspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpm�~�
dotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpm�!�Mdotnet-host-7.0.12-1.el9_2.x86_64.rpm�}�Mdotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm�y�Mdotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpm�����)
	��#��QBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update��R�<https://access.redhat.com/errata/RHSA-2023:5753RHSA-2023:5753RHSA-2023:5753https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-5753.htmlALSA-2023:5753ALSA-2023:5753
	��0java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-jmods-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-headless-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-javadoc-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-devel-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-src-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-static-libs-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-demo-17.0.9.0.9-2.el9.x86_64.rpm	��0java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-jmods-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-headless-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-javadoc-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-devel-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-src-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-static-libs-17.0.9.0.9-2.el9.x86_64.rpm��0java-17-openjdk-demo-17.0.9.0.9-2.el9.x86_64.rpm��˩l�*
	��'��dBsecurityImportant: curl security update���}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763
��libcurl-devel-7.76.1-23.el9_2.4.i686.rpm��libcurl-devel-7.76.1-23.el9_2.4.x86_64.rpm��libcurl-devel-7.76.1-23.el9_2.4.i686.rpm��libcurl-devel-7.76.1-23.el9_2.4.x86_64.rpm����e�+
	��2��hBBBBBBBBsecurityImportant: nodejs security update���Mhttps://access.redhat.com/errata/RHSA-2023:5765RHSA-2023:5765RHSA-2023:5765https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5765.htmlALSA-2023:5765ALSA-2023:5765
>�anodejs-docs-16.20.2-3.el9_2.noarch.rpm��anodejs-libs-16.20.2-3.el9_2.i686.rpme�anodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpm��anodejs-libs-16.20.2-3.el9_2.x86_64.rpmd�;npm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm,�anodejs-16.20.2-3.el9_2.x86_64.rpm>�anodejs-docs-16.20.2-3.el9_2.noarch.rpm��anodejs-libs-16.20.2-3.el9_2.i686.rpme�anodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpm��anodejs-libs-16.20.2-3.el9_2.x86_64.rpmd�;npm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm,�anodejs-16.20.2-3.el9_2.x86_64.rpm����[�,
	��<�aBF�MBBBBBBBsecurityImportant: nodejs:18 security update��X�
https://access.redhat.com/errata/RHSA-2023:5849RHSA-2023:5849RHSA-2023:5849https://access.redhat.com/security/cve/CVE-2023-38552CVE-2023-38552CVE-2023-38552https://access.redhat.com/security/cve/CVE-2023-39333CVE-2023-39333CVE-2023-39333https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://access.redhat.com/security/cve/CVE-2023-45143CVE-2023-45143CVE-2023-45143https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22441042244104https://bugzilla.redhat.com/22444152244415https://bugzilla.redhat.com/22444182244418https://errata.almalinux.org/9/ALSA-2023-5849.htmlALSA-2023:5849ALSA-2023:5849
,��@*e�!nodejs-full-i18n-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpmd�Bnpm-9.8.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e20.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm,�!nodejs-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm>�!nodejs-docs-18.18.2-2.module_el9.2.0+43+3ebc9e20.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�#�!nodejs-devel-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm,��@*e�!nodejs-full-i18n-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpmd�Bnpm-9.8.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e20.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm,�!nodejs-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm>�!nodejs-docs-18.18.2-2.module_el9.2.0+43+3ebc9e20.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�#�!nodejs-devel-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm����
�-
	��?��}securityModerate: grafana security update��r�https://access.redhat.com/errata/RHSA-2023:5867RHSA-2023:5867RHSA-2023:5867https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-5867.htmlALSA-2023:5867ALSA-2023:5867
�I�[grafana-9.0.9-4.el9_2.alma.1.x86_64.rpm�I�[grafana-9.0.9-4.el9_2.alma.1.x86_64.rpm��œ5�.
	����@BBBsecurityImportant: varnish security update��}�https://access.redhat.com/errata/RHSA-2023:5924RHSA-2023:5924RHSA-2023:5924https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5924.htmlALSA-2023:5924ALSA-2023:5924
�P�varnish-6.6.2-3.el9_2.1.i686.rpm�P�varnish-6.6.2-3.el9_2.1.x86_64.rpm�N�varnish-docs-6.6.2-3.el9_2.1.x86_64.rpm�P�varnish-6.6.2-3.el9_2.1.i686.rpm�P�varnish-6.6.2-3.el9_2.1.x86_64.rpm�N�varnish-docs-6.6.2-3.el9_2.1.x86_64.rpm����{�/
	��8��FBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php security update��
�rhttps://access.redhat.com/errata/RHSA-2023:5926RHSA-2023:5926RHSA-2023:5926https://access.redhat.com/security/cve/CVE-2023-0567CVE-2023-0567CVE-2023-0567https://access.redhat.com/security/cve/CVE-2023-0568CVE-2023-0568CVE-2023-0568https://access.redhat.com/security/cve/CVE-2023-0662CVE-2023-0662CVE-2023-0662https://access.redhat.com/security/cve/CVE-2023-3247CVE-2023-3247CVE-2023-3247https://access.redhat.com/security/cve/CVE-2023-3823CVE-2023-3823CVE-2023-3823https://access.redhat.com/security/cve/CVE-2023-3824CVE-2023-3824CVE-2023-3824https://bugzilla.redhat.com/21707612170761https://bugzilla.redhat.com/21707702170770https://bugzilla.redhat.com/21707712170771https://bugzilla.redhat.com/22192902219290https://bugzilla.redhat.com/22293962229396https://bugzilla.redhat.com/22301012230101https://errata.almalinux.org/9/ALSA-2023-5926.htmlALSA-2023:5926ALSA-2023:5926
�Bphp-pgsql-8.0.30-1.el9_2.x86_64.rpm�Bphp-enchant-8.0.30-1.el9_2.x86_64.rpm�Bphp-embedded-8.0.30-1.el9_2.x86_64.rpm�Bphp-ffi-8.0.30-1.el9_2.x86_64.rpm�Bphp-dba-8.0.30-1.el9_2.x86_64.rpm�Bphp-fpm-8.0.30-1.el9_2.x86_64.rpm�Bphp-8.0.30-1.el9_2.x86_64.rpm�Bphp-ldap-8.0.30-1.el9_2.x86_64.rpm�Bphp-soap-8.0.30-1.el9_2.x86_64.rpm�Bphp-xml-8.0.30-1.el9_2.x86_64.rpm�Bphp-pdo-8.0.30-1.el9_2.x86_64.rpm�	Bphp-cli-8.0.30-1.el9_2.x86_64.rpm�Bphp-snmp-8.0.30-1.el9_2.x86_64.rpm�Bphp-dbg-8.0.30-1.el9_2.x86_64.rpm�Bphp-odbc-8.0.30-1.el9_2.x86_64.rpm�Bphp-bcmath-8.0.30-1.el9_2.x86_64.rpm�Bphp-opcache-8.0.30-1.el9_2.x86_64.rpm�Bphp-process-8.0.30-1.el9_2.x86_64.rpm�Bphp-gmp-8.0.30-1.el9_2.x86_64.rpm�
Bphp-common-8.0.30-1.el9_2.x86_64.rpm�Bphp-mysqlnd-8.0.30-1.el9_2.x86_64.rpm�Bphp-intl-8.0.30-1.el9_2.x86_64.rpm�Bphp-mbstring-8.0.30-1.el9_2.x86_64.rpm�
Bphp-devel-8.0.30-1.el9_2.x86_64.rpm�Bphp-gd-8.0.30-1.el9_2.x86_64.rpm�Bphp-pgsql-8.0.30-1.el9_2.x86_64.rpm�Bphp-enchant-8.0.30-1.el9_2.x86_64.rpm�Bphp-embedded-8.0.30-1.el9_2.x86_64.rpm�Bphp-ffi-8.0.30-1.el9_2.x86_64.rpm�Bphp-dba-8.0.30-1.el9_2.x86_64.rpm�Bphp-fpm-8.0.30-1.el9_2.x86_64.rpm�Bphp-8.0.30-1.el9_2.x86_64.rpm�Bphp-ldap-8.0.30-1.el9_2.x86_64.rpm�Bphp-soap-8.0.30-1.el9_2.x86_64.rpm�Bphp-xml-8.0.30-1.el9_2.x86_64.rpm�Bphp-pdo-8.0.30-1.el9_2.x86_64.rpm�	Bphp-cli-8.0.30-1.el9_2.x86_64.rpm�Bphp-snmp-8.0.30-1.el9_2.x86_64.rpm�Bphp-dbg-8.0.30-1.el9_2.x86_64.rpm�Bphp-odbc-8.0.30-1.el9_2.x86_64.rpm�Bphp-bcmath-8.0.30-1.el9_2.x86_64.rpm�Bphp-opcache-8.0.30-1.el9_2.x86_64.rpm�Bphp-process-8.0.30-1.el9_2.x86_64.rpm�Bphp-gmp-8.0.30-1.el9_2.x86_64.rpm�
Bphp-common-8.0.30-1.el9_2.x86_64.rpm�Bphp-mysqlnd-8.0.30-1.el9_2.x86_64.rpm�Bphp-intl-8.0.30-1.el9_2.x86_64.rpm�Bphp-mbstring-8.0.30-1.el9_2.x86_64.rpm�
Bphp-devel-8.0.30-1.el9_2.x86_64.rpm�Bphp-gd-8.0.30-1.el9_2.x86_64.rpm����d�0
	����yBBBBBBsecurityImportant: tomcat security update���)https://access.redhat.com/errata/RHSA-2023:5929RHSA-2023:5929RHSA-2023:5929https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5929.htmlALSA-2023:5929ALSA-2023:5929
��1tomcat-docs-webapp-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-lib-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-webapps-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-jsp-2.3-api-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-admin-webapps-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-servlet-4.0-api-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-el-3.0-api-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-docs-webapp-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-lib-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-webapps-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-jsp-2.3-api-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-admin-webapps-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-servlet-4.0-api-9.0.62-11.el9_2.3.noarch.rpm��1tomcat-el-3.0-api-9.0.62-11.el9_2.3.noarch.rpm���I�1
	����BBBsecurityModerate: toolbox security update��(� https://access.redhat.com/errata/RHSA-2023:6077RHSA-2023:6077RHSA-2023:6077https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-6077.htmlALSA-2023:6077ALSA-2023:6077
�
�_toolbox-tests-0.0.99.3-10.el9_2.x86_64.rpm��_toolbox-0.0.99.3-10.el9_2.x86_64.rpm�
�_toolbox-tests-0.0.99.3-10.el9_2.x86_64.rpm��_toolbox-0.0.99.3-10.el9_2.x86_64.rpm����2
	����GBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.22 security update��H�Qhttps://access.redhat.com/errata/RHSA-2023:6120RHSA-2023:6120RHSA-2023:6120https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6120.htmlALSA-2023:6120ALSA-2023:6120
�O�T�A*
��nginx-mod-http-xslt-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-mod-devel-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-core-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm�O�nginx-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm�v�nginx-mod-stream-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm�G�nginx-all-modules-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpm�H�nginx-filesystem-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpm��nginx-mod-http-image-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-mod-mail-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-mod-http-perl-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm�O�T�A*
��nginx-mod-http-xslt-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-mod-devel-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-core-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm�O�nginx-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm�v�nginx-mod-stream-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm�G�nginx-all-modules-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpm�H�nginx-filesystem-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpm��nginx-mod-http-image-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-mod-mail-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm��nginx-mod-http-perl-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm���`�3
	����ZsecurityLow: libguestfs-winsupport security update�6���https://access.redhat.com/errata/RHSA-2023:6167RHSA-2023:6167RHSA-2023:6167https://access.redhat.com/security/cve/CVE-2022-40284CVE-2022-40284CVE-2022-40284https://bugzilla.redhat.com/22361302236130https://errata.almalinux.org/9/ALSA-2023-6167.htmlALSA-2023:6167ALSA-2023:6167
�y�]libguestfs-winsupport-9.2-2.el9_2.x86_64.rpm�y�]libguestfs-winsupport-9.2-2.el9_2.x86_64.rpm����W�4
	��!��]BBsecurityImportant: firefox security update���Hhttps://access.redhat.com/errata/RHSA-2023:6188RHSA-2023:6188RHSA-2023:6188https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5721CVE-2023-5721CVE-2023-5721https://access.redhat.com/security/cve/CVE-2023-5724CVE-2023-5724CVE-2023-5724https://access.redhat.com/security/cve/CVE-2023-5725CVE-2023-5725CVE-2023-5725https://access.redhat.com/security/cve/CVE-2023-5728CVE-2023-5728CVE-2023-5728https://access.redhat.com/security/cve/CVE-2023-5730CVE-2023-5730CVE-2023-5730https://access.redhat.com/security/cve/CVE-2023-5732CVE-2023-5732CVE-2023-5732https://bugzilla.redhat.com/22418062241806https://bugzilla.redhat.com/22458962245896https://bugzilla.redhat.com/22458982245898https://bugzilla.redhat.com/22458992245899https://bugzilla.redhat.com/22459002245900https://bugzilla.redhat.com/22459032245903https://bugzilla.redhat.com/22459062245906https://errata.almalinux.org/9/ALSA-2023-6188.htmlALSA-2023:6188ALSA-2023:6188
P�firefox-x11-115.4.0-1.el9_2.alma.1.x86_64.rpm8�firefox-115.4.0-1.el9_2.alma.1.x86_64.rpmP�firefox-x11-115.4.0-1.el9_2.alma.1.x86_64.rpm8�firefox-115.4.0-1.el9_2.alma.1.x86_64.rpm����h�5
	��$��bsecurityImportant: thunderbird security update��c�https://access.redhat.com/errata/RHSA-2023:6191RHSA-2023:6191RHSA-2023:6191https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5721CVE-2023-5721CVE-2023-5721https://access.redhat.com/security/cve/CVE-2023-5724CVE-2023-5724CVE-2023-5724https://access.redhat.com/security/cve/CVE-2023-5725CVE-2023-5725CVE-2023-5725https://access.redhat.com/security/cve/CVE-2023-5728CVE-2023-5728CVE-2023-5728https://access.redhat.com/security/cve/CVE-2023-5730CVE-2023-5730CVE-2023-5730https://access.redhat.com/security/cve/CVE-2023-5732CVE-2023-5732CVE-2023-5732https://bugzilla.redhat.com/22418062241806https://bugzilla.redhat.com/22458962245896https://bugzilla.redhat.com/22458982245898https://bugzilla.redhat.com/22458992245899https://bugzilla.redhat.com/22459002245900https://bugzilla.redhat.com/22459032245903https://bugzilla.redhat.com/22459062245906https://errata.almalinux.org/9/ALSA-2023-6191.htmlALSA-2023:6191ALSA-2023:6191
9�thunderbird-115.4.1-1.el9_2.alma.x86_64.rpm9�thunderbird-115.4.1-1.el9_2.alma.x86_64.rpm����<�6
	��5��eBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security update��z�Qhttps://access.redhat.com/errata/RHSA-2023:6242RHSA-2023:6242RHSA-2023:6242https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6242.htmlALSA-2023:6242ALSA-2023:6242
�S�[dotnet-templates-6.0-6.0.124-1.el9_2.x86_64.rpm�R�Ndotnet-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm�L�Naspnetcore-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm�N�Ndotnet-apphost-pack-6.0-6.0.24-1.el9_2.x86_64.rpm�M�Naspnetcore-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm�O�Ndotnet-hostfxr-6.0-6.0.24-1.el9_2.x86_64.rpm�P�Ndotnet-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm�Q�[dotnet-sdk-6.0-6.0.124-1.el9_2.x86_64.rpm�S�[dotnet-templates-6.0-6.0.124-1.el9_2.x86_64.rpm�R�Ndotnet-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm�L�Naspnetcore-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm�N�Ndotnet-apphost-pack-6.0-6.0.24-1.el9_2.x86_64.rpm�M�Naspnetcore-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm�O�Ndotnet-hostfxr-6.0-6.0.24-1.el9_2.x86_64.rpm�P�Ndotnet-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm�Q�[dotnet-sdk-6.0-6.0.124-1.el9_2.x86_64.rpm�����7�	��
��vBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security update��K�Qhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246

�z�Ndotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpm�|�dotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpm�x�Naspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm�y�Ndotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpm�}�Ndotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm�{�Ndotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm�~�dotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpm�!�Ndotnet-host-7.0.13-1.el9_2.x86_64.rpm�w�Naspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpm
�z�Ndotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpm�|�dotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpm�x�Naspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm�y�Ndotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpm�}�Ndotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm�{�Ndotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm�~�dotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpm�!�Ndotnet-host-7.0.13-1.el9_2.x86_64.rpm�w�Naspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm�"�netstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpm����L�8
	����KBBBBBBBBBBBBsecurityImportant: ghostscript security update���https://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265
�e�nlibgs-9.54.0-11.el9_2.x86_64.rpm��nghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpm�e�nlibgs-9.54.0-11.el9_2.i686.rpm��nghostscript-x11-9.54.0-11.el9_2.x86_64.rpm�k�nghostscript-doc-9.54.0-11.el9_2.noarch.rpm��nghostscript-9.54.0-11.el9_2.x86_64.rpm��nghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpm��nghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpm�e�nlibgs-9.54.0-11.el9_2.x86_64.rpm��nghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpm�e�nlibgs-9.54.0-11.el9_2.i686.rpm��nghostscript-x11-9.54.0-11.el9_2.x86_64.rpm�k�nghostscript-doc-9.54.0-11.el9_2.noarch.rpm��nghostscript-9.54.0-11.el9_2.x86_64.rpm��nghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpm��nghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpm�����9
	����ZsecurityCritical: squid security update�S���1https://access.redhat.com/errata/RHSA-2023:6266RHSA-2023:6266RHSA-2023:6266https://access.redhat.com/security/cve/CVE-2023-46846CVE-2023-46846CVE-2023-46846https://access.redhat.com/security/cve/CVE-2023-46847CVE-2023-46847CVE-2023-46847https://access.redhat.com/security/cve/CVE-2023-46848CVE-2023-46848CVE-2023-46848https://bugzilla.redhat.com/22459102245910https://bugzilla.redhat.com/22459162245916https://bugzilla.redhat.com/22459192245919https://errata.almalinux.org/9/ALSA-2023-6266.htmlALSA-2023:6266ALSA-2023:6266
�{�Jsquid-5.5-5.el9_2.1.x86_64.rpm�{�Jsquid-5.5-5.el9_2.1.x86_64.rpm����T�:
	����]securityModerate: python3.11-pip security update��N�'https://access.redhat.com/errata/RHSA-2023:6324RHSA-2023:6324RHSA-2023:6324https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6324.htmlALSA-2023:6324ALSA-2023:6324
�E�%python3.11-pip-wheel-22.3.1-4.el9.noarch.rpm�D�%python3.11-pip-22.3.1-4.el9.noarch.rpm�E�%python3.11-pip-wheel-22.3.1-4.el9.noarch.rpm�D�%python3.11-pip-22.3.1-4.el9.noarch.rpm����&�;
	��"��`securityModerate: edk2 security, bug fix, and enhancement update��u�Bhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330
��edk2-aarch64-20230524-3.el9.noarch.rpm�g�edk2-ovmf-20230524-3.el9.noarch.rpm��edk2-aarch64-20230524-3.el9.noarch.rpm�g�edk2-ovmf-20230524-3.el9.noarch.rpm����<
	��/��cBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update��7�https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340
��!xorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-common-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-common-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpm��!xorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpm�����=
	��2��psecurityModerate: xorg-x11-server-Xwayland security, bug fix, and enhancement update��;�
https://access.redhat.com/errata/RHSA-2023:6341RHSA-2023:6341RHSA-2023:6341https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6341.htmlALSA-2023:6341ALSA-2023:6341
��dxorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpm��dxorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpm����r�>
	��6��sBsecurityModerate: LibRaw security update��H�Ghttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343
�3�LibRaw-0.20.2-6.el9.x86_64.rpm�3�LibRaw-0.20.2-6.el9.i686.rpm�3�LibRaw-0.20.2-6.el9.x86_64.rpm�3�LibRaw-0.20.2-6.el9.i686.rpm�����?
	��;��wBBsecurityModerate: toolbox security and bug fix update���bhttps://access.redhat.com/errata/RHSA-2023:6346RHSA-2023:6346RHSA-2023:6346https://access.redhat.com/security/cve/CVE-2022-3064CVE-2022-3064CVE-2022-3064https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21630372163037https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6346.htmlALSA-2023:6346ALSA-2023:6346
��btoolbox-0.0.99.4-6.el9_3.x86_64.rpm�
�btoolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm��btoolbox-0.0.99.4-6.el9_3.x86_64.rpm�
�btoolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm�����@
	����|BBsecurityModerate: skopeo security update��q�Rhttps://access.redhat.com/errata/RHSA-2023:6363RHSA-2023:6363RHSA-2023:6363https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24537CVE-2023-24537CVE-2023-24537https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21844842184484https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6363.htmlALSA-2023:6363ALSA-2023:6363
�d�/skopeo-tests-1.13.3-1.el9.x86_64.rpm�c�/skopeo-1.13.3-1.el9.x86_64.rpm�d�/skopeo-tests-1.13.3-1.el9.x86_64.rpm�c�/skopeo-1.13.3-1.el9.x86_64.rpm�����A
	����AsecurityModerate: mod_auth_openidc security and bug fix update��C�https://access.redhat.com/errata/RHSA-2023:6365RHSA-2023:6365RHSA-2023:6365https://access.redhat.com/security/cve/CVE-2022-23527CVE-2022-23527CVE-2022-23527https://access.redhat.com/security/cve/CVE-2023-28625CVE-2023-28625CVE-2023-28625https://bugzilla.redhat.com/21536552153655https://bugzilla.redhat.com/21841182184118https://errata.almalinux.org/9/ALSA-2023-6365.htmlALSA-2023:6365ALSA-2023:6365
�d�Smod_auth_openidc-2.4.9.4-4.el9.x86_64.rpm�d�Smod_auth_openidc-2.4.9.4-4.el9.x86_64.rpm����s�B
	��*��DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement update��X�rhttps://access.redhat.com/errata/RHSA-2023:6368RHSA-2023:6368RHSA-2023:6368https://access.redhat.com/security/cve/CVE-2023-2680CVE-2023-2680CVE-2023-2680https://bugzilla.redhat.com/22033872203387https://errata.almalinux.org/9/ALSA-2023-6368.htmlALSA-2023:6368ALSA-2023:6368
�5]qemu-kvm-block-rbd-8.0.0-16.el9_3.alma.1.x86_64.rpm�?]qemu-kvm-ui-egl-headless-8.0.0-16.el9_3.alma.1.x86_64.rpm�2]qemu-kvm-8.0.0-16.el9_3.alma.1.x86_64.rpm�A]qemu-pr-helper-8.0.0-16.el9_3.alma.1.x86_64.rpm�0]qemu-guest-agent-8.0.0-16.el9_3.alma.1.x86_64.rpm�8]qemu-kvm-device-display-virtio-gpu-8.0.0-16.el9_3.alma.1.x86_64.rpm�6]qemu-kvm-common-8.0.0-16.el9_3.alma.1.x86_64.rpm�3]qemu-kvm-audio-pa-8.0.0-16.el9_3.alma.1.x86_64.rpm�K]qemu-kvm-block-blkio-8.0.0-16.el9_3.alma.1.x86_64.rpm�<]qemu-kvm-device-usb-redirect-8.0.0-16.el9_3.alma.1.x86_64.rpm�=]qemu-kvm-docs-8.0.0-16.el9_3.alma.1.x86_64.rpm�9]qemu-kvm-device-display-virtio-gpu-pci-8.0.0-16.el9_3.alma.1.x86_64.rpm�;]qemu-kvm-device-usb-host-8.0.0-16.el9_3.alma.1.x86_64.rpm�1]qemu-img-8.0.0-16.el9_3.alma.1.x86_64.rpm�@]qemu-kvm-ui-opengl-8.0.0-16.el9_3.alma.1.x86_64.rpm�4]qemu-kvm-block-curl-8.0.0-16.el9_3.alma.1.x86_64.rpm�:]qemu-kvm-device-display-virtio-vga-8.0.0-16.el9_3.alma.1.x86_64.rpm�>]qemu-kvm-tools-8.0.0-16.el9_3.alma.1.x86_64.rpm�7]qemu-kvm-core-8.0.0-16.el9_3.alma.1.x86_64.rpm�5]qemu-kvm-block-rbd-8.0.0-16.el9_3.alma.1.x86_64.rpm�?]qemu-kvm-ui-egl-headless-8.0.0-16.el9_3.alma.1.x86_64.rpm�2]qemu-kvm-8.0.0-16.el9_3.alma.1.x86_64.rpm�A]qemu-pr-helper-8.0.0-16.el9_3.alma.1.x86_64.rpm�0]qemu-guest-agent-8.0.0-16.el9_3.alma.1.x86_64.rpm�8]qemu-kvm-device-display-virtio-gpu-8.0.0-16.el9_3.alma.1.x86_64.rpm�6]qemu-kvm-common-8.0.0-16.el9_3.alma.1.x86_64.rpm�3]qemu-kvm-audio-pa-8.0.0-16.el9_3.alma.1.x86_64.rpm�K]qemu-kvm-block-blkio-8.0.0-16.el9_3.alma.1.x86_64.rpm�<]qemu-kvm-device-usb-redirect-8.0.0-16.el9_3.alma.1.x86_64.rpm�=]qemu-kvm-docs-8.0.0-16.el9_3.alma.1.x86_64.rpm�9]qemu-kvm-device-display-virtio-gpu-pci-8.0.0-16.el9_3.alma.1.x86_64.rpm�;]qemu-kvm-device-usb-host-8.0.0-16.el9_3.alma.1.x86_64.rpm�1]qemu-img-8.0.0-16.el9_3.alma.1.x86_64.rpm�@]qemu-kvm-ui-opengl-8.0.0-16.el9_3.alma.1.x86_64.rpm�4]qemu-kvm-block-curl-8.0.0-16.el9_3.alma.1.x86_64.rpm�:]qemu-kvm-device-display-virtio-vga-8.0.0-16.el9_3.alma.1.x86_64.rpm�>]qemu-kvm-tools-8.0.0-16.el9_3.alma.1.x86_64.rpm�7]qemu-kvm-core-8.0.0-16.el9_3.alma.1.x86_64.rpm����"�C
	����kBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5 security and bug fix update��J�https://access.redhat.com/errata/RHSA-2023:6369RHSA-2023:6369RHSA-2023:6369https://access.redhat.com/security/cve/CVE-2023-32573CVE-2023-32573CVE-2023-32573https://access.redhat.com/security/cve/CVE-2023-33285CVE-2023-33285CVE-2023-33285https://access.redhat.com/security/cve/CVE-2023-34410CVE-2023-34410CVE-2023-34410https://access.redhat.com/security/cve/CVE-2023-37369CVE-2023-37369CVE-2023-37369https://access.redhat.com/security/cve/CVE-2023-38197CVE-2023-38197CVE-2023-38197https://bugzilla.redhat.com/22081352208135https://bugzilla.redhat.com/22094882209488https://bugzilla.redhat.com/22127472212747https://bugzilla.redhat.com/22227672222767https://bugzilla.redhat.com/22321732232173https://errata.almalinux.org/9/ALSA-2023-6369.htmlALSA-2023:6369ALSA-2023:6369
�I�qt5-qtbase-postgresql-5.15.9-7.el9.i686.rpm�D�qt5-qtbase-devel-5.15.9-7.el9.i686.rpm�F�qt5-qtbase-gui-5.15.9-7.el9.x86_64.rpm�C�qt5-qtbase-5.15.9-7.el9.i686.rpm��Rqt5-5.15.9-1.el9.noarch.rpm�G�qt5-qtbase-mysql-5.15.9-7.el9.i686.rpm�H�qt5-qtbase-odbc-5.15.9-7.el9.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-7.el9.i686.rpm�J�qt5-qtbase-private-devel-5.15.9-7.el9.i686.rpm��Rqt5-rpm-macros-5.15.9-1.el9.noarch.rpm�I�qt5-qtbase-postgresql-5.15.9-7.el9.x86_64.rpm�R�qt5-qtbase-common-5.15.9-7.el9.noarch.rpm�F�qt5-qtbase-gui-5.15.9-7.el9.i686.rpm��Rqt5-srpm-macros-5.15.9-1.el9.noarch.rpm�C�qt5-qtbase-5.15.9-7.el9.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-7.el9.x86_64.rpm�G�qt5-qtbase-mysql-5.15.9-7.el9.x86_64.rpm�E�qt5-qtbase-examples-5.15.9-7.el9.i686.rpm�D�qt5-qtbase-devel-5.15.9-7.el9.x86_64.rpm�E�qt5-qtbase-examples-5.15.9-7.el9.x86_64.rpm�I�qt5-qtbase-postgresql-5.15.9-7.el9.i686.rpm�D�qt5-qtbase-devel-5.15.9-7.el9.i686.rpm�F�qt5-qtbase-gui-5.15.9-7.el9.x86_64.rpm�C�qt5-qtbase-5.15.9-7.el9.i686.rpm��Rqt5-5.15.9-1.el9.noarch.rpm�G�qt5-qtbase-mysql-5.15.9-7.el9.i686.rpm�H�qt5-qtbase-odbc-5.15.9-7.el9.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-7.el9.i686.rpm�J�qt5-qtbase-private-devel-5.15.9-7.el9.i686.rpm��Rqt5-rpm-macros-5.15.9-1.el9.noarch.rpm�I�qt5-qtbase-postgresql-5.15.9-7.el9.x86_64.rpm�R�qt5-qtbase-common-5.15.9-7.el9.noarch.rpm�F�qt5-qtbase-gui-5.15.9-7.el9.i686.rpm��Rqt5-srpm-macros-5.15.9-1.el9.noarch.rpm�C�qt5-qtbase-5.15.9-7.el9.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-7.el9.x86_64.rpm�G�qt5-qtbase-mysql-5.15.9-7.el9.x86_64.rpm�E�qt5-qtbase-examples-5.15.9-7.el9.i686.rpm�D�qt5-qtbase-devel-5.15.9-7.el9.x86_64.rpm�E�qt5-qtbase-examples-5.15.9-7.el9.x86_64.rpm����f�D
	��	��securityModerate: cloud-init security, bug fix, and enhancement update��g�https://access.redhat.com/errata/RHSA-2023:6371RHSA-2023:6371RHSA-2023:6371https://access.redhat.com/security/cve/CVE-2023-1786CVE-2023-1786CVE-2023-1786https://bugzilla.redhat.com/21900792190079https://errata.almalinux.org/9/ALSA-2023-6371.htmlALSA-2023:6371ALSA-2023:6371
�F�cloud-init-23.1.1-11.el9.alma.1.noarch.rpm�F�cloud-init-23.1.1-11.el9.alma.1.noarch.rpm����?�E
	����JBBBBBBBsecurityLow: gdb security update�6��f�Dhttps://access.redhat.com/errata/RHSA-2023:6372RHSA-2023:6372RHSA-2023:6372https://access.redhat.com/security/cve/CVE-2021-3826CVE-2021-3826CVE-2021-3826https://bugzilla.redhat.com/21226272122627https://errata.almalinux.org/9/ALSA-2023-6372.htmlALSA-2023:6372ALSA-2023:6372
�7�
gdb-10.2-11.el9.x86_64.rpm�9�
gdb-headless-10.2-11.el9.x86_64.rpm�<�
gdb-doc-10.2-11.el9.noarch.rpm�8�
gdb-gdbserver-10.2-11.el9.x86_64.rpm�:�
gdb-minimal-10.2-11.el9.x86_64.rpm�7�
gdb-10.2-11.el9.x86_64.rpm�9�
gdb-headless-10.2-11.el9.x86_64.rpm�<�
gdb-doc-10.2-11.el9.noarch.rpm�8�
gdb-gdbserver-10.2-11.el9.x86_64.rpm�:�
gdb-minimal-10.2-11.el9.x86_64.rpm����e�F
	����TsecurityModerate: runc security update��*�Yhttps://access.redhat.com/errata/RHSA-2023:6380RHSA-2023:6380RHSA-2023:6380https://access.redhat.com/security/cve/CVE-2021-43784CVE-2021-43784CVE-2021-43784https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2023-25809CVE-2023-25809CVE-2023-25809https://access.redhat.com/security/cve/CVE-2023-27561CVE-2023-27561CVE-2023-27561https://access.redhat.com/security/cve/CVE-2023-28642CVE-2023-28642CVE-2023-28642https://bugzilla.redhat.com/20294392029439https://bugzilla.redhat.com/21757212175721https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21828832182883https://bugzilla.redhat.com/21828842182884https://errata.almalinux.org/9/ALSA-2023-6380.htmlALSA-2023:6380ALSA-2023:6380
�z�(runc-1.1.9-1.el9.x86_64.rpm�z�(runc-1.1.9-1.el9.x86_64.rpm����t�G
	����WBBsecurityModerate: liblouis security update���Ihttps://access.redhat.com/errata/RHSA-2023:6385RHSA-2023:6385RHSA-2023:6385https://access.redhat.com/security/cve/CVE-2023-26767CVE-2023-26767CVE-2023-26767https://access.redhat.com/security/cve/CVE-2023-26768CVE-2023-26768CVE-2023-26768https://access.redhat.com/security/cve/CVE-2023-26769CVE-2023-26769CVE-2023-26769https://bugzilla.redhat.com/21811352181135https://bugzilla.redhat.com/21811392181139https://bugzilla.redhat.com/21811432181143https://errata.almalinux.org/9/ALSA-2023-6385.htmlALSA-2023:6385ALSA-2023:6385
�Z�Nliblouis-3.16.1-5.el9.i686.rpm�Z�Nliblouis-3.16.1-5.el9.x86_64.rpm�;�Npython3-louis-3.16.1-5.el9.noarch.rpm�Z�Nliblouis-3.16.1-5.el9.i686.rpm�Z�Nliblouis-3.16.1-5.el9.x86_64.rpm�;�Npython3-louis-3.16.1-5.el9.noarch.rpm����R�H
	����\securityModerate: containernetworking-plugins security and bug fix update��L�Lhttps://access.redhat.com/errata/RHSA-2023:6402RHSA-2023:6402RHSA-2023:6402https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6402.htmlALSA-2023:6402ALSA-2023:6402
�_�containernetworking-plugins-1.3.0-4.el9.x86_64.rpm�_�containernetworking-plugins-1.3.0-4.el9.x86_64.rpm����t�I
	��3��_BBBBBBBBBBBBBBBBBBsecurityModerate: httpd and mod_http2 security, bug fix, and enhancement update���mhttps://access.redhat.com/errata/RHSA-2023:6403RHSA-2023:6403RHSA-2023:6403https://access.redhat.com/security/cve/CVE-2023-27522CVE-2023-27522CVE-2023-27522https://bugzilla.redhat.com/21762112176211https://errata.almalinux.org/9/ALSA-2023-6403.htmlALSA-2023:6403ALSA-2023:6403
�M�qmod_ldap-2.4.57-5.el9.x86_64.rpm�}�qhttpd-filesystem-2.4.57-5.el9.noarch.rpm�B�qhttpd-devel-2.4.57-5.el9.x86_64.rpm�@�qhttpd-2.4.57-5.el9.x86_64.rpm�O� mod_proxy_html-2.4.57-5.el9.x86_64.rpm�P�qmod_session-2.4.57-5.el9.x86_64.rpm�N�qmod_lua-2.4.57-5.el9.x86_64.rpm�~�qhttpd-manual-2.4.57-5.el9.noarch.rpm�Q� mod_ssl-2.4.57-5.el9.x86_64.rpm�C�qhttpd-tools-2.4.57-5.el9.x86_64.rpm�A�qhttpd-core-2.4.57-5.el9.x86_64.rpm�M�qmod_ldap-2.4.57-5.el9.x86_64.rpm�}�qhttpd-filesystem-2.4.57-5.el9.noarch.rpm�B�qhttpd-devel-2.4.57-5.el9.x86_64.rpm�@�qhttpd-2.4.57-5.el9.x86_64.rpm�O� mod_proxy_html-2.4.57-5.el9.x86_64.rpm�P�qmod_session-2.4.57-5.el9.x86_64.rpm�N�qmod_lua-2.4.57-5.el9.x86_64.rpm�~�qhttpd-manual-2.4.57-5.el9.noarch.rpm�Q� mod_ssl-2.4.57-5.el9.x86_64.rpm�C�qhttpd-tools-2.4.57-5.el9.x86_64.rpm�A�qhttpd-core-2.4.57-5.el9.x86_64.rpm����3�J
	��*��tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security, bug fix, and enhancement update���https://access.redhat.com/errata/RHSA-2023:6409RHSA-2023:6409RHSA-2023:6409https://access.redhat.com/security/cve/CVE-2023-3750CVE-2023-3750CVE-2023-3750https://bugzilla.redhat.com/22222102222210https://errata.almalinux.org/9/ALSA-2023-6409.htmlALSA-2023:6409ALSA-2023:6409
�s:libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3.alma.1.x86_64.rpm�F:libvirt-daemon-log-9.5.0-7.el9_3.alma.1.x86_64.rpm�y:libvirt-daemon-kvm-9.5.0-7.el9_3.alma.1.x86_64.rpm�w:libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3.alma.1.x86_64.rpm�g:libvirt-client-9.5.0-7.el9_3.alma.1.x86_64.rpm�z:libvirt-libs-9.5.0-7.el9_3.alma.1.x86_64.rpm�j:libvirt-daemon-config-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm�k:libvirt-daemon-driver-interface-9.5.0-7.el9_3.alma.1.x86_64.rpm�h:libvirt-daemon-9.5.0-7.el9_3.alma.1.x86_64.rpm�x:libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3.alma.1.x86_64.rpm�u:libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3.alma.1.x86_64.rpm�p:libvirt-daemon-driver-secret-9.5.0-7.el9_3.alma.1.x86_64.rpm�D:libvirt-daemon-common-9.5.0-7.el9_3.alma.1.x86_64.rpm�m:libvirt-daemon-driver-nodedev-9.5.0-7.el9_3.alma.1.x86_64.rpm�i:libvirt-daemon-config-network-9.5.0-7.el9_3.alma.1.x86_64.rpm�l:libvirt-daemon-driver-network-9.5.0-7.el9_3.alma.1.x86_64.rpm�E:libvirt-daemon-lock-9.5.0-7.el9_3.alma.1.x86_64.rpm�f:libvirt-9.5.0-7.el9_3.alma.1.x86_64.rpm�q:libvirt-daemon-driver-storage-9.5.0-7.el9_3.alma.1.x86_64.rpm�r:libvirt-daemon-driver-storage-core-9.5.0-7.el9_3.alma.1.x86_64.rpm�{:libvirt-nss-9.5.0-7.el9_3.alma.1.x86_64.rpm�G:libvirt-daemon-plugin-lockd-9.5.0-7.el9_3.alma.1.x86_64.rpm�H:libvirt-daemon-proxy-9.5.0-7.el9_3.alma.1.x86_64.rpm�o:libvirt-daemon-driver-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm�n:libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm�v:libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3.alma.1.x86_64.rpm�t:libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3.alma.1.x86_64.rpm�s:libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3.alma.1.x86_64.rpm�F:libvirt-daemon-log-9.5.0-7.el9_3.alma.1.x86_64.rpm�y:libvirt-daemon-kvm-9.5.0-7.el9_3.alma.1.x86_64.rpm�w:libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3.alma.1.x86_64.rpm�g:libvirt-client-9.5.0-7.el9_3.alma.1.x86_64.rpm�z:libvirt-libs-9.5.0-7.el9_3.alma.1.x86_64.rpm�j:libvirt-daemon-config-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm�k:libvirt-daemon-driver-interface-9.5.0-7.el9_3.alma.1.x86_64.rpm�h:libvirt-daemon-9.5.0-7.el9_3.alma.1.x86_64.rpm�x:libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3.alma.1.x86_64.rpm�u:libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3.alma.1.x86_64.rpm�p:libvirt-daemon-driver-secret-9.5.0-7.el9_3.alma.1.x86_64.rpm�D:libvirt-daemon-common-9.5.0-7.el9_3.alma.1.x86_64.rpm�m:libvirt-daemon-driver-nodedev-9.5.0-7.el9_3.alma.1.x86_64.rpm�i:libvirt-daemon-config-network-9.5.0-7.el9_3.alma.1.x86_64.rpm�l:libvirt-daemon-driver-network-9.5.0-7.el9_3.alma.1.x86_64.rpm�E:libvirt-daemon-lock-9.5.0-7.el9_3.alma.1.x86_64.rpm�f:libvirt-9.5.0-7.el9_3.alma.1.x86_64.rpm�q:libvirt-daemon-driver-storage-9.5.0-7.el9_3.alma.1.x86_64.rpm�r:libvirt-daemon-driver-storage-core-9.5.0-7.el9_3.alma.1.x86_64.rpm�{:libvirt-nss-9.5.0-7.el9_3.alma.1.x86_64.rpm�G:libvirt-daemon-plugin-lockd-9.5.0-7.el9_3.alma.1.x86_64.rpm�H:libvirt-daemon-proxy-9.5.0-7.el9_3.alma.1.x86_64.rpm�o:libvirt-daemon-driver-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm�n:libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm�v:libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3.alma.1.x86_64.rpm�t:libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3.alma.1.x86_64.rpm����~�K
	��-��ksecurityModerate: grafana security and enhancement update���qhttps://access.redhat.com/errata/RHSA-2023:6420RHSA-2023:6420RHSA-2023:6420https://access.redhat.com/security/cve/CVE-2022-23552CVE-2022-23552CVE-2022-23552https://access.redhat.com/security/cve/CVE-2022-31123CVE-2022-31123CVE-2022-31123https://access.redhat.com/security/cve/CVE-2022-31130CVE-2022-31130CVE-2022-31130https://access.redhat.com/security/cve/CVE-2022-39201CVE-2022-39201CVE-2022-39201https://access.redhat.com/security/cve/CVE-2022-39306CVE-2022-39306CVE-2022-39306https://access.redhat.com/security/cve/CVE-2022-39307CVE-2022-39307CVE-2022-39307https://access.redhat.com/security/cve/CVE-2022-39324CVE-2022-39324CVE-2022-39324https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://bugzilla.redhat.com/21311462131146https://bugzilla.redhat.com/21311472131147https://bugzilla.redhat.com/21311482131148https://bugzilla.redhat.com/21380142138014https://bugzilla.redhat.com/21380152138015https://bugzilla.redhat.com/21482522148252https://bugzilla.redhat.com/21584202158420https://bugzilla.redhat.com/21612742161274https://bugzilla.redhat.com/21844832184483https://errata.almalinux.org/9/ALSA-2023-6420.htmlALSA-2023:6420ALSA-2023:6420
�I�^grafana-9.2.10-7.el9_3.alma.1.x86_64.rpm�I�^grafana-9.2.10-7.el9_3.alma.1.x86_64.rpm����u�L
	��4��nBBBBsecurityLow: libpq security update�6���Dhttps://access.redhat.com/errata/RHSA-2023:6429RHSA-2023:6429RHSA-2023:6429https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-6429.htmlALSA-2023:6429ALSA-2023:6429
�=�^libpq-13.11-1.el9.i686.rpm�>�^libpq-devel-13.11-1.el9.x86_64.rpm�>�^libpq-devel-13.11-1.el9.i686.rpm�=�^libpq-13.11-1.el9.x86_64.rpm�=�^libpq-13.11-1.el9.i686.rpm�>�^libpq-devel-13.11-1.el9.x86_64.rpm�>�^libpq-devel-13.11-1.el9.i686.rpm�=�^libpq-13.11-1.el9.x86_64.rpm����O�M
	��8��uBsecurityModerate: libfastjson security update��I�[https://access.redhat.com/errata/RHSA-2023:6431RHSA-2023:6431RHSA-2023:6431https://access.redhat.com/security/cve/CVE-2020-12762CVE-2020-12762CVE-2020-12762https://bugzilla.redhat.com/18352531835253https://errata.almalinux.org/9/ALSA-2023-6431.htmlALSA-2023:6431ALSA-2023:6431
�Q�!libfastjson-0.99.9-5.el9.i686.rpm�Q�!libfastjson-0.99.9-5.el9.x86_64.rpm�Q�!libfastjson-0.99.9-5.el9.i686.rpm�Q�!libfastjson-0.99.9-5.el9.x86_64.rpm�����N
	��<��yBsecurityModerate: frr security and bug fix update��$�
https://access.redhat.com/errata/RHSA-2023:6434RHSA-2023:6434RHSA-2023:6434https://access.redhat.com/security/cve/CVE-2022-36440CVE-2022-36440CVE-2022-36440https://access.redhat.com/security/cve/CVE-2022-40302CVE-2022-40302CVE-2022-40302https://access.redhat.com/security/cve/CVE-2022-40318CVE-2022-40318CVE-2022-40318https://access.redhat.com/security/cve/CVE-2022-43681CVE-2022-43681CVE-2022-43681https://bugzilla.redhat.com/21844682184468https://bugzilla.redhat.com/21960882196088https://bugzilla.redhat.com/21960902196090https://bugzilla.redhat.com/21960912196091https://errata.almalinux.org/9/ALSA-2023-6434.htmlALSA-2023:6434ALSA-2023:6434
�6�frr-selinux-8.3.1-11.el9_3.alma.1.noarch.rpm�9�frr-8.3.1-11.el9_3.alma.1.x86_64.rpm�6�frr-selinux-8.3.1-11.el9_3.alma.1.noarch.rpm�9�frr-8.3.1-11.el9_3.alma.1.x86_64.rpm����H�O
	����}BBBsecurityModerate: wireshark security update��7�Ghttps://access.redhat.com/errata/RHSA-2023:6469RHSA-2023:6469RHSA-2023:6469https://access.redhat.com/security/cve/CVE-2023-0666CVE-2023-0666CVE-2023-0666https://access.redhat.com/security/cve/CVE-2023-0668CVE-2023-0668CVE-2023-0668https://access.redhat.com/security/cve/CVE-2023-2855CVE-2023-2855CVE-2023-2855https://access.redhat.com/security/cve/CVE-2023-2856CVE-2023-2856CVE-2023-2856https://access.redhat.com/security/cve/CVE-2023-2858CVE-2023-2858CVE-2023-2858https://access.redhat.com/security/cve/CVE-2023-2952CVE-2023-2952CVE-2023-2952https://bugzilla.redhat.com/22108222210822https://bugzilla.redhat.com/22108242210824https://bugzilla.redhat.com/22108292210829https://bugzilla.redhat.com/22108322210832https://bugzilla.redhat.com/22108352210835https://bugzilla.redhat.com/22114062211406https://errata.almalinux.org/9/ALSA-2023-6469.htmlALSA-2023:6469ALSA-2023:6469
�N�swireshark-cli-3.4.10-6.el9.x86_64.rpm��swireshark-3.4.10-6.el9.x86_64.rpm�N�swireshark-cli-3.4.10-6.el9.i686.rpm�N�swireshark-cli-3.4.10-6.el9.x86_64.rpm��swireshark-3.4.10-6.el9.x86_64.rpm�N�swireshark-cli-3.4.10-6.el9.i686.rpm����2�P
	����CBBsecurityModerate: buildah security update��~�https://access.redhat.com/errata/RHSA-2023:6473RHSA-2023:6473RHSA-2023:6473https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-25173CVE-2023-25173CVE-2023-25173https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21744852174485https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6473.htmlALSA-2023:6473ALSA-2023:6473
�0�buildah-tests-1.31.3-1.el9.x86_64.rpm�/�buildah-1.31.3-1.el9.x86_64.rpm�0�buildah-tests-1.31.3-1.el9.x86_64.rpm�/�buildah-1.31.3-1.el9.x86_64.rpm�����Q
	����HBBBBBBBBBsecurityModerate: podman security, bug fix, and enhancement update���https://access.redhat.com/errata/RHSA-2023:6474RHSA-2023:6474RHSA-2023:6474https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24537CVE-2023-24537CVE-2023-24537https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-25173CVE-2023-25173CVE-2023-25173https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://access.redhat.com/security/cve/CVE-2023-3978CVE-2023-3978CVE-2023-3978https://bugzilla.redhat.com/21744852174485https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21844842184484https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://bugzilla.redhat.com/22286892228689https://errata.almalinux.org/9/ALSA-2023-6474.htmlALSA-2023:6474ALSA-2023:6474
�1�podman-4.6.1-5.el9.x86_64.rpmh�podman-docker-4.6.1-5.el9.noarch.rpm�2�podman-plugins-4.6.1-5.el9.x86_64.rpm�M�podman-gvproxy-4.6.1-5.el9.x86_64.rpm�3�podman-remote-4.6.1-5.el9.x86_64.rpm�4�podman-tests-4.6.1-5.el9.x86_64.rpm�1�podman-4.6.1-5.el9.x86_64.rpmh�podman-docker-4.6.1-5.el9.noarch.rpm�2�podman-plugins-4.6.1-5.el9.x86_64.rpm�M�podman-gvproxy-4.6.1-5.el9.x86_64.rpm�3�podman-remote-4.6.1-5.el9.x86_64.rpm�4�podman-tests-4.6.1-5.el9.x86_64.rpm����I�R
	����TBBBsecurityModerate: librabbitmq security update���Whttps://access.redhat.com/errata/RHSA-2023:6482RHSA-2023:6482RHSA-2023:6482https://access.redhat.com/security/cve/CVE-2023-35789CVE-2023-35789CVE-2023-35789https://bugzilla.redhat.com/22157622215762https://errata.almalinux.org/9/ALSA-2023-6482.htmlALSA-2023:6482ALSA-2023:6482
�{�Vlibrabbitmq-tools-0.11.0-7.el9.x86_64.rpm�`�Vlibrabbitmq-0.11.0-7.el9.x86_64.rpm�`�Vlibrabbitmq-0.11.0-7.el9.i686.rpm�{�Vlibrabbitmq-tools-0.11.0-7.el9.x86_64.rpm�`�Vlibrabbitmq-0.11.0-7.el9.x86_64.rpm�`�Vlibrabbitmq-0.11.0-7.el9.i686.rpm����4�S
	����ZsecurityModerate: tang security update��t�4https://access.redhat.com/errata/RHSA-2023:6492RHSA-2023:6492RHSA-2023:6492https://access.redhat.com/security/cve/CVE-2023-1672CVE-2023-1672CVE-2023-1672https://bugzilla.redhat.com/21809992180999https://errata.almalinux.org/9/ALSA-2023-6492.htmlALSA-2023:6492ALSA-2023:6492
�T�tang-14-2.el9.x86_64.rpm�T�tang-14-2.el9.x86_64.rpm����x�T
	��'��]BBBBBBBBsecurityModerate: python3.11 security update��(�bhttps://access.redhat.com/errata/RHSA-2023:6494RHSA-2023:6494RHSA-2023:6494https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://access.redhat.com/security/cve/CVE-2023-41105CVE-2023-41105CVE-2023-41105https://bugzilla.redhat.com/22357952235795https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6494.htmlALSA-2023:6494ALSA-2023:6494
\�&python3.11-libs-3.11.5-1.el9_3.i686.rpm�Q�&python3.11-tkinter-3.11.5-1.el9_3.x86_64.rpm\�&python3.11-libs-3.11.5-1.el9_3.x86_64.rpm[�&python3.11-devel-3.11.5-1.el9_3.i686.rpm�P�&python3.11-3.11.5-1.el9_3.x86_64.rpm[�&python3.11-devel-3.11.5-1.el9_3.x86_64.rpm\�&python3.11-libs-3.11.5-1.el9_3.i686.rpm�Q�&python3.11-tkinter-3.11.5-1.el9_3.x86_64.rpm\�&python3.11-libs-3.11.5-1.el9_3.x86_64.rpm[�&python3.11-devel-3.11.5-1.el9_3.i686.rpm�P�&python3.11-3.11.5-1.el9_3.x86_64.rpm[�&python3.11-devel-3.11.5-1.el9_3.x86_64.rpm�����U�	��*��hsecurityModerate: haproxy security and bug fix update��
�
https://access.redhat.com/errata/RHSA-2023:6496RHSA-2023:6496RHSA-2023:6496https://access.redhat.com/security/cve/CVE-2023-0836CVE-2023-0836CVE-2023-0836https://bugzilla.redhat.com/21807462180746https://errata.almalinux.org/9/ALSA-2023-6496.htmlALSA-2023:6496ALSA-2023:6496
�b�Qhaproxy-2.4.22-1.el9.x86_64.rpm�b�Qhaproxy-2.4.22-1.el9.x86_64.rpm����y�V
	��5��kBBBBBBBBsecurityModerate: libX11 security update���6https://access.redhat.com/errata/RHSA-2023:6497RHSA-2023:6497RHSA-2023:6497https://access.redhat.com/security/cve/CVE-2023-3138CVE-2023-3138CVE-2023-3138https://bugzilla.redhat.com/22137482213748https://errata.almalinux.org/9/ALSA-2023-6497.htmlALSA-2023:6497ALSA-2023:6497
�v�/libX11-common-1.7.0-8.el9.noarch.rpm�*�/libX11-devel-1.7.0-8.el9.i686.rpm�+�/libX11-xcb-1.7.0-8.el9.i686.rpm�*�/libX11-devel-1.7.0-8.el9.x86_64.rpm�)�/libX11-1.7.0-8.el9.i686.rpm�)�/libX11-1.7.0-8.el9.x86_64.rpm�+�/libX11-xcb-1.7.0-8.el9.x86_64.rpm�v�/libX11-common-1.7.0-8.el9.noarch.rpm�*�/libX11-devel-1.7.0-8.el9.i686.rpm�+�/libX11-xcb-1.7.0-8.el9.i686.rpm�*�/libX11-devel-1.7.0-8.el9.x86_64.rpm�)�/libX11-1.7.0-8.el9.i686.rpm�)�/libX11-1.7.0-8.el9.x86_64.rpm�+�/libX11-xcb-1.7.0-8.el9.x86_64.rpm����z�W
	��0��vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update��M�/
https://access.redhat.com/errata/RHSA-2023:6508RHSA-2023:6508RHSA-2023:6508https://access.redhat.com/security/cve/CVE-2022-38745CVE-2022-38745CVE-2022-38745https://access.redhat.com/security/cve/CVE-2023-0950CVE-2023-0950CVE-2023-0950https://access.redhat.com/security/cve/CVE-2023-1183CVE-2023-1183CVE-2023-1183https://access.redhat.com/security/cve/CVE-2023-2255CVE-2023-2255CVE-2023-2255https://bugzilla.redhat.com/21820442182044https://bugzilla.redhat.com/22085062208506https://bugzilla.redhat.com/22101852210185https://bugzilla.redhat.com/22101862210186https://errata.almalinux.org/9/ALSA-2023-6508.htmlALSA-2023:6508ALSA-2023:6508
�1�olibreoffice-help-si-7.1.8.1-11.el9.alma.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-11.el9.alma.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-11.el9.alma.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-11.el9.alma.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-11.el9.alma.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-11.el9.alma.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-11.el9.alma.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-11.el9.alma.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-11.el9.alma.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-11.el9.alma.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-11.el9.alma.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-it-7.1.8.1-11.el9.alma.noarch.rpm�dlibreoffice-help-ko-7.1.8.1-11.el9.alma.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-sv-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-fi-7.1.8.1-11.el9.alma.x86_64.rpm�Clibreoffice-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-11.el9.alma.x86_64.rpm�Flibreoffice-writer-7.1.8.1-11.el9.alma.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-11.el9.alma.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-11.el9.alma.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-11.el9.alma.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-11.el9.alma.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-11.el9.alma.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-11.el9.alma.x86_64.rpm�*libreoffice-data-7.1.8.1-11.el9.alma.noarch.rpm�}autocorr-fa-7.1.8.1-11.el9.alma.noarch.rpm�`libreoffice-help-hu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-11.el9.alma.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-11.el9.alma.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-11.el9.alma.noarch.rpm�<libreoffice-langpack-xh-7.1.8.1-11.el9.alma.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ko-7.1.8.1-11.el9.alma.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-11.el9.alma.x86_64.rpm�
libreoffice-langpack-fr-7.1.8.1-11.el9.alma.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-11.el9.alma.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-11.el9.alma.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-11.el9.alma.x86_64.rpm�yautocorr-dsb-7.1.8.1-11.el9.alma.noarch.rpm�{libreoffice-langpack-as-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-vro-7.1.8.1-11.el9.alma.noarch.rpm�ylibreoffice-langpack-af-7.1.8.1-11.el9.alma.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-11.el9.alma.x86_64.rpm�{autocorr-en-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-hu-7.1.8.1-11.el9.alma.x86_64.rpm�
autocorr-mn-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-hsb-7.1.8.1-11.el9.alma.noarch.rpm�tautocorr-bg-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-el-7.1.8.1-11.el9.alma.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-11.el9.alma.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-11.el9.alma.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-11.el9.alma.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-11.el9.alma.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-ko-7.1.8.1-11.el9.alma.noarch.rpm�'libreoffice-langpack-pa-7.1.8.1-11.el9.alma.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-sk-7.1.8.1-11.el9.alma.noarch.rpm�"libreoffice-langpack-nl-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-tr-7.1.8.1-11.el9.alma.noarch.rpm�Nlibreoffice-help-ca-7.1.8.1-11.el9.alma.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-11.el9.alma.x86_64.rpm�Tlibreoffice-help-en-7.1.8.1-11.el9.alma.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-vi-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-ml-7.1.8.1-11.el9.alma.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-nl-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-en-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-11.el9.alma.x86_64.rpm�Jlibreoffice-gtk3-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-fr-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-cs-7.1.8.1-11.el9.alma.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-11.el9.alma.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-11.el9.alma.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-11.el9.alma.x86_64.rpm�alibreoffice-help-id-7.1.8.1-11.el9.alma.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-11.el9.alma.x86_64.rpm�
autocorr-pt-7.1.8.1-11.el9.alma.noarch.rpm�Hlibreoffice-xsltfilter-7.1.8.1-11.el9.alma.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-11.el9.alma.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-11.el9.alma.x86_64.rpm�Dlibreoffice-core-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-11.el9.alma.x86_64.rpm�Elibreoffice-draw-7.1.8.1-11.el9.alma.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-11.el9.alma.x86_64.rpm�Glibreoffice-x11-7.1.8.1-11.el9.alma.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-11.el9.alma.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-11.el9.alma.x86_64.rpm�@libreoffice-math-7.1.8.1-11.el9.alma.x86_64.rpm�|libreoffice-langpack-bg-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-zh-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-it-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-11.el9.alma.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-11.el9.alma.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpm�Glibreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpm�uautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpm�blibreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpm�mlibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpm�|autocorr-es-7.1.8.1-11.el9.alma.noarch.rpm�	autocorr-lt-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-ru-7.1.8.1-11.el9.alma.noarch.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpm�klibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-ro-7.1.8.1-11.el9.alma.noarch.rpm�Blibreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-ga-7.1.8.1-11.el9.alma.noarch.rpm�tlibreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpm�wautocorr-da-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-hu-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpm�xlibreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpm�8libreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpm�~autocorr-fi-7.1.8.1-11.el9.alma.noarch.rpm�Ylibreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-pl-7.1.8.1-11.el9.alma.noarch.rpm�Vlibreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpm�llibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-lb-7.1.8.1-11.el9.alma.noarch.rpm�xautocorr-de-7.1.8.1-11.el9.alma.noarch.rpm�Plibreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm� libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpm�Clibreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-is-7.1.8.1-11.el9.alma.noarch.rpm�vautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpm�ulibreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpm�zautocorr-el-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-sl-7.1.8.1-11.el9.alma.noarch.rpm�]libreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpm�sautocorr-af-7.1.8.1-11.el9.alma.noarch.rpm�Blibreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpm�jlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-hr-7.1.8.1-11.el9.alma.noarch.rpm�Ilibreofficekit-7.1.8.1-11.el9.alma.x86_64.rpm�1�olibreoffice-help-si-7.1.8.1-11.el9.alma.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-11.el9.alma.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-11.el9.alma.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-11.el9.alma.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-11.el9.alma.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-11.el9.alma.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-11.el9.alma.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-11.el9.alma.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-11.el9.alma.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-11.el9.alma.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-11.el9.alma.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-it-7.1.8.1-11.el9.alma.noarch.rpm�dlibreoffice-help-ko-7.1.8.1-11.el9.alma.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-sv-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-fi-7.1.8.1-11.el9.alma.x86_64.rpm�Clibreoffice-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-11.el9.alma.x86_64.rpm�Flibreoffice-writer-7.1.8.1-11.el9.alma.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-11.el9.alma.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-11.el9.alma.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-11.el9.alma.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-11.el9.alma.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-11.el9.alma.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-11.el9.alma.x86_64.rpm�*libreoffice-data-7.1.8.1-11.el9.alma.noarch.rpm�}autocorr-fa-7.1.8.1-11.el9.alma.noarch.rpm�`libreoffice-help-hu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-11.el9.alma.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-11.el9.alma.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-11.el9.alma.noarch.rpm�<libreoffice-langpack-xh-7.1.8.1-11.el9.alma.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ko-7.1.8.1-11.el9.alma.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-11.el9.alma.x86_64.rpm�
libreoffice-langpack-fr-7.1.8.1-11.el9.alma.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-11.el9.alma.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-11.el9.alma.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-11.el9.alma.x86_64.rpm�yautocorr-dsb-7.1.8.1-11.el9.alma.noarch.rpm�{libreoffice-langpack-as-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-vro-7.1.8.1-11.el9.alma.noarch.rpm�ylibreoffice-langpack-af-7.1.8.1-11.el9.alma.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-11.el9.alma.x86_64.rpm�{autocorr-en-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-hu-7.1.8.1-11.el9.alma.x86_64.rpm�
autocorr-mn-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-hsb-7.1.8.1-11.el9.alma.noarch.rpm�tautocorr-bg-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-el-7.1.8.1-11.el9.alma.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-11.el9.alma.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-11.el9.alma.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-11.el9.alma.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-11.el9.alma.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-ko-7.1.8.1-11.el9.alma.noarch.rpm�'libreoffice-langpack-pa-7.1.8.1-11.el9.alma.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-sk-7.1.8.1-11.el9.alma.noarch.rpm�"libreoffice-langpack-nl-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-tr-7.1.8.1-11.el9.alma.noarch.rpm�Nlibreoffice-help-ca-7.1.8.1-11.el9.alma.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-11.el9.alma.x86_64.rpm�Tlibreoffice-help-en-7.1.8.1-11.el9.alma.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-vi-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-ml-7.1.8.1-11.el9.alma.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-nl-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-en-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-11.el9.alma.x86_64.rpm�Jlibreoffice-gtk3-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-fr-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-cs-7.1.8.1-11.el9.alma.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-11.el9.alma.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-11.el9.alma.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-11.el9.alma.x86_64.rpm�alibreoffice-help-id-7.1.8.1-11.el9.alma.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-11.el9.alma.x86_64.rpm�
autocorr-pt-7.1.8.1-11.el9.alma.noarch.rpm�Hlibreoffice-xsltfilter-7.1.8.1-11.el9.alma.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-11.el9.alma.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-11.el9.alma.x86_64.rpm�Dlibreoffice-core-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-11.el9.alma.x86_64.rpm�Elibreoffice-draw-7.1.8.1-11.el9.alma.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-11.el9.alma.x86_64.rpm�Glibreoffice-x11-7.1.8.1-11.el9.alma.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-11.el9.alma.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-11.el9.alma.x86_64.rpm�@libreoffice-math-7.1.8.1-11.el9.alma.x86_64.rpm�|libreoffice-langpack-bg-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-zh-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-it-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-11.el9.alma.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-11.el9.alma.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpm�Glibreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpm�uautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpm�blibreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpm�mlibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpm�|autocorr-es-7.1.8.1-11.el9.alma.noarch.rpm�	autocorr-lt-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-ru-7.1.8.1-11.el9.alma.noarch.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpm�klibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-ro-7.1.8.1-11.el9.alma.noarch.rpm�Blibreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-ga-7.1.8.1-11.el9.alma.noarch.rpm�tlibreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpm�wautocorr-da-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-hu-7.1.8.1-11.el9.alma.noarch.rpm�libreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpm�xlibreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpm�8libreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpm�~autocorr-fi-7.1.8.1-11.el9.alma.noarch.rpm�Ylibreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-pl-7.1.8.1-11.el9.alma.noarch.rpm�Vlibreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpm�llibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-lb-7.1.8.1-11.el9.alma.noarch.rpm�xautocorr-de-7.1.8.1-11.el9.alma.noarch.rpm�Plibreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm� libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpm�Clibreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-is-7.1.8.1-11.el9.alma.noarch.rpm�vautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpm�ulibreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpm�zautocorr-el-7.1.8.1-11.el9.alma.noarch.rpm�autocorr-sl-7.1.8.1-11.el9.alma.noarch.rpm�]libreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpm�sautocorr-af-7.1.8.1-11.el9.alma.noarch.rpm�Blibreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpm�jlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpm�autocorr-hr-7.1.8.1-11.el9.alma.noarch.rpm�Ilibreofficekit-7.1.8.1-11.el9.alma.x86_64.rpm����p�X
	��9��qBBBBBBsecurityModerate: flatpak security, bug fix, and enhancement update��|�whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518
�^�Sflatpak-1.12.8-1.el9.x86_64.rpm�2�Sflatpak-libs-1.12.8-1.el9.x86_64.rpm�8�Sflatpak-selinux-1.12.8-1.el9.noarch.rpm�_�Sflatpak-session-helper-1.12.8-1.el9.x86_64.rpm�2�Sflatpak-libs-1.12.8-1.el9.i686.rpm�^�Sflatpak-1.12.8-1.el9.x86_64.rpm�2�Sflatpak-libs-1.12.8-1.el9.x86_64.rpm�8�Sflatpak-selinux-1.12.8-1.el9.noarch.rpm�_�Sflatpak-session-helper-1.12.8-1.el9.x86_64.rpm�2�Sflatpak-libs-1.12.8-1.el9.i686.rpm����g�Y
	��<��zsecurityModerate: python-tornado security update��s�mhttps://access.redhat.com/errata/RHSA-2023:6523RHSA-2023:6523RHSA-2023:6523https://access.redhat.com/security/cve/CVE-2023-28370CVE-2023-28370CVE-2023-28370https://bugzilla.redhat.com/22101992210199https://errata.almalinux.org/9/ALSA-2023-6523.htmlALSA-2023:6523ALSA-2023:6523
�J�:python3-tornado-6.1.0-9.el9.x86_64.rpm�J�:python3-tornado-6.1.0-9.el9.x86_64.rpm����z�Z
	����}BBsecurityModerate: dnsmasq security and bug fix update��`�Uhttps://access.redhat.com/errata/RHSA-2023:6524RHSA-2023:6524RHSA-2023:6524https://access.redhat.com/security/cve/CVE-2023-28450CVE-2023-28450CVE-2023-28450https://bugzilla.redhat.com/21789482178948https://errata.almalinux.org/9/ALSA-2023-6524.htmlALSA-2023:6524ALSA-2023:6524
�s�*dnsmasq-utils-2.85-14.el9.x86_64.rpm�r�*dnsmasq-2.85-14.el9.x86_64.rpm�s�*dnsmasq-utils-2.85-14.el9.x86_64.rpm�r�*dnsmasq-2.85-14.el9.x86_64.rpm�����[
	����BBBBBBBBBBBsecurityImportant: webkit2gtk3 security and bug fix update��5�&https://access.redhat.com/errata/RHSA-2023:6535RHSA-2023:6535RHSA-2023:6535https://access.redhat.com/security/cve/CVE-2022-32885CVE-2022-32885CVE-2022-32885https://access.redhat.com/security/cve/CVE-2023-27932CVE-2023-27932CVE-2023-27932https://access.redhat.com/security/cve/CVE-2023-27954CVE-2023-27954CVE-2023-27954https://access.redhat.com/security/cve/CVE-2023-28198CVE-2023-28198CVE-2023-28198https://access.redhat.com/security/cve/CVE-2023-32370CVE-2023-32370CVE-2023-32370https://access.redhat.com/security/cve/CVE-2023-32393CVE-2023-32393CVE-2023-32393https://access.redhat.com/security/cve/CVE-2023-38133CVE-2023-38133CVE-2023-38133https://access.redhat.com/security/cve/CVE-2023-38572CVE-2023-38572CVE-2023-38572https://access.redhat.com/security/cve/CVE-2023-38592CVE-2023-38592CVE-2023-38592https://access.redhat.com/security/cve/CVE-2023-38594CVE-2023-38594CVE-2023-38594https://access.redhat.com/security/cve/CVE-2023-38595CVE-2023-38595CVE-2023-38595https://access.redhat.com/security/cve/CVE-2023-38597CVE-2023-38597CVE-2023-38597https://access.redhat.com/security/cve/CVE-2023-38599CVE-2023-38599CVE-2023-38599https://access.redhat.com/security/cve/CVE-2023-38600CVE-2023-38600CVE-2023-38600https://access.redhat.com/security/cve/CVE-2023-38611CVE-2023-38611CVE-2023-38611https://access.redhat.com/security/cve/CVE-2023-39434CVE-2023-39434CVE-2023-39434https://access.redhat.com/security/cve/CVE-2023-40397CVE-2023-40397CVE-2023-40397https://access.redhat.com/security/cve/CVE-2023-40451CVE-2023-40451CVE-2023-40451https://bugzilla.redhat.com/22246082224608https://bugzilla.redhat.com/22310152231015https://bugzilla.redhat.com/22310172231017https://bugzilla.redhat.com/22310182231018https://bugzilla.redhat.com/22310192231019https://bugzilla.redhat.com/22310202231020https://bugzilla.redhat.com/22310212231021https://bugzilla.redhat.com/22310222231022https://bugzilla.redhat.com/22310282231028https://bugzilla.redhat.com/22310432231043https://bugzilla.redhat.com/22368422236842https://bugzilla.redhat.com/22368432236843https://bugzilla.redhat.com/22368442236844https://bugzilla.redhat.com/22389432238943https://bugzilla.redhat.com/22389442238944https://bugzilla.redhat.com/22389452238945https://bugzilla.redhat.com/22414052241405https://bugzilla.redhat.com/22414092241409https://errata.almalinux.org/9/ALSA-2023-6535.htmlALSA-2023:6535ALSA-2023:6535
2�1webkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm1�1webkit2gtk3-devel-2.40.5-1.el9.i686.rpm3�1webkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm3�1webkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm2�1webkit2gtk3-jsc-2.40.5-1.el9.i686.rpm0�1webkit2gtk3-2.40.5-1.el9.x86_64.rpm1�1webkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm0�1webkit2gtk3-2.40.5-1.el9.i686.rpm2�1webkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm1�1webkit2gtk3-devel-2.40.5-1.el9.i686.rpm3�1webkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm3�1webkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm2�1webkit2gtk3-jsc-2.40.5-1.el9.i686.rpm0�1webkit2gtk3-2.40.5-1.el9.x86_64.rpm1�1webkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm0�1webkit2gtk3-2.40.5-1.el9.i686.rpm����}�\
	����securityModerate: perl-CPAN security update��C�"https://access.redhat.com/errata/RHSA-2023:6539RHSA-2023:6539RHSA-2023:6539https://access.redhat.com/security/cve/CVE-2023-31484CVE-2023-31484CVE-2023-31484https://bugzilla.redhat.com/22186672218667https://errata.almalinux.org/9/ALSA-2023-6539.htmlALSA-2023:6539ALSA-2023:6539
�c�pperl-CPAN-2.29-3.el9.noarch.rpm�c�pperl-CPAN-2.29-3.el9.noarch.rpm����A�]
	����securityModerate: perl-HTTP-Tiny security update��e�[https://access.redhat.com/errata/RHSA-2023:6542RHSA-2023:6542RHSA-2023:6542https://access.redhat.com/security/cve/CVE-2023-31486CVE-2023-31486CVE-2023-31486https://bugzilla.redhat.com/22283922228392https://errata.almalinux.org/9/ALSA-2023-6542.htmlALSA-2023:6542ALSA-2023:6542
�w�~perl-HTTP-Tiny-0.076-461.el9.noarch.rpm�w�~perl-HTTP-Tiny-0.076-461.el9.noarch.rpm����A�^
	��!��SBBBBBBBBBBBBsecurityModerate: ghostscript security and bug fix update��@�rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544
��oghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpm�k�oghostscript-doc-9.54.0-13.el9.noarch.rpm��oghostscript-x11-9.54.0-13.el9.x86_64.rpm��oghostscript-9.54.0-13.el9.x86_64.rpm�e�olibgs-9.54.0-13.el9.x86_64.rpm��oghostscript-tools-printing-9.54.0-13.el9.x86_64.rpm��oghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpm�e�olibgs-9.54.0-13.el9.i686.rpm��oghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpm�k�oghostscript-doc-9.54.0-13.el9.noarch.rpm��oghostscript-x11-9.54.0-13.el9.x86_64.rpm��oghostscript-9.54.0-13.el9.x86_64.rpm�e�olibgs-9.54.0-13.el9.x86_64.rpm��oghostscript-tools-printing-9.54.0-13.el9.x86_64.rpm��oghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpm�e�olibgs-9.54.0-13.el9.i686.rpm�����_
	��$��bsecurityModerate: libreswan security update��2�yhttps://access.redhat.com/errata/RHSA-2023:6549RHSA-2023:6549RHSA-2023:6549https://access.redhat.com/security/cve/CVE-2023-38710CVE-2023-38710CVE-2023-38710https://access.redhat.com/security/cve/CVE-2023-38711CVE-2023-38711CVE-2023-38711https://access.redhat.com/security/cve/CVE-2023-38712CVE-2023-38712CVE-2023-38712https://bugzilla.redhat.com/22159522215952https://bugzilla.redhat.com/22253682225368https://bugzilla.redhat.com/22253692225369https://errata.almalinux.org/9/ALSA-2023-6549.htmlALSA-2023:6549ALSA-2023:6549
�J�libreswan-4.12-1.el9.x86_64.rpm�J�libreswan-4.12-1.el9.x86_64.rpm����{�`
	��(��eBsecurityModerate: yajl security update��+�,https://access.redhat.com/errata/RHSA-2023:6551RHSA-2023:6551RHSA-2023:6551https://access.redhat.com/security/cve/CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/22212492221249https://errata.almalinux.org/9/ALSA-2023-6551.htmlALSA-2023:6551ALSA-2023:6551
�^�Jyajl-2.1.0-22.el9.x86_64.rpm�^�Jyajl-2.1.0-22.el9.i686.rpm�^�Jyajl-2.1.0-22.el9.x86_64.rpm�^�Jyajl-2.1.0-22.el9.i686.rpm�����a
	��,��iBsecurityModerate: libmicrohttpd security update��W�~https://access.redhat.com/errata/RHSA-2023:6566RHSA-2023:6566RHSA-2023:6566https://access.redhat.com/security/cve/CVE-2023-27371CVE-2023-27371CVE-2023-27371https://bugzilla.redhat.com/21743132174313https://errata.almalinux.org/9/ALSA-2023-6566.htmlALSA-2023:6566ALSA-2023:6566
�[�Alibmicrohttpd-0.9.72-5.el9.x86_64.rpm�[�Alibmicrohttpd-0.9.72-5.el9.i686.rpm�[�Alibmicrohttpd-0.9.72-5.el9.x86_64.rpm�[�Alibmicrohttpd-0.9.72-5.el9.i686.rpm�����b
	��/��msecurityModerate: sysstat security and bug fix update��U�Yhttps://access.redhat.com/errata/RHSA-2023:6569RHSA-2023:6569RHSA-2023:6569https://access.redhat.com/security/cve/CVE-2023-33204CVE-2023-33204CVE-2023-33204https://bugzilla.redhat.com/22082702208270https://errata.almalinux.org/9/ALSA-2023-6569.htmlALSA-2023:6569ALSA-2023:6569
��sysstat-12.5.4-7.el9.x86_64.rpm��sysstat-12.5.4-7.el9.x86_64.rpm����|�c
	��8��pBBBBBBsecurityModerate: tomcat security and bug fix update��.�3https://access.redhat.com/errata/RHSA-2023:6570RHSA-2023:6570RHSA-2023:6570https://access.redhat.com/security/cve/CVE-2023-24998CVE-2023-24998CVE-2023-24998https://access.redhat.com/security/cve/CVE-2023-28708CVE-2023-28708CVE-2023-28708https://access.redhat.com/security/cve/CVE-2023-28709CVE-2023-28709CVE-2023-28709https://bugzilla.redhat.com/21722982172298https://bugzilla.redhat.com/21808562180856https://bugzilla.redhat.com/22103212210321https://errata.almalinux.org/9/ALSA-2023-6570.htmlALSA-2023:6570ALSA-2023:6570
��2tomcat-9.0.62-37.el9_3.noarch.rpm��2tomcat-docs-webapp-9.0.62-37.el9_3.noarch.rpm��2tomcat-admin-webapps-9.0.62-37.el9_3.noarch.rpm��2tomcat-el-3.0-api-9.0.62-37.el9_3.noarch.rpm��2tomcat-webapps-9.0.62-37.el9_3.noarch.rpm��2tomcat-lib-9.0.62-37.el9_3.noarch.rpm��2tomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpm��2tomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpm��2tomcat-9.0.62-37.el9_3.noarch.rpm��2tomcat-docs-webapp-9.0.62-37.el9_3.noarch.rpm��2tomcat-admin-webapps-9.0.62-37.el9_3.noarch.rpm��2tomcat-el-3.0-api-9.0.62-37.el9_3.noarch.rpm��2tomcat-webapps-9.0.62-37.el9_3.noarch.rpm��2tomcat-lib-9.0.62-37.el9_3.noarch.rpm��2tomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpm��2tomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpm����v�d
	��?��yBBBBsecurityModerate: libtiff security update��a�Nhttps://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575
�D�libtiff-devel-4.4.0-10.el9.i686.rpm�C�libtiff-4.4.0-10.el9.x86_64.rpm�C�libtiff-4.4.0-10.el9.i686.rpm�D�libtiff-devel-4.4.0-10.el9.x86_64.rpm�D�libtiff-devel-4.4.0-10.el9.i686.rpm�C�libtiff-4.4.0-10.el9.x86_64.rpm�C�libtiff-4.4.0-10.el9.i686.rpm�D�libtiff-devel-4.4.0-10.el9.x86_64.rpm����Y�e
	����@BsecurityModerate: libqb security update��/�ohttps://access.redhat.com/errata/RHSA-2023:6578RHSA-2023:6578RHSA-2023:6578https://access.redhat.com/security/cve/CVE-2023-39976CVE-2023-39976CVE-2023-39976https://bugzilla.redhat.com/22307082230708https://errata.almalinux.org/9/ALSA-2023-6578.htmlALSA-2023:6578ALSA-2023:6578
�^�Ilibqb-2.0.6-4.el9_3.i686.rpm�^�Ilibqb-2.0.6-4.el9_3.x86_64.rpm�^�Ilibqb-2.0.6-4.el9_3.i686.rpm�^�Ilibqb-2.0.6-4.el9_3.x86_64.rpm����;�f
	����DBsecurityModerate: binutils security update���Jhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593
� �Lbinutils-devel-2.35.2-42.el9.x86_64.rpm� �Lbinutils-devel-2.35.2-42.el9.i686.rpm� �Lbinutils-devel-2.35.2-42.el9.x86_64.rpm� �Lbinutils-devel-2.35.2-42.el9.i686.rpm�����g
	����HBBBBBBBBBBBBsecurityModerate: cups security and bug fix update��h�nhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596
�.�fcups-lpd-2.3.3op2-21.el9.x86_64.rpm�-�fcups-ipptool-2.3.3op2-21.el9.x86_64.rpm�+�fcups-2.3.3op2-21.el9.x86_64.rpm�,�fcups-client-2.3.3op2-21.el9.x86_64.rpm�/�fcups-printerapp-2.3.3op2-21.el9.x86_64.rpm�f�fcups-devel-2.3.3op2-21.el9.i686.rpm��fcups-filesystem-2.3.3op2-21.el9.noarch.rpm�f�fcups-devel-2.3.3op2-21.el9.x86_64.rpm�.�fcups-lpd-2.3.3op2-21.el9.x86_64.rpm�-�fcups-ipptool-2.3.3op2-21.el9.x86_64.rpm�+�fcups-2.3.3op2-21.el9.x86_64.rpm�,�fcups-client-2.3.3op2-21.el9.x86_64.rpm�/�fcups-printerapp-2.3.3op2-21.el9.x86_64.rpm�f�fcups-devel-2.3.3op2-21.el9.i686.rpm��fcups-filesystem-2.3.3op2-21.el9.noarch.rpm�f�fcups-devel-2.3.3op2-21.el9.x86_64.rpm�����h
	����WBBBBsecurityLow: glib2 security and bug fix update�6��V�ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631
��dglib2-devel-2.68.4-11.el9.x86_64.rpm�:�dglib2-tests-2.68.4-11.el9.x86_64.rpm��dglib2-devel-2.68.4-11.el9.i686.rpm�:�dglib2-doc-2.68.4-11.el9.noarch.rpm��dglib2-devel-2.68.4-11.el9.x86_64.rpm�:�dglib2-tests-2.68.4-11.el9.x86_64.rpm��dglib2-devel-2.68.4-11.el9.i686.rpm�:�dglib2-doc-2.68.4-11.el9.noarch.rpm����a�i
	��!��^BsecurityModerate: c-ares security, bug fix, and enhancement update��E�

https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635
�5�&c-ares-devel-1.19.1-1.el9.x86_64.rpm�5�&c-ares-devel-1.19.1-1.el9.i686.rpm�5�&c-ares-devel-1.19.1-1.el9.x86_64.rpm�5�&c-ares-devel-1.19.1-1.el9.i686.rpm�����j
	��%��bBsecurityModerate: libssh security update��O�{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:6643
��libssh-devel-0.10.4-11.el9.x86_64.rpm��libssh-devel-0.10.4-11.el9.i686.rpm��libssh-devel-0.10.4-11.el9.x86_64.rpm��libssh-devel-0.10.4-11.el9.i686.rpm�����k
	��,��fBBBBsecurityModerate: python3.9 security update��J� https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659
f�python-unversioned-command-3.9.18-1.el9_3.noarch.rpm�+�python3-tkinter-3.9.18-1.el9_3.x86_64.rpmQ�python3-devel-3.9.18-1.el9_3.i686.rpmQ�python3-devel-3.9.18-1.el9_3.x86_64.rpmf�python-unversioned-command-3.9.18-1.el9_3.noarch.rpm�+�python3-tkinter-3.9.18-1.el9_3.x86_64.rpmQ�python3-devel-3.9.18-1.el9_3.i686.rpmQ�python3-devel-3.9.18-1.el9_3.x86_64.rpm����a�l
	��3��mBBBBsecurityLow: gmp security and enhancement update�6��j�Uhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661
�G�agmp-devel-6.2.0-13.el9.i686.rpm�F�agmp-c++-6.2.0-13.el9.x86_64.rpm�G�agmp-devel-6.2.0-13.el9.x86_64.rpm�F�agmp-c++-6.2.0-13.el9.i686.rpm�G�agmp-devel-6.2.0-13.el9.i686.rpm�F�agmp-c++-6.2.0-13.el9.x86_64.rpm�G�agmp-devel-6.2.0-13.el9.x86_64.rpm�F�agmp-c++-6.2.0-13.el9.i686.rpm�����m
	����tBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update��?�K
https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667
�Q�Dsamba-winbind-clients-4.18.6-100.el9.x86_64.rpm�S�Dsamba-winexe-4.18.6-100.el9.x86_64.rpm�P�Dsamba-vfs-iouring-4.18.6-100.el9.x86_64.rpm�O�Dsamba-krb5-printing-4.18.6-100.el9.x86_64.rpm�N�Dsamba-client-4.18.6-100.el9.x86_64.rpm�R�Dsamba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpm�Q�Dsamba-winbind-clients-4.18.6-100.el9.x86_64.rpm�S�Dsamba-winexe-4.18.6-100.el9.x86_64.rpm�P�Dsamba-vfs-iouring-4.18.6-100.el9.x86_64.rpm�O�Dsamba-krb5-printing-4.18.6-100.el9.x86_64.rpm�N�Dsamba-client-4.18.6-100.el9.x86_64.rpm�R�Dsamba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpm�����n
	����ABsecurityModerate: curl security update��
�q
https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679
��libcurl-devel-7.76.1-26.el9.i686.rpm��libcurl-devel-7.76.1-26.el9.x86_64.rpm��libcurl-devel-7.76.1-26.el9.i686.rpm��libcurl-devel-7.76.1-26.el9.x86_64.rpm����V�o
	����securityModerate: python-pip security update��{�(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694
�>�python3-pip-21.2.3-7.el9.noarch.rpm�>�python3-pip-21.2.3-7.el9.noarch.rpm����D�p
	����GBBBBBsecurityModerate: ncurses security and bug fix update��#�xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698
�W�Gncurses-term-6.2-10.20210508.el9.noarch.rpm�p�Gncurses-devel-6.2-10.20210508.el9.i686.rpm�o�Gncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpm�p�Gncurses-devel-6.2-10.20210508.el9.x86_64.rpm�o�Gncurses-c++-libs-6.2-10.20210508.el9.i686.rpm�W�Gncurses-term-6.2-10.20210508.el9.noarch.rpm�p�Gncurses-devel-6.2-10.20210508.el9.i686.rpm�o�Gncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpm�p�Gncurses-devel-6.2-10.20210508.el9.x86_64.rpm�o�Gncurses-c++-libs-6.2-10.20210508.el9.i686.rpm����i�q
	����OBsecurityModerate: krb5 security and bug fix update���9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699
�d�+krb5-devel-1.21.1-1.el9.x86_64.rpm�d�+krb5-devel-1.21.1-1.el9.i686.rpm�d�+krb5-devel-1.21.1-1.el9.x86_64.rpm�d�+krb5-devel-1.21.1-1.el9.i686.rpm����"�r
	����SBBBsecurityModerate: avahi security update��T�https://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707
�o�]avahi-tools-0.8-15.el9.x86_64.rpm�4�]avahi-glib-0.8-15.el9.x86_64.rpm�4�]avahi-glib-0.8-15.el9.i686.rpm�o�]avahi-tools-0.8-15.el9.x86_64.rpm�4�]avahi-glib-0.8-15.el9.x86_64.rpm�4�]avahi-glib-0.8-15.el9.i686.rpm����G�s
	��'��YBBBBBBBBBBBBsecurityImportant: ghostscript security update��e�https://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732
�e�plibgs-9.54.0-14.el9_3.i686.rpm��pghostscript-x11-9.54.0-14.el9_3.x86_64.rpm��pghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpm�e�plibgs-9.54.0-14.el9_3.x86_64.rpm��pghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpm��pghostscript-9.54.0-14.el9_3.x86_64.rpm�k�pghostscript-doc-9.54.0-14.el9_3.noarch.rpm��pghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpm�e�plibgs-9.54.0-14.el9_3.i686.rpm��pghostscript-x11-9.54.0-14.el9_3.x86_64.rpm��pghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpm�e�plibgs-9.54.0-14.el9_3.x86_64.rpm��pghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpm��pghostscript-9.54.0-14.el9_3.x86_64.rpm�k�pghostscript-doc-9.54.0-14.el9_3.noarch.rpm��pghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpm�����t
	��:��hBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security and bug fix update��f�https://access.redhat.com/errata/RHSA-2023:6738RHSA-2023:6738RHSA-2023:6738https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-6738.htmlALSA-2023:6738ALSA-2023:6738
	�q�1java-21-openjdk-javadoc-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�n�1java-21-openjdk-demo-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�r�1java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�s�1java-21-openjdk-jmods-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�p�1java-21-openjdk-headless-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�t�1java-21-openjdk-src-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�m�1java-21-openjdk-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�o�1java-21-openjdk-devel-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�u�1java-21-openjdk-static-libs-21.0.1.0.12-2.el9.alma.1.x86_64.rpm	�q�1java-21-openjdk-javadoc-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�n�1java-21-openjdk-demo-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�r�1java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�s�1java-21-openjdk-jmods-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�p�1java-21-openjdk-headless-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�t�1java-21-openjdk-src-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�m�1java-21-openjdk-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�o�1java-21-openjdk-devel-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�u�1java-21-openjdk-static-libs-21.0.1.0.12-2.el9.alma.1.x86_64.rpm����[�u
	����{BBBBBBBBBBsecurityModerate: samba security update���Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744
�S�Esamba-winexe-4.18.6-101.el9_3.alma.1.x86_64.rpm�Q�Esamba-winbind-clients-4.18.6-101.el9_3.alma.1.x86_64.rpm�O�Esamba-krb5-printing-4.18.6-101.el9_3.alma.1.x86_64.rpm�N�Esamba-client-4.18.6-101.el9_3.alma.1.x86_64.rpm�P�Esamba-vfs-iouring-4.18.6-101.el9_3.alma.1.x86_64.rpm�R�Esamba-winbind-krb5-locator-4.18.6-101.el9_3.alma.1.x86_64.rpm�S�Esamba-winexe-4.18.6-101.el9_3.alma.1.x86_64.rpm�Q�Esamba-winbind-clients-4.18.6-101.el9_3.alma.1.x86_64.rpm�O�Esamba-krb5-printing-4.18.6-101.el9_3.alma.1.x86_64.rpm�N�Esamba-client-4.18.6-101.el9_3.alma.1.x86_64.rpm�P�Esamba-vfs-iouring-4.18.6-101.el9_3.alma.1.x86_64.rpm�R�Esamba-winbind-krb5-locator-4.18.6-101.el9_3.alma.1.x86_64.rpm����!�v
	����HBsecurityImportant: curl security update��Y�}https://access.redhat.com/errata/RHSA-2023:6745RHSA-2023:6745RHSA-2023:6745https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-6745.htmlALSA-2023:6745ALSA-2023:6745
��libcurl-devel-7.76.1-26.el9_3.2.i686.rpm��libcurl-devel-7.76.1-26.el9_3.2.x86_64.rpm��libcurl-devel-7.76.1-26.el9_3.2.i686.rpm��libcurl-devel-7.76.1-26.el9_3.2.x86_64.rpm����'�w
	����LsecurityCritical: squid security update�S��V�
https://access.redhat.com/errata/RHSA-2023:6748RHSA-2023:6748RHSA-2023:6748https://access.redhat.com/security/cve/CVE-2023-46846CVE-2023-46846CVE-2023-46846https://access.redhat.com/security/cve/CVE-2023-46847CVE-2023-46847CVE-2023-46847https://access.redhat.com/security/cve/CVE-2023-46848CVE-2023-46848CVE-2023-46848https://bugzilla.redhat.com/22459102245910https://bugzilla.redhat.com/22459162245916https://bugzilla.redhat.com/22459192245919https://errata.almalinux.org/9/ALSA-2023-6748.htmlALSA-2023:6748ALSA-2023:6748
�{�Ksquid-5.5-6.el9_3.1.x86_64.rpm�{�Ksquid-5.5-6.el9_3.1.x86_64.rpm����	�x
	��#��OBBBBBBBBBBBBBBBBBBsecurityModerate: dotnet8.0 security update��`�https://access.redhat.com/errata/RHSA-2023:7253RHSA-2023:7253RHSA-2023:7253https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7253.htmlALSA-2023:7253ALSA-2023:7253

�"�netstandard-targeting-pack-2.1-8.0.100-2.el9_3.x86_64.rpm�x�Qdotnet-hostfxr-8.0-8.0.0-2.el9_3.x86_64.rpm�y�Qdotnet-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm�u�Qaspnetcore-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm�v�Qaspnetcore-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpm�{�Qdotnet-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpm�w�Qdotnet-apphost-pack-8.0-8.0.0-2.el9_3.x86_64.rpm�|�dotnet-templates-8.0-8.0.100-2.el9_3.x86_64.rpm�!�Qdotnet-host-8.0.0-2.el9_3.x86_64.rpm�z�dotnet-sdk-8.0-8.0.100-2.el9_3.x86_64.rpm
�"�netstandard-targeting-pack-2.1-8.0.100-2.el9_3.x86_64.rpm�x�Qdotnet-hostfxr-8.0-8.0.0-2.el9_3.x86_64.rpm�y�Qdotnet-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm�u�Qaspnetcore-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm�v�Qaspnetcore-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpm�{�Qdotnet-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpm�w�Qdotnet-apphost-pack-8.0-8.0.0-2.el9_3.x86_64.rpm�|�dotnet-templates-8.0-8.0.100-2.el9_3.x86_64.rpm�!�Qdotnet-host-8.0.0-2.el9_3.x86_64.rpm�z�dotnet-sdk-8.0-8.0.100-2.el9_3.x86_64.rpm��ٍ�y
	��4��dBBBBBBBBBBBBBBsecurityModerate: dotnet7.0 security update��|�1https://access.redhat.com/errata/RHSA-2023:7255RHSA-2023:7255RHSA-2023:7255https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7255.htmlALSA-2023:7255ALSA-2023:7255
�x�Taspnetcore-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm�w�Taspnetcore-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm�y�Tdotnet-apphost-pack-7.0-7.0.14-1.el9_3.x86_64.rpm�z�Tdotnet-hostfxr-7.0-7.0.14-1.el9_3.x86_64.rpm�|�cdotnet-sdk-7.0-7.0.114-1.el9_3.x86_64.rpm�{�Tdotnet-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm�~�cdotnet-templates-7.0-7.0.114-1.el9_3.x86_64.rpm�}�Tdotnet-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm�x�Taspnetcore-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm�w�Taspnetcore-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm�y�Tdotnet-apphost-pack-7.0-7.0.14-1.el9_3.x86_64.rpm�z�Tdotnet-hostfxr-7.0-7.0.14-1.el9_3.x86_64.rpm�|�cdotnet-sdk-7.0-7.0.114-1.el9_3.x86_64.rpm�{�Tdotnet-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm�~�cdotnet-templates-7.0-7.0.114-1.el9_3.x86_64.rpm�}�Tdotnet-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm����t�z
	����uBBBBBBBBBBBBBBsecurityModerate: dotnet6.0 security update��-�.https://access.redhat.com/errata/RHSA-2023:7257RHSA-2023:7257RHSA-2023:7257https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7257.htmlALSA-2023:7257ALSA-2023:7257
�P�Odotnet-runtime-6.0-6.0.25-1.el9_3.x86_64.rpm�O�Odotnet-hostfxr-6.0-6.0.25-1.el9_3.x86_64.rpm�S�\dotnet-templates-6.0-6.0.125-1.el9_3.x86_64.rpm�Q�\dotnet-sdk-6.0-6.0.125-1.el9_3.x86_64.rpm�R�Odotnet-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpm�N�Odotnet-apphost-pack-6.0-6.0.25-1.el9_3.x86_64.rpm�L�Oaspnetcore-runtime-6.0-6.0.25-1.el9_3.x86_64.rpm�M�Oaspnetcore-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpm�P�Odotnet-runtime-6.0-6.0.25-1.el9_3.x86_64.rpm�O�Odotnet-hostfxr-6.0-6.0.25-1.el9_3.x86_64.rpm�S�\dotnet-templates-6.0-6.0.125-1.el9_3.x86_64.rpm�Q�\dotnet-sdk-6.0-6.0.125-1.el9_3.x86_64.rpm�R�Odotnet-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpm�N�Odotnet-apphost-pack-6.0-6.0.25-1.el9_3.x86_64.rpm�L�Oaspnetcore-runtime-6.0-6.0.25-1.el9_3.x86_64.rpm�M�Oaspnetcore-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpm��و;�{
	����FBBBBBBBBsecurityImportant: open-vm-tools security update��[�Shttps://access.redhat.com/errata/RHSA-2023:7277RHSA-2023:7277RHSA-2023:7277https://access.redhat.com/security/cve/CVE-2023-34058CVE-2023-34058CVE-2023-34058https://access.redhat.com/security/cve/CVE-2023-34059CVE-2023-34059CVE-2023-34059https://bugzilla.redhat.com/22460802246080https://bugzilla.redhat.com/22460962246096https://errata.almalinux.org/9/ALSA-2023-7277.htmlALSA-2023:7277ALSA-2023:7277
��mopen-vm-tools-desktop-12.2.5-3.el9_3.2.alma.1.x86_64.rpm�
�mopen-vm-tools-test-12.2.5-3.el9_3.2.alma.1.x86_64.rpm�M�mopen-vm-tools-salt-minion-12.2.5-3.el9_3.2.alma.1.x86_64.rpm��mopen-vm-tools-12.2.5-3.el9_3.2.alma.1.x86_64.rpm�	�mopen-vm-tools-sdmp-12.2.5-3.el9_3.2.alma.1.x86_64.rpm��mopen-vm-tools-desktop-12.2.5-3.el9_3.2.alma.1.x86_64.rpm�
�mopen-vm-tools-test-12.2.5-3.el9_3.2.alma.1.x86_64.rpm�M�mopen-vm-tools-salt-minion-12.2.5-3.el9_3.2.alma.1.x86_64.rpm��mopen-vm-tools-12.2.5-3.el9_3.2.alma.1.x86_64.rpm�	�mopen-vm-tools-sdmp-12.2.5-3.el9_3.2.alma.1.x86_64.rpm��ؾ�|
	����QsecurityImportant: squid security update��.�whttps://access.redhat.com/errata/RHSA-2023:7465RHSA-2023:7465RHSA-2023:7465https://access.redhat.com/security/cve/CVE-2023-5824CVE-2023-5824CVE-2023-5824https://bugzilla.redhat.com/22459142245914https://errata.almalinux.org/9/ALSA-2023-7465.htmlALSA-2023:7465ALSA-2023:7465
�{�Lsquid-5.5-6.el9_3.2.x86_64.rpm�{�Lsquid-5.5-6.el9_3.2.x86_64.rpm�����}
	����TsecurityImportant: thunderbird security update��%�&https://access.redhat.com/errata/RHSA-2023:7501RHSA-2023:7501RHSA-2023:7501https://access.redhat.com/security/cve/CVE-2023-6204CVE-2023-6204CVE-2023-6204https://access.redhat.com/security/cve/CVE-2023-6205CVE-2023-6205CVE-2023-6205https://access.redhat.com/security/cve/CVE-2023-6206CVE-2023-6206CVE-2023-6206https://access.redhat.com/security/cve/CVE-2023-6207CVE-2023-6207CVE-2023-6207https://access.redhat.com/security/cve/CVE-2023-6208CVE-2023-6208CVE-2023-6208https://access.redhat.com/security/cve/CVE-2023-6209CVE-2023-6209CVE-2023-6209https://access.redhat.com/security/cve/CVE-2023-6212CVE-2023-6212CVE-2023-6212https://bugzilla.redhat.com/22508962250896https://bugzilla.redhat.com/22508972250897https://bugzilla.redhat.com/22508982250898https://bugzilla.redhat.com/22508992250899https://bugzilla.redhat.com/22509002250900https://bugzilla.redhat.com/22509012250901https://bugzilla.redhat.com/22509022250902https://errata.almalinux.org/9/ALSA-2023-7501.htmlALSA-2023:7501ALSA-2023:7501
9�thunderbird-115.5.0-1.el9_3.alma.x86_64.rpm9�thunderbird-115.5.0-1.el9_3.alma.x86_64.rpm����H�~
	����WBBsecurityImportant: firefox security update��K�Whttps://access.redhat.com/errata/RHSA-2023:7507RHSA-2023:7507RHSA-2023:7507https://access.redhat.com/security/cve/CVE-2023-6204CVE-2023-6204CVE-2023-6204https://access.redhat.com/security/cve/CVE-2023-6205CVE-2023-6205CVE-2023-6205https://access.redhat.com/security/cve/CVE-2023-6206CVE-2023-6206CVE-2023-6206https://access.redhat.com/security/cve/CVE-2023-6207CVE-2023-6207CVE-2023-6207https://access.redhat.com/security/cve/CVE-2023-6208CVE-2023-6208CVE-2023-6208https://access.redhat.com/security/cve/CVE-2023-6209CVE-2023-6209CVE-2023-6209https://access.redhat.com/security/cve/CVE-2023-6212CVE-2023-6212CVE-2023-6212https://bugzilla.redhat.com/22508962250896https://bugzilla.redhat.com/22508972250897https://bugzilla.redhat.com/22508982250898https://bugzilla.redhat.com/22508992250899https://bugzilla.redhat.com/22509002250900https://bugzilla.redhat.com/22509012250901https://bugzilla.redhat.com/22509022250902https://errata.almalinux.org/9/ALSA-2023-7507.htmlALSA-2023:7507ALSA-2023:7507
8�firefox-115.5.0-1.el9_3.alma.1.x86_64.rpmP�firefox-x11-115.5.0-1.el9_3.alma.1.x86_64.rpm8�firefox-115.5.0-1.el9_3.alma.1.x86_64.rpmP�firefox-x11-115.5.0-1.el9_3.alma.1.x86_64.rpm����%�	��"��\BBBBsecurityModerate: apr security update��"�@https://access.redhat.com/errata/RHSA-2023:7711RHSA-2023:7711RHSA-2023:7711https://access.redhat.com/security/cve/CVE-2022-24963CVE-2022-24963CVE-2022-24963https://bugzilla.redhat.com/21694652169465https://errata.almalinux.org/9/ALSA-2023-7711.htmlALSA-2023:7711ALSA-2023:7711
��\apr-devel-1.7.0-12.el9_3.x86_64.rpm��\apr-1.7.0-12.el9_3.x86_64.rpm��\apr-devel-1.7.0-12.el9_3.i686.rpm��\apr-1.7.0-12.el9_3.i686.rpm��\apr-devel-1.7.0-12.el9_3.x86_64.rpm��\apr-1.7.0-12.el9_3.x86_64.rpm��\apr-devel-1.7.0-12.el9_3.i686.rpm��\apr-1.7.0-12.el9_3.i686.rpm��ܗK�	��%��csecurityImportant: tracker-miners security update��b�7https://access.redhat.com/errata/RHSA-2023:7712RHSA-2023:7712RHSA-2023:7712https://access.redhat.com/security/cve/CVE-2023-5557CVE-2023-5557CVE-2023-5557https://bugzilla.redhat.com/22430962243096https://errata.almalinux.org/9/ALSA-2023-7712.htmlALSA-2023:7712ALSA-2023:7712
�k�wtracker-miners-3.1.2-4.el9_3.x86_64.rpm�k�wtracker-miners-3.1.2-4.el9_3.x86_64.rpm���d�	��2��fBBBBBBBBBBsecurityImportant: webkit2gtk3 security update���ghttps://access.redhat.com/errata/RHSA-2023:7715RHSA-2023:7715RHSA-2023:7715https://access.redhat.com/security/cve/CVE-2023-42917CVE-2023-42917CVE-2023-42917https://bugzilla.redhat.com/22530582253058https://errata.almalinux.org/9/ALSA-2023-7715.htmlALSA-2023:7715ALSA-2023:7715
2�2webkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm2�2webkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm1�2webkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm3�2webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm0�2webkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm0�2webkit2gtk3-2.40.5-1.el9_3.1.i686.rpm1�2webkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm3�2webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm2�2webkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm2�2webkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm1�2webkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm3�2webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm0�2webkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm0�2webkit2gtk3-2.40.5-1.el9_3.1.i686.rpm1�2webkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm3�2webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm���&�	��6��sBsecurityModerate: libxml2 security update���https://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747
�E�glibxml2-devel-2.9.13-5.el9_3.i686.rpm�E�glibxml2-devel-2.9.13-5.el9_3.x86_64.rpm�E�glibxml2-devel-2.9.13-5.el9_3.i686.rpm�E�glibxml2-devel-2.9.13-5.el9_3.x86_64.rpm���K�	��
��wBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update���Rhttps://access.redhat.com/errata/RHSA-2023:7753RHSA-2023:7753RHSA-2023:7753https://access.redhat.com/security/cve/CVE-2023-37920CVE-2023-37920CVE-2023-37920https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://bugzilla.redhat.com/22265862226586https://bugzilla.redhat.com/22424932242493https://errata.almalinux.org/9/ALSA-2023-7753.htmlALSA-2023:7753ALSA-2023:7753

�h�%fence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�d�%fence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�%�%fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpm�j�%fence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�$�%fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpm�g�%fence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�b�%fence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�f�%fence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�c�%fence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�e�%fence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�i�%fence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�#�%fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm�&�%fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm
�h�%fence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�d�%fence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�%�%fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpm�j�%fence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�$�%fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpm�g�%fence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�b�%fence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�f�%fence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�c�%fence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�e�%fence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�i�%fence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm�#�%fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm�&�%fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm����	����NBBBBsecurityModerate: pixman security update��Q�https://access.redhat.com/errata/RHSA-2023:7754RHSA-2023:7754RHSA-2023:7754https://access.redhat.com/security/cve/CVE-2022-44638CVE-2022-44638CVE-2022-44638https://bugzilla.redhat.com/21399882139988https://errata.almalinux.org/9/ALSA-2023-7754.htmlALSA-2023:7754ALSA-2023:7754
�v�Opixman-devel-0.40.0-6.el9_3.x86_64.rpm�u�Opixman-0.40.0-6.el9_3.x86_64.rpm�u�Opixman-0.40.0-6.el9_3.i686.rpm�v�Opixman-devel-0.40.0-6.el9_3.i686.rpm�v�Opixman-devel-0.40.0-6.el9_3.x86_64.rpm�u�Opixman-0.40.0-6.el9_3.x86_64.rpm�u�Opixman-0.40.0-6.el9_3.i686.rpm�v�Opixman-devel-0.40.0-6.el9_3.i686.rpm���R�	����UBBsecurityModerate: skopeo security update��V�Zhttps://access.redhat.com/errata/RHSA-2023:7762RHSA-2023:7762RHSA-2023:7762https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7762.htmlALSA-2023:7762ALSA-2023:7762
�c�0skopeo-1.13.3-3.el9_3.x86_64.rpm�d�0skopeo-tests-1.13.3-3.el9_3.x86_64.rpm�c�0skopeo-1.13.3-3.el9_3.x86_64.rpm�d�0skopeo-tests-1.13.3-3.el9_3.x86_64.rpm���K�	����ZsecurityModerate: runc security update��0�qhttps://access.redhat.com/errata/RHSA-2023:7763RHSA-2023:7763RHSA-2023:7763https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7763.htmlALSA-2023:7763ALSA-2023:7763
�z�)runc-1.1.9-2.el9_3.x86_64.rpm�z�)runc-1.1.9-2.el9_3.x86_64.rpm���I�	��!��]BBsecurityModerate: buildah security update��!�https://access.redhat.com/errata/RHSA-2023:7764RHSA-2023:7764RHSA-2023:7764https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7764.htmlALSA-2023:7764ALSA-2023:7764
�/�buildah-1.31.3-2.el9_3.x86_64.rpm�0�buildah-tests-1.31.3-2.el9_3.x86_64.rpm�/�buildah-1.31.3-2.el9_3.x86_64.rpm�0�buildah-tests-1.31.3-2.el9_3.x86_64.rpm���L�	��-��bBBBBBBBBBsecurityModerate: podman security update��8�https://access.redhat.com/errata/RHSA-2023:7765RHSA-2023:7765RHSA-2023:7765https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7765.htmlALSA-2023:7765ALSA-2023:7765
�3�podman-remote-4.6.1-7.el9_3.x86_64.rpm�1�podman-4.6.1-7.el9_3.x86_64.rpm�4�podman-tests-4.6.1-7.el9_3.x86_64.rpm�2�podman-plugins-4.6.1-7.el9_3.x86_64.rpm�M�podman-gvproxy-4.6.1-7.el9_3.x86_64.rpmh�podman-docker-4.6.1-7.el9_3.noarch.rpm�3�podman-remote-4.6.1-7.el9_3.x86_64.rpm�1�podman-4.6.1-7.el9_3.x86_64.rpm�4�podman-tests-4.6.1-7.el9_3.x86_64.rpm�2�podman-plugins-4.6.1-7.el9_3.x86_64.rpm�M�podman-gvproxy-4.6.1-7.el9_3.x86_64.rpmh�podman-docker-4.6.1-7.el9_3.noarch.rpm���Z�		��0��nsecurityModerate: containernetworking-plugins security update��9�https://access.redhat.com/errata/RHSA-2023:7766RHSA-2023:7766RHSA-2023:7766https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7766.htmlALSA-2023:7766ALSA-2023:7766
�_�containernetworking-plugins-1.3.0-6.el9_3.x86_64.rpm�_�containernetworking-plugins-1.3.0-6.el9_3.x86_64.rpm���I�
	����qBBBBBBBBBBBBBBsecurityImportant: postgresql security update��L�
https://access.redhat.com/errata/RHSA-2023:7784RHSA-2023:7784RHSA-2023:7784https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7784.htmlALSA-2023:7784ALSA-2023:7784
��:postgresql-pltcl-13.13-1.el9_3.x86_64.rpm��:postgresql-contrib-13.13-1.el9_3.x86_64.rpm��:postgresql-private-libs-13.13-1.el9_3.x86_64.rpm��:postgresql-upgrade-13.13-1.el9_3.x86_64.rpm��:postgresql-plperl-13.13-1.el9_3.x86_64.rpm��:postgresql-plpython3-13.13-1.el9_3.x86_64.rpm��:postgresql-server-13.13-1.el9_3.x86_64.rpmZ�:postgresql-13.13-1.el9_3.x86_64.rpm��:postgresql-pltcl-13.13-1.el9_3.x86_64.rpm��:postgresql-contrib-13.13-1.el9_3.x86_64.rpm��:postgresql-private-libs-13.13-1.el9_3.x86_64.rpm��:postgresql-upgrade-13.13-1.el9_3.x86_64.rpm��:postgresql-plperl-13.13-1.el9_3.x86_64.rpm��:postgresql-plpython3-13.13-1.el9_3.x86_64.rpm��:postgresql-server-13.13-1.el9_3.x86_64.rpmZ�:postgresql-13.13-1.el9_3.x86_64.rpm����b�	���gBBBBB�WBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update��R�chttps://access.redhat.com/errata/RHSA-2023:7785RHSA-2023:7785RHSA-2023:7785https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-39418CVE-2023-39418CVE-2023-39418https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22281122228112https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7785.htmlALSA-2023:7785ALSA-2023:7785
Z�L�B*�wpostgresql-pltcl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�[�ppostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm�`wpostgresql-test-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�^wpostgresql-server-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmZwpostgresql-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�wpostgresql-private-libs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�Z�opgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm�wpostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�_wpostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�\wpostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�wpostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�Y�lpg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm�wpostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�wpostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�awpostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�9wpostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpm�wpostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�]wpostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmZ�L�B*�wpostgresql-pltcl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�[�ppostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm�`wpostgresql-test-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�^wpostgresql-server-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmZwpostgresql-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�wpostgresql-private-libs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�Z�opgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm�wpostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�_wpostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�\wpostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�wpostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�Y�lpg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm�wpostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�wpostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�awpostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�9wpostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpm�wpostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm�]wpostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm����&�	��#��`BsecurityImportant: gstreamer1-plugins-bad-free security update��5�https://access.redhat.com/errata/RHSA-2023:7791RHSA-2023:7791RHSA-2023:7791https://access.redhat.com/security/cve/CVE-2023-44429CVE-2023-44429CVE-2023-44429https://access.redhat.com/security/cve/CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/22502472250247https://bugzilla.redhat.com/22502492250249https://errata.almalinux.org/9/ALSA-2023-7791.htmlALSA-2023:7791ALSA-2023:7791
��1gstreamer1-plugins-bad-free-1.22.1-2.el9_3.i686.rpm��1gstreamer1-plugins-bad-free-1.22.1-2.el9_3.x86_64.rpm��1gstreamer1-plugins-bad-free-1.22.1-2.el9_3.i686.rpm��1gstreamer1-plugins-bad-free-1.22.1-2.el9_3.x86_64.rpm���M�
	��&��dsecurityImportant: thunderbird security update��R�@https://access.redhat.com/errata/RHSA-2024:0001RHSA-2024:0001RHSA-2024:0001https://access.redhat.com/security/cve/CVE-2023-50761CVE-2023-50761CVE-2023-50761https://access.redhat.com/security/cve/CVE-2023-50762CVE-2023-50762CVE-2023-50762https://access.redhat.com/security/cve/CVE-2023-6856CVE-2023-6856CVE-2023-6856https://access.redhat.com/security/cve/CVE-2023-6857CVE-2023-6857CVE-2023-6857https://access.redhat.com/security/cve/CVE-2023-6858CVE-2023-6858CVE-2023-6858https://access.redhat.com/security/cve/CVE-2023-6859CVE-2023-6859CVE-2023-6859https://access.redhat.com/security/cve/CVE-2023-6860CVE-2023-6860CVE-2023-6860https://access.redhat.com/security/cve/CVE-2023-6861CVE-2023-6861CVE-2023-6861https://access.redhat.com/security/cve/CVE-2023-6862CVE-2023-6862CVE-2023-6862https://access.redhat.com/security/cve/CVE-2023-6863CVE-2023-6863CVE-2023-6863https://access.redhat.com/security/cve/CVE-2023-6864CVE-2023-6864CVE-2023-6864https://bugzilla.redhat.com/22553602255360https://bugzilla.redhat.com/22553622255362https://bugzilla.redhat.com/22553632255363https://bugzilla.redhat.com/22553642255364https://bugzilla.redhat.com/22553652255365https://bugzilla.redhat.com/22553672255367https://bugzilla.redhat.com/22553682255368https://bugzilla.redhat.com/22553692255369https://bugzilla.redhat.com/22553702255370https://bugzilla.redhat.com/22553782255378https://bugzilla.redhat.com/22553792255379https://errata.almalinux.org/9/ALSA-2024-0001.htmlALSA-2024:0001ALSA-2024:0001
9�cthunderbird-115.6.0-1.el9_3.alma.x86_64.rpm9�cthunderbird-115.6.0-1.el9_3.alma.x86_64.rpm��֯�	��2��gBBBBBBBBBsecurityImportant: tigervnc security update���0https://access.redhat.com/errata/RHSA-2024:0010RHSA-2024:0010RHSA-2024:0010https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://errata.almalinux.org/9/ALSA-2024-0010.htmlALSA-2024:0010ALSA-2024:0010
��tigervnc-license-1.13.1-3.el9_3.3.alma.1.noarch.rpm��tigervnc-icons-1.13.1-3.el9_3.3.alma.1.noarch.rpm�Z�tigervnc-server-module-1.13.1-3.el9_3.3.alma.1.x86_64.rpm�W�tigervnc-1.13.1-3.el9_3.3.alma.1.x86_64.rpm�Y�tigervnc-server-minimal-1.13.1-3.el9_3.3.alma.1.x86_64.rpm�X�tigervnc-server-1.13.1-3.el9_3.3.alma.1.x86_64.rpm��tigervnc-selinux-1.13.1-3.el9_3.3.alma.1.noarch.rpm��tigervnc-license-1.13.1-3.el9_3.3.alma.1.noarch.rpm��tigervnc-icons-1.13.1-3.el9_3.3.alma.1.noarch.rpm�Z�tigervnc-server-module-1.13.1-3.el9_3.3.alma.1.x86_64.rpm�W�tigervnc-1.13.1-3.el9_3.3.alma.1.x86_64.rpm�Y�tigervnc-server-minimal-1.13.1-3.el9_3.3.alma.1.x86_64.rpm�X�tigervnc-server-1.13.1-3.el9_3.3.alma.1.x86_64.rpm��tigervnc-selinux-1.13.1-3.el9_3.3.alma.1.noarch.rpm��֭$�	��7��sBBsecurityImportant: firefox security update��B�https://access.redhat.com/errata/RHSA-2024:0025RHSA-2024:0025RHSA-2024:0025https://access.redhat.com/security/cve/CVE-2023-6856CVE-2023-6856CVE-2023-6856https://access.redhat.com/security/cve/CVE-2023-6857CVE-2023-6857CVE-2023-6857https://access.redhat.com/security/cve/CVE-2023-6858CVE-2023-6858CVE-2023-6858https://access.redhat.com/security/cve/CVE-2023-6859CVE-2023-6859CVE-2023-6859https://access.redhat.com/security/cve/CVE-2023-6860CVE-2023-6860CVE-2023-6860https://access.redhat.com/security/cve/CVE-2023-6861CVE-2023-6861CVE-2023-6861https://access.redhat.com/security/cve/CVE-2023-6862CVE-2023-6862CVE-2023-6862https://access.redhat.com/security/cve/CVE-2023-6863CVE-2023-6863CVE-2023-6863https://access.redhat.com/security/cve/CVE-2023-6864CVE-2023-6864CVE-2023-6864https://access.redhat.com/security/cve/CVE-2023-6865CVE-2023-6865CVE-2023-6865https://access.redhat.com/security/cve/CVE-2023-6867CVE-2023-6867CVE-2023-6867https://bugzilla.redhat.com/22553602255360https://bugzilla.redhat.com/22553612255361https://bugzilla.redhat.com/22553622255362https://bugzilla.redhat.com/22553632255363https://bugzilla.redhat.com/22553642255364https://bugzilla.redhat.com/22553652255365https://bugzilla.redhat.com/22553662255366https://bugzilla.redhat.com/22553672255367https://bugzilla.redhat.com/22553682255368https://bugzilla.redhat.com/22553692255369https://bugzilla.redhat.com/22553702255370https://errata.almalinux.org/9/ALSA-2024-0025.htmlALSA-2024:0025ALSA-2024:0025
8�cfirefox-115.6.0-1.el9_3.alma.x86_64.rpmP�cfirefox-x11-115.6.0-1.el9_3.alma.x86_64.rpm8�cfirefox-115.6.0-1.el9_3.alma.x86_64.rpmP�cfirefox-x11-115.6.0-1.el9_3.alma.x86_64.rpm��֫Y�	��:��xsecurityImportant: squid security update��B�
https://access.redhat.com/errata/RHSA-2024:0071RHSA-2024:0071RHSA-2024:0071https://access.redhat.com/security/cve/CVE-2023-46724CVE-2023-46724CVE-2023-46724https://access.redhat.com/security/cve/CVE-2023-46728CVE-2023-46728CVE-2023-46728https://access.redhat.com/security/cve/CVE-2023-49285CVE-2023-49285CVE-2023-49285https://access.redhat.com/security/cve/CVE-2023-49286CVE-2023-49286CVE-2023-49286https://bugzilla.redhat.com/22475672247567https://bugzilla.redhat.com/22485212248521https://bugzilla.redhat.com/22529232252923https://bugzilla.redhat.com/22529262252926https://errata.almalinux.org/9/ALSA-2024-0071.htmlALSA-2024:0071ALSA-2024:0071
�{�Msquid-5.5-6.el9_3.5.x86_64.rpm�{�Msquid-5.5-6.el9_3.5.x86_64.rpm����	����{BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: nss security update��P�+https://access.redhat.com/errata/RHSA-2024:0108RHSA-2024:0108RHSA-2024:0108https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://bugzilla.redhat.com/22436442243644https://errata.almalinux.org/9/ALSA-2024-0108.htmlALSA-2024:0108ALSA-2024:0108
�Ejnss-devel-3.90.0-4.el9_3.i686.rpm�C�nspr-devel-4.35.0-4.el9_3.x86_64.rpm�Djnss-3.90.0-4.el9_3.x86_64.rpm�Jjnss-util-3.90.0-4.el9_3.x86_64.rpm�Kjnss-util-devel-3.90.0-4.el9_3.i686.rpm�Gjnss-softokn-devel-3.90.0-4.el9_3.x86_64.rpm�Hjnss-softokn-freebl-3.90.0-4.el9_3.i686.rpm�Ijnss-softokn-freebl-devel-3.90.0-4.el9_3.i686.rpm�Ejnss-devel-3.90.0-4.el9_3.x86_64.rpm�Kjnss-util-devel-3.90.0-4.el9_3.x86_64.rpm�B�nspr-4.35.0-4.el9_3.i686.rpm�Gjnss-softokn-devel-3.90.0-4.el9_3.i686.rpm�Fjnss-softokn-3.90.0-4.el9_3.x86_64.rpm�jnss-tools-3.90.0-4.el9_3.x86_64.rpm�Djnss-3.90.0-4.el9_3.i686.rpm�Fjnss-softokn-3.90.0-4.el9_3.i686.rpm�Jjnss-util-3.90.0-4.el9_3.i686.rpm�B�nspr-4.35.0-4.el9_3.x86_64.rpm�C�nspr-devel-4.35.0-4.el9_3.i686.rpm�Hjnss-softokn-freebl-3.90.0-4.el9_3.x86_64.rpm�Ijnss-softokn-freebl-devel-3.90.0-4.el9_3.x86_64.rpm�
jnss-sysinit-3.90.0-4.el9_3.x86_64.rpm�Ejnss-devel-3.90.0-4.el9_3.i686.rpm�C�nspr-devel-4.35.0-4.el9_3.x86_64.rpm�Djnss-3.90.0-4.el9_3.x86_64.rpm�Jjnss-util-3.90.0-4.el9_3.x86_64.rpm�Kjnss-util-devel-3.90.0-4.el9_3.i686.rpm�Gjnss-softokn-devel-3.90.0-4.el9_3.x86_64.rpm�Hjnss-softokn-freebl-3.90.0-4.el9_3.i686.rpm�Ijnss-softokn-freebl-devel-3.90.0-4.el9_3.i686.rpm�Ejnss-devel-3.90.0-4.el9_3.x86_64.rpm�Kjnss-util-devel-3.90.0-4.el9_3.x86_64.rpm�B�nspr-4.35.0-4.el9_3.i686.rpm�Gjnss-softokn-devel-3.90.0-4.el9_3.i686.rpm�Fjnss-softokn-3.90.0-4.el9_3.x86_64.rpm�jnss-tools-3.90.0-4.el9_3.x86_64.rpm�Djnss-3.90.0-4.el9_3.i686.rpm�Fjnss-softokn-3.90.0-4.el9_3.i686.rpm�Jjnss-util-3.90.0-4.el9_3.i686.rpm�B�nspr-4.35.0-4.el9_3.x86_64.rpm�C�nspr-devel-4.35.0-4.el9_3.i686.rpm�Hjnss-softokn-freebl-3.90.0-4.el9_3.x86_64.rpm�Ijnss-softokn-freebl-devel-3.90.0-4.el9_3.x86_64.rpm�
jnss-sysinit-3.90.0-4.el9_3.x86_64.rpm�����	��0��^BBBBBBBBBBBBBBBBsecurityModerate: ipa security update��{�4https://access.redhat.com/errata/RHSA-2024:0141RHSA-2024:0141RHSA-2024:0141https://access.redhat.com/security/cve/CVE-2023-5455CVE-2023-5455CVE-2023-5455https://bugzilla.redhat.com/22428282242828https://errata.almalinux.org/9/ALSA-2024-0141.htmlALSA-2024:0141ALSA-2024:0141

�i�@python3-ipaserver-4.10.2-5.el9_3.alma.1.noarch.rpm�a�@ipa-client-common-4.10.2-5.el9_3.alma.1.noarch.rpm�a�@ipa-client-4.10.2-5.el9_3.alma.1.x86_64.rpm�g�@python3-ipaclient-4.10.2-5.el9_3.alma.1.noarch.rpm�b�@ipa-common-4.10.2-5.el9_3.alma.1.noarch.rpm�d�@ipa-server-common-4.10.2-5.el9_3.alma.1.noarch.rpm�e�@ipa-server-dns-4.10.2-5.el9_3.alma.1.noarch.rpm�c�@ipa-client-samba-4.10.2-5.el9_3.alma.1.x86_64.rpm�c�@ipa-selinux-4.10.2-5.el9_3.alma.1.noarch.rpm�b�@ipa-client-epn-4.10.2-5.el9_3.alma.1.x86_64.rpm�d�@ipa-server-4.10.2-5.el9_3.alma.1.x86_64.rpm�h�@python3-ipalib-4.10.2-5.el9_3.alma.1.noarch.rpm�e�@ipa-server-trust-ad-4.10.2-5.el9_3.alma.1.x86_64.rpm
�i�@python3-ipaserver-4.10.2-5.el9_3.alma.1.noarch.rpm�a�@ipa-client-common-4.10.2-5.el9_3.alma.1.noarch.rpm�a�@ipa-client-4.10.2-5.el9_3.alma.1.x86_64.rpm�g�@python3-ipaclient-4.10.2-5.el9_3.alma.1.noarch.rpm�b�@ipa-common-4.10.2-5.el9_3.alma.1.noarch.rpm�d�@ipa-server-common-4.10.2-5.el9_3.alma.1.noarch.rpm�e�@ipa-server-dns-4.10.2-5.el9_3.alma.1.noarch.rpm�c�@ipa-client-samba-4.10.2-5.el9_3.alma.1.x86_64.rpm�c�@ipa-selinux-4.10.2-5.el9_3.alma.1.noarch.rpm�b�@ipa-client-epn-4.10.2-5.el9_3.alma.1.x86_64.rpm�d�@ipa-server-4.10.2-5.el9_3.alma.1.x86_64.rpm�h�@python3-ipalib-4.10.2-5.el9_3.alma.1.noarch.rpm�e�@ipa-server-trust-ad-4.10.2-5.el9_3.alma.1.x86_64.rpm����|�	����qBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update��/�ghttps://access.redhat.com/errata/RHSA-2024:0151RHSA-2024:0151RHSA-2024:0151https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0151.htmlALSA-2024:0151ALSA-2024:0151
�}�Udotnet-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpm�{�Udotnet-runtime-7.0-7.0.15-1.el9_3.x86_64.rpm�x�Uaspnetcore-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpm�|�ddotnet-sdk-7.0-7.0.115-1.el9_3.x86_64.rpm�y�Udotnet-apphost-pack-7.0-7.0.15-1.el9_3.x86_64.rpm�~�ddotnet-templates-7.0-7.0.115-1.el9_3.x86_64.rpm�w�Uaspnetcore-runtime-7.0-7.0.15-1.el9_3.x86_64.rpm�z�Udotnet-hostfxr-7.0-7.0.15-1.el9_3.x86_64.rpm�}�Udotnet-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpm�{�Udotnet-runtime-7.0-7.0.15-1.el9_3.x86_64.rpm�x�Uaspnetcore-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpm�|�ddotnet-sdk-7.0-7.0.115-1.el9_3.x86_64.rpm�y�Udotnet-apphost-pack-7.0-7.0.15-1.el9_3.x86_64.rpm�~�ddotnet-templates-7.0-7.0.115-1.el9_3.x86_64.rpm�w�Uaspnetcore-runtime-7.0-7.0.15-1.el9_3.x86_64.rpm�z�Udotnet-hostfxr-7.0-7.0.15-1.el9_3.x86_64.rpm����U�	����BBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update���fhttps://access.redhat.com/errata/RHSA-2024:0152RHSA-2024:0152RHSA-2024:0152https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0152.htmlALSA-2024:0152ALSA-2024:0152

�v�Raspnetcore-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpm�|�dotnet-templates-8.0-8.0.101-1.el9_3.x86_64.rpm�u�Raspnetcore-runtime-8.0-8.0.1-1.el9_3.x86_64.rpm�z�dotnet-sdk-8.0-8.0.101-1.el9_3.x86_64.rpm�w�Rdotnet-apphost-pack-8.0-8.0.1-1.el9_3.x86_64.rpm�{�Rdotnet-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpm�"�netstandard-targeting-pack-2.1-8.0.101-1.el9_3.x86_64.rpm�y�Rdotnet-runtime-8.0-8.0.1-1.el9_3.x86_64.rpm�!�Rdotnet-host-8.0.1-1.el9_3.x86_64.rpm�x�Rdotnet-hostfxr-8.0-8.0.1-1.el9_3.x86_64.rpm
�v�Raspnetcore-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpm�|�dotnet-templates-8.0-8.0.101-1.el9_3.x86_64.rpm�u�Raspnetcore-runtime-8.0-8.0.1-1.el9_3.x86_64.rpm�z�dotnet-sdk-8.0-8.0.101-1.el9_3.x86_64.rpm�w�Rdotnet-apphost-pack-8.0-8.0.1-1.el9_3.x86_64.rpm�{�Rdotnet-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpm�"�netstandard-targeting-pack-2.1-8.0.101-1.el9_3.x86_64.rpm�y�Rdotnet-runtime-8.0-8.0.1-1.el9_3.x86_64.rpm�!�Rdotnet-host-8.0.1-1.el9_3.x86_64.rpm�x�Rdotnet-hostfxr-8.0-8.0.1-1.el9_3.x86_64.rpm�����	��'��WBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security update��|�ghttps://access.redhat.com/errata/RHSA-2024:0156RHSA-2024:0156RHSA-2024:0156https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0156.htmlALSA-2024:0156ALSA-2024:0156
�R�Pdotnet-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpm�O�Pdotnet-hostfxr-6.0-6.0.26-1.el9_3.x86_64.rpm�L�Paspnetcore-runtime-6.0-6.0.26-1.el9_3.x86_64.rpm�S�]dotnet-templates-6.0-6.0.126-1.el9_3.x86_64.rpm�M�Paspnetcore-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpm�Q�]dotnet-sdk-6.0-6.0.126-1.el9_3.x86_64.rpm�N�Pdotnet-apphost-pack-6.0-6.0.26-1.el9_3.x86_64.rpm�P�Pdotnet-runtime-6.0-6.0.26-1.el9_3.x86_64.rpm�R�Pdotnet-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpm�O�Pdotnet-hostfxr-6.0-6.0.26-1.el9_3.x86_64.rpm�L�Paspnetcore-runtime-6.0-6.0.26-1.el9_3.x86_64.rpm�S�]dotnet-templates-6.0-6.0.126-1.el9_3.x86_64.rpm�M�Paspnetcore-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpm�Q�]dotnet-sdk-6.0-6.0.126-1.el9_3.x86_64.rpm�N�Pdotnet-apphost-pack-6.0-6.0.26-1.el9_3.x86_64.rpm�P�Pdotnet-runtime-6.0-6.0.26-1.el9_3.x86_64.rpm����w�	��:��hBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��c�!https://access.redhat.com/errata/RHSA-2024:0249RHSA-2024:0249RHSA-2024:0249https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0249.htmlALSA-2024:0249ALSA-2024:0249
	�m�4java-21-openjdk-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�t�4java-21-openjdk-src-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�o�4java-21-openjdk-devel-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�s�4java-21-openjdk-jmods-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�n�4java-21-openjdk-demo-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�r�4java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�p�4java-21-openjdk-headless-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�u�4java-21-openjdk-static-libs-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�q�4java-21-openjdk-javadoc-21.0.2.0.13-1.el9.alma.1.x86_64.rpm	�m�4java-21-openjdk-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�t�4java-21-openjdk-src-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�o�4java-21-openjdk-devel-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�s�4java-21-openjdk-jmods-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�n�4java-21-openjdk-demo-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�r�4java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�p�4java-21-openjdk-headless-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�u�4java-21-openjdk-static-libs-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�q�4java-21-openjdk-javadoc-21.0.2.0.13-1.el9.alma.1.x86_64.rpm����~�	����{BBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix update���1https://access.redhat.com/errata/RHSA-2024:0265RHSA-2024:0265RHSA-2024:0265https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0265.htmlALSA-2024:0265ALSA-2024:0265
�8�njava-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9.noarch.rpm�T�njava-1.8.0-openjdk-1.8.0.402.b06-2.el9.x86_64.rpm�U�njava-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9.x86_64.rpm�7�njava-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9.noarch.rpm�W�njava-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9.x86_64.rpm�X�njava-1.8.0-openjdk-src-1.8.0.402.b06-2.el9.x86_64.rpm�V�njava-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9.x86_64.rpm�8�njava-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9.noarch.rpm�T�njava-1.8.0-openjdk-1.8.0.402.b06-2.el9.x86_64.rpm�U�njava-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9.x86_64.rpm�7�njava-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9.noarch.rpm�W�njava-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9.x86_64.rpm�X�njava-1.8.0-openjdk-src-1.8.0.402.b06-2.el9.x86_64.rpm�V�njava-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9.x86_64.rpm����$�	����HBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update��5�phttps://access.redhat.com/errata/RHSA-2024:0266RHSA-2024:0266RHSA-2024:0266https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0266.htmlALSA-2024:0266ALSA-2024:0266
	�K�java-11-openjdk-src-11.0.22.0.7-2.el9.x86_64.rpm�D�java-11-openjdk-11.0.22.0.7-2.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.22.0.7-2.el9.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.22.0.7-2.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.22.0.7-2.el9.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.22.0.7-2.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.22.0.7-2.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.22.0.7-2.el9.x86_64.rpm	�K�java-11-openjdk-src-11.0.22.0.7-2.el9.x86_64.rpm�D�java-11-openjdk-11.0.22.0.7-2.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.22.0.7-2.el9.x86_64.rpm�H�java-11-openjdk-javadoc-11.0.22.0.7-2.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.22.0.7-2.el9.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.22.0.7-2.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.22.0.7-2.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.22.0.7-2.el9.x86_64.rpm����A�	��-��[BBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update��%�*https://access.redhat.com/errata/RHSA-2024:0267RHSA-2024:0267RHSA-2024:0267https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20932CVE-2024-20932CVE-2024-20932https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577202257720https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0267.htmlALSA-2024:0267ALSA-2024:0267
	��"java-17-openjdk-static-libs-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-jmods-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-devel-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-src-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-javadoc-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-demo-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-headless-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-17.0.10.0.7-2.el9.x86_64.rpm	��"java-17-openjdk-static-libs-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-jmods-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-devel-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-src-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-javadoc-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-demo-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-headless-17.0.10.0.7-2.el9.x86_64.rpm��"java-17-openjdk-17.0.10.0.7-2.el9.x86_64.rpm����1�	��3��nBBBsecurityModerate: openssl security update��O�Nhttps://access.redhat.com/errata/RHSA-2024:0310RHSA-2024:0310RHSA-2024:0310https://access.redhat.com/security/cve/CVE-2023-5363CVE-2023-5363CVE-2023-5363https://bugzilla.redhat.com/22438392243839https://errata.almalinux.org/9/ALSA-2024-0310.htmlALSA-2024:0310ALSA-2024:0310
��lopenssl-devel-3.0.7-25.el9_3.i686.rpm��lopenssl-devel-3.0.7-25.el9_3.x86_64.rpm��lopenssl-perl-3.0.7-25.el9_3.x86_64.rpm��lopenssl-devel-3.0.7-25.el9_3.i686.rpm��lopenssl-devel-3.0.7-25.el9_3.x86_64.rpm��lopenssl-perl-3.0.7-25.el9_3.x86_64.rpm����[�	��&�~BBBBBBBB_B��PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update���rhttps://access.redhat.com/errata/RHSA-2024:0387RHSA-2024:0387RHSA-2024:0387https://access.redhat.com/security/cve/CVE-2023-0567CVE-2023-0567CVE-2023-0567https://access.redhat.com/security/cve/CVE-2023-0568CVE-2023-0568CVE-2023-0568https://access.redhat.com/security/cve/CVE-2023-0662CVE-2023-0662CVE-2023-0662https://access.redhat.com/security/cve/CVE-2023-3247CVE-2023-3247CVE-2023-3247https://access.redhat.com/security/cve/CVE-2023-3823CVE-2023-3823CVE-2023-3823https://access.redhat.com/security/cve/CVE-2023-3824CVE-2023-3824CVE-2023-3824https://bugzilla.redhat.com/21707612170761https://bugzilla.redhat.com/21707702170770https://bugzilla.redhat.com/21707712170771https://bugzilla.redhat.com/22192902219290https://bugzilla.redhat.com/22293962229396https://bugzilla.redhat.com/22301012230101https://errata.almalinux.org/9/ALSA-2024-0387.htmlALSA-2024:0387ALSA-2024:0387
��j�C*�Fphp-fpm-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-dbg-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-snmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-ldap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�U�(php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-intl-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-pdo-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-gd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�
Fphp-common-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�
Fphp-devel-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-process-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-enchant-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-xml-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-bcmath-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�	Fphp-cli-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-opcache-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-ffi-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-mbstring-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-mysqlnd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-pgsql-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-soap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-dba-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�Fphp-embedded-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-gmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-odbc-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm��j�C*�Fphp-fpm-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-dbg-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-snmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-ldap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�U�(php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-intl-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-pdo-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-gd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�
Fphp-common-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�
Fphp-devel-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-process-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-enchant-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-xml-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-bcmath-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�	Fphp-cli-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-opcache-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-ffi-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-mbstring-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-mysqlnd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-pgsql-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-soap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-dba-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�Fphp-embedded-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Fphp-gmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm�Fphp-odbc-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm��˴[�	��6��gBBBBBBBBBBBBBsecurityModerate: rpm security update���whttps://access.redhat.com/errata/RHSA-2024:0463RHSA-2024:0463RHSA-2024:0463https://access.redhat.com/security/cve/CVE-2021-35937CVE-2021-35937CVE-2021-35937https://access.redhat.com/security/cve/CVE-2021-35938CVE-2021-35938CVE-2021-35938https://access.redhat.com/security/cve/CVE-2021-35939CVE-2021-35939CVE-2021-35939https://bugzilla.redhat.com/19641141964114https://bugzilla.redhat.com/19641251964125https://bugzilla.redhat.com/19641291964129https://errata.almalinux.org/9/ALSA-2024-0463.htmlALSA-2024:0463ALSA-2024:0463
	�D� rpm-build-4.16.1.3-27.el9_3.x86_64.rpm�� rpm-devel-4.16.1.3-27.el9_3.i686.rpm�F� rpm-plugin-ima-4.16.1.3-27.el9_3.x86_64.rpm�I� rpm-apidocs-4.16.1.3-27.el9_3.noarch.rpm�H� rpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3.x86_64.rpm�� rpm-devel-4.16.1.3-27.el9_3.x86_64.rpm�G� rpm-plugin-syslog-4.16.1.3-27.el9_3.x86_64.rpm�E� rpm-plugin-fapolicyd-4.16.1.3-27.el9_3.x86_64.rpm�J� rpm-cron-4.16.1.3-27.el9_3.noarch.rpm	�D� rpm-build-4.16.1.3-27.el9_3.x86_64.rpm�� rpm-devel-4.16.1.3-27.el9_3.i686.rpm�F� rpm-plugin-ima-4.16.1.3-27.el9_3.x86_64.rpm�I� rpm-apidocs-4.16.1.3-27.el9_3.noarch.rpm�H� rpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3.x86_64.rpm�� rpm-devel-4.16.1.3-27.el9_3.x86_64.rpm�G� rpm-plugin-syslog-4.16.1.3-27.el9_3.x86_64.rpm�E� rpm-plugin-fapolicyd-4.16.1.3-27.el9_3.x86_64.rpm�J� rpm-cron-4.16.1.3-27.el9_3.noarch.rpm��˰3�	��=��wBBBBsecurityModerate: sqlite security update���https://access.redhat.com/errata/RHSA-2024:0465RHSA-2024:0465RHSA-2024:0465https://access.redhat.com/security/cve/CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/22561942256194https://errata.almalinux.org/9/ALSA-2024-0465.htmlALSA-2024:0465ALSA-2024:0465
�O�usqlite-devel-3.34.1-7.el9_3.x86_64.rpm�N�usqlite-3.34.1-7.el9_3.x86_64.rpm�N�usqlite-3.34.1-7.el9_3.i686.rpm�O�usqlite-devel-3.34.1-7.el9_3.i686.rpm�O�usqlite-devel-3.34.1-7.el9_3.x86_64.rpm�N�usqlite-3.34.1-7.el9_3.x86_64.rpm�N�usqlite-3.34.1-7.el9_3.i686.rpm�O�usqlite-devel-3.34.1-7.el9_3.i686.rpm��˩7�	����~BBBBsecurityModerate: python3.9 security update���chttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466
�+�python3-tkinter-3.9.18-1.el9_3.1.x86_64.rpmf�python-unversioned-command-3.9.18-1.el9_3.1.noarch.rpmQ�python3-devel-3.9.18-1.el9_3.1.x86_64.rpmQ�python3-devel-3.9.18-1.el9_3.1.i686.rpm�+�python3-tkinter-3.9.18-1.el9_3.1.x86_64.rpmf�python-unversioned-command-3.9.18-1.el9_3.1.noarch.rpmQ�python3-devel-3.9.18-1.el9_3.1.x86_64.rpmQ�python3-devel-3.9.18-1.el9_3.1.i686.rpm��ˤ�	��
��EBBBBBBsecurityModerate: tomcat security update��q�
https://access.redhat.com/errata/RHSA-2024:0474RHSA-2024:0474RHSA-2024:0474https://access.redhat.com/security/cve/CVE-2023-41080CVE-2023-41080CVE-2023-41080https://access.redhat.com/security/cve/CVE-2023-42794CVE-2023-42794CVE-2023-42794https://access.redhat.com/security/cve/CVE-2023-42795CVE-2023-42795CVE-2023-42795https://access.redhat.com/security/cve/CVE-2023-45648CVE-2023-45648CVE-2023-45648https://bugzilla.redhat.com/22353702235370https://bugzilla.redhat.com/22437492243749https://bugzilla.redhat.com/22437512243751https://bugzilla.redhat.com/22437522243752https://errata.almalinux.org/9/ALSA-2024-0474.htmlALSA-2024:0474ALSA-2024:0474
��3tomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-docs-webapp-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-webapps-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-el-3.0-api-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-servlet-4.0-api-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-lib-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-admin-webapps-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-docs-webapp-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-webapps-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-el-3.0-api-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-servlet-4.0-api-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-lib-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-9.0.62-37.el9_3.1.noarch.rpm��3tomcat-admin-webapps-9.0.62-37.el9_3.1.noarch.rpm��ˢ#� 	����NBsecurityModerate: frr security update��� 
https://access.redhat.com/errata/RHSA-2024:0477RHSA-2024:0477RHSA-2024:0477https://access.redhat.com/security/cve/CVE-2023-38406CVE-2023-38406CVE-2023-38406https://access.redhat.com/security/cve/CVE-2023-38407CVE-2023-38407CVE-2023-38407https://access.redhat.com/security/cve/CVE-2023-47234CVE-2023-47234CVE-2023-47234https://access.redhat.com/security/cve/CVE-2023-47235CVE-2023-47235CVE-2023-47235https://bugzilla.redhat.com/22482072248207https://bugzilla.redhat.com/22482082248208https://bugzilla.redhat.com/22485262248526https://bugzilla.redhat.com/22485282248528https://errata.almalinux.org/9/ALSA-2024-0477.htmlALSA-2024:0477ALSA-2024:0477
�9�frr-8.3.1-11.el9_3.2.alma.1.x86_64.rpm�6�frr-selinux-8.3.1-11.el9_3.2.alma.1.noarch.rpm�9�frr-8.3.1-11.el9_3.2.alma.1.x86_64.rpm�6�frr-selinux-8.3.1-11.el9_3.2.alma.1.noarch.rpm��ˠ(�!	����RBBBBBBBBBsecurityModerate: gnutls security update��0�Ghttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533
�b�gnutls-dane-3.7.6-23.el9_3.3.i686.rpm�c�gnutls-devel-3.7.6-23.el9_3.3.i686.rpm�a�gnutls-c++-3.7.6-23.el9_3.3.i686.rpm�)�gnutls-utils-3.7.6-23.el9_3.3.x86_64.rpm�a�gnutls-c++-3.7.6-23.el9_3.3.x86_64.rpm�b�gnutls-dane-3.7.6-23.el9_3.3.x86_64.rpm�c�gnutls-devel-3.7.6-23.el9_3.3.x86_64.rpm�b�gnutls-dane-3.7.6-23.el9_3.3.i686.rpm�c�gnutls-devel-3.7.6-23.el9_3.3.i686.rpm�a�gnutls-c++-3.7.6-23.el9_3.3.i686.rpm�)�gnutls-utils-3.7.6-23.el9_3.3.x86_64.rpm�a�gnutls-c++-3.7.6-23.el9_3.3.x86_64.rpm�b�gnutls-dane-3.7.6-23.el9_3.3.x86_64.rpm�c�gnutls-devel-3.7.6-23.el9_3.3.x86_64.rpm��߲�"	��)��^BBBBBBBBBsecurityImportant: tigervnc security update��w�o
https://access.redhat.com/errata/RHSA-2024:0557RHSA-2024:0557RHSA-2024:0557https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-0557.htmlALSA-2024:0557ALSA-2024:0557
�W�	tigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm��	tigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpm�X�	tigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpm�Y�	tigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpm�Z�	tigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm��	tigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm��	tigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpm�W�	tigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm��	tigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpm�X�	tigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpm�Y�	tigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpm�Z�	tigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm��	tigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm��	tigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpm����W�#	��,��jsecurityImportant: thunderbird security update��f�https://access.redhat.com/errata/RHSA-2024:0602RHSA-2024:0602RHSA-2024:0602https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0602.htmlALSA-2024:0602ALSA-2024:0602
9�dthunderbird-115.7.0-1.el9_3.alma.x86_64.rpm9�dthunderbird-115.7.0-1.el9_3.alma.x86_64.rpm�����$	��1��mBBsecurityImportant: firefox security update��v�Ahttps://access.redhat.com/errata/RHSA-2024:0603RHSA-2024:0603RHSA-2024:0603https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0603.htmlALSA-2024:0603ALSA-2024:0603
P�dfirefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm8�dfirefox-115.7.0-1.el9_3.alma.x86_64.rpmP�dfirefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm8�dfirefox-115.7.0-1.el9_3.alma.x86_64.rpm����8�%	��4��rsecurityImportant: runc security update��7�|https://access.redhat.com/errata/RHSA-2024:0670RHSA-2024:0670RHSA-2024:0670https://access.redhat.com/security/cve/CVE-2024-21626CVE-2024-21626CVE-2024-21626https://bugzilla.redhat.com/22587252258725https://errata.almalinux.org/9/ALSA-2024-0670.htmlALSA-2024:0670ALSA-2024:0670
�z�"runc-1.1.12-1.el9_3.x86_64.rpm�z�"runc-1.1.12-1.el9_3.x86_64.rpm����1�&	��:��uBBBsecurityImportant: gimp security update��3�
https://access.redhat.com/errata/RHSA-2024:0675RHSA-2024:0675RHSA-2024:0675https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2024-0675.htmlALSA-2024:0675ALSA-2024:0675
�?�gimp-2.99.8-4.el9_3.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_3.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_3.i686.rpm�?�gimp-2.99.8-4.el9_3.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_3.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_3.i686.rpm����=�'	����{BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: nss security update��Q�:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790
�Jknss-util-3.90.0-6.el9_3.x86_64.rpm�Kknss-util-devel-3.90.0-6.el9_3.i686.rpm�Hknss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm�Hknss-softokn-freebl-3.90.0-6.el9_3.i686.rpm�Iknss-softokn-freebl-devel-3.90.0-6.el9_3.i686.rpm�Gknss-softokn-devel-3.90.0-6.el9_3.i686.rpm�Jknss-util-3.90.0-6.el9_3.i686.rpm�B�nspr-4.35.0-6.el9_3.x86_64.rpm�C�nspr-devel-4.35.0-6.el9_3.i686.rpm�Gknss-softokn-devel-3.90.0-6.el9_3.x86_64.rpm�knss-tools-3.90.0-6.el9_3.x86_64.rpm�Dknss-3.90.0-6.el9_3.i686.rpm�Eknss-devel-3.90.0-6.el9_3.x86_64.rpm�
knss-sysinit-3.90.0-6.el9_3.x86_64.rpm�Eknss-devel-3.90.0-6.el9_3.i686.rpm�Dknss-3.90.0-6.el9_3.x86_64.rpm�Kknss-util-devel-3.90.0-6.el9_3.x86_64.rpm�Fknss-softokn-3.90.0-6.el9_3.i686.rpm�Fknss-softokn-3.90.0-6.el9_3.x86_64.rpm�Iknss-softokn-freebl-devel-3.90.0-6.el9_3.x86_64.rpm�B�nspr-4.35.0-6.el9_3.i686.rpm�C�nspr-devel-4.35.0-6.el9_3.x86_64.rpm�Jknss-util-3.90.0-6.el9_3.x86_64.rpm�Kknss-util-devel-3.90.0-6.el9_3.i686.rpm�Hknss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm�Hknss-softokn-freebl-3.90.0-6.el9_3.i686.rpm�Iknss-softokn-freebl-devel-3.90.0-6.el9_3.i686.rpm�Gknss-softokn-devel-3.90.0-6.el9_3.i686.rpm�Jknss-util-3.90.0-6.el9_3.i686.rpm�B�nspr-4.35.0-6.el9_3.x86_64.rpm�C�nspr-devel-4.35.0-6.el9_3.i686.rpm�Gknss-softokn-devel-3.90.0-6.el9_3.x86_64.rpm�knss-tools-3.90.0-6.el9_3.x86_64.rpm�Dknss-3.90.0-6.el9_3.i686.rpm�Eknss-devel-3.90.0-6.el9_3.x86_64.rpm�
knss-sysinit-3.90.0-6.el9_3.x86_64.rpm�Eknss-devel-3.90.0-6.el9_3.i686.rpm�Dknss-3.90.0-6.el9_3.x86_64.rpm�Kknss-util-devel-3.90.0-6.el9_3.x86_64.rpm�Fknss-softokn-3.90.0-6.el9_3.i686.rpm�Fknss-softokn-3.90.0-6.el9_3.x86_64.rpm�Iknss-softokn-freebl-devel-3.90.0-6.el9_3.x86_64.rpm�B�nspr-4.35.0-6.el9_3.i686.rpm�C�nspr-devel-4.35.0-6.el9_3.x86_64.rpm����9�(	��.��^BBBBBBBBBBBBBBsecurityImportant: dotnet7.0 security update���xhttps://access.redhat.com/errata/RHSA-2024:0805RHSA-2024:0805RHSA-2024:0805https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0805.htmlALSA-2024:0805ALSA-2024:0805
�|�edotnet-sdk-7.0-7.0.116-1.el9_3.x86_64.rpm�~�edotnet-templates-7.0-7.0.116-1.el9_3.x86_64.rpm�y�Vdotnet-apphost-pack-7.0-7.0.16-1.el9_3.x86_64.rpm�x�Vaspnetcore-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpm�}�Vdotnet-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpm�{�Vdotnet-runtime-7.0-7.0.16-1.el9_3.x86_64.rpm�z�Vdotnet-hostfxr-7.0-7.0.16-1.el9_3.x86_64.rpm�w�Vaspnetcore-runtime-7.0-7.0.16-1.el9_3.x86_64.rpm�|�edotnet-sdk-7.0-7.0.116-1.el9_3.x86_64.rpm�~�edotnet-templates-7.0-7.0.116-1.el9_3.x86_64.rpm�y�Vdotnet-apphost-pack-7.0-7.0.16-1.el9_3.x86_64.rpm�x�Vaspnetcore-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpm�}�Vdotnet-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpm�{�Vdotnet-runtime-7.0-7.0.16-1.el9_3.x86_64.rpm�z�Vdotnet-hostfxr-7.0-7.0.16-1.el9_3.x86_64.rpm�w�Vaspnetcore-runtime-7.0-7.0.16-1.el9_3.x86_64.rpm����B�)	��?��oBBBBBBBBBBBBBBsecurityImportant: dotnet6.0 security update���xhttps://access.redhat.com/errata/RHSA-2024:0807RHSA-2024:0807RHSA-2024:0807https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0807.htmlALSA-2024:0807ALSA-2024:0807
�Q�^dotnet-sdk-6.0-6.0.127-1.el9_3.x86_64.rpm�M�Qaspnetcore-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm�S�^dotnet-templates-6.0-6.0.127-1.el9_3.x86_64.rpm�L�Qaspnetcore-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm�R�Qdotnet-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm�N�Qdotnet-apphost-pack-6.0-6.0.27-1.el9_3.x86_64.rpm�P�Qdotnet-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm�O�Qdotnet-hostfxr-6.0-6.0.27-1.el9_3.x86_64.rpm�Q�^dotnet-sdk-6.0-6.0.127-1.el9_3.x86_64.rpm�M�Qaspnetcore-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm�S�^dotnet-templates-6.0-6.0.127-1.el9_3.x86_64.rpm�L�Qaspnetcore-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm�R�Qdotnet-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm�N�Qdotnet-apphost-pack-6.0-6.0.27-1.el9_3.x86_64.rpm�P�Qdotnet-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm�O�Qdotnet-hostfxr-6.0-6.0.27-1.el9_3.x86_64.rpm����3�*	����@securityModerate: sudo security update��{�|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811
�L�gsudo-python-plugin-1.9.5p2-10.el9_3.x86_64.rpm�L�gsudo-python-plugin-1.9.5p2-10.el9_3.x86_64.rpm����[�+	����CBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update��w�whttps://access.redhat.com/errata/RHSA-2024:0848RHSA-2024:0848RHSA-2024:0848https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0848.htmlALSA-2024:0848ALSA-2024:0848

�u�Saspnetcore-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm�"�netstandard-targeting-pack-2.1-8.0.102-2.el9_3.x86_64.rpm�!�Sdotnet-host-8.0.2-2.el9_3.x86_64.rpm�{�Sdotnet-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpm�|�dotnet-templates-8.0-8.0.102-2.el9_3.x86_64.rpm�w�Sdotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpm�v�Saspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpm�y�Sdotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm�x�Sdotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpm�z�dotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpm
�u�Saspnetcore-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm�"�netstandard-targeting-pack-2.1-8.0.102-2.el9_3.x86_64.rpm�!�Sdotnet-host-8.0.2-2.el9_3.x86_64.rpm�{�Sdotnet-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpm�|�dotnet-templates-8.0-8.0.102-2.el9_3.x86_64.rpm�w�Sdotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpm�v�Saspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpm�y�Sdotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm�x�Sdotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpm�z�dotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpm�����,	��5�gBBBBB��mBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update��n�	https://access.redhat.com/errata/RHSA-2024:0950RHSA-2024:0950RHSA-2024:0950https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0950.htmlALSA-2024:0950ALSA-2024:0950
Z�L�D*�[�ppostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm�axpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�Z�opgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm�xpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�`xpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmZxpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�^xpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�Y�lpg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm�\xpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�9xpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpm�xpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�_xpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�]xpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmZ�L�D*�[�ppostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm�axpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�Z�opgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm�xpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�`xpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmZxpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�^xpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�Y�lpg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm�\xpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�xpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�9xpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpm�xpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�_xpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm�]xpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm����q�-	����vBBBBBBBBBBBBBBsecurityImportant: postgresql security update��w�	https://access.redhat.com/errata/RHSA-2024:0951RHSA-2024:0951RHSA-2024:0951https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0951.htmlALSA-2024:0951ALSA-2024:0951
Z�;postgresql-13.14-1.el9_3.x86_64.rpm��;postgresql-plperl-13.14-1.el9_3.x86_64.rpm��;postgresql-contrib-13.14-1.el9_3.x86_64.rpm��;postgresql-plpython3-13.14-1.el9_3.x86_64.rpm��;postgresql-upgrade-13.14-1.el9_3.x86_64.rpm��;postgresql-server-13.14-1.el9_3.x86_64.rpm��;postgresql-pltcl-13.14-1.el9_3.x86_64.rpm��;postgresql-private-libs-13.14-1.el9_3.x86_64.rpmZ�;postgresql-13.14-1.el9_3.x86_64.rpm��;postgresql-plperl-13.14-1.el9_3.x86_64.rpm��;postgresql-contrib-13.14-1.el9_3.x86_64.rpm��;postgresql-plpython3-13.14-1.el9_3.x86_64.rpm��;postgresql-upgrade-13.14-1.el9_3.x86_64.rpm��;postgresql-server-13.14-1.el9_3.x86_64.rpm��;postgresql-pltcl-13.14-1.el9_3.x86_64.rpm��;postgresql-private-libs-13.14-1.el9_3.x86_64.rpm�����.	����GBBsecurityImportant: firefox security update���Phttps://access.redhat.com/errata/RHSA-2024:0952RHSA-2024:0952RHSA-2024:0952https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0952.htmlALSA-2024:0952ALSA-2024:0952
P�efirefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm8�efirefox-115.8.0-1.el9_3.alma.x86_64.rpmP�efirefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm8�efirefox-115.8.0-1.el9_3.alma.x86_64.rpm����h�/	����LsecurityImportant: thunderbird security update��P�https://access.redhat.com/errata/RHSA-2024:0963RHSA-2024:0963RHSA-2024:0963https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0963.htmlALSA-2024:0963ALSA-2024:0963
9�ethunderbird-115.8.0-1.el9_3.alma.x86_64.rpm9�ethunderbird-115.8.0-1.el9_3.alma.x86_64.rpm����q�0	����OBBBBBsecurityImportant: unbound security update��o�[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977
��unbound-libs-1.16.2-3.el9_3.1.i686.rpm�U�unbound-1.16.2-3.el9_3.1.x86_64.rpm��unbound-libs-1.16.2-3.el9_3.1.x86_64.rpm�P�python3-unbound-1.16.2-3.el9_3.1.x86_64.rpm��unbound-libs-1.16.2-3.el9_3.1.i686.rpm�U�unbound-1.16.2-3.el9_3.1.x86_64.rpm��unbound-libs-1.16.2-3.el9_3.1.x86_64.rpm�P�python3-unbound-1.16.2-3.el9_3.1.x86_64.rpm�����1	��"��WBBBBBBBBBsecurityImportant: tigervnc security update��J�lhttps://access.redhat.com/errata/RHSA-2024:10090RHSA-2024:10090RHSA-2024:10090https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://bugzilla.redhat.com/23172332317233https://errata.almalinux.org/9/ALSA-2024-10090.htmlALSA-2024:10090ALSA-2024:10090
��tigervnc-selinux-1.14.1-1.el9_5.noarch.rpm�W�tigervnc-1.14.1-1.el9_5.x86_64.rpm�Y�tigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpm�X�tigervnc-server-1.14.1-1.el9_5.x86_64.rpm�Z�tigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm��tigervnc-icons-1.14.1-1.el9_5.noarch.rpm��tigervnc-license-1.14.1-1.el9_5.noarch.rpm��tigervnc-selinux-1.14.1-1.el9_5.noarch.rpm�W�tigervnc-1.14.1-1.el9_5.x86_64.rpm�Y�tigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpm�X�tigervnc-server-1.14.1-1.el9_5.x86_64.rpm�Z�tigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm��tigervnc-icons-1.14.1-1.el9_5.noarch.rpm��tigervnc-license-1.14.1-1.el9_5.noarch.rpm����]�2	��$��#securityModerate: perl-App-cpanminus security update��6�https://access.redhat.com/errata/RHSA-2024:10218RHSA-2024:10218RHSA-2024:10218https://access.redhat.com/security/cve/CVE-2024-45321CVE-2024-45321CVE-2024-45321https://bugzilla.redhat.com/23080782308078https://errata.almalinux.org/9/ALSA-2024-10218.htmlALSA-2024:10218ALSA-2024:10218
�^�Jperl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm�^�Jperl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm����a�3	��*��eBBBsecurityImportant: pam:1.5.1 security update��E�[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:10244
��epam-devel-1.5.1-22.el9_5.x86_64.rpm�J�epam-docs-1.5.1-22.el9_5.x86_64.rpm��epam-devel-1.5.1-22.el9_5.i686.rpm��epam-devel-1.5.1-22.el9_5.x86_64.rpm�J�epam-docs-1.5.1-22.el9_5.x86_64.rpm��epam-devel-1.5.1-22.el9_5.i686.rpm����g�4	��<��kBBBBBBBBBBBBBBBsecurityModerate: kernel security update�� �https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274
	�Xkernel-doc-5.14.0-503.15.1.el9_5.noarch.rpm%�Xkernel-devel-5.14.0-503.15.1.el9_5.x86_64.rpm#�Xkernel-debug-devel-5.14.0-503.15.1.el9_5.x86_64.rpm$�Xkernel-debug-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm(�Xkernel-headers-5.14.0-503.15.1.el9_5.x86_64.rpm'�Xperf-5.14.0-503.15.1.el9_5.x86_64.rpm+�Xrv-5.14.0-503.15.1.el9_5.x86_64.rpm)�Xrtla-5.14.0-503.15.1.el9_5.x86_64.rpm&�Xkernel-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm	�Xkernel-doc-5.14.0-503.15.1.el9_5.noarch.rpm%�Xkernel-devel-5.14.0-503.15.1.el9_5.x86_64.rpm#�Xkernel-debug-devel-5.14.0-503.15.1.el9_5.x86_64.rpm$�Xkernel-debug-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm(�Xkernel-headers-5.14.0-503.15.1.el9_5.x86_64.rpm'�Xperf-5.14.0-503.15.1.el9_5.x86_64.rpm+�Xrv-5.14.0-503.15.1.el9_5.x86_64.rpm)�Xrtla-5.14.0-503.15.1.el9_5.x86_64.rpm&�Xkernel-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm����x�5	����}BBBBBBsecurityImportant: tuned security update��?�https://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:10384
�4�;tuned-utils-2.24.0-2.el9_5.alma.1.noarch.rpm�1�;tuned-profiles-oracle-2.24.0-2.el9_5.alma.1.noarch.rpm�2�;tuned-profiles-postgresql-2.24.0-2.el9_5.alma.1.noarch.rpm�3�;tuned-profiles-spectrumscale-2.24.0-2.el9_5.alma.1.noarch.rpm�-�;tuned-gtk-2.24.0-2.el9_5.alma.1.noarch.rpm�.�;tuned-ppd-2.24.0-2.el9_5.alma.1.noarch.rpm�/�;tuned-profiles-atomic-2.24.0-2.el9_5.alma.1.noarch.rpm�0�;tuned-profiles-mssql-2.24.0-2.el9_5.alma.1.noarch.rpm�4�;tuned-utils-2.24.0-2.el9_5.alma.1.noarch.rpm�1�;tuned-profiles-oracle-2.24.0-2.el9_5.alma.1.noarch.rpm�2�;tuned-profiles-postgresql-2.24.0-2.el9_5.alma.1.noarch.rpm�3�;tuned-profiles-spectrumscale-2.24.0-2.el9_5.alma.1.noarch.rpm�-�;tuned-gtk-2.24.0-2.el9_5.alma.1.noarch.rpm�.�;tuned-ppd-2.24.0-2.el9_5.alma.1.noarch.rpm�/�;tuned-profiles-atomic-2.24.0-2.el9_5.alma.1.noarch.rpm�0�;tuned-profiles-mssql-2.24.0-2.el9_5.alma.1.noarch.rpm����z�6	����FBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��]�shttps://access.redhat.com/errata/RHSA-2024:10472RHSA-2024:10472RHSA-2024:10472https://access.redhat.com/security/cve/CVE-2024-44309CVE-2024-44309CVE-2024-44309https://bugzilla.redhat.com/23279272327927https://errata.almalinux.org/9/ALSA-2024-10472.htmlALSA-2024:10472ALSA-2024:10472
1�7webkit2gtk3-devel-2.46.3-2.el9_5.x86_64.rpm1�7webkit2gtk3-devel-2.46.3-2.el9_5.i686.rpm0�7webkit2gtk3-2.46.3-2.el9_5.i686.rpm2�7webkit2gtk3-jsc-2.46.3-2.el9_5.x86_64.rpm0�7webkit2gtk3-2.46.3-2.el9_5.x86_64.rpm2�7webkit2gtk3-jsc-2.46.3-2.el9_5.i686.rpm3�7webkit2gtk3-jsc-devel-2.46.3-2.el9_5.x86_64.rpm3�7webkit2gtk3-jsc-devel-2.46.3-2.el9_5.i686.rpm1�7webkit2gtk3-devel-2.46.3-2.el9_5.x86_64.rpm1�7webkit2gtk3-devel-2.46.3-2.el9_5.i686.rpm0�7webkit2gtk3-2.46.3-2.el9_5.i686.rpm2�7webkit2gtk3-jsc-2.46.3-2.el9_5.x86_64.rpm0�7webkit2gtk3-2.46.3-2.el9_5.x86_64.rpm2�7webkit2gtk3-jsc-2.46.3-2.el9_5.i686.rpm3�7webkit2gtk3-jsc-devel-2.46.3-2.el9_5.x86_64.rpm3�7webkit2gtk3-jsc-devel-2.46.3-2.el9_5.i686.rpm����7�7	����SsecurityImportant: python-tornado security update��P�Jhttps://access.redhat.com/errata/RHSA-2024:10590RHSA-2024:10590RHSA-2024:10590https://access.redhat.com/security/cve/CVE-2024-52804CVE-2024-52804CVE-2024-52804https://bugzilla.redhat.com/23280452328045https://errata.almalinux.org/9/ALSA-2024-10590.htmlALSA-2024:10590ALSA-2024:10590
�J�;python3-tornado-6.4.2-1.el9_5.x86_64.rpm�J�;python3-tornado-6.4.2-1.el9_5.x86_64.rpm����\�8	����VsecurityImportant: thunderbird security update���https://access.redhat.com/errata/RHSA-2024:10592RHSA-2024:10592RHSA-2024:10592https://access.redhat.com/security/cve/CVE-2024-11159CVE-2024-11159CVE-2024-11159https://access.redhat.com/security/cve/CVE-2024-11692CVE-2024-11692CVE-2024-11692https://access.redhat.com/security/cve/CVE-2024-11694CVE-2024-11694CVE-2024-11694https://access.redhat.com/security/cve/CVE-2024-11695CVE-2024-11695CVE-2024-11695https://access.redhat.com/security/cve/CVE-2024-11696CVE-2024-11696CVE-2024-11696https://access.redhat.com/security/cve/CVE-2024-11697CVE-2024-11697CVE-2024-11697https://access.redhat.com/security/cve/CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/23258962325896https://bugzilla.redhat.com/23289412328941https://bugzilla.redhat.com/23289432328943https://bugzilla.redhat.com/23289462328946https://bugzilla.redhat.com/23289472328947https://bugzilla.redhat.com/23289482328948https://bugzilla.redhat.com/23289502328950https://errata.almalinux.org/9/ALSA-2024-10592.htmlALSA-2024:10592ALSA-2024:10592
9�thunderbird-128.5.0-1.el9_5.alma.1.x86_64.rpm9�thunderbird-128.5.0-1.el9_5.alma.1.x86_64.rpm����3�9	����YBBsecurityImportant: firefox security update�� �Vhttps://access.redhat.com/errata/RHSA-2024:10702RHSA-2024:10702RHSA-2024:10702https://access.redhat.com/security/cve/CVE-2024-11692CVE-2024-11692CVE-2024-11692https://access.redhat.com/security/cve/CVE-2024-11694CVE-2024-11694CVE-2024-11694https://access.redhat.com/security/cve/CVE-2024-11695CVE-2024-11695CVE-2024-11695https://access.redhat.com/security/cve/CVE-2024-11696CVE-2024-11696CVE-2024-11696https://access.redhat.com/security/cve/CVE-2024-11697CVE-2024-11697CVE-2024-11697https://access.redhat.com/security/cve/CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/23289412328941https://bugzilla.redhat.com/23289432328943https://bugzilla.redhat.com/23289462328946https://bugzilla.redhat.com/23289472328947https://bugzilla.redhat.com/23289482328948https://bugzilla.redhat.com/23289502328950https://errata.almalinux.org/9/ALSA-2024-10702.htmlALSA-2024:10702ALSA-2024:10702
P�firefox-x11-128.5.1-1.el9_5.x86_64.rpm8�firefox-128.5.1-1.el9_5.x86_64.rpmP�firefox-x11-128.5.1-1.el9_5.x86_64.rpm8�firefox-128.5.1-1.el9_5.x86_64.rpm�����:	�� ��^securityImportant: edk2 security update��v�6https://access.redhat.com/errata/RHSA-2024:1075RHSA-2024:1075RHSA-2024:1075https://access.redhat.com/security/cve/CVE-2023-45230CVE-2023-45230CVE-2023-45230https://access.redhat.com/security/cve/CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/22586852258685https://bugzilla.redhat.com/22586972258697https://errata.almalinux.org/9/ALSA-2024-1075.htmlALSA-2024:1075ALSA-2024:1075
�g�edk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm��edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm�g�edk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm��edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm����L�;	��>�hBBB�|B�{BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update��,�`https://access.redhat.com/errata/RHSA-2024:10787RHSA-2024:10787RHSA-2024:10787https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10787.htmlALSA-2024:10787ALSA-2024:10787
Z�_�R*�`qpostgresql-test-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmZqpostgresql-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�qpostgresql-plperl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�_qpostgresql-static-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�9qpostgresql-test-rpm-macros-15.10-1.module_el9.5.0+126+03d48c9f.noarch.rpm�^qpostgresql-server-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�aqpostgresql-upgrade-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-pltcl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�]qpostgresql-private-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�\qpostgresql-docs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�Y�pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm�qpostgresql-plpython3-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-contrib-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-server-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-upgrade-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-private-libs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmZ�_�R*�`qpostgresql-test-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmZqpostgresql-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�qpostgresql-plperl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�_qpostgresql-static-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�9qpostgresql-test-rpm-macros-15.10-1.module_el9.5.0+126+03d48c9f.noarch.rpm�^qpostgresql-server-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�aqpostgresql-upgrade-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-pltcl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�]qpostgresql-private-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�\qpostgresql-docs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�Y�pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm�qpostgresql-plpython3-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-contrib-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-server-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-upgrade-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm�qpostgresql-private-libs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm����v�<	���lBBB�zBBB�UBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update���`https://access.redhat.com/errata/RHSA-2024:10788RHSA-2024:10788RHSA-2024:10788https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10788.htmlALSA-2024:10788ALSA-2024:10788
Z�_�H*�Y�pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm��[postgresql-server-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm��[postgresql-private-libs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�^�[postgresql-server-devel-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�9�[postgresql-test-rpm-macros-16.6-1.module_el9.5.0+127+50ff03a9.noarch.rpm��[postgresql-plperl-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm��@postgresql-pltcl-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�`�@postgresql-test-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�L�pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm��@postgresql-contrib-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�\�[postgresql-docs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm��@postgresql-plpython3-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�]�@postgresql-private-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmZ�@postgresql-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�a�@postgresql-upgrade-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�_�@postgresql-static-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm��[postgresql-upgrade-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpmZ�_�H*�Y�pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm��[postgresql-server-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm��[postgresql-private-libs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�^�[postgresql-server-devel-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�9�[postgresql-test-rpm-macros-16.6-1.module_el9.5.0+127+50ff03a9.noarch.rpm��[postgresql-plperl-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm��@postgresql-pltcl-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�`�@postgresql-test-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�L�pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm��@postgresql-contrib-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�\�[postgresql-docs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm��@postgresql-plpython3-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�]�@postgresql-private-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmZ�@postgresql-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�a�@postgresql-upgrade-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm�_�@postgresql-static-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm��[postgresql-upgrade-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm����
�=	��-��]BBBBBBBBBBBBBBsecurityImportant: postgresql security update��l�`https://access.redhat.com/errata/RHSA-2024:10791RHSA-2024:10791RHSA-2024:10791https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10791.htmlALSA-2024:10791ALSA-2024:10791
Z�=postgresql-13.18-1.el9_5.x86_64.rpm��=postgresql-plperl-13.18-1.el9_5.x86_64.rpm��=postgresql-private-libs-13.18-1.el9_5.x86_64.rpm��=postgresql-plpython3-13.18-1.el9_5.x86_64.rpm��=postgresql-pltcl-13.18-1.el9_5.x86_64.rpm��=postgresql-upgrade-13.18-1.el9_5.x86_64.rpm��=postgresql-contrib-13.18-1.el9_5.x86_64.rpm��=postgresql-server-13.18-1.el9_5.x86_64.rpmZ�=postgresql-13.18-1.el9_5.x86_64.rpm��=postgresql-plperl-13.18-1.el9_5.x86_64.rpm��=postgresql-private-libs-13.18-1.el9_5.x86_64.rpm��=postgresql-plpython3-13.18-1.el9_5.x86_64.rpm��=postgresql-pltcl-13.18-1.el9_5.x86_64.rpm��=postgresql-upgrade-13.18-1.el9_5.x86_64.rpm��=postgresql-contrib-13.18-1.el9_5.x86_64.rpm��=postgresql-server-13.18-1.el9_5.x86_64.rpm����p�>	��
��nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby security update��L�%https://access.redhat.com/errata/RHSA-2024:10858RHSA-2024:10858RHSA-2024:10858https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10858.htmlALSA-2024:10858ALSA-2024:10858
�:�>ruby-devel-3.0.7-163.el9_5.x86_64.rpm�4�*rubygems-devel-3.2.33-163.el9_5.noarch.rpm�;�>ruby-libs-3.0.7-163.el9_5.i686.rpm�*�;rubygem-irb-1.3.5-163.el9_5.noarch.rpm��Erubygem-io-console-0.5.7-163.el9_5.x86_64.rpm��}rubygem-psych-3.3.2-163.el9_5.x86_64.rpm�;�>ruby-libs-3.0.7-163.el9_5.x86_64.rpm�3�*rubygems-3.2.33-163.el9_5.noarch.rpm�-�Mrubygem-rake-13.0.3-163.el9_5.noarch.rpm��Xrubygem-json-2.5.1-163.el9_5.x86_64.rpm�)�nrubygem-bundler-2.2.33-163.el9_5.noarch.rpm�,�.rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm�+�#rubygem-minitest-5.14.2-163.el9_5.noarch.rpm�K�@rubygem-rbs-1.4.0-163.el9_5.noarch.rpm�.�/rubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm�(�>ruby-default-gems-3.0.7-163.el9_5.noarch.rpm�0�	rubygem-rss-0.2.9-163.el9_5.noarch.rpm��>ruby-3.0.7-163.el9_5.i686.rpm��srubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm�1�rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm�2�rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm�/�rubygem-rexml-3.2.5-163.el9_5.noarch.rpm�:�>ruby-devel-3.0.7-163.el9_5.i686.rpm��>ruby-3.0.7-163.el9_5.x86_64.rpm�:�>ruby-devel-3.0.7-163.el9_5.x86_64.rpm�4�*rubygems-devel-3.2.33-163.el9_5.noarch.rpm�;�>ruby-libs-3.0.7-163.el9_5.i686.rpm�*�;rubygem-irb-1.3.5-163.el9_5.noarch.rpm��Erubygem-io-console-0.5.7-163.el9_5.x86_64.rpm��}rubygem-psych-3.3.2-163.el9_5.x86_64.rpm�;�>ruby-libs-3.0.7-163.el9_5.x86_64.rpm�3�*rubygems-3.2.33-163.el9_5.noarch.rpm�-�Mrubygem-rake-13.0.3-163.el9_5.noarch.rpm��Xrubygem-json-2.5.1-163.el9_5.x86_64.rpm�)�nrubygem-bundler-2.2.33-163.el9_5.noarch.rpm�,�.rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm�+�#rubygem-minitest-5.14.2-163.el9_5.noarch.rpm�K�@rubygem-rbs-1.4.0-163.el9_5.noarch.rpm�.�/rubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm�(�>ruby-default-gems-3.0.7-163.el9_5.noarch.rpm�0�	rubygem-rss-0.2.9-163.el9_5.noarch.rpm��>ruby-3.0.7-163.el9_5.i686.rpm��srubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm�1�rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm�2�rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm�/�rubygem-rexml-3.2.5-163.el9_5.noarch.rpm�:�>ruby-devel-3.0.7-163.el9_5.i686.rpm��>ruby-3.0.7-163.el9_5.x86_64.rpm���L�?	��7�KBBBBB��BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby:3.1 security update��q�%https://access.redhat.com/errata/RHSA-2024:10860RHSA-2024:10860RHSA-2024:10860https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10860.htmlALSA-2024:10860ALSA-2024:10860
��'�U*$��qrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�:�zruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�,�\rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��zruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm��zruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�(�zruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm��zruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�4�0rubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�*�Drubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�;�zruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�3�0rubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm��qrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm��zruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm��Zrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�2�
rubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��rubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�1�rubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��rubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�.�4rubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��Zrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�K�\rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�0�rubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�:�zruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�+�'rubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�K�\rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�j�zruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm�-�Qrubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�;�zruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm��rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�)�srubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�/�	rubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��'�U*$��qrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�:�zruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�,�\rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��zruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm��zruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�(�zruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm��zruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�4�0rubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�*�Drubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�;�zruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�3�0rubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm��qrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm��zruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm��Zrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�2�
rubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��rubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�1�rubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��rubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�.�4rubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm��Zrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�K�\rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�0�rubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�:�zruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�+�'rubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�K�\rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm�j�zruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm�-�Qrubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�;�zruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm��rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�)�srubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm�/�	rubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm���d�@	��=��xBBBsecurityModerate: redis:7 security update���Mhttps://access.redhat.com/errata/RHSA-2024:10869RHSA-2024:10869RHSA-2024:10869https://access.redhat.com/security/cve/CVE-2023-41053CVE-2023-41053CVE-2023-41053https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31227CVE-2024-31227CVE-2024-31227https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://bugzilla.redhat.com/22378262237826https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170532317053https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://errata.almalinux.org/9/ALSA-2024-10869.htmlALSA-2024:10869ALSA-2024:10869
�I��V*�i�redis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm�b�redis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm�I�redis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm�I��V*�i�redis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm�b�redis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm�I�redis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm���#�A	����~BBBBBBBBBBBBBBBsecurityModerate: kernel security update��c�Ahttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939
	)�Yrtla-5.14.0-503.16.1.el9_5.x86_64.rpm�Ykernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm%�Ykernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm(�Ykernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm'�Yperf-5.14.0-503.16.1.el9_5.x86_64.rpm$�Ykernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm#�Ykernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm&�Ykernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm+�Yrv-5.14.0-503.16.1.el9_5.x86_64.rpm	)�Yrtla-5.14.0-503.16.1.el9_5.x86_64.rpm�Ykernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm%�Ykernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm(�Ykernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm'�Yperf-5.14.0-503.16.1.el9_5.x86_64.rpm$�Ykernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm#�Ykernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm&�Ykernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm+�Yrv-5.14.0-503.16.1.el9_5.x86_64.rpm����0�B	���QB^BBBBBBBB��ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security update��$�https://access.redhat.com/errata/RHSA-2024:10949RHSA-2024:10949RHSA-2024:10949https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10949.htmlALSA-2024:10949ALSA-2024:10949
��9�<*�Iphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm�Iphp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�W�jphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm�V�Nphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm�	Iphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�
Iphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�Iphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�
Iphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm��9�<*�Iphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm�Iphp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�W�jphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm�V�Nphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm�	Iphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�
Iphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�Iphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�
Iphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm�Iphp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm����S�C	��5�~BBBBBBBBLB��rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update��=�https://access.redhat.com/errata/RHSA-2024:10950RHSA-2024:10950RHSA-2024:10950https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10950.htmlALSA-2024:10950ALSA-2024:10950
��j�W*�Gphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Gphp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�
Gphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�Gphp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�
Gphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Gphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�	Gphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Gphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm��j�W*�Gphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Gphp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�
Gphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�Gphp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�
Gphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Gphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�	Gphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�Gphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Gphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm����`�D	����vBBBBBBBBsecurityImportant: python3.12 security update��V�-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978
��9python3.12-devel-3.12.5-2.el9_5.2.i686.rpm��9python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-libs-3.12.5-2.el9_5.2.i686.rpm��9python3.12-devel-3.12.5-2.el9_5.2.i686.rpm��9python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm��9python3.12-libs-3.12.5-2.el9_5.2.i686.rpm�����E	����ABBBBsecurityModerate: python3.9:3.9.21 security update���https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983
�+�
python3-tkinter-3.9.21-1.el9_5.x86_64.rpmQ�
python3-devel-3.9.21-1.el9_5.x86_64.rpmf�
python-unversioned-command-3.9.21-1.el9_5.noarch.rpmQ�
python3-devel-3.9.21-1.el9_5.i686.rpm�+�
python3-tkinter-3.9.21-1.el9_5.x86_64.rpmQ�
python3-devel-3.9.21-1.el9_5.x86_64.rpmf�
python-unversioned-command-3.9.21-1.el9_5.noarch.rpmQ�
python3-devel-3.9.21-1.el9_5.i686.rpm����H�F	����HBBBBBBBBsecurityModerate: python3.11 security update��!�Mhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111
[�.python3.11-devel-3.11.9-7.el9_5.2.i686.rpm[�.python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm�P�.python3.11-3.11.9-7.el9_5.2.x86_64.rpm\�.python3.11-libs-3.11.9-7.el9_5.2.i686.rpm\�.python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm�Q�.python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm[�.python3.11-devel-3.11.9-7.el9_5.2.i686.rpm[�.python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm�P�.python3.11-3.11.9-7.el9_5.2.x86_64.rpm\�.python3.11-libs-3.11.9-7.el9_5.2.i686.rpm\�.python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm�Q�.python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm����|�G	����SBBBBsecurityImportant: gstreamer1-plugins-good security update��n�'https://access.redhat.com/errata/RHSA-2024:11122RHSA-2024:11122RHSA-2024:11122https://access.redhat.com/security/cve/CVE-2024-47537CVE-2024-47537CVE-2024-47537https://access.redhat.com/security/cve/CVE-2024-47539CVE-2024-47539CVE-2024-47539https://access.redhat.com/security/cve/CVE-2024-47540CVE-2024-47540CVE-2024-47540https://access.redhat.com/security/cve/CVE-2024-47606CVE-2024-47606CVE-2024-47606https://access.redhat.com/security/cve/CVE-2024-47613CVE-2024-47613CVE-2024-47613https://bugzilla.redhat.com/23317192331719https://bugzilla.redhat.com/23317222331722https://bugzilla.redhat.com/23317262331726https://bugzilla.redhat.com/23317532331753https://bugzilla.redhat.com/23317602331760https://errata.almalinux.org/9/ALSA-2024-11122.htmlALSA-2024:11122ALSA-2024:11122
�
�6gstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpm�
�6gstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm��6gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm��6gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpm�
�6gstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpm�
�6gstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm��6gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm��6gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpm����r�H	��"��ZBBBBBBsecurityImportant: gstreamer1-plugins-base security update���Bhttps://access.redhat.com/errata/RHSA-2024:11123RHSA-2024:11123RHSA-2024:11123https://access.redhat.com/security/cve/CVE-2024-47538CVE-2024-47538CVE-2024-47538https://access.redhat.com/security/cve/CVE-2024-47607CVE-2024-47607CVE-2024-47607https://access.redhat.com/security/cve/CVE-2024-47615CVE-2024-47615CVE-2024-47615https://bugzilla.redhat.com/23317272331727https://bugzilla.redhat.com/23317402331740https://bugzilla.redhat.com/23317542331754https://errata.almalinux.org/9/ALSA-2024-11123.htmlALSA-2024:11123ALSA-2024:11123
�4�6gstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpm�3�6gstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpm�`�6gstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpm�3�6gstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpm�4�6gstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm�4�6gstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpm�3�6gstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpm�`�6gstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpm�3�6gstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpm�4�6gstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm����-�I	��%��csecurityModerate: edk2:20240524 security update��W�Bhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219
�g�"edk2-ovmf-20240524-6.el9_5.3.noarch.rpm��"edk2-aarch64-20240524-6.el9_5.3.noarch.rpm�g�"edk2-ovmf-20240524-6.el9_5.3.noarch.rpm��"edk2-aarch64-20240524-6.el9_5.3.noarch.rpm����T�J	��'��&securityModerate: python3.11-urllib3 security update���9https://access.redhat.com/errata/RHSA-2024:11238RHSA-2024:11238RHSA-2024:11238https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-11238.htmlALSA-2024:11238ALSA-2024:11238
�Q�5python3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm�Q�5python3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm����`�K	��/��hBBBBBsecurityModerate: mpg123:1.32.9 security update��R�qhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242
�m�mpg123-libs-1.32.9-1.el9_5.x86_64.rpm��mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm��mpg123-1.32.9-1.el9_5.x86_64.rpm�m�mpg123-libs-1.32.9-1.el9_5.i686.rpm�m�mpg123-libs-1.32.9-1.el9_5.x86_64.rpm��mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm��mpg123-1.32.9-1.el9_5.x86_64.rpm�m�mpg123-libs-1.32.9-1.el9_5.i686.rpm�����L	��5��pBBBsecurityModerate: pam security update��C�?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:11250
��dpam-devel-1.5.1-21.el9_5.x86_64.rpm��dpam-devel-1.5.1-21.el9_5.i686.rpm�J�dpam-docs-1.5.1-21.el9_5.x86_64.rpm��dpam-devel-1.5.1-21.el9_5.x86_64.rpm��dpam-devel-1.5.1-21.el9_5.i686.rpm�J�dpam-docs-1.5.1-21.el9_5.x86_64.rpm�����M	��9��vBsecurityModerate: curl security update���@https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129
��libcurl-devel-7.76.1-26.el9_3.3.i686.rpm��libcurl-devel-7.76.1-26.el9_3.3.x86_64.rpm��libcurl-devel-7.76.1-26.el9_3.3.i686.rpm��libcurl-devel-7.76.1-26.el9_3.3.x86_64.rpm����6�N	��>��zBBsecurityModerate: openssh security update��B�0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130
��Ropenssh-askpass-8.7p1-34.el9_3.3.x86_64.rpm��0pam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpm��Ropenssh-askpass-8.7p1-34.el9_3.3.x86_64.rpm��0pam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpm����R�O	��	��BBBBBBBBsecurityModerate: golang security update��r�Phttps://access.redhat.com/errata/RHSA-2024:1131RHSA-2024:1131RHSA-2024:1131https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45285CVE-2023-45285CVE-2023-45285https://bugzilla.redhat.com/22533232253323https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1131.htmlALSA-2024:1131ALSA-2024:1131
n�(golang-misc-1.20.12-1.el9_3.noarch.rpmm�(golang-docs-1.20.12-1.el9_3.noarch.rpmo�(golang-src-1.20.12-1.el9_3.noarch.rpmp�(golang-tests-1.20.12-1.el9_3.noarch.rpm�N�(go-toolset-1.20.12-1.el9_3.x86_64.rpm�H�(golang-bin-1.20.12-1.el9_3.x86_64.rpm�G�(golang-1.20.12-1.el9_3.x86_64.rpmn�(golang-misc-1.20.12-1.el9_3.noarch.rpmm�(golang-docs-1.20.12-1.el9_3.noarch.rpmo�(golang-src-1.20.12-1.el9_3.noarch.rpmp�(golang-tests-1.20.12-1.el9_3.noarch.rpm�N�(go-toolset-1.20.12-1.el9_3.x86_64.rpm�H�(golang-bin-1.20.12-1.el9_3.x86_64.rpm�G�(golang-1.20.12-1.el9_3.x86_64.rpm����/�P	����JBBBBBBsecurityImportant: tomcat security update��B�https://access.redhat.com/errata/RHSA-2024:1134RHSA-2024:1134RHSA-2024:1134https://access.redhat.com/security/cve/CVE-2023-46589CVE-2023-46589CVE-2023-46589https://bugzilla.redhat.com/22520502252050https://errata.almalinux.org/9/ALSA-2024-1134.htmlALSA-2024:1134ALSA-2024:1134
��4tomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-docs-webapp-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-webapps-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-lib-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-docs-webapp-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-webapps-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-lib-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpm��4tomcat-9.0.62-37.el9_3.2.noarch.rpm����a�Q	�� ��SBBBBBBBBBBBsecurityLow: keylime security update�6��G�https://access.redhat.com/errata/RHSA-2024:1139RHSA-2024:1139RHSA-2024:1139https://access.redhat.com/security/cve/CVE-2023-3674CVE-2023-3674CVE-2023-3674https://bugzilla.redhat.com/22229032222903https://errata.almalinux.org/9/ALSA-2024-1139.htmlALSA-2024:1139ALSA-2024:1139
�@�ekeylime-registrar-7.3.0-13.el9_3.x86_64.rpm�B�ekeylime-verifier-7.3.0-13.el9_3.x86_64.rpm�O�epython3-keylime-7.3.0-13.el9_3.x86_64.rpm�>�ekeylime-7.3.0-13.el9_3.x86_64.rpm�?�ekeylime-base-7.3.0-13.el9_3.x86_64.rpm�<�ekeylime-selinux-7.3.0-13.el9_3.noarch.rpm�A�ekeylime-tenant-7.3.0-13.el9_3.x86_64.rpm�@�ekeylime-registrar-7.3.0-13.el9_3.x86_64.rpm�B�ekeylime-verifier-7.3.0-13.el9_3.x86_64.rpm�O�epython3-keylime-7.3.0-13.el9_3.x86_64.rpm�>�ekeylime-7.3.0-13.el9_3.x86_64.rpm�?�ekeylime-base-7.3.0-13.el9_3.x86_64.rpm�<�ekeylime-selinux-7.3.0-13.el9_3.noarch.rpm�A�ekeylime-tenant-7.3.0-13.el9_3.x86_64.rpm����*�R	��)��aBBBBBBsecurityModerate: mysql security update��`�t�https://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141
��[mysql-errmsg-8.0.36-1.el9_3.x86_64.rpm�V�[mysql-8.0.36-1.el9_3.x86_64.rpm�R�[mysql-server-8.0.36-1.el9_3.x86_64.rpm��[mysql-common-8.0.36-1.el9_3.x86_64.rpm��[mysql-errmsg-8.0.36-1.el9_3.x86_64.rpm�V�[mysql-8.0.36-1.el9_3.x86_64.rpm�R�[mysql-server-8.0.36-1.el9_3.x86_64.rpm��[mysql-common-8.0.36-1.el9_3.x86_64.rpm����y�S	��,��jsecurityModerate: haproxy security update��T�	https://access.redhat.com/errata/RHSA-2024:1142RHSA-2024:1142RHSA-2024:1142https://access.redhat.com/security/cve/CVE-2023-40225CVE-2023-40225CVE-2023-40225https://access.redhat.com/security/cve/CVE-2023-45539CVE-2023-45539CVE-2023-45539https://bugzilla.redhat.com/22313702231370https://bugzilla.redhat.com/22530372253037https://errata.almalinux.org/9/ALSA-2024-1142.htmlALSA-2024:1142ALSA-2024:1142
�b�Rhaproxy-2.4.22-3.el9_3.x86_64.rpm�b�Rhaproxy-2.4.22-3.el9_3.x86_64.rpm����e�T	��/��msecurityModerate: rear security update��]�|https://access.redhat.com/errata/RHSA-2024:1147RHSA-2024:1147RHSA-2024:1147https://access.redhat.com/security/cve/CVE-2024-23301CVE-2024-23301CVE-2024-23301https://bugzilla.redhat.com/22583962258396https://errata.almalinux.org/9/ALSA-2024-1147.htmlALSA-2024:1147ALSA-2024:1147
�C�Zrear-2.6-21.el9_3.alma.x86_64.rpm�C�Zrear-2.6-21.el9_3.alma.x86_64.rpm����	�U	����pBBBBBBBBBBBBBBBsecurityModerate: kernel security update��Y�c$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486
	'�Zperf-5.14.0-503.19.1.el9_5.x86_64.rpm�Zkernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm+�Zrv-5.14.0-503.19.1.el9_5.x86_64.rpm%�Zkernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm&�Zkernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm)�Zrtla-5.14.0-503.19.1.el9_5.x86_64.rpm#�Zkernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$�Zkernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm(�Zkernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpm	'�Zperf-5.14.0-503.19.1.el9_5.x86_64.rpm�Zkernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm+�Zrv-5.14.0-503.19.1.el9_5.x86_64.rpm%�Zkernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm&�Zkernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm)�Zrtla-5.14.0-503.19.1.el9_5.x86_64.rpm#�Zkernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$�Zkernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm(�Zkernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpm����i�V	����BBBsecurityModerate: skopeo security update��<�\https://access.redhat.com/errata/RHSA-2024:1149RHSA-2024:1149RHSA-2024:1149https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1149.htmlALSA-2024:1149ALSA-2024:1149
�d�1skopeo-tests-1.13.3-4.el9_3.x86_64.rpm�c�1skopeo-1.13.3-4.el9_3.x86_64.rpm�d�1skopeo-tests-1.13.3-4.el9_3.x86_64.rpm�c�1skopeo-1.13.3-4.el9_3.x86_64.rpm�����W	����GBBsecurityModerate: buildah security update���yhttps://access.redhat.com/errata/RHSA-2024:1150RHSA-2024:1150RHSA-2024:1150https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://bugzilla.redhat.com/22542102254210https://errata.almalinux.org/9/ALSA-2024-1150.htmlALSA-2024:1150ALSA-2024:1150
�/�buildah-1.31.4-1.el9_3.x86_64.rpm�0�buildah-tests-1.31.4-1.el9_3.x86_64.rpm�/�buildah-1.31.4-1.el9_3.x86_64.rpm�0�buildah-tests-1.31.4-1.el9_3.x86_64.rpm����0�X	����LBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security update���Fhttps://access.redhat.com/errata/RHSA-2024:1309RHSA-2024:1309RHSA-2024:1309https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1309.htmlALSA-2024:1309ALSA-2024:1309
�~�fdotnet-templates-7.0-7.0.117-1.el9_3.x86_64.rpm�x�Waspnetcore-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpm�|�fdotnet-sdk-7.0-7.0.117-1.el9_3.x86_64.rpm�{�Wdotnet-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm�}�Wdotnet-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpm�z�Wdotnet-hostfxr-7.0-7.0.17-1.el9_3.x86_64.rpm�w�Waspnetcore-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm�y�Wdotnet-apphost-pack-7.0-7.0.17-1.el9_3.x86_64.rpm�~�fdotnet-templates-7.0-7.0.117-1.el9_3.x86_64.rpm�x�Waspnetcore-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpm�|�fdotnet-sdk-7.0-7.0.117-1.el9_3.x86_64.rpm�{�Wdotnet-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm�}�Wdotnet-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpm�z�Wdotnet-hostfxr-7.0-7.0.17-1.el9_3.x86_64.rpm�w�Waspnetcore-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm�y�Wdotnet-apphost-pack-7.0-7.0.17-1.el9_3.x86_64.rpm��˥u�Y	��7��]BBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security update��W�Ehttps://access.redhat.com/errata/RHSA-2024:1310RHSA-2024:1310RHSA-2024:1310https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1310.htmlALSA-2024:1310ALSA-2024:1310

�w�>dotnet-apphost-pack-8.0-8.0.3-2.el9_3.x86_64.rpm�u�>aspnetcore-runtime-8.0-8.0.3-2.el9_3.x86_64.rpm�|�Tdotnet-templates-8.0-8.0.103-2.el9_3.x86_64.rpm�y�>dotnet-runtime-8.0-8.0.3-2.el9_3.x86_64.rpm�"�Tnetstandard-targeting-pack-2.1-8.0.103-2.el9_3.x86_64.rpm�x�>dotnet-hostfxr-8.0-8.0.3-2.el9_3.x86_64.rpm�!�>dotnet-host-8.0.3-2.el9_3.x86_64.rpm�z�Tdotnet-sdk-8.0-8.0.103-2.el9_3.x86_64.rpm�a�Tdotnet-sdk-dbg-8.0-8.0.103-2.el9_3.x86_64.rpm�{�>dotnet-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm�v�>aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm�Y�>aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm�`�>dotnet-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm
�w�>dotnet-apphost-pack-8.0-8.0.3-2.el9_3.x86_64.rpm�u�>aspnetcore-runtime-8.0-8.0.3-2.el9_3.x86_64.rpm�|�Tdotnet-templates-8.0-8.0.103-2.el9_3.x86_64.rpm�y�>dotnet-runtime-8.0-8.0.3-2.el9_3.x86_64.rpm�"�Tnetstandard-targeting-pack-2.1-8.0.103-2.el9_3.x86_64.rpm�x�>dotnet-hostfxr-8.0-8.0.3-2.el9_3.x86_64.rpm�!�>dotnet-host-8.0.3-2.el9_3.x86_64.rpm�z�Tdotnet-sdk-8.0-8.0.103-2.el9_3.x86_64.rpm�a�Tdotnet-sdk-dbg-8.0-8.0.103-2.el9_3.x86_64.rpm�{�>dotnet-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm�v�>aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm�Y�>aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm�`�>dotnet-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm����i�Z	��<��xBBsecurityImportant: dnsmasq security update��� https://access.redhat.com/errata/RHSA-2024:1334RHSA-2024:1334RHSA-2024:1334https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1334.htmlALSA-2024:1334ALSA-2024:1334
�r�+dnsmasq-2.85-14.el9_3.1.x86_64.rpm�s�+dnsmasq-utils-2.85-14.el9_3.1.x86_64.rpm�r�+dnsmasq-2.85-14.el9_3.1.x86_64.rpm�s�+dnsmasq-utils-2.85-14.el9_3.1.x86_64.rpm����W�[	��?��}securityImportant: squid security update��<�https://access.redhat.com/errata/RHSA-2024:1376RHSA-2024:1376RHSA-2024:1376https://access.redhat.com/security/cve/CVE-2023-50269CVE-2023-50269CVE-2023-50269https://access.redhat.com/security/cve/CVE-2024-25111CVE-2024-25111CVE-2024-25111https://access.redhat.com/security/cve/CVE-2024-25617CVE-2024-25617CVE-2024-25617https://bugzilla.redhat.com/22546632254663https://bugzilla.redhat.com/22643092264309https://bugzilla.redhat.com/22683662268366https://errata.almalinux.org/9/ALSA-2024-1376.htmlALSA-2024:1376ALSA-2024:1376
�{�Nsquid-5.5-6.el9_3.8.x86_64.rpm�{�Nsquid-5.5-6.el9_3.8.x86_64.rpm����\	��:��@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libreoffice security update��J�https://access.redhat.com/errata/RHSA-2024:1427RHSA-2024:1427RHSA-2024:1427https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-1427.htmlALSA-2024:1427ALSA-2024:1427
�1�^libreoffice-help-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-12.el9_3.alma.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-nl-7.1.8.1-12.el9_3.alma.noarch.rpm�blibreoffice-help-it-7.1.8.1-12.el9_3.alma.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-12.el9_3.alma.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-vi-7.1.8.1-12.el9_3.alma.noarch.rpm�alibreoffice-help-id-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-sl-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-it-7.1.8.1-12.el9_3.alma.x86_64.rpm�tautocorr-bg-7.1.8.1-12.el9_3.alma.noarch.rpm�4libreoffice-langpack-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm�Dlibreoffice-core-7.1.8.1-12.el9_3.alma.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpm�]libreoffice-help-he-7.1.8.1-12.el9_3.alma.x86_64.rpm�sautocorr-af-7.1.8.1-12.el9_3.alma.noarch.rpm�Dlibreoffice-ure-7.1.8.1-12.el9_3.alma.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm�wautocorr-da-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-kn-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-sv-7.1.8.1-12.el9_3.alma.noarch.rpm�8libreoffice-langpack-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-tr-7.1.8.1-12.el9_3.alma.noarch.rpm�<libreoffice-langpack-xh-7.1.8.1-12.el9_3.alma.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-12.el9_3.alma.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-12.el9_3.alma.x86_64.rpm�|autocorr-es-7.1.8.1-12.el9_3.alma.noarch.rpm�Rlibreoffice-help-dz-7.1.8.1-12.el9_3.alma.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-lb-7.1.8.1-12.el9_3.alma.noarch.rpm�hlibreoffice-help-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm�yautocorr-dsb-7.1.8.1-12.el9_3.alma.noarch.rpm�Clibreoffice-7.1.8.1-12.el9_3.alma.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm�Elibreoffice-draw-7.1.8.1-12.el9_3.alma.x86_64.rpm�jlibreoffice-help-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm�	autocorr-lt-7.1.8.1-12.el9_3.alma.noarch.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.alma.noarch.rpm�llibreoffice-help-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-12.el9_3.alma.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-12.el9_3.alma.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-12.el9_3.alma.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-12.el9_3.alma.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-12.el9_3.alma.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-12.el9_3.alma.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-12.el9_3.alma.x86_64.rpm�Blibreoffice-pdfimport-7.1.8.1-12.el9_3.alma.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-12.el9_3.alma.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-12.el9_3.alma.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-12.el9_3.alma.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ko-7.1.8.1-12.el9_3.alma.noarch.rpm�mlibreoffice-help-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm�Glibreoffice-filters-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-pl-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-zh-7.1.8.1-12.el9_3.alma.noarch.rpm�{libreoffice-langpack-as-7.1.8.1-12.el9_3.alma.x86_64.rpm�
autocorr-mn-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-gu-7.1.8.1-12.el9_3.alma.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-fr-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-id-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-12.el9_3.alma.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-sr-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-hr-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm�olibreoffice-help-si-7.1.8.1-12.el9_3.alma.x86_64.rpm�{autocorr-en-7.1.8.1-12.el9_3.alma.noarch.rpm�Flibreoffice-emailmerge-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ru-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-kk-7.1.8.1-12.el9_3.alma.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm�
libreoffice-langpack-fr-7.1.8.1-12.el9_3.alma.x86_64.rpm�xautocorr-de-7.1.8.1-12.el9_3.alma.noarch.rpm�xlibreoffice-impress-7.1.8.1-12.el9_3.alma.x86_64.rpm�Flibreoffice-writer-7.1.8.1-12.el9_3.alma.x86_64.rpm�Ilibreofficekit-7.1.8.1-12.el9_3.alma.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-12.el9_3.alma.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-he-7.1.8.1-12.el9_3.alma.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-12.el9_3.alma.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-12.el9_3.alma.x86_64.rpm�*libreoffice-data-7.1.8.1-12.el9_3.alma.noarch.rpm�Tlibreoffice-help-en-7.1.8.1-12.el9_3.alma.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-12.el9_3.alma.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-12.el9_3.alma.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpm�tlibreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm� libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpm�Clibreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpm�|libreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpm�~autocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpm�Ulibreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpm�klibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpm�zlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpm�dlibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpm�zautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpm�uautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpm�1libreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpm�vautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpm�Plibreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpm�Mlibreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpm�Zlibreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpm�@libreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpm�
autocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpm�"libreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpm�}autocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpm�/libreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpm�Blibreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm�Jlibreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpm�Glibreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm�1�^libreoffice-help-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-12.el9_3.alma.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-nl-7.1.8.1-12.el9_3.alma.noarch.rpm�blibreoffice-help-it-7.1.8.1-12.el9_3.alma.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-12.el9_3.alma.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-vi-7.1.8.1-12.el9_3.alma.noarch.rpm�alibreoffice-help-id-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-sl-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-it-7.1.8.1-12.el9_3.alma.x86_64.rpm�tautocorr-bg-7.1.8.1-12.el9_3.alma.noarch.rpm�4libreoffice-langpack-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm�Dlibreoffice-core-7.1.8.1-12.el9_3.alma.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpm�]libreoffice-help-he-7.1.8.1-12.el9_3.alma.x86_64.rpm�sautocorr-af-7.1.8.1-12.el9_3.alma.noarch.rpm�Dlibreoffice-ure-7.1.8.1-12.el9_3.alma.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm�wautocorr-da-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-kn-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-sv-7.1.8.1-12.el9_3.alma.noarch.rpm�8libreoffice-langpack-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-tr-7.1.8.1-12.el9_3.alma.noarch.rpm�<libreoffice-langpack-xh-7.1.8.1-12.el9_3.alma.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-12.el9_3.alma.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-12.el9_3.alma.x86_64.rpm�|autocorr-es-7.1.8.1-12.el9_3.alma.noarch.rpm�Rlibreoffice-help-dz-7.1.8.1-12.el9_3.alma.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-lb-7.1.8.1-12.el9_3.alma.noarch.rpm�hlibreoffice-help-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm�yautocorr-dsb-7.1.8.1-12.el9_3.alma.noarch.rpm�Clibreoffice-7.1.8.1-12.el9_3.alma.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm�Elibreoffice-draw-7.1.8.1-12.el9_3.alma.x86_64.rpm�jlibreoffice-help-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm�	autocorr-lt-7.1.8.1-12.el9_3.alma.noarch.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.alma.noarch.rpm�llibreoffice-help-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-12.el9_3.alma.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-12.el9_3.alma.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-12.el9_3.alma.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-12.el9_3.alma.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-12.el9_3.alma.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-12.el9_3.alma.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-12.el9_3.alma.x86_64.rpm�Blibreoffice-pdfimport-7.1.8.1-12.el9_3.alma.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-12.el9_3.alma.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-12.el9_3.alma.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-12.el9_3.alma.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ko-7.1.8.1-12.el9_3.alma.noarch.rpm�mlibreoffice-help-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm�Glibreoffice-filters-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-pl-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-zh-7.1.8.1-12.el9_3.alma.noarch.rpm�{libreoffice-langpack-as-7.1.8.1-12.el9_3.alma.x86_64.rpm�
autocorr-mn-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-gu-7.1.8.1-12.el9_3.alma.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-fr-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-id-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-12.el9_3.alma.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-sr-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-hr-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm�olibreoffice-help-si-7.1.8.1-12.el9_3.alma.x86_64.rpm�{autocorr-en-7.1.8.1-12.el9_3.alma.noarch.rpm�Flibreoffice-emailmerge-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ru-7.1.8.1-12.el9_3.alma.noarch.rpm�libreoffice-langpack-kk-7.1.8.1-12.el9_3.alma.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm�
libreoffice-langpack-fr-7.1.8.1-12.el9_3.alma.x86_64.rpm�xautocorr-de-7.1.8.1-12.el9_3.alma.noarch.rpm�xlibreoffice-impress-7.1.8.1-12.el9_3.alma.x86_64.rpm�Flibreoffice-writer-7.1.8.1-12.el9_3.alma.x86_64.rpm�Ilibreofficekit-7.1.8.1-12.el9_3.alma.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-12.el9_3.alma.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-he-7.1.8.1-12.el9_3.alma.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-12.el9_3.alma.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-12.el9_3.alma.x86_64.rpm�*libreoffice-data-7.1.8.1-12.el9_3.alma.noarch.rpm�Tlibreoffice-help-en-7.1.8.1-12.el9_3.alma.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-12.el9_3.alma.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-12.el9_3.alma.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpm�tlibreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm� libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpm�Clibreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpm�|libreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpm�~autocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpm�Ulibreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpm�klibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpm�zlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpm�dlibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpm�zautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpm�uautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpm�1libreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpm�vautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpm�Plibreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpm�Mlibreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpm�Zlibreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpm�@libreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpm�
autocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpm�"libreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpm�}autocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpm�/libreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm�autocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpm�Blibreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm�Jlibreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpm�autocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpm�Glibreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm����^�]	��<��;securityImportant: postgresql-jdbc security update��]�ohttps://access.redhat.com/errata/RHSA-2024:1436RHSA-2024:1436RHSA-2024:1436https://access.redhat.com/security/cve/CVE-2024-1597CVE-2024-1597CVE-2024-1597https://bugzilla.redhat.com/22665232266523https://errata.almalinux.org/9/ALSA-2024-1436.htmlALSA-2024:1436ALSA-2024:1436
�Z� postgresql-jdbc-42.2.28-1.el9_3.noarch.rpm�Z� postgresql-jdbc-42.2.28-1.el9_3.noarch.rpm����g�^	����}BBBBBBBBsecurityImportant: nodejs security update��L�Hhttps://access.redhat.com/errata/RHSA-2024:1438RHSA-2024:1438RHSA-2024:1438https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645742264574https://errata.almalinux.org/9/ALSA-2024-1438.htmlALSA-2024:1438ALSA-2024:1438
d�<npm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm,�bnodejs-16.20.2-4.el9_3.x86_64.rpm��bnodejs-libs-16.20.2-4.el9_3.i686.rpme�bnodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpm>�bnodejs-docs-16.20.2-4.el9_3.noarch.rpm��bnodejs-libs-16.20.2-4.el9_3.x86_64.rpmd�<npm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm,�bnodejs-16.20.2-4.el9_3.x86_64.rpm��bnodejs-libs-16.20.2-4.el9_3.i686.rpme�bnodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpm>�bnodejs-docs-16.20.2-4.el9_3.noarch.rpm��bnodejs-libs-16.20.2-4.el9_3.x86_64.rpm���	�_	����HBBBBBBBBsecurityImportant: golang security update���Bhttps://access.redhat.com/errata/RHSA-2024:1462RHSA-2024:1462RHSA-2024:1462https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1462.htmlALSA-2024:1462ALSA-2024:1462
p�)golang-tests-1.20.12-2.el9_3.noarch.rpm�G�)golang-1.20.12-2.el9_3.x86_64.rpm�H�)golang-bin-1.20.12-2.el9_3.x86_64.rpm�N�)go-toolset-1.20.12-2.el9_3.x86_64.rpmn�)golang-misc-1.20.12-2.el9_3.noarch.rpmm�)golang-docs-1.20.12-2.el9_3.noarch.rpmo�)golang-src-1.20.12-2.el9_3.noarch.rpmp�)golang-tests-1.20.12-2.el9_3.noarch.rpm�G�)golang-1.20.12-2.el9_3.x86_64.rpm�H�)golang-bin-1.20.12-2.el9_3.x86_64.rpm�N�)go-toolset-1.20.12-2.el9_3.x86_64.rpmn�)golang-misc-1.20.12-2.el9_3.noarch.rpmm�)golang-docs-1.20.12-2.el9_3.noarch.rpmo�)golang-src-1.20.12-2.el9_3.noarch.rpm����&�`	����SBBsecurityCritical: firefox security update�S��V�Chttps://access.redhat.com/errata/RHSA-2024:1485RHSA-2024:1485RHSA-2024:1485https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://access.redhat.com/security/cve/CVE-2024-2616CVE-2024-2616CVE-2024-2616https://access.redhat.com/security/cve/CVE-2024-29944CVE-2024-29944CVE-2024-29944https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706622270662https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://bugzilla.redhat.com/22710642271064https://errata.almalinux.org/9/ALSA-2024-1485.htmlALSA-2024:1485ALSA-2024:1485
P�firefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm8�firefox-115.9.1-1.el9_3.alma.1.x86_64.rpmP�firefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm8�firefox-115.9.1-1.el9_3.alma.1.x86_64.rpm�����a	����XsecurityModerate: thunderbird security update���Khttps://access.redhat.com/errata/RHSA-2024:1493RHSA-2024:1493RHSA-2024:1493https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-1936CVE-2024-1936CVE-2024-1936https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22681712268171https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://errata.almalinux.org/9/ALSA-2024-1493.htmlALSA-2024:1493ALSA-2024:1493
9�thunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm9�thunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm��٨?�b	����[securityImportant: grafana security update��d�nhttps://access.redhat.com/errata/RHSA-2024:1501RHSA-2024:1501RHSA-2024:1501https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1501.htmlALSA-2024:1501ALSA-2024:1501
�I�_grafana-9.2.10-8.el9_3.alma.1.x86_64.rpm�I�_grafana-9.2.10-8.el9_3.alma.1.x86_64.rpm����9�c	�� ��^securityImportant: grafana-pcp security update��R�:https://access.redhat.com/errata/RHSA-2024:1502RHSA-2024:1502RHSA-2024:1502https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1502.htmlALSA-2024:1502ALSA-2024:1502
�~�1grafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpm�~�1grafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpm����$�d	��*�aBF��{BBBBBBBsecurityImportant: nodejs:18 security update���https://access.redhat.com/errata/RHSA-2024:1503RHSA-2024:1503RHSA-2024:1503https://access.redhat.com/security/cve/CVE-2023-46809CVE-2023-46809CVE-2023-46809https://access.redhat.com/security/cve/CVE-2024-21892CVE-2024-21892CVE-2024-21892https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645692264569https://bugzilla.redhat.com/22645742264574https://bugzilla.redhat.com/22645822264582https://errata.almalinux.org/9/ALSA-2024-1503.htmlALSA-2024:1503ALSA-2024:1503
,��E*�#�"nodejs-devel-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm,�"nodejs-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm>�"nodejs-docs-18.19.1-1.module_el9.3.0+59+28b95644.noarch.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�"nodejs-full-i18n-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmd�"npm-10.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644.x86_64.rpm,��E*�#�"nodejs-devel-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm,�"nodejs-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm>�"nodejs-docs-18.19.1-1.module_el9.3.0+59+28b95644.noarch.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�"nodejs-full-i18n-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmd�"npm-10.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644.x86_64.rpm�����e	��.��kBsecurityModerate: expat security update��+�Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530
��Sexpat-devel-2.5.0-1.el9_3.1.i686.rpm��Sexpat-devel-2.5.0-1.el9_3.1.x86_64.rpm��Sexpat-devel-2.5.0-1.el9_3.1.i686.rpm��Sexpat-devel-2.5.0-1.el9_3.1.x86_64.rpm�����f	���KBBBBB��`BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.1 security, bug fix, and enhancement update��m�
https://access.redhat.com/errata/RHSA-2024:1576RHSA-2024:1576RHSA-2024:1576https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2023-36617CVE-2023-36617CVE-2023-36617https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22186142218614https://errata.almalinux.org/9/ALSA-2024-1576.htmlALSA-2024:1576ALSA-2024:1576
��'�F*$��rubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�*�Brubygem-irb-1.4.1-143.module_el9.3.0+60+5ebc989a.noarch.rpm�(�yruby-default-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpm�)�qrubygem-bundler-2.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm�4�.rubygems-devel-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm�:�yruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�;�yruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm�2�rubygem-typeprof-0.21.3-143.module_el9.3.0+60+5ebc989a.noarch.rpm��prubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�/�rubygem-rexml-3.2.5-143.module_el9.3.0+60+5ebc989a.noarch.rpm�.�1rubygem-rdoc-6.4.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm�1�rubygem-test-unit-3.5.3-143.module_el9.3.0+60+5ebc989a.noarch.rpm�j�yruby-doc-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpm��Yrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.i686.rpm�3�.rubygems-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm��yruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�,�Zrubygem-power_assert-2.0.1-143.module_el9.3.0+60+5ebc989a.noarch.rpm��rubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.i686.rpm��Yrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�;�yruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�:�yruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm��rubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.x86_64.rpm��yruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm�K�[rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.i686.rpm�+�%rubygem-minitest-5.15.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm�-�Orubygem-rake-13.0.6-143.module_el9.3.0+60+5ebc989a.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm��yruby-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�0�rubygem-rss-0.2.9-143.module_el9.3.0+60+5ebc989a.noarch.rpm��prubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.i686.rpm��yruby-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm��rubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.i686.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�K�[rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.x86_64.rpm��'�F*$��rubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�*�Brubygem-irb-1.4.1-143.module_el9.3.0+60+5ebc989a.noarch.rpm�(�yruby-default-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpm�)�qrubygem-bundler-2.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm�4�.rubygems-devel-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm�:�yruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�;�yruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm�2�rubygem-typeprof-0.21.3-143.module_el9.3.0+60+5ebc989a.noarch.rpm��prubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�/�rubygem-rexml-3.2.5-143.module_el9.3.0+60+5ebc989a.noarch.rpm�.�1rubygem-rdoc-6.4.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm�1�rubygem-test-unit-3.5.3-143.module_el9.3.0+60+5ebc989a.noarch.rpm�j�yruby-doc-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpm��Yrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.i686.rpm�3�.rubygems-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm��yruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�,�Zrubygem-power_assert-2.0.1-143.module_el9.3.0+60+5ebc989a.noarch.rpm��rubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.i686.rpm��Yrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�;�yruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm�:�yruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm��rubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.x86_64.rpm��yruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm�K�[rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.i686.rpm�+�%rubygem-minitest-5.15.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm�-�Orubygem-rake-13.0.6-143.module_el9.3.0+60+5ebc989a.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm��yruby-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�0�rubygem-rss-0.2.9-143.module_el9.3.0+60+5ebc989a.noarch.rpm��prubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.i686.rpm��yruby-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm��rubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.i686.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�K�[rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.x86_64.rpm����L�g	��$�x��bBBBBBBBBBsecurityImportant: nodejs:20 security update��q�Uhttps://access.redhat.com/errata/RHSA-2024:1688RHSA-2024:1688RHSA-2024:1688https://access.redhat.com/security/cve/CVE-2023-46809CVE-2023-46809CVE-2023-46809https://access.redhat.com/security/cve/CVE-2024-21890CVE-2024-21890CVE-2024-21890https://access.redhat.com/security/cve/CVE-2024-21891CVE-2024-21891CVE-2024-21891https://access.redhat.com/security/cve/CVE-2024-21892CVE-2024-21892CVE-2024-21892https://access.redhat.com/security/cve/CVE-2024-21896CVE-2024-21896CVE-2024-21896https://access.redhat.com/security/cve/CVE-2024-22017CVE-2024-22017CVE-2024-22017https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645692264569https://bugzilla.redhat.com/22645742264574https://bugzilla.redhat.com/22645822264582https://bugzilla.redhat.com/22657172265717https://bugzilla.redhat.com/22657202265720https://bugzilla.redhat.com/22657222265722https://bugzilla.redhat.com/22657272265727https://errata.almalinux.org/9/ALSA-2024-1688.htmlALSA-2024:1688ALSA-2024:1688
,�Q�G*>�&nodejs-docs-20.11.1-1.module_el9.3.0+88+29afeaa2.noarch.rpm�	�nodejs-packaging-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpm,�&nodejs-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm�#�&nodejs-devel-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpml�onodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpme�&nodejs-full-i18n-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm�
�nodejs-packaging-bundler-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpmd�#npm-10.2.4-1.20.11.1.1.module_el9.3.0+88+29afeaa2.x86_64.rpm,�Q�G*>�&nodejs-docs-20.11.1-1.module_el9.3.0+88+29afeaa2.noarch.rpm�	�nodejs-packaging-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpm,�&nodejs-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm�#�&nodejs-devel-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpml�onodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpme�&nodejs-full-i18n-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm�
�nodejs-packaging-bundler-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpmd�#npm-10.2.4-1.20.11.1.1.module_el9.3.0+88+29afeaa2.x86_64.rpm��իv�h	��*��eBBBsecurityImportant: varnish security update��F�thttps://access.redhat.com/errata/RHSA-2024:1691RHSA-2024:1691RHSA-2024:1691https://access.redhat.com/security/cve/CVE-2024-30156CVE-2024-30156CVE-2024-30156https://bugzilla.redhat.com/22714862271486https://errata.almalinux.org/9/ALSA-2024-1691.htmlALSA-2024:1691ALSA-2024:1691
�P�varnish-6.6.2-4.el9_3.1.i686.rpm�P�varnish-6.6.2-4.el9_3.1.x86_64.rpm�N�varnish-docs-6.6.2-4.el9_3.1.x86_64.rpm�P�varnish-6.6.2-4.el9_3.1.i686.rpm�P�varnish-6.6.2-4.el9_3.1.x86_64.rpm�N�varnish-docs-6.6.2-4.el9_3.1.x86_64.rpm����>�i	��2��kBBBBBsecurityImportant: unbound security update��:�6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750
��unbound-libs-1.16.2-3.el9_3.5.x86_64.rpm�P�python3-unbound-1.16.2-3.el9_3.5.x86_64.rpm�U�unbound-1.16.2-3.el9_3.5.x86_64.rpm��unbound-libs-1.16.2-3.el9_3.5.i686.rpm��unbound-libs-1.16.2-3.el9_3.5.x86_64.rpm�P�python3-unbound-1.16.2-3.el9_3.5.x86_64.rpm�U�unbound-1.16.2-3.el9_3.5.x86_64.rpm��unbound-libs-1.16.2-3.el9_3.5.i686.rpm���H�j	����sBBBBBBBBBBBBBsecurityImportant: bind security update��p�Ghttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789
	�"�bind-license-9.16.23-14.el9_3.4.noarch.rpm�'�python3-bind-9.16.23-14.el9_3.4.noarch.rpm�Z�bind-9.16.23-14.el9_3.4.x86_64.rpm�\�bind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpm�!�bind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpm�[�bind-chroot-9.16.23-14.el9_3.4.x86_64.rpm�p�{bind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpm�^�bind-utils-9.16.23-14.el9_3.4.x86_64.rpm�]�bind-libs-9.16.23-14.el9_3.4.x86_64.rpm	�"�bind-license-9.16.23-14.el9_3.4.noarch.rpm�'�python3-bind-9.16.23-14.el9_3.4.noarch.rpm�Z�bind-9.16.23-14.el9_3.4.x86_64.rpm�\�bind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpm�!�bind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpm�[�bind-chroot-9.16.23-14.el9_3.4.x86_64.rpm�p�{bind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpm�^�bind-utils-9.16.23-14.el9_3.4.x86_64.rpm�]�bind-libs-9.16.23-14.el9_3.4.x86_64.rpm�����k	����CBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update��7�
https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818
�8�ojava-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm�X�ojava-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm�U�ojava-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm�W�ojava-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm�V�ojava-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm�7�ojava-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm�T�ojava-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpm�8�ojava-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm�X�ojava-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm�U�ojava-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm�W�ojava-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm�V�ojava-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm�7�ojava-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm�T�ojava-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpm����y�l	��"��PBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update��V�nhttps://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822
	�H�java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpm�K�java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpm�D�java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm	�H�java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpm�G�java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpm�K�java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpm�F�java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpm�E�java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpm�J�java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpm�L�java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpm�D�java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpm�I�java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm����O�m	��5��cBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update��D�$
https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825
	��#java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm	��#java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpm��#java-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm����$�n	����vBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update��h�Hhttps://access.redhat.com/errata/RHSA-2024:1828RHSA-2024:1828RHSA-2024:1828https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://errata.almalinux.org/9/ALSA-2024-1828.htmlALSA-2024:1828ALSA-2024:1828
	�p�5java-21-openjdk-headless-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�o�5java-21-openjdk-devel-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�t�5java-21-openjdk-src-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�r�5java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�s�5java-21-openjdk-jmods-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�u�5java-21-openjdk-static-libs-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�q�5java-21-openjdk-javadoc-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�m�5java-21-openjdk-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�n�5java-21-openjdk-demo-21.0.3.0.9-1.el9.alma.1.x86_64.rpm	�p�5java-21-openjdk-headless-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�o�5java-21-openjdk-devel-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�t�5java-21-openjdk-src-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�r�5java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�s�5java-21-openjdk-jmods-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�u�5java-21-openjdk-static-libs-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�q�5java-21-openjdk-javadoc-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�m�5java-21-openjdk-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�n�5java-21-openjdk-demo-21.0.3.0.9-1.el9.alma.1.x86_64.rpm����T�o	����IsecurityImportant: mod_http2 security update��0�vhttps://access.redhat.com/errata/RHSA-2024:1872RHSA-2024:1872RHSA-2024:1872https://access.redhat.com/security/cve/CVE-2024-27316CVE-2024-27316CVE-2024-27316https://bugzilla.redhat.com/22682772268277https://errata.almalinux.org/9/ALSA-2024-1872.htmlALSA-2024:1872ALSA-2024:1872
�K�Jmod_http2-1.15.19-5.el9_3.1.x86_64.rpm�K�Jmod_http2-1.15.19-5.el9_3.1.x86_64.rpm����@�p	����LBBBBBBBBBsecurityModerate: gnutls security update��&�https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879
�b�gnutls-dane-3.7.6-23.el9_3.4.i686.rpm�c�gnutls-devel-3.7.6-23.el9_3.4.x86_64.rpm�)�gnutls-utils-3.7.6-23.el9_3.4.x86_64.rpm�c�gnutls-devel-3.7.6-23.el9_3.4.i686.rpm�a�gnutls-c++-3.7.6-23.el9_3.4.x86_64.rpm�a�gnutls-c++-3.7.6-23.el9_3.4.i686.rpm�b�gnutls-dane-3.7.6-23.el9_3.4.x86_64.rpm�b�gnutls-dane-3.7.6-23.el9_3.4.i686.rpm�c�gnutls-devel-3.7.6-23.el9_3.4.x86_64.rpm�)�gnutls-utils-3.7.6-23.el9_3.4.x86_64.rpm�c�gnutls-devel-3.7.6-23.el9_3.4.i686.rpm�a�gnutls-c++-3.7.6-23.el9_3.4.x86_64.rpm�a�gnutls-c++-3.7.6-23.el9_3.4.i686.rpm�b�gnutls-dane-3.7.6-23.el9_3.4.x86_64.rpm�����q	����XBBsecurityImportant: firefox security update��8�@https://access.redhat.com/errata/RHSA-2024:1908RHSA-2024:1908RHSA-2024:1908https://access.redhat.com/security/cve/CVE-2024-2609CVE-2024-2609CVE-2024-2609https://access.redhat.com/security/cve/CVE-2024-3852CVE-2024-3852CVE-2024-3852https://access.redhat.com/security/cve/CVE-2024-3854CVE-2024-3854CVE-2024-3854https://access.redhat.com/security/cve/CVE-2024-3857CVE-2024-3857CVE-2024-3857https://access.redhat.com/security/cve/CVE-2024-3859CVE-2024-3859CVE-2024-3859https://access.redhat.com/security/cve/CVE-2024-3861CVE-2024-3861CVE-2024-3861https://access.redhat.com/security/cve/CVE-2024-3864CVE-2024-3864CVE-2024-3864https://bugzilla.redhat.com/22755472275547https://bugzilla.redhat.com/22755492275549https://bugzilla.redhat.com/22755502275550https://bugzilla.redhat.com/22755512275551https://bugzilla.redhat.com/22755522275552https://bugzilla.redhat.com/22755532275553https://bugzilla.redhat.com/22755552275555https://errata.almalinux.org/9/ALSA-2024-1908.htmlALSA-2024:1908ALSA-2024:1908
P�firefox-x11-115.10.0-1.el9_3.alma.1.x86_64.rpm8�firefox-115.10.0-1.el9_3.alma.1.x86_64.rpmP�firefox-x11-115.10.0-1.el9_3.alma.1.x86_64.rpm8�firefox-115.10.0-1.el9_3.alma.1.x86_64.rpm����,�r	����]securityLow: thunderbird security update�6��x�https://access.redhat.com/errata/RHSA-2024:1940RHSA-2024:1940RHSA-2024:1940https://access.redhat.com/security/cve/CVE-2024-2609CVE-2024-2609CVE-2024-2609https://access.redhat.com/security/cve/CVE-2024-3302CVE-2024-3302CVE-2024-3302https://access.redhat.com/security/cve/CVE-2024-3852CVE-2024-3852CVE-2024-3852https://access.redhat.com/security/cve/CVE-2024-3854CVE-2024-3854CVE-2024-3854https://access.redhat.com/security/cve/CVE-2024-3857CVE-2024-3857CVE-2024-3857https://access.redhat.com/security/cve/CVE-2024-3859CVE-2024-3859CVE-2024-3859https://access.redhat.com/security/cve/CVE-2024-3861CVE-2024-3861CVE-2024-3861https://access.redhat.com/security/cve/CVE-2024-3864CVE-2024-3864CVE-2024-3864https://bugzilla.redhat.com/22733832273383https://bugzilla.redhat.com/22755472275547https://bugzilla.redhat.com/22755492275549https://bugzilla.redhat.com/22755502275550https://bugzilla.redhat.com/22755512275551https://bugzilla.redhat.com/22755522275552https://bugzilla.redhat.com/22755532275553https://bugzilla.redhat.com/22755552275555https://errata.almalinux.org/9/ALSA-2024-1940.htmlALSA-2024:1940ALSA-2024:1940
9�~thunderbird-115.10.0-2.el9_3.alma.1.x86_64.rpm9�~thunderbird-115.10.0-2.el9_3.alma.1.x86_64.rpm����[�s	��*��`BBBBBBBBsecurityImportant: golang security update���;https://access.redhat.com/errata/RHSA-2024:1963RHSA-2024:1963RHSA-2024:1963https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-1963.htmlALSA-2024:1963ALSA-2024:1963
�G�*golang-1.20.12-4.el9_3.x86_64.rpmm�*golang-docs-1.20.12-4.el9_3.noarch.rpm�N�*go-toolset-1.20.12-4.el9_3.x86_64.rpmp�*golang-tests-1.20.12-4.el9_3.noarch.rpmo�*golang-src-1.20.12-4.el9_3.noarch.rpm�H�*golang-bin-1.20.12-4.el9_3.x86_64.rpmn�*golang-misc-1.20.12-4.el9_3.noarch.rpm�G�*golang-1.20.12-4.el9_3.x86_64.rpmm�*golang-docs-1.20.12-4.el9_3.noarch.rpm�N�*go-toolset-1.20.12-4.el9_3.x86_64.rpmp�*golang-tests-1.20.12-4.el9_3.noarch.rpmo�*golang-src-1.20.12-4.el9_3.noarch.rpm�H�*golang-bin-1.20.12-4.el9_3.x86_64.rpmn�*golang-misc-1.20.12-4.el9_3.noarch.rpm����t�t	��-��ksecurityModerate: libreswan security and bug fix update��I�Nhttps://access.redhat.com/errata/RHSA-2024:2033RHSA-2024:2033RHSA-2024:2033https://access.redhat.com/security/cve/CVE-2024-2357CVE-2024-2357CVE-2024-2357https://bugzilla.redhat.com/22689522268952https://errata.almalinux.org/9/ALSA-2024-2033.htmlALSA-2024:2033ALSA-2024:2033
�J�libreswan-4.12-1.el9_3.1.alma.1.x86_64.rpm�J�libreswan-4.12-1.el9_3.1.alma.1.x86_64.rpm����`�u	��2��nBBsecurityImportant: buildah security update���ghttps://access.redhat.com/errata/RHSA-2024:2055RHSA-2024:2055RHSA-2024:2055https://access.redhat.com/security/cve/CVE-2024-1753CVE-2024-1753CVE-2024-1753https://bugzilla.redhat.com/22655132265513https://errata.almalinux.org/9/ALSA-2024-2055.htmlALSA-2024:2055ALSA-2024:2055
�/�buildah-1.31.5-1.el9_3.x86_64.rpm�0�buildah-tests-1.31.5-1.el9_3.x86_64.rpm�/�buildah-1.31.5-1.el9_3.x86_64.rpm�0�buildah-tests-1.31.5-1.el9_3.x86_64.rpm�����v	��5��ssecurityImportant: git-lfs security update��~�~https://access.redhat.com/errata/RHSA-2024:2079RHSA-2024:2079RHSA-2024:2079https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2079.htmlALSA-2024:2079ALSA-2024:2079
�l�ygit-lfs-3.2.0-2.el9_3.x86_64.rpm�l�ygit-lfs-3.2.0-2.el9_3.x86_64.rpm����Z�w	��<��vBBBBsecurityModerate: Image builder components bug fix, enhancement and security update��|�Shttps://access.redhat.com/errata/RHSA-2024:2119RHSA-2024:2119RHSA-2024:2119https://access.redhat.com/security/cve/CVE-2024-2307CVE-2024-2307CVE-2024-2307https://bugzilla.redhat.com/22685132268513https://errata.almalinux.org/9/ALSA-2024-2119.htmlALSA-2024:2119ALSA-2024:2119
�x�Yosbuild-composer-core-101-1.el9.alma.1.x86_64.rpm�w�Yosbuild-composer-101-1.el9.alma.1.x86_64.rpm�y�Yosbuild-composer-worker-101-1.el9.alma.1.x86_64.rpm�x�Yosbuild-composer-core-101-1.el9.alma.1.x86_64.rpm�w�Yosbuild-composer-101-1.el9.alma.1.x86_64.rpm�y�Yosbuild-composer-worker-101-1.el9.alma.1.x86_64.rpm���F�x	��	��}BBBBBBBBBBsecurityImportant: webkit2gtk3 security update��O�https://access.redhat.com/errata/RHSA-2024:2126RHSA-2024:2126RHSA-2024:2126https://access.redhat.com/security/cve/CVE-2014-1745CVE-2014-1745CVE-2014-1745https://access.redhat.com/security/cve/CVE-2023-32359CVE-2023-32359CVE-2023-32359https://access.redhat.com/security/cve/CVE-2023-39928CVE-2023-39928CVE-2023-39928https://access.redhat.com/security/cve/CVE-2023-40414CVE-2023-40414CVE-2023-40414https://access.redhat.com/security/cve/CVE-2023-41983CVE-2023-41983CVE-2023-41983https://access.redhat.com/security/cve/CVE-2023-42852CVE-2023-42852CVE-2023-42852https://access.redhat.com/security/cve/CVE-2023-42883CVE-2023-42883CVE-2023-42883https://access.redhat.com/security/cve/CVE-2023-42890CVE-2023-42890CVE-2023-42890https://access.redhat.com/security/cve/CVE-2024-23206CVE-2024-23206CVE-2024-23206https://access.redhat.com/security/cve/CVE-2024-23213CVE-2024-23213CVE-2024-23213https://bugzilla.redhat.com/22414002241400https://bugzilla.redhat.com/22543262254326https://bugzilla.redhat.com/22543272254327https://bugzilla.redhat.com/22697432269743https://bugzilla.redhat.com/22701412270141https://bugzilla.redhat.com/22701432270143https://bugzilla.redhat.com/22701512270151https://bugzilla.redhat.com/22714492271449https://bugzilla.redhat.com/22714532271453https://bugzilla.redhat.com/22714562271456https://errata.almalinux.org/9/ALSA-2024-2126.htmlALSA-2024:2126ALSA-2024:2126
2�3webkit2gtk3-jsc-2.42.5-1.el9.i686.rpm0�3webkit2gtk3-2.42.5-1.el9.x86_64.rpm1�3webkit2gtk3-devel-2.42.5-1.el9.x86_64.rpm1�3webkit2gtk3-devel-2.42.5-1.el9.i686.rpm0�3webkit2gtk3-2.42.5-1.el9.i686.rpm3�3webkit2gtk3-jsc-devel-2.42.5-1.el9.i686.rpm3�3webkit2gtk3-jsc-devel-2.42.5-1.el9.x86_64.rpm2�3webkit2gtk3-jsc-2.42.5-1.el9.x86_64.rpm2�3webkit2gtk3-jsc-2.42.5-1.el9.i686.rpm0�3webkit2gtk3-2.42.5-1.el9.x86_64.rpm1�3webkit2gtk3-devel-2.42.5-1.el9.x86_64.rpm1�3webkit2gtk3-devel-2.42.5-1.el9.i686.rpm0�3webkit2gtk3-2.42.5-1.el9.i686.rpm3�3webkit2gtk3-jsc-devel-2.42.5-1.el9.i686.rpm3�3webkit2gtk3-jsc-devel-2.42.5-1.el9.x86_64.rpm2�3webkit2gtk3-jsc-2.42.5-1.el9.x86_64.rpm���N�y	�� ��JBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security and bug fix update��R�yhttps://access.redhat.com/errata/RHSA-2024:2132RHSA-2024:2132RHSA-2024:2132https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://access.redhat.com/security/cve/CVE-2023-52323CVE-2023-52323CVE-2023-52323https://access.redhat.com/security/cve/CVE-2024-22195CVE-2024-22195CVE-2024-22195https://bugzilla.redhat.com/22468402246840https://bugzilla.redhat.com/22570282257028https://bugzilla.redhat.com/22578542257854https://errata.almalinux.org/9/ALSA-2024-2132.htmlALSA-2024:2132ALSA-2024:2132

�i�&fence-virtd-serial-4.10.0-62.el9.x86_64.rpm�e�&fence-virtd-4.10.0-62.el9.x86_64.rpm�c�&fence-agents-kubevirt-4.10.0-62.el9.x86_64.rpm�$�&fence-agents-ibm-powervs-4.10.0-62.el9.noarch.rpm�f�&fence-virtd-cpg-4.10.0-62.el9.x86_64.rpm�h�&fence-virtd-multicast-4.10.0-62.el9.x86_64.rpm�%�&fence-agents-ibm-vpc-4.10.0-62.el9.noarch.rpm�j�&fence-virtd-tcp-4.10.0-62.el9.x86_64.rpm�&�&fence-agents-virsh-4.10.0-62.el9.noarch.rpm�#�&fence-agents-common-4.10.0-62.el9.noarch.rpm�d�&fence-virt-4.10.0-62.el9.x86_64.rpm�b�&fence-agents-compute-4.10.0-62.el9.x86_64.rpm�g�&fence-virtd-libvirt-4.10.0-62.el9.x86_64.rpm
�i�&fence-virtd-serial-4.10.0-62.el9.x86_64.rpm�e�&fence-virtd-4.10.0-62.el9.x86_64.rpm�c�&fence-agents-kubevirt-4.10.0-62.el9.x86_64.rpm�$�&fence-agents-ibm-powervs-4.10.0-62.el9.noarch.rpm�f�&fence-virtd-cpg-4.10.0-62.el9.x86_64.rpm�h�&fence-virtd-multicast-4.10.0-62.el9.x86_64.rpm�%�&fence-agents-ibm-vpc-4.10.0-62.el9.noarch.rpm�j�&fence-virtd-tcp-4.10.0-62.el9.x86_64.rpm�&�&fence-agents-virsh-4.10.0-62.el9.noarch.rpm�#�&fence-agents-common-4.10.0-62.el9.noarch.rpm�d�&fence-virt-4.10.0-62.el9.x86_64.rpm�b�&fence-agents-compute-4.10.0-62.el9.x86_64.rpm�g�&fence-virtd-libvirt-4.10.0-62.el9.x86_64.rpm���`�z	����aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security update��K�Phttps://access.redhat.com/errata/RHSA-2024:2135RHSA-2024:2135RHSA-2024:2135https://access.redhat.com/security/cve/CVE-2023-3019CVE-2023-3019CVE-2023-3019https://access.redhat.com/security/cve/CVE-2023-3255CVE-2023-3255CVE-2023-3255https://access.redhat.com/security/cve/CVE-2023-42467CVE-2023-42467CVE-2023-42467https://access.redhat.com/security/cve/CVE-2023-5088CVE-2023-5088CVE-2023-5088https://access.redhat.com/security/cve/CVE-2023-6683CVE-2023-6683CVE-2023-6683https://bugzilla.redhat.com/22184862218486https://bugzilla.redhat.com/22223512222351https://bugzilla.redhat.com/22382912238291https://bugzilla.redhat.com/22472832247283https://bugzilla.redhat.com/22548252254825https://errata.almalinux.org/9/ALSA-2024-2135.htmlALSA-2024:2135ALSA-2024:2135
�4^qemu-kvm-block-curl-8.2.0-11.el9_4.x86_64.rpm�6^qemu-kvm-common-8.2.0-11.el9_4.x86_64.rpm�?^qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.x86_64.rpm�9^qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.x86_64.rpm�3^qemu-kvm-audio-pa-8.2.0-11.el9_4.x86_64.rpm�A^qemu-pr-helper-8.2.0-11.el9_4.x86_64.rpm�>^qemu-kvm-tools-8.2.0-11.el9_4.x86_64.rpm�7^qemu-kvm-core-8.2.0-11.el9_4.x86_64.rpm�=^qemu-kvm-docs-8.2.0-11.el9_4.x86_64.rpm�;^qemu-kvm-device-usb-host-8.2.0-11.el9_4.x86_64.rpm�@^qemu-kvm-ui-opengl-8.2.0-11.el9_4.x86_64.rpm�<^qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.x86_64.rpm�0^qemu-guest-agent-8.2.0-11.el9_4.x86_64.rpm�:^qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.x86_64.rpm�2^qemu-kvm-8.2.0-11.el9_4.x86_64.rpm�5^qemu-kvm-block-rbd-8.2.0-11.el9_4.x86_64.rpm�1^qemu-img-8.2.0-11.el9_4.x86_64.rpm�8^qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.x86_64.rpm�K^qemu-kvm-block-blkio-8.2.0-11.el9_4.x86_64.rpm�4^qemu-kvm-block-curl-8.2.0-11.el9_4.x86_64.rpm�6^qemu-kvm-common-8.2.0-11.el9_4.x86_64.rpm�?^qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.x86_64.rpm�9^qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.x86_64.rpm�3^qemu-kvm-audio-pa-8.2.0-11.el9_4.x86_64.rpm�A^qemu-pr-helper-8.2.0-11.el9_4.x86_64.rpm�>^qemu-kvm-tools-8.2.0-11.el9_4.x86_64.rpm�7^qemu-kvm-core-8.2.0-11.el9_4.x86_64.rpm�=^qemu-kvm-docs-8.2.0-11.el9_4.x86_64.rpm�;^qemu-kvm-device-usb-host-8.2.0-11.el9_4.x86_64.rpm�@^qemu-kvm-ui-opengl-8.2.0-11.el9_4.x86_64.rpm�<^qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.x86_64.rpm�0^qemu-guest-agent-8.2.0-11.el9_4.x86_64.rpm�:^qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.x86_64.rpm�2^qemu-kvm-8.2.0-11.el9_4.x86_64.rpm�5^qemu-kvm-block-rbd-8.2.0-11.el9_4.x86_64.rpm�1^qemu-img-8.2.0-11.el9_4.x86_64.rpm�8^qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.x86_64.rpm�K^qemu-kvm-block-blkio-8.2.0-11.el9_4.x86_64.rpm���y�{	����HBsecurityLow: LibRaw security update�6���https://access.redhat.com/errata/RHSA-2024:2137RHSA-2024:2137RHSA-2024:2137https://access.redhat.com/security/cve/CVE-2023-1729CVE-2023-1729CVE-2023-1729https://bugzilla.redhat.com/21882402188240https://errata.almalinux.org/9/ALSA-2024-2137.htmlALSA-2024:2137ALSA-2024:2137
�3�YLibRaw-0.21.1-1.el9.i686.rpm�3�YLibRaw-0.21.1-1.el9.x86_64.rpm�3�YLibRaw-0.21.1-1.el9.i686.rpm�3�YLibRaw-0.21.1-1.el9.x86_64.rpm���H�|	����LBBBBBBBBsecurityModerate: libX11 security update��3�https://access.redhat.com/errata/RHSA-2024:2145RHSA-2024:2145RHSA-2024:2145https://access.redhat.com/security/cve/CVE-2023-43785CVE-2023-43785CVE-2023-43785https://access.redhat.com/security/cve/CVE-2023-43786CVE-2023-43786CVE-2023-43786https://access.redhat.com/security/cve/CVE-2023-43787CVE-2023-43787CVE-2023-43787https://bugzilla.redhat.com/22422522242252https://bugzilla.redhat.com/22422532242253https://bugzilla.redhat.com/22422542242254https://errata.almalinux.org/9/ALSA-2024-2145.htmlALSA-2024:2145ALSA-2024:2145
�*�0libX11-devel-1.7.0-9.el9.i686.rpm�)�0libX11-1.7.0-9.el9.x86_64.rpm�*�0libX11-devel-1.7.0-9.el9.x86_64.rpm�v�0libX11-common-1.7.0-9.el9.noarch.rpm�)�0libX11-1.7.0-9.el9.i686.rpm�+�0libX11-xcb-1.7.0-9.el9.i686.rpm�+�0libX11-xcb-1.7.0-9.el9.x86_64.rpm�*�0libX11-devel-1.7.0-9.el9.i686.rpm�)�0libX11-1.7.0-9.el9.x86_64.rpm�*�0libX11-devel-1.7.0-9.el9.x86_64.rpm�v�0libX11-common-1.7.0-9.el9.noarch.rpm�)�0libX11-1.7.0-9.el9.i686.rpm�+�0libX11-xcb-1.7.0-9.el9.i686.rpm�+�0libX11-xcb-1.7.0-9.el9.x86_64.rpm���M�}	����WBBBBsecurityModerate: libXpm security update��P�https://access.redhat.com/errata/RHSA-2024:2146RHSA-2024:2146RHSA-2024:2146https://access.redhat.com/security/cve/CVE-2023-43788CVE-2023-43788CVE-2023-43788https://access.redhat.com/security/cve/CVE-2023-43789CVE-2023-43789CVE-2023-43789https://bugzilla.redhat.com/22422482242248https://bugzilla.redhat.com/22422492242249https://errata.almalinux.org/9/ALSA-2024-2146.htmlALSA-2024:2146ALSA-2024:2146
�-�xlibXpm-devel-3.5.13-10.el9.i686.rpm�,�xlibXpm-3.5.13-10.el9.x86_64.rpm�,�xlibXpm-3.5.13-10.el9.i686.rpm�-�xlibXpm-devel-3.5.13-10.el9.x86_64.rpm�-�xlibXpm-devel-3.5.13-10.el9.i686.rpm�,�xlibXpm-3.5.13-10.el9.x86_64.rpm�,�xlibXpm-3.5.13-10.el9.i686.rpm�-�xlibXpm-devel-3.5.13-10.el9.x86_64.rpm����~	��0��^BBBBBBBBBBBBBBBBsecurityModerate: ipa security update��o�uhttps://access.redhat.com/errata/RHSA-2024:2147RHSA-2024:2147RHSA-2024:2147https://access.redhat.com/security/cve/CVE-2024-1481CVE-2024-1481CVE-2024-1481https://bugzilla.redhat.com/22621692262169https://errata.almalinux.org/9/ALSA-2024-2147.htmlALSA-2024:2147ALSA-2024:2147

�b�Bipa-client-epn-4.11.0-9.el9_4.x86_64.rpm�c�Bipa-selinux-4.11.0-9.el9_4.noarch.rpm�e�Bipa-server-trust-ad-4.11.0-9.el9_4.x86_64.rpm�a�Bipa-client-common-4.11.0-9.el9_4.noarch.rpm�c�Bipa-client-samba-4.11.0-9.el9_4.x86_64.rpm�d�Bipa-server-4.11.0-9.el9_4.x86_64.rpm�i�Bpython3-ipaserver-4.11.0-9.el9_4.noarch.rpm�h�Bpython3-ipalib-4.11.0-9.el9_4.noarch.rpm�a�Bipa-client-4.11.0-9.el9_4.x86_64.rpm�g�Bpython3-ipaclient-4.11.0-9.el9_4.noarch.rpm�d�Bipa-server-common-4.11.0-9.el9_4.noarch.rpm�b�Bipa-common-4.11.0-9.el9_4.noarch.rpm�e�Bipa-server-dns-4.11.0-9.el9_4.noarch.rpm
�b�Bipa-client-epn-4.11.0-9.el9_4.x86_64.rpm�c�Bipa-selinux-4.11.0-9.el9_4.noarch.rpm�e�Bipa-server-trust-ad-4.11.0-9.el9_4.x86_64.rpm�a�Bipa-client-common-4.11.0-9.el9_4.noarch.rpm�c�Bipa-client-samba-4.11.0-9.el9_4.x86_64.rpm�d�Bipa-server-4.11.0-9.el9_4.x86_64.rpm�i�Bpython3-ipaserver-4.11.0-9.el9_4.noarch.rpm�h�Bpython3-ipalib-4.11.0-9.el9_4.noarch.rpm�a�Bipa-client-4.11.0-9.el9_4.x86_64.rpm�g�Bpython3-ipaclient-4.11.0-9.el9_4.noarch.rpm�d�Bipa-server-common-4.11.0-9.el9_4.noarch.rpm�b�Bipa-common-4.11.0-9.el9_4.noarch.rpm�e�Bipa-server-dns-4.11.0-9.el9_4.noarch.rpm���(�	��4��qBsecurityModerate: frr security update��d�bhttps://access.redhat.com/errata/RHSA-2024:2156RHSA-2024:2156RHSA-2024:2156https://access.redhat.com/security/cve/CVE-2023-31489CVE-2023-31489CVE-2023-31489https://access.redhat.com/security/cve/CVE-2023-31490CVE-2023-31490CVE-2023-31490https://access.redhat.com/security/cve/CVE-2023-41358CVE-2023-41358CVE-2023-41358https://access.redhat.com/security/cve/CVE-2023-41359CVE-2023-41359CVE-2023-41359https://access.redhat.com/security/cve/CVE-2023-41360CVE-2023-41360CVE-2023-41360https://access.redhat.com/security/cve/CVE-2023-41909CVE-2023-41909CVE-2023-41909https://access.redhat.com/security/cve/CVE-2023-46752CVE-2023-46752CVE-2023-46752https://access.redhat.com/security/cve/CVE-2023-46753CVE-2023-46753CVE-2023-46753https://bugzilla.redhat.com/22358392235839https://bugzilla.redhat.com/22358402235840https://bugzilla.redhat.com/22358422235842https://bugzilla.redhat.com/22374162237416https://bugzilla.redhat.com/22389902238990https://bugzilla.redhat.com/22389922238992https://bugzilla.redhat.com/22463792246379https://bugzilla.redhat.com/22463812246381https://errata.almalinux.org/9/ALSA-2024-2156.htmlALSA-2024:2156ALSA-2024:2156
�9�frr-8.5.3-4.el9.x86_64.rpm�6�frr-selinux-8.5.3-4.el9.noarch.rpm�9�frr-8.5.3-4.el9.x86_64.rpm�6�frr-selinux-8.5.3-4.el9.noarch.rpm����	��6��5securityModerate: python3.11-urllib3 security update��F�3https://access.redhat.com/errata/RHSA-2024:2159RHSA-2024:2159RHSA-2024:2159https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://bugzilla.redhat.com/22424932242493https://errata.almalinux.org/9/ALSA-2024-2159.htmlALSA-2024:2159ALSA-2024:2159
�Q�3python3.11-urllib3-1.26.12-2.el9.noarch.rpm�Q�3python3.11-urllib3-1.26.12-2.el9.noarch.rpm����	��;��wBBsecurityModerate: toolbox security update��y�_https://access.redhat.com/errata/RHSA-2024:2160RHSA-2024:2160RHSA-2024:2160https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2160.htmlALSA-2024:2160ALSA-2024:2160
��ctoolbox-0.0.99.5-2.el9.x86_64.rpm�
�ctoolbox-tests-0.0.99.5-2.el9.x86_64.rpm��ctoolbox-0.0.99.5-2.el9.x86_64.rpm�
�ctoolbox-tests-0.0.99.5-2.el9.x86_64.rpm���!�	����|BBBBBBBBBBsecurityModerate: xorg-x11-server security update��X�https://access.redhat.com/errata/RHSA-2024:2169RHSA-2024:2169RHSA-2024:2169https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22447362244736https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2169.htmlALSA-2024:2169ALSA-2024:2169
��"xorg-x11-server-Xvfb-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xorg-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xnest-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xdmx-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-common-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xephyr-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xvfb-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xorg-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xnest-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xdmx-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-common-1.20.11-24.el9.x86_64.rpm��"xorg-x11-server-Xephyr-1.20.11-24.el9.x86_64.rpm���
�	����IsecurityModerate: xorg-x11-server-Xwayland security update��X�Jhttps://access.redhat.com/errata/RHSA-2024:2170RHSA-2024:2170RHSA-2024:2170https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2170.htmlALSA-2024:2170ALSA-2024:2170
��exorg-x11-server-Xwayland-22.1.9-5.el9.x86_64.rpm��exorg-x11-server-Xwayland-22.1.9-5.el9.x86_64.rpm����	����LsecurityModerate: runc security update��"�
https://access.redhat.com/errata/RHSA-2024:2180RHSA-2024:2180RHSA-2024:2180https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/22531932253193https://errata.almalinux.org/9/ALSA-2024-2180.htmlALSA-2024:2180ALSA-2024:2180
�z�#runc-1.1.12-2.el9.x86_64.rpm�z�#runc-1.1.12-2.el9.x86_64.rpm����	����OBBBsecurityModerate: libsndfile security update��)�&https://access.redhat.com/errata/RHSA-2024:2184RHSA-2024:2184RHSA-2024:2184https://access.redhat.com/security/cve/CVE-2022-33065CVE-2022-33065CVE-2022-33065https://bugzilla.redhat.com/22389342238934https://errata.almalinux.org/9/ALSA-2024-2184.htmlALSA-2024:2184ALSA-2024:2184
�c�_libsndfile-1.0.31-8.el9.x86_64.rpm�c�_libsndfile-1.0.31-8.el9.i686.rpm�}�_libsndfile-utils-1.0.31-8.el9.x86_64.rpm�c�_libsndfile-1.0.31-8.el9.x86_64.rpm�c�_libsndfile-1.0.31-8.el9.i686.rpm�}�_libsndfile-utils-1.0.31-8.el9.x86_64.rpm���J�	����UBBBBBBBsecurityModerate: podman security update��O�thttps://access.redhat.com/errata/RHSA-2024:2193RHSA-2024:2193RHSA-2024:2193https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2193.htmlALSA-2024:2193ALSA-2024:2193
h�podman-docker-4.9.4-0.1.el9.noarch.rpm�3�podman-remote-4.9.4-0.1.el9.x86_64.rpm�2�podman-plugins-4.9.4-0.1.el9.x86_64.rpm�4�podman-tests-4.9.4-0.1.el9.x86_64.rpm�1�podman-4.9.4-0.1.el9.x86_64.rpmh�podman-docker-4.9.4-0.1.el9.noarch.rpm�3�podman-remote-4.9.4-0.1.el9.x86_64.rpm�2�podman-plugins-4.9.4-0.1.el9.x86_64.rpm�4�podman-tests-4.9.4-0.1.el9.x86_64.rpm�1�podman-4.9.4-0.1.el9.x86_64.rpm���\�	��*��_BBBBBBBBBsecurityImportant: pmix security update��C�:https://access.redhat.com/errata/RHSA-2024:2199RHSA-2024:2199RHSA-2024:2199https://access.redhat.com/security/cve/CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/22388982238898https://errata.almalinux.org/9/ALSA-2024-2199.htmlALSA-2024:2199ALSA-2024:2199
�x�pmix-devel-3.2.3-5.el9.x86_64.rpm�y�pmix-pmi-3.2.3-5.el9.i686.rpm�w�pmix-3.2.3-5.el9.x86_64.rpm�y�pmix-pmi-3.2.3-5.el9.x86_64.rpm�w�pmix-3.2.3-5.el9.i686.rpm�.�pmix-tools-3.2.3-5.el9.x86_64.rpm�x�pmix-devel-3.2.3-5.el9.i686.rpm�x�pmix-devel-3.2.3-5.el9.x86_64.rpm�y�pmix-pmi-3.2.3-5.el9.i686.rpm�w�pmix-3.2.3-5.el9.x86_64.rpm�y�pmix-pmi-3.2.3-5.el9.x86_64.rpm�w�pmix-3.2.3-5.el9.i686.rpm�.�pmix-tools-3.2.3-5.el9.x86_64.rpm�x�pmix-devel-3.2.3-5.el9.i686.rpm����	��3��kBBBBBBsecurityModerate: libnbd security update��}�<https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204
�A�Wlibnbd-1.18.1-3.el9.x86_64.rpm��Wpython3-libnbd-1.18.1-3.el9.x86_64.rpm��Wnbdfuse-1.18.1-3.el9.x86_64.rpm�{�Wlibnbd-bash-completion-1.18.1-3.el9.noarch.rpm�A�Wlibnbd-1.18.1-3.el9.i686.rpm�A�Wlibnbd-1.18.1-3.el9.x86_64.rpm��Wpython3-libnbd-1.18.1-3.el9.x86_64.rpm��Wnbdfuse-1.18.1-3.el9.x86_64.rpm�{�Wlibnbd-bash-completion-1.18.1-3.el9.noarch.rpm�A�Wlibnbd-1.18.1-3.el9.i686.rpm���6�		��<��tBBBBBBsecurityModerate: freerdp security update��9�ihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208
��jfreerdp-2.11.2-1.el9.x86_64.rpm�h�jlibwinpr-2.11.2-1.el9.i686.rpm�`�jfreerdp-libs-2.11.2-1.el9.x86_64.rpm�h�jlibwinpr-2.11.2-1.el9.x86_64.rpm�`�jfreerdp-libs-2.11.2-1.el9.i686.rpm��jfreerdp-2.11.2-1.el9.x86_64.rpm�h�jlibwinpr-2.11.2-1.el9.i686.rpm�`�jfreerdp-libs-2.11.2-1.el9.x86_64.rpm�h�jlibwinpr-2.11.2-1.el9.x86_64.rpm�`�jfreerdp-libs-2.11.2-1.el9.i686.rpm���2�
	��?��}securityModerate: tcpdump security update��"�hhttps://access.redhat.com/errata/RHSA-2024:2211RHSA-2024:2211RHSA-2024:2211https://access.redhat.com/security/cve/CVE-2021-41043CVE-2021-41043CVE-2021-41043https://bugzilla.redhat.com/20403922040392https://errata.almalinux.org/9/ALSA-2024-2211.htmlALSA-2024:2211ALSA-2024:2211
�V�tcpdump-4.99.0-9.el9.x86_64.rpm�V�tcpdump-4.99.0-9.el9.x86_64.rpm����	����@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: pcp security update��
�Mhttps://access.redhat.com/errata/RHSA-2024:2213RHSA-2024:2213RHSA-2024:2213https://access.redhat.com/security/cve/CVE-2023-6917CVE-2023-6917CVE-2023-6917https://bugzilla.redhat.com/22549832254983https://errata.almalinux.org/9/ALSA-2024-2213.htmlALSA-2024:2213ALSA-2024:2213
l�Apcp-selinux-6.2.0-1.el9.x86_64.rpm�pcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpm�>pcp-pmda-weblog-6.2.0-1.el9.x86_64.rpm�*pcp-pmda-podman-6.2.0-1.el9.x86_64.rpm�{pcp-pmda-bind2-6.2.0-1.el9.x86_64.rpm�pcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpm�pcp-pmda-memcache-6.2.0-1.el9.x86_64.rpm�pcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpm�pcp-pmda-dm-6.2.0-1.el9.x86_64.rpm�tpcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpm�upcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpm�5pcp-pmda-slurm-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mysql-6.2.0-1.el9.x86_64.rpm�gpcp-conf-6.2.0-1.el9.x86_64.rpm�>pcp-testsuite-6.2.0-1.el9.x86_64.rpm�'pcp-pmda-oracle-6.2.0-1.el9.x86_64.rpm�$pcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpm�Gperl-PCP-PMDA-6.2.0-1.el9.x86_64.rpm�Eperl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpm�pcp-pmda-named-6.2.0-1.el9.x86_64.rpm�?pcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpm�"pcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpm�
pcp-pmda-gluster-6.2.0-1.el9.x86_64.rpm�;pcp-devel-6.2.0-1.el9.i686.rpm�hpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpm�ipcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpm�Cpcp-zeroconf-6.2.0-1.el9.x86_64.rpm�~pcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpm�0pcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpm�)pcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm�Ipython3-pcp-6.2.0-1.el9.x86_64.rpm�1pcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpm�pcp-pmda-json-6.2.0-1.el9.x86_64.rpm�npcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpm�pcp-pmda-farm-6.2.0-1.el9.x86_64.rpm�,pcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpm�ppcp-geolocate-6.2.0-1.el9.x86_64.rpm�pcp-pmda-cisco-6.2.0-1.el9.x86_64.rpm�9pcp-pmda-statsd-6.2.0-1.el9.x86_64.rpm�;pcp-devel-6.2.0-1.el9.x86_64.rpm�fpcp-6.2.0-1.el9.x86_64.rpm�.pcp-pmda-redis-6.2.0-1.el9.x86_64.rpm�#pcp-pmda-nginx-6.2.0-1.el9.x86_64.rpm�rpcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpm�6pcp-pmda-smart-6.2.0-1.el9.x86_64.rpm�Kpcp-doc-6.2.0-1.el9.noarch.rpm�(pcp-pmda-pdns-6.2.0-1.el9.x86_64.rpm�/pcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpm�=pcp-libs-devel-6.2.0-1.el9.x86_64.rpm�2pcp-pmda-samba-6.2.0-1.el9.x86_64.rpm�pcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpm�pcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpm�kpcp-export-pcp2json-6.2.0-1.el9.x86_64.rpm�zpcp-pmda-bcc-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpm�=pcp-libs-devel-6.2.0-1.el9.i686.rpm�<pcp-libs-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lio-6.2.0-1.el9.x86_64.rpm�pcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpm�4pcp-pmda-shping-6.2.0-1.el9.x86_64.rpm�spcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpm�|pcp-pmda-bonding-6.2.0-1.el9.x86_64.rpm� pcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpm�=pcp-pmda-unbound-6.2.0-1.el9.x86_64.rpm�Bpcp-system-tools-6.2.0-1.el9.x86_64.rpm�pcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpm�3pcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpm�pcp-pmda-docker-6.2.0-1.el9.x86_64.rpm�mpcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mounts-6.2.0-1.el9.x86_64.rpm�pcp-pmda-denki-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mssql-6.2.0-1.el9.x86_64.rpm�lpcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpm�vpcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpm�wpcp-pmda-activemq-6.2.0-1.el9.x86_64.rpm�<pcp-pmda-trace-6.2.0-1.el9.x86_64.rpm�;pcp-pmda-systemd-6.2.0-1.el9.x86_64.rpm�xpcp-pmda-apache-6.2.0-1.el9.x86_64.rpm�%pcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpm�Fperl-PCP-MMV-6.2.0-1.el9.x86_64.rpm�7pcp-pmda-snmp-6.2.0-1.el9.x86_64.rpm�opcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpm�ypcp-pmda-bash-6.2.0-1.el9.x86_64.rpm�pcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpm�!pcp-pmda-news-6.2.0-1.el9.x86_64.rpm�:pcp-pmda-summary-6.2.0-1.el9.x86_64.rpm�pcp-pmda-ds389-6.2.0-1.el9.x86_64.rpm�@pcp-pmda-zswap-6.2.0-1.el9.x86_64.rpm�}pcp-pmda-bpf-6.2.0-1.el9.x86_64.rpm�
pcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpm�&pcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpm�qpcp-gui-6.2.0-1.el9.x86_64.rpm�pcp-pmda-logger-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mailq-6.2.0-1.el9.x86_64.rpm�8pcp-pmda-sockets-6.2.0-1.el9.x86_64.rpm�pcp-pmda-dbping-6.2.0-1.el9.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpm�pcp-pmda-cifs-6.2.0-1.el9.x86_64.rpm�>pcp-testsuite-6.2.0-1.el9.i686.rpm�<pcp-libs-6.2.0-1.el9.i686.rpm�+pcp-pmda-postfix-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lustre-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mic-6.2.0-1.el9.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpm�Dperl-PCP-LogImport-6.2.0-1.el9.x86_64.rpm�	pcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpml�Apcp-selinux-6.2.0-1.el9.x86_64.rpm�pcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpm�>pcp-pmda-weblog-6.2.0-1.el9.x86_64.rpm�*pcp-pmda-podman-6.2.0-1.el9.x86_64.rpm�{pcp-pmda-bind2-6.2.0-1.el9.x86_64.rpm�pcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpm�pcp-pmda-memcache-6.2.0-1.el9.x86_64.rpm�pcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpm�pcp-pmda-dm-6.2.0-1.el9.x86_64.rpm�tpcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpm�upcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpm�5pcp-pmda-slurm-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mysql-6.2.0-1.el9.x86_64.rpm�gpcp-conf-6.2.0-1.el9.x86_64.rpm�>pcp-testsuite-6.2.0-1.el9.x86_64.rpm�'pcp-pmda-oracle-6.2.0-1.el9.x86_64.rpm�$pcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpm�Gperl-PCP-PMDA-6.2.0-1.el9.x86_64.rpm�Eperl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpm�pcp-pmda-named-6.2.0-1.el9.x86_64.rpm�?pcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpm�"pcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpm�
pcp-pmda-gluster-6.2.0-1.el9.x86_64.rpm�;pcp-devel-6.2.0-1.el9.i686.rpm�hpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpm�ipcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpm�Cpcp-zeroconf-6.2.0-1.el9.x86_64.rpm�~pcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpm�0pcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpm�)pcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm�Ipython3-pcp-6.2.0-1.el9.x86_64.rpm�1pcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpm�pcp-pmda-json-6.2.0-1.el9.x86_64.rpm�npcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpm�pcp-pmda-farm-6.2.0-1.el9.x86_64.rpm�,pcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpm�ppcp-geolocate-6.2.0-1.el9.x86_64.rpm�pcp-pmda-cisco-6.2.0-1.el9.x86_64.rpm�9pcp-pmda-statsd-6.2.0-1.el9.x86_64.rpm�;pcp-devel-6.2.0-1.el9.x86_64.rpm�fpcp-6.2.0-1.el9.x86_64.rpm�.pcp-pmda-redis-6.2.0-1.el9.x86_64.rpm�#pcp-pmda-nginx-6.2.0-1.el9.x86_64.rpm�rpcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpm�6pcp-pmda-smart-6.2.0-1.el9.x86_64.rpm�Kpcp-doc-6.2.0-1.el9.noarch.rpm�(pcp-pmda-pdns-6.2.0-1.el9.x86_64.rpm�/pcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpm�=pcp-libs-devel-6.2.0-1.el9.x86_64.rpm�2pcp-pmda-samba-6.2.0-1.el9.x86_64.rpm�pcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpm�pcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpm�kpcp-export-pcp2json-6.2.0-1.el9.x86_64.rpm�zpcp-pmda-bcc-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpm�=pcp-libs-devel-6.2.0-1.el9.i686.rpm�<pcp-libs-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lio-6.2.0-1.el9.x86_64.rpm�pcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpm�4pcp-pmda-shping-6.2.0-1.el9.x86_64.rpm�spcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpm�|pcp-pmda-bonding-6.2.0-1.el9.x86_64.rpm� pcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpm�=pcp-pmda-unbound-6.2.0-1.el9.x86_64.rpm�Bpcp-system-tools-6.2.0-1.el9.x86_64.rpm�pcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpm�3pcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpm�pcp-pmda-docker-6.2.0-1.el9.x86_64.rpm�mpcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mounts-6.2.0-1.el9.x86_64.rpm�pcp-pmda-denki-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mssql-6.2.0-1.el9.x86_64.rpm�lpcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpm�vpcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpm�wpcp-pmda-activemq-6.2.0-1.el9.x86_64.rpm�<pcp-pmda-trace-6.2.0-1.el9.x86_64.rpm�;pcp-pmda-systemd-6.2.0-1.el9.x86_64.rpm�xpcp-pmda-apache-6.2.0-1.el9.x86_64.rpm�%pcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpm�Fperl-PCP-MMV-6.2.0-1.el9.x86_64.rpm�7pcp-pmda-snmp-6.2.0-1.el9.x86_64.rpm�opcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpm�ypcp-pmda-bash-6.2.0-1.el9.x86_64.rpm�pcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpm�!pcp-pmda-news-6.2.0-1.el9.x86_64.rpm�:pcp-pmda-summary-6.2.0-1.el9.x86_64.rpm�pcp-pmda-ds389-6.2.0-1.el9.x86_64.rpm�@pcp-pmda-zswap-6.2.0-1.el9.x86_64.rpm�}pcp-pmda-bpf-6.2.0-1.el9.x86_64.rpm�
pcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpm�&pcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpm�qpcp-gui-6.2.0-1.el9.x86_64.rpm�pcp-pmda-logger-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mailq-6.2.0-1.el9.x86_64.rpm�8pcp-pmda-sockets-6.2.0-1.el9.x86_64.rpm�pcp-pmda-dbping-6.2.0-1.el9.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpm�pcp-pmda-cifs-6.2.0-1.el9.x86_64.rpm�>pcp-testsuite-6.2.0-1.el9.i686.rpm�<pcp-libs-6.2.0-1.el9.i686.rpm�+pcp-pmda-postfix-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lustre-6.2.0-1.el9.x86_64.rpm�pcp-pmda-mic-6.2.0-1.el9.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpm�pcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpm�Dperl-PCP-LogImport-6.2.0-1.el9.x86_64.rpm�	pcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpm���Y�	����TBBBBsecurityModerate: motif security update��W�$https://access.redhat.com/errata/RHSA-2024:2217RHSA-2024:2217RHSA-2024:2217https://access.redhat.com/security/cve/CVE-2023-43788CVE-2023-43788CVE-2023-43788https://access.redhat.com/security/cve/CVE-2023-43789CVE-2023-43789CVE-2023-43789https://bugzilla.redhat.com/22422482242248https://bugzilla.redhat.com/22422492242249https://errata.almalinux.org/9/ALSA-2024-2217.htmlALSA-2024:2217ALSA-2024:2217
�k�bmotif-2.3.4-28.el9.i686.rpm�l�bmotif-devel-2.3.4-28.el9.i686.rpm�l�bmotif-devel-2.3.4-28.el9.x86_64.rpm�k�bmotif-2.3.4-28.el9.x86_64.rpm�k�bmotif-2.3.4-28.el9.i686.rpm�l�bmotif-devel-2.3.4-28.el9.i686.rpm�l�bmotif-devel-2.3.4-28.el9.x86_64.rpm�k�bmotif-2.3.4-28.el9.x86_64.rpm����
	����[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: perl security update��{�3https://access.redhat.com/errata/RHSA-2024:2228RHSA-2024:2228RHSA-2024:2228https://access.redhat.com/security/cve/CVE-2023-47038CVE-2023-47038CVE-2023-47038https://bugzilla.redhat.com/22495232249523https://errata.almalinux.org/9/ALSA-2024-2228.htmlALSA-2024:2228ALSA-2024:2228
f��Hperl-NDBM_File-1.15-481.el9.x86_64.rpm��Wperl-Net-1.02-481.el9.noarch.rpm�k�perl-ExtUtils-Constant-0.25-481.el9.noarch.rpm�z�0perl-IPC-Open3-1.21-481.el9.noarch.rpm�_�perl-Attribute-Handlers-1.01-481.el9.noarch.rpm� �Fperl-libnetcfg-5.32.1-481.el9.noarch.rpm��	perl-less-0.03-481.el9.noarch.rpm�a�6perl-AutoSplit-5.74-481.el9.noarch.rpm�+�
perl-vars-1.05-481.el9.noarch.rpm�g�perl-Devel-SelfStubber-1.06-481.el9.noarch.rpm��"perl-Tie-Memoize-1.1-481.el9.noarch.rpm�
�jperl-Thread-Semaphore-2.13-481.el9.noarch.rpm�l�=perl-ExtUtils-Embed-1.35-481.el9.noarch.rpm�'�Fperl-interpreter-5.32.1-481.el9.x86_64.rpm�x�Wperl-I18N-Collate-1.02-481.el9.noarch.rpm�t�dperl-FileHandle-2.03-481.el9.noarch.rpm�s�%perl-FileCache-1.10-481.el9.noarch.rpm��perl-filetest-1.03-481.el9.noarch.rpm�&�{perl-overloading-0.02-481.el9.noarch.rpm�t�Fperl-libs-5.32.1-481.el9.x86_64.rpm�"�kperl-POSIX-1.94-481.el9.x86_64.rpm��Rperl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm��Wperl-Text-Abbrev-1.02-481.el9.noarch.rpm��bperl-DynaLoader-1.47-481.el9.x86_64.rpm�}�perl-Memoize-1.03-481.el9.noarch.rpm�h�
perl-DirHandle-1.05-481.el9.noarch.rpm��1perl-Pod-Html-1.25-481.el9.noarch.rpm�~�Vperl-Module-Loaded-0.08-481.el9.noarch.rpm��!perl-Symbol-1.08-481.el9.noarch.rpm�(�Gperl-lib-0.65-481.el9.x86_64.rpm��perl-autouse-1.11-481.el9.noarch.rpm��perl-blib-1.07-481.el9.noarch.rpm�t�Fperl-libs-5.32.1-481.el9.i686.rpm�{�Wperl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm��perl-encoding-warnings-0.13-481.el9.noarch.rpm�q�perl-File-Find-1.37-481.el9.noarch.rpm�!�Xperl-locale-1.09-481.el9.noarch.rpm��$perl-Pod-Functions-1.13-481.el9.noarch.rpm��$perl-Fcntl-1.13-481.el9.x86_64.rpm��Iperl-File-DosGlob-1.12-481.el9.x86_64.rpm�d�perl-Class-Struct-0.66-481.el9.noarch.rpm�	�+perl-Term-ReadLine-1.17-481.el9.noarch.rpm�"�Fperl-macros-5.32.1-481.el9.noarch.rpm��Hperl-debugger-1.56-481.el9.noarch.rpm�v�Iperl-Getopt-Std-1.12-481.el9.noarch.rpm��perl-if-0.60.800-481.el9.noarch.rpm� �Kperl-ODBM_File-1.16-481.el9.x86_64.rpm�f�}perl-DBM_Filter-0.06-481.el9.noarch.rpm�'�Xperl-sigtrap-1.09-481.el9.noarch.rpm��perl-User-pwent-1.03-481.el9.noarch.rpm�o�&perl-File-Compare-1.100.600-481.el9.noarch.rpm��Lperl-GDBM_File-1.18-481.el9.x86_64.rpm�n�zperl-File-Basename-2.85-481.el9.noarch.rpm��uperl-Safe-2.41-481.el9.noarch.rpm��perl-Search-Dict-1.07-481.el9.noarch.rpm�`�6perl-AutoLoader-5.74-481.el9.noarch.rpm�(�eperl-sort-2.04-481.el9.noarch.rpm�i�Operl-Dumpvalue-2.27-481.el9.noarch.rpm��2perl-SelfLoader-1.26-481.el9.noarch.rpm�*�Uperl-ph-5.32.1-481.el9.x86_64.rpm��Uperl-doc-5.32.1-481.el9.noarch.rpm�r�Xperl-File-stat-1.09-481.el9.noarch.rpm�s�Fperl-devel-5.32.1-481.el9.i686.rpm��Eperl-Term-Complete-1.403-481.el9.noarch.rpm��perl-diagnostics-1.37-481.el9.noarch.rpm�m�Xperl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpm�s�Fperl-devel-5.32.1-481.el9.x86_64.rpm��Operl-fields-2.27-481.el9.noarch.rpm�#�Uperl-meta-notation-5.32.1-481.el9.noarch.rpm�b�`perl-Benchmark-1.23-481.el9.noarch.rpm��Zperl-Devel-Peek-1.28-481.el9.x86_64.rpm�*�Uperl-utils-5.32.1-481.el9.noarch.rpm��Operl-base-2.27-481.el9.noarch.rpm��perl-Thread-3.05-481.el9.noarch.rpm��fperl-B-1.80-481.el9.x86_64.rpm�)�`perl-mro-1.23-481.el9.x86_64.rpm��]perl-Errno-1.30-481.el9.x86_64.rpm�
�perl-Test-1.31-481.el9.noarch.rpm�)�perl-subs-1.03-481.el9.noarch.rpm�e�	perl-Config-Extensions-0.03-481.el9.noarch.rpm��Aperl-Hash-Util-0.23-481.el9.x86_64.rpm��perl-Time-1.03-481.el9.noarch.rpm��perl-NEXT-0.67-481.el9.noarch.rpm��|perl-deprecate-0.04-481.el9.noarch.rpm�%�perl-overload-1.31-481.el9.noarch.rpm�$�`perl-Sys-Hostname-1.23-481.el9.x86_64.rpm�|�Iperl-Math-Complex-1.59-481.el9.noarch.rpm�!�cperl-Opcode-1.48-481.el9.x86_64.rpm�y�perl-I18N-LangTags-0.44-481.el9.noarch.rpm��Fperl-5.32.1-481.el9.x86_64.rpm��Wperl-SelectSaver-1.02-481.el9.noarch.rpm�p�tperl-File-Copy-2.34-481.el9.noarch.rpm��perl-Tie-4.6-481.el9.noarch.rpm�u�Gperl-FindBin-1.51-481.el9.noarch.rpm��perl-Tie-File-1.06-481.el9.noarch.rpm��>perl-I18N-Langinfo-0.19-481.el9.x86_64.rpm�$�Iperl-open-1.12-481.el9.noarch.rpm��aperl-IO-1.43-481.el9.x86_64.rpm�,� perl-vmsish-1.04-481.el9.noarch.rpm��perl-Unicode-UCD-0.75-481.el9.noarch.rpm�j�perl-English-1.11-481.el9.noarch.rpm�%�^perl-Time-Piece-1.3401-481.el9.x86_64.rpmf��Hperl-NDBM_File-1.15-481.el9.x86_64.rpm��Wperl-Net-1.02-481.el9.noarch.rpm�k�perl-ExtUtils-Constant-0.25-481.el9.noarch.rpm�z�0perl-IPC-Open3-1.21-481.el9.noarch.rpm�_�perl-Attribute-Handlers-1.01-481.el9.noarch.rpm� �Fperl-libnetcfg-5.32.1-481.el9.noarch.rpm��	perl-less-0.03-481.el9.noarch.rpm�a�6perl-AutoSplit-5.74-481.el9.noarch.rpm�+�
perl-vars-1.05-481.el9.noarch.rpm�g�perl-Devel-SelfStubber-1.06-481.el9.noarch.rpm��"perl-Tie-Memoize-1.1-481.el9.noarch.rpm�
�jperl-Thread-Semaphore-2.13-481.el9.noarch.rpm�l�=perl-ExtUtils-Embed-1.35-481.el9.noarch.rpm�'�Fperl-interpreter-5.32.1-481.el9.x86_64.rpm�x�Wperl-I18N-Collate-1.02-481.el9.noarch.rpm�t�dperl-FileHandle-2.03-481.el9.noarch.rpm�s�%perl-FileCache-1.10-481.el9.noarch.rpm��perl-filetest-1.03-481.el9.noarch.rpm�&�{perl-overloading-0.02-481.el9.noarch.rpm�t�Fperl-libs-5.32.1-481.el9.x86_64.rpm�"�kperl-POSIX-1.94-481.el9.x86_64.rpm��Rperl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm��Wperl-Text-Abbrev-1.02-481.el9.noarch.rpm��bperl-DynaLoader-1.47-481.el9.x86_64.rpm�}�perl-Memoize-1.03-481.el9.noarch.rpm�h�
perl-DirHandle-1.05-481.el9.noarch.rpm��1perl-Pod-Html-1.25-481.el9.noarch.rpm�~�Vperl-Module-Loaded-0.08-481.el9.noarch.rpm��!perl-Symbol-1.08-481.el9.noarch.rpm�(�Gperl-lib-0.65-481.el9.x86_64.rpm��perl-autouse-1.11-481.el9.noarch.rpm��perl-blib-1.07-481.el9.noarch.rpm�t�Fperl-libs-5.32.1-481.el9.i686.rpm�{�Wperl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm��perl-encoding-warnings-0.13-481.el9.noarch.rpm�q�perl-File-Find-1.37-481.el9.noarch.rpm�!�Xperl-locale-1.09-481.el9.noarch.rpm��$perl-Pod-Functions-1.13-481.el9.noarch.rpm��$perl-Fcntl-1.13-481.el9.x86_64.rpm��Iperl-File-DosGlob-1.12-481.el9.x86_64.rpm�d�perl-Class-Struct-0.66-481.el9.noarch.rpm�	�+perl-Term-ReadLine-1.17-481.el9.noarch.rpm�"�Fperl-macros-5.32.1-481.el9.noarch.rpm��Hperl-debugger-1.56-481.el9.noarch.rpm�v�Iperl-Getopt-Std-1.12-481.el9.noarch.rpm��perl-if-0.60.800-481.el9.noarch.rpm� �Kperl-ODBM_File-1.16-481.el9.x86_64.rpm�f�}perl-DBM_Filter-0.06-481.el9.noarch.rpm�'�Xperl-sigtrap-1.09-481.el9.noarch.rpm��perl-User-pwent-1.03-481.el9.noarch.rpm�o�&perl-File-Compare-1.100.600-481.el9.noarch.rpm��Lperl-GDBM_File-1.18-481.el9.x86_64.rpm�n�zperl-File-Basename-2.85-481.el9.noarch.rpm��uperl-Safe-2.41-481.el9.noarch.rpm��perl-Search-Dict-1.07-481.el9.noarch.rpm�`�6perl-AutoLoader-5.74-481.el9.noarch.rpm�(�eperl-sort-2.04-481.el9.noarch.rpm�i�Operl-Dumpvalue-2.27-481.el9.noarch.rpm��2perl-SelfLoader-1.26-481.el9.noarch.rpm�*�Uperl-ph-5.32.1-481.el9.x86_64.rpm��Uperl-doc-5.32.1-481.el9.noarch.rpm�r�Xperl-File-stat-1.09-481.el9.noarch.rpm�s�Fperl-devel-5.32.1-481.el9.i686.rpm��Eperl-Term-Complete-1.403-481.el9.noarch.rpm��perl-diagnostics-1.37-481.el9.noarch.rpm�m�Xperl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpm�s�Fperl-devel-5.32.1-481.el9.x86_64.rpm��Operl-fields-2.27-481.el9.noarch.rpm�#�Uperl-meta-notation-5.32.1-481.el9.noarch.rpm�b�`perl-Benchmark-1.23-481.el9.noarch.rpm��Zperl-Devel-Peek-1.28-481.el9.x86_64.rpm�*�Uperl-utils-5.32.1-481.el9.noarch.rpm��Operl-base-2.27-481.el9.noarch.rpm��perl-Thread-3.05-481.el9.noarch.rpm��fperl-B-1.80-481.el9.x86_64.rpm�)�`perl-mro-1.23-481.el9.x86_64.rpm��]perl-Errno-1.30-481.el9.x86_64.rpm�
�perl-Test-1.31-481.el9.noarch.rpm�)�perl-subs-1.03-481.el9.noarch.rpm�e�	perl-Config-Extensions-0.03-481.el9.noarch.rpm��Aperl-Hash-Util-0.23-481.el9.x86_64.rpm��perl-Time-1.03-481.el9.noarch.rpm��perl-NEXT-0.67-481.el9.noarch.rpm��|perl-deprecate-0.04-481.el9.noarch.rpm�%�perl-overload-1.31-481.el9.noarch.rpm�$�`perl-Sys-Hostname-1.23-481.el9.x86_64.rpm�|�Iperl-Math-Complex-1.59-481.el9.noarch.rpm�!�cperl-Opcode-1.48-481.el9.x86_64.rpm�y�perl-I18N-LangTags-0.44-481.el9.noarch.rpm��Fperl-5.32.1-481.el9.x86_64.rpm��Wperl-SelectSaver-1.02-481.el9.noarch.rpm�p�tperl-File-Copy-2.34-481.el9.noarch.rpm��perl-Tie-4.6-481.el9.noarch.rpm�u�Gperl-FindBin-1.51-481.el9.noarch.rpm��perl-Tie-File-1.06-481.el9.noarch.rpm��>perl-I18N-Langinfo-0.19-481.el9.x86_64.rpm�$�Iperl-open-1.12-481.el9.noarch.rpm��aperl-IO-1.43-481.el9.x86_64.rpm�,� perl-vmsish-1.04-481.el9.noarch.rpm��perl-Unicode-UCD-0.75-481.el9.noarch.rpm�j�perl-English-1.11-481.el9.noarch.rpm�%�^perl-Time-Piece-1.3401-481.el9.x86_64.rpm����	����ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update��.�https://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236
�E6libvirt-daemon-lock-10.0.0-6.el9_4.alma.1.x86_64.rpm�m6libvirt-daemon-driver-nodedev-10.0.0-6.el9_4.alma.1.x86_64.rpm�n6libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm�o6libvirt-daemon-driver-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm�w6libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4.alma.1.x86_64.rpm�F6libvirt-daemon-log-10.0.0-6.el9_4.alma.1.x86_64.rpm�q6libvirt-daemon-driver-storage-10.0.0-6.el9_4.alma.1.x86_64.rpm�D6libvirt-daemon-common-10.0.0-6.el9_4.alma.1.x86_64.rpm�l6libvirt-daemon-driver-network-10.0.0-6.el9_4.alma.1.x86_64.rpm�h6libvirt-daemon-10.0.0-6.el9_4.alma.1.x86_64.rpm�z6libvirt-libs-10.0.0-6.el9_4.alma.1.x86_64.rpm�c6libvirt-client-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm�G6libvirt-daemon-plugin-lockd-10.0.0-6.el9_4.alma.1.x86_64.rpm�p6libvirt-daemon-driver-secret-10.0.0-6.el9_4.alma.1.x86_64.rpm�t6libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4.alma.1.x86_64.rpm�v6libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4.alma.1.x86_64.rpm�H6libvirt-daemon-proxy-10.0.0-6.el9_4.alma.1.x86_64.rpm�y6libvirt-daemon-kvm-10.0.0-6.el9_4.alma.1.x86_64.rpm�g6libvirt-client-10.0.0-6.el9_4.alma.1.x86_64.rpm�k6libvirt-daemon-driver-interface-10.0.0-6.el9_4.alma.1.x86_64.rpm�i6libvirt-daemon-config-network-10.0.0-6.el9_4.alma.1.x86_64.rpm�r6libvirt-daemon-driver-storage-core-10.0.0-6.el9_4.alma.1.x86_64.rpm�{6libvirt-nss-10.0.0-6.el9_4.alma.1.x86_64.rpm�f6libvirt-10.0.0-6.el9_4.alma.1.x86_64.rpm�s6libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4.alma.1.x86_64.rpm�j6libvirt-daemon-config-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm�u6libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4.alma.1.x86_64.rpm�x6libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4.alma.1.x86_64.rpm�E6libvirt-daemon-lock-10.0.0-6.el9_4.alma.1.x86_64.rpm�m6libvirt-daemon-driver-nodedev-10.0.0-6.el9_4.alma.1.x86_64.rpm�n6libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm�o6libvirt-daemon-driver-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm�w6libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4.alma.1.x86_64.rpm�F6libvirt-daemon-log-10.0.0-6.el9_4.alma.1.x86_64.rpm�q6libvirt-daemon-driver-storage-10.0.0-6.el9_4.alma.1.x86_64.rpm�D6libvirt-daemon-common-10.0.0-6.el9_4.alma.1.x86_64.rpm�l6libvirt-daemon-driver-network-10.0.0-6.el9_4.alma.1.x86_64.rpm�h6libvirt-daemon-10.0.0-6.el9_4.alma.1.x86_64.rpm�z6libvirt-libs-10.0.0-6.el9_4.alma.1.x86_64.rpm�c6libvirt-client-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm�G6libvirt-daemon-plugin-lockd-10.0.0-6.el9_4.alma.1.x86_64.rpm�p6libvirt-daemon-driver-secret-10.0.0-6.el9_4.alma.1.x86_64.rpm�t6libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4.alma.1.x86_64.rpm�v6libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4.alma.1.x86_64.rpm�H6libvirt-daemon-proxy-10.0.0-6.el9_4.alma.1.x86_64.rpm�y6libvirt-daemon-kvm-10.0.0-6.el9_4.alma.1.x86_64.rpm�g6libvirt-client-10.0.0-6.el9_4.alma.1.x86_64.rpm�k6libvirt-daemon-driver-interface-10.0.0-6.el9_4.alma.1.x86_64.rpm�i6libvirt-daemon-config-network-10.0.0-6.el9_4.alma.1.x86_64.rpm�r6libvirt-daemon-driver-storage-core-10.0.0-6.el9_4.alma.1.x86_64.rpm�{6libvirt-nss-10.0.0-6.el9_4.alma.1.x86_64.rpm�f6libvirt-10.0.0-6.el9_4.alma.1.x86_64.rpm�s6libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4.alma.1.x86_64.rpm�j6libvirt-daemon-config-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm�u6libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4.alma.1.x86_64.rpm�x6libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4.alma.1.x86_64.rpm���|�	����SBBsecurityModerate: skopeo security update��D�\https://access.redhat.com/errata/RHSA-2024:2239RHSA-2024:2239RHSA-2024:2239https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://errata.almalinux.org/9/ALSA-2024-2239.htmlALSA-2024:2239ALSA-2024:2239
�d�2skopeo-tests-1.14.3-0.1.el9.x86_64.rpm�c�2skopeo-1.14.3-0.1.el9.x86_64.rpm�d�2skopeo-tests-1.14.3-0.1.el9.x86_64.rpm�c�2skopeo-1.14.3-0.1.el9.x86_64.rpm����	����XBBsecurityModerate: buildah security update�� �
https://access.redhat.com/errata/RHSA-2024:2245RHSA-2024:2245RHSA-2024:2245https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2245.htmlALSA-2024:2245ALSA-2024:2245
�/�=buildah-1.33.6-2.el9.x86_64.rpm�0�=buildah-tests-1.33.6-2.el9.x86_64.rpm�/�=buildah-1.33.6-2.el9.x86_64.rpm�0�=buildah-tests-1.33.6-2.el9.x86_64.rpm���D�	��!��]BBsecurityModerate: ansible-core bug fix, enhancement, and security update��*�https://access.redhat.com/errata/RHSA-2024:2246RHSA-2024:2246RHSA-2024:2246https://access.redhat.com/security/cve/CVE-2024-0690CVE-2024-0690CVE-2024-0690https://bugzilla.redhat.com/22590132259013https://errata.almalinux.org/9/ALSA-2024-2246.htmlALSA-2024:2246ALSA-2024:2246
�n�ansible-core-2.14.14-1.el9.x86_64.rpm�o�ansible-test-2.14.14-1.el9.x86_64.rpm�n�ansible-core-2.14.14-1.el9.x86_64.rpm�o�ansible-test-2.14.14-1.el9.x86_64.rpm���'�	��#��"securityImportant: edk2 security update��<�jhttps://access.redhat.com/errata/RHSA-2024:2264RHSA-2024:2264RHSA-2024:2264https://access.redhat.com/security/cve/CVE-2022-36763CVE-2022-36763CVE-2022-36763https://access.redhat.com/security/cve/CVE-2022-36764CVE-2022-36764CVE-2022-36764https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-45229CVE-2023-45229CVE-2023-45229https://access.redhat.com/security/cve/CVE-2023-45231CVE-2023-45231CVE-2023-45231https://access.redhat.com/security/cve/CVE-2023-45232CVE-2023-45232CVE-2023-45232https://access.redhat.com/security/cve/CVE-2023-45233CVE-2023-45233CVE-2023-45233https://access.redhat.com/security/cve/CVE-2023-45235CVE-2023-45235CVE-2023-45235https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22575822257582https://bugzilla.redhat.com/22575832257583https://bugzilla.redhat.com/22586772258677https://bugzilla.redhat.com/22586882258688https://bugzilla.redhat.com/22586912258691https://bugzilla.redhat.com/22586942258694https://bugzilla.redhat.com/22587002258700https://errata.almalinux.org/9/ALSA-2024-2264.htmlALSA-2024:2264ALSA-2024:2264
�g�~edk2-ovmf-20231122-6.el9.noarch.rpm�g�~edk2-ovmf-20231122-6.el9.noarch.rpm���U�	��&��dsecurityModerate: containernetworking-plugins security update��&�https://access.redhat.com/errata/RHSA-2024:2272RHSA-2024:2272RHSA-2024:2272https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2272.htmlALSA-2024:2272ALSA-2024:2272
�_�containernetworking-plugins-1.4.0-2.el9_4.x86_64.rpm�_�containernetworking-plugins-1.4.0-2.el9_4.x86_64.rpm����	����gBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5-qtbase security update��,�shttps://access.redhat.com/errata/RHSA-2024:2276RHSA-2024:2276RHSA-2024:2276https://access.redhat.com/security/cve/CVE-2023-51714CVE-2023-51714CVE-2023-51714https://access.redhat.com/security/cve/CVE-2024-25580CVE-2024-25580CVE-2024-25580https://bugzilla.redhat.com/22558562255856https://bugzilla.redhat.com/22644232264423https://errata.almalinux.org/9/ALSA-2024-2276.htmlALSA-2024:2276ALSA-2024:2276
�C�qt5-qtbase-5.15.9-9.el9.i686.rpm�E�qt5-qtbase-examples-5.15.9-9.el9.i686.rpm�F�qt5-qtbase-gui-5.15.9-9.el9.i686.rpm�C�qt5-qtbase-5.15.9-9.el9.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-9.el9.x86_64.rpm�E�qt5-qtbase-examples-5.15.9-9.el9.x86_64.rpm�I�qt5-qtbase-postgresql-5.15.9-9.el9.i686.rpm�F�qt5-qtbase-gui-5.15.9-9.el9.x86_64.rpm�D�qt5-qtbase-devel-5.15.9-9.el9.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-9.el9.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-9.el9.i686.rpm�D�qt5-qtbase-devel-5.15.9-9.el9.i686.rpm�G�qt5-qtbase-mysql-5.15.9-9.el9.i686.rpm�R�qt5-qtbase-common-5.15.9-9.el9.noarch.rpm�G�qt5-qtbase-mysql-5.15.9-9.el9.x86_64.rpm�I�qt5-qtbase-postgresql-5.15.9-9.el9.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-9.el9.i686.rpm�C�qt5-qtbase-5.15.9-9.el9.i686.rpm�E�qt5-qtbase-examples-5.15.9-9.el9.i686.rpm�F�qt5-qtbase-gui-5.15.9-9.el9.i686.rpm�C�qt5-qtbase-5.15.9-9.el9.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-9.el9.x86_64.rpm�E�qt5-qtbase-examples-5.15.9-9.el9.x86_64.rpm�I�qt5-qtbase-postgresql-5.15.9-9.el9.i686.rpm�F�qt5-qtbase-gui-5.15.9-9.el9.x86_64.rpm�D�qt5-qtbase-devel-5.15.9-9.el9.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-9.el9.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-9.el9.i686.rpm�D�qt5-qtbase-devel-5.15.9-9.el9.i686.rpm�G�qt5-qtbase-mysql-5.15.9-9.el9.i686.rpm�R�qt5-qtbase-common-5.15.9-9.el9.noarch.rpm�G�qt5-qtbase-mysql-5.15.9-9.el9.x86_64.rpm�I�qt5-qtbase-postgresql-5.15.9-9.el9.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-9.el9.i686.rpm����	����ABBBBBBBBBBBBBBBBBBsecurityModerate: httpd security update���https://access.redhat.com/errata/RHSA-2024:2278RHSA-2024:2278RHSA-2024:2278https://access.redhat.com/security/cve/CVE-2023-31122CVE-2023-31122CVE-2023-31122https://bugzilla.redhat.com/22453322245332https://errata.almalinux.org/9/ALSA-2024-2278.htmlALSA-2024:2278ALSA-2024:2278
�P�rmod_session-2.4.57-8.el9.x86_64.rpm�A�rhttpd-core-2.4.57-8.el9.x86_64.rpm�}�rhttpd-filesystem-2.4.57-8.el9.noarch.rpm�N�rmod_lua-2.4.57-8.el9.x86_64.rpm�B�rhttpd-devel-2.4.57-8.el9.x86_64.rpm�Q�!mod_ssl-2.4.57-8.el9.x86_64.rpm�C�rhttpd-tools-2.4.57-8.el9.x86_64.rpm�@�rhttpd-2.4.57-8.el9.x86_64.rpm�O�!mod_proxy_html-2.4.57-8.el9.x86_64.rpm�M�rmod_ldap-2.4.57-8.el9.x86_64.rpm�~�rhttpd-manual-2.4.57-8.el9.noarch.rpm�P�rmod_session-2.4.57-8.el9.x86_64.rpm�A�rhttpd-core-2.4.57-8.el9.x86_64.rpm�}�rhttpd-filesystem-2.4.57-8.el9.noarch.rpm�N�rmod_lua-2.4.57-8.el9.x86_64.rpm�B�rhttpd-devel-2.4.57-8.el9.x86_64.rpm�Q�!mod_ssl-2.4.57-8.el9.x86_64.rpm�C�rhttpd-tools-2.4.57-8.el9.x86_64.rpm�@�rhttpd-2.4.57-8.el9.x86_64.rpm�O�!mod_proxy_html-2.4.57-8.el9.x86_64.rpm�M�rmod_ldap-2.4.57-8.el9.x86_64.rpm�~�rhttpd-manual-2.4.57-8.el9.noarch.rpm����	����VBsecurityModerate: gstreamer1-plugins-bad-free security update��+�P
https://access.redhat.com/errata/RHSA-2024:2287RHSA-2024:2287RHSA-2024:2287https://access.redhat.com/security/cve/CVE-2023-40474CVE-2023-40474CVE-2023-40474https://access.redhat.com/security/cve/CVE-2023-40475CVE-2023-40475CVE-2023-40475https://access.redhat.com/security/cve/CVE-2023-40476CVE-2023-40476CVE-2023-40476https://access.redhat.com/security/cve/CVE-2023-50186CVE-2023-50186CVE-2023-50186https://bugzilla.redhat.com/22545872254587https://bugzilla.redhat.com/22545882254588https://bugzilla.redhat.com/22545892254589https://bugzilla.redhat.com/22556392255639https://errata.almalinux.org/9/ALSA-2024-2287.htmlALSA-2024:2287ALSA-2024:2287
��2gstreamer1-plugins-bad-free-1.22.1-4.el9.i686.rpm��2gstreamer1-plugins-bad-free-1.22.1-4.el9.x86_64.rpm��2gstreamer1-plugins-bad-free-1.22.1-4.el9.i686.rpm��2gstreamer1-plugins-bad-free-1.22.1-4.el9.x86_64.rpm���h�	�� ��ZBBBBsecurityModerate: libtiff security update��{�:https://access.redhat.com/errata/RHSA-2024:2289RHSA-2024:2289RHSA-2024:2289https://access.redhat.com/security/cve/CVE-2022-40090CVE-2022-40090CVE-2022-40090https://access.redhat.com/security/cve/CVE-2023-3618CVE-2023-3618CVE-2023-3618https://access.redhat.com/security/cve/CVE-2023-40745CVE-2023-40745CVE-2023-40745https://access.redhat.com/security/cve/CVE-2023-41175CVE-2023-41175CVE-2023-41175https://access.redhat.com/security/cve/CVE-2023-6228CVE-2023-6228CVE-2023-6228https://bugzilla.redhat.com/22158652215865https://bugzilla.redhat.com/22349702234970https://bugzilla.redhat.com/22352642235264https://bugzilla.redhat.com/22352652235265https://bugzilla.redhat.com/22409952240995https://errata.almalinux.org/9/ALSA-2024-2289.htmlALSA-2024:2289ALSA-2024:2289
�D�libtiff-devel-4.4.0-12.el9.x86_64.rpm�C�libtiff-4.4.0-12.el9.i686.rpm�C�libtiff-4.4.0-12.el9.x86_64.rpm�D�libtiff-devel-4.4.0-12.el9.i686.rpm�D�libtiff-devel-4.4.0-12.el9.x86_64.rpm�C�libtiff-4.4.0-12.el9.i686.rpm�C�libtiff-4.4.0-12.el9.x86_64.rpm�D�libtiff-devel-4.4.0-12.el9.i686.rpm����	��#��asecurityModerate: mutt security update��5�https://access.redhat.com/errata/RHSA-2024:2290RHSA-2024:2290RHSA-2024:2290https://access.redhat.com/security/cve/CVE-2023-4874CVE-2023-4874CVE-2023-4874https://access.redhat.com/security/cve/CVE-2023-4875CVE-2023-4875CVE-2023-4875https://bugzilla.redhat.com/22382402238240https://bugzilla.redhat.com/22382412238241https://errata.almalinux.org/9/ALSA-2024-2290.htmlALSA-2024:2290ALSA-2024:2290
��9mutt-2.2.6-2.el9.x86_64.rpm��9mutt-2.2.6-2.el9.x86_64.rpm����	��.��dBBBBBBBBsecurityModerate: python3.11 security update��=�rhttps://access.redhat.com/errata/RHSA-2024:2292RHSA-2024:2292RHSA-2024:2292https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-2292.htmlALSA-2024:2292ALSA-2024:2292
�Q�'python3.11-tkinter-3.11.7-1.el9.x86_64.rpm\�'python3.11-libs-3.11.7-1.el9.i686.rpm\�'python3.11-libs-3.11.7-1.el9.x86_64.rpm[�'python3.11-devel-3.11.7-1.el9.x86_64.rpm�P�'python3.11-3.11.7-1.el9.x86_64.rpm[�'python3.11-devel-3.11.7-1.el9.i686.rpm�Q�'python3.11-tkinter-3.11.7-1.el9.x86_64.rpm\�'python3.11-libs-3.11.7-1.el9.i686.rpm\�'python3.11-libs-3.11.7-1.el9.x86_64.rpm[�'python3.11-devel-3.11.7-1.el9.x86_64.rpm�P�'python3.11-3.11.7-1.el9.x86_64.rpm[�'python3.11-devel-3.11.7-1.el9.i686.rpm���V�	��7��oBBBBBBsecurityModerate: libjpeg-turbo security update��/�Rhttps://access.redhat.com/errata/RHSA-2024:2295RHSA-2024:2295RHSA-2024:2295https://access.redhat.com/security/cve/CVE-2021-29390CVE-2021-29390CVE-2021-29390https://bugzilla.redhat.com/22355212235521https://errata.almalinux.org/9/ALSA-2024-2295.htmlALSA-2024:2295ALSA-2024:2295
�@�elibjpeg-turbo-devel-2.0.90-7.el9.x86_64.rpm�?�elibjpeg-turbo-2.0.90-7.el9.x86_64.rpm�@�elibjpeg-turbo-devel-2.0.90-7.el9.i686.rpm�z�elibjpeg-turbo-utils-2.0.90-7.el9.x86_64.rpm�?�elibjpeg-turbo-2.0.90-7.el9.i686.rpm�@�elibjpeg-turbo-devel-2.0.90-7.el9.x86_64.rpm�?�elibjpeg-turbo-2.0.90-7.el9.x86_64.rpm�@�elibjpeg-turbo-devel-2.0.90-7.el9.i686.rpm�z�elibjpeg-turbo-utils-2.0.90-7.el9.x86_64.rpm�?�elibjpeg-turbo-2.0.90-7.el9.i686.rpm���9�	����xBBBBBBBBBsecurityImportant: tigervnc security update���https://access.redhat.com/errata/RHSA-2024:2298RHSA-2024:2298RHSA-2024:2298https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-5574CVE-2023-5574CVE-2023-5574https://bugzilla.redhat.com/22447352244735https://bugzilla.redhat.com/22447362244736https://errata.almalinux.org/9/ALSA-2024-2298.htmlALSA-2024:2298ALSA-2024:2298
��
tigervnc-selinux-1.13.1-8.el9.noarch.rpm�X�
tigervnc-server-1.13.1-8.el9.x86_64.rpm��
tigervnc-icons-1.13.1-8.el9.noarch.rpm�W�
tigervnc-1.13.1-8.el9.x86_64.rpm�Y�
tigervnc-server-minimal-1.13.1-8.el9.x86_64.rpm��
tigervnc-license-1.13.1-8.el9.noarch.rpm�Z�
tigervnc-server-module-1.13.1-8.el9.x86_64.rpm��
tigervnc-selinux-1.13.1-8.el9.noarch.rpm�X�
tigervnc-server-1.13.1-8.el9.x86_64.rpm��
tigervnc-icons-1.13.1-8.el9.noarch.rpm�W�
tigervnc-1.13.1-8.el9.x86_64.rpm�Y�
tigervnc-server-minimal-1.13.1-8.el9.x86_64.rpm��
tigervnc-license-1.13.1-8.el9.noarch.rpm�Z�
tigervnc-server-module-1.13.1-8.el9.x86_64.rpm���`�	����DBBBBBBsecurityModerate: gstreamer1-plugins-base security update���lhttps://access.redhat.com/errata/RHSA-2024:2302RHSA-2024:2302RHSA-2024:2302https://access.redhat.com/security/cve/CVE-2023-37328CVE-2023-37328CVE-2023-37328https://bugzilla.redhat.com/22545402254540https://errata.almalinux.org/9/ALSA-2024-2302.htmlALSA-2024:2302ALSA-2024:2302
�`�5gstreamer1-plugins-base-tools-1.22.1-2.el9.x86_64.rpm�3�5gstreamer1-plugins-base-1.22.1-2.el9.x86_64.rpm�4�5gstreamer1-plugins-base-devel-1.22.1-2.el9.i686.rpm�3�5gstreamer1-plugins-base-1.22.1-2.el9.i686.rpm�4�5gstreamer1-plugins-base-devel-1.22.1-2.el9.x86_64.rpm�`�5gstreamer1-plugins-base-tools-1.22.1-2.el9.x86_64.rpm�3�5gstreamer1-plugins-base-1.22.1-2.el9.x86_64.rpm�4�5gstreamer1-plugins-base-devel-1.22.1-2.el9.i686.rpm�3�5gstreamer1-plugins-base-1.22.1-2.el9.i686.rpm�4�5gstreamer1-plugins-base-devel-1.22.1-2.el9.x86_64.rpm���9�	����MBBBBsecurityModerate: gstreamer1-plugins-good security update���4https://access.redhat.com/errata/RHSA-2024:2303RHSA-2024:2303RHSA-2024:2303https://access.redhat.com/security/cve/CVE-2023-37327CVE-2023-37327CVE-2023-37327https://bugzilla.redhat.com/22545392254539https://errata.almalinux.org/9/ALSA-2024-2303.htmlALSA-2024:2303ALSA-2024:2303
��5gstreamer1-plugins-good-gtk-1.22.1-2.el9.x86_64.rpm��5gstreamer1-plugins-good-gtk-1.22.1-2.el9.i686.rpm�
�5gstreamer1-plugins-good-1.22.1-2.el9.x86_64.rpm�
�5gstreamer1-plugins-good-1.22.1-2.el9.i686.rpm��5gstreamer1-plugins-good-gtk-1.22.1-2.el9.x86_64.rpm��5gstreamer1-plugins-good-gtk-1.22.1-2.el9.i686.rpm�
�5gstreamer1-plugins-good-1.22.1-2.el9.x86_64.rpm�
�5gstreamer1-plugins-good-1.22.1-2.el9.i686.rpm����	����TsecurityModerate: python3.11-cryptography security update��7�ohttps://access.redhat.com/errata/RHSA-2024:2337RHSA-2024:2337RHSA-2024:2337https://access.redhat.com/security/cve/CVE-2023-49083CVE-2023-49083CVE-2023-49083https://bugzilla.redhat.com/22553312255331https://errata.almalinux.org/9/ALSA-2024-2337.htmlALSA-2024:2337ALSA-2024:2337
�?�python3.11-cryptography-37.0.2-6.el9.x86_64.rpm�?�python3.11-cryptography-37.0.2-6.el9.x86_64.rpm����	����securityModerate: python-jinja2 security update��&�https://access.redhat.com/errata/RHSA-2024:2348RHSA-2024:2348RHSA-2024:2348https://access.redhat.com/security/cve/CVE-2024-22195CVE-2024-22195CVE-2024-22195https://bugzilla.redhat.com/22578542257854https://errata.almalinux.org/9/ALSA-2024-2348.htmlALSA-2024:2348ALSA-2024:2348
�N�fpython3-jinja2-2.11.3-5.el9.noarch.rpm�N�fpython3-jinja2-2.11.3-5.el9.noarch.rpm���� 	����YsecurityModerate: mingw components security update��;�Bhttps://access.redhat.com/errata/RHSA-2024:2353RHSA-2024:2353RHSA-2024:2353https://access.redhat.com/security/cve/CVE-2023-1579CVE-2023-1579CVE-2023-1579https://bugzilla.redhat.com/21809052180905https://errata.almalinux.org/9/ALSA-2024-2353.htmlALSA-2024:2353ALSA-2024:2353
��Tmingw-binutils-generic-2.41-3.el9.x86_64.rpm��Tmingw-binutils-generic-2.41-3.el9.x86_64.rpm����!	��"��\BBBBsecurityModerate: freeglut security update��}�{https://access.redhat.com/errata/RHSA-2024:2366RHSA-2024:2366RHSA-2024:2366https://access.redhat.com/security/cve/CVE-2024-24258CVE-2024-24258CVE-2024-24258https://access.redhat.com/security/cve/CVE-2024-24259CVE-2024-24259CVE-2024-24259https://bugzilla.redhat.com/22639392263939https://bugzilla.redhat.com/22639432263943https://errata.almalinux.org/9/ALSA-2024-2366.htmlALSA-2024:2366ALSA-2024:2366
�*�sfreeglut-3.2.1-10.el9.x86_64.rpm�*�sfreeglut-3.2.1-10.el9.i686.rpm�+�sfreeglut-devel-3.2.1-10.el9.x86_64.rpm�+�sfreeglut-devel-3.2.1-10.el9.i686.rpm�*�sfreeglut-3.2.1-10.el9.x86_64.rpm�*�sfreeglut-3.2.1-10.el9.i686.rpm�+�sfreeglut-devel-3.2.1-10.el9.x86_64.rpm�+�sfreeglut-devel-3.2.1-10.el9.i686.rpm����"	��%��csecurityModerate: mod_http2 security update��x�https://access.redhat.com/errata/RHSA-2024:2368RHSA-2024:2368RHSA-2024:2368https://access.redhat.com/security/cve/CVE-2023-43622CVE-2023-43622CVE-2023-43622https://access.redhat.com/security/cve/CVE-2023-45802CVE-2023-45802CVE-2023-45802https://bugzilla.redhat.com/22438772243877https://bugzilla.redhat.com/22451532245153https://errata.almalinux.org/9/ALSA-2024-2368.htmlALSA-2024:2368ALSA-2024:2368
�K�Cmod_http2-2.0.26-1.el9.x86_64.rpm�K�Cmod_http2-2.0.26-1.el9.x86_64.rpm���Z�#	��+��fBBBsecurityModerate: zziplib security update��{�https://access.redhat.com/errata/RHSA-2024:2377RHSA-2024:2377RHSA-2024:2377https://access.redhat.com/security/cve/CVE-2020-18770CVE-2020-18770CVE-2020-18770https://bugzilla.redhat.com/22469072246907https://errata.almalinux.org/9/ALSA-2024-2377.htmlALSA-2024:2377ALSA-2024:2377
�%�Wzziplib-utils-0.13.71-11.el9_4.x86_64.rpm�H�Wzziplib-0.13.71-11.el9_4.x86_64.rpm�H�Wzziplib-0.13.71-11.el9_4.i686.rpm�%�Wzziplib-utils-0.13.71-11.el9_4.x86_64.rpm�H�Wzziplib-0.13.71-11.el9_4.x86_64.rpm�H�Wzziplib-0.13.71-11.el9_4.i686.rpm���z�$	��0��lBBsecurityModerate: mod_jk and mod_proxy_cluster security update��	�_https://access.redhat.com/errata/RHSA-2024:2387RHSA-2024:2387RHSA-2024:2387https://access.redhat.com/security/cve/CVE-2023-41081CVE-2023-41081CVE-2023-41081https://access.redhat.com/security/cve/CVE-2023-6710CVE-2023-6710CVE-2023-6710https://bugzilla.redhat.com/22388472238847https://bugzilla.redhat.com/22541282254128https://errata.almalinux.org/9/ALSA-2024-2387.htmlALSA-2024:2387ALSA-2024:2387
��[mod_proxy_cluster-1.3.20-1.el9_4.x86_64.rpm�~�Pmod_jk-1.2.49-1.el9_4.x86_64.rpm��[mod_proxy_cluster-1.3.20-1.el9_4.x86_64.rpm�~�Pmod_jk-1.2.49-1.el9_4.x86_64.rpm���0�%	����qBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update��h�%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394
https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671	)�Jrtla-5.14.0-427.13.1.el9_4.x86_64.rpm#�Jkernel-debug-devel-5.14.0-427.13.1.el9_4.x86_64.rpm$�Jkernel-debug-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm&�Jkernel-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm'�Jperf-5.14.0-427.13.1.el9_4.x86_64.rpm%�Jkernel-devel-5.14.0-427.13.1.el9_4.x86_64.rpm�Jkernel-doc-5.14.0-427.13.1.el9_4.noarch.rpm+�Jrv-5.14.0-427.13.1.el9_4.x86_64.rpm(�Jkernel-headers-5.14.0-427.13.1.el9_4.x86_64.rpm	)�Jrtla-5.14.0-427.13.1.el9_4.x86_64.rpm#�Jkernel-debug-devel-5.14.0-427.13.1.el9_4.x86_64.rpm$�Jkernel-debug-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm&�Jkernel-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm'�Jperf-5.14.0-427.13.1.el9_4.x86_64.rpm%�Jkernel-devel-5.14.0-427.13.1.el9_4.x86_64.rpm�Jkernel-doc-5.14.0-427.13.1.el9_4.noarch.rpm+�Jrv-5.14.0-427.13.1.el9_4.x86_64.rpm(�Jkernel-headers-5.14.0-427.13.1.el9_4.x86_64.rpm����"�&	��	��CBBBBsecurityModerate: harfbuzz security update��
�{https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410
�(�iharfbuzz-icu-2.7.4-10.el9.x86_64.rpm�'�iharfbuzz-devel-2.7.4-10.el9.i686.rpm�'�iharfbuzz-devel-2.7.4-10.el9.x86_64.rpm�(�iharfbuzz-icu-2.7.4-10.el9.i686.rpm�(�iharfbuzz-icu-2.7.4-10.el9.x86_64.rpm�'�iharfbuzz-devel-2.7.4-10.el9.i686.rpm�'�iharfbuzz-devel-2.7.4-10.el9.x86_64.rpm�(�iharfbuzz-icu-2.7.4-10.el9.i686.rpm����'	����JBBBsecurityModerate: avahi security update���Ohttps://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433
�o�^avahi-tools-0.8-20.el9.x86_64.rpm�4�^avahi-glib-0.8-20.el9.x86_64.rpm�4�^avahi-glib-0.8-20.el9.i686.rpm�o�^avahi-tools-0.8-20.el9.x86_64.rpm�4�^avahi-glib-0.8-20.el9.x86_64.rpm�4�^avahi-glib-0.8-20.el9.i686.rpm���
�(	����PBBBsecurityModerate: pam security update��W�Ohttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:2438
�J�cpam-docs-1.5.1-19.el9.x86_64.rpm��cpam-devel-1.5.1-19.el9.i686.rpm��cpam-devel-1.5.1-19.el9.x86_64.rpm�J�cpam-docs-1.5.1-19.el9.x86_64.rpm��cpam-devel-1.5.1-19.el9.i686.rpm��cpam-devel-1.5.1-19.el9.x86_64.rpm����)	����VBBBsecurityLow: openssl and openssl-fips-provider security update�6��&�/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447
��mopenssl-perl-3.0.7-27.el9.x86_64.rpm��mopenssl-devel-3.0.7-27.el9.x86_64.rpm��mopenssl-devel-3.0.7-27.el9.i686.rpm��mopenssl-perl-3.0.7-27.el9.x86_64.rpm��mopenssl-devel-3.0.7-27.el9.x86_64.rpm��mopenssl-devel-3.0.7-27.el9.i686.rpm����*	��!��\BBBsecurityModerate: systemd security update��U�https://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463
�T�systemd-journal-remote-252-32.el9_4.alma.1.x86_64.rpm��systemd-devel-252-32.el9_4.alma.1.i686.rpm��systemd-devel-252-32.el9_4.alma.1.x86_64.rpm�T�systemd-journal-remote-252-32.el9_4.alma.1.x86_64.rpm��systemd-devel-252-32.el9_4.alma.1.i686.rpm��systemd-devel-252-32.el9_4.alma.1.x86_64.rpm����+	��%��bBsecurityLow: libssh security update�6��V�https://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:2504
��libssh-devel-0.10.4-13.el9.i686.rpm��libssh-devel-0.10.4-13.el9.x86_64.rpm��libssh-devel-0.10.4-13.el9.i686.rpm��libssh-devel-0.10.4-13.el9.x86_64.rpm����,	��'��&securityLow: file security update�6��^�Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512
�9�,python3-file-magic-5.39-16.el9.noarch.rpm�9�,python3-file-magic-5.39-16.el9.noarch.rpm����-	��1��hBBBBBBBsecurityModerate: podman security and bug fix update�� �^https://access.redhat.com/errata/RHSA-2024:2548RHSA-2024:2548RHSA-2024:2548https://access.redhat.com/security/cve/CVE-2024-1753CVE-2024-1753CVE-2024-1753https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://bugzilla.redhat.com/22655132265513https://bugzilla.redhat.com/22680462268046https://errata.almalinux.org/9/ALSA-2024-2548.htmlALSA-2024:2548ALSA-2024:2548
�1�%podman-4.9.4-3.el9_4.x86_64.rpm�2�%podman-plugins-4.9.4-3.el9_4.x86_64.rpm�4�%podman-tests-4.9.4-3.el9_4.x86_64.rpmh�%podman-docker-4.9.4-3.el9_4.noarch.rpm�3�%podman-remote-4.9.4-3.el9_4.x86_64.rpm�1�%podman-4.9.4-3.el9_4.x86_64.rpm�2�%podman-plugins-4.9.4-3.el9_4.x86_64.rpm�4�%podman-tests-4.9.4-3.el9_4.x86_64.rpmh�%podman-docker-4.9.4-3.el9_4.noarch.rpm�3�%podman-remote-4.9.4-3.el9_4.x86_64.rpm���	�.	��6��rBBsecurityModerate: skopeo security and bug fix update��~�1https://access.redhat.com/errata/RHSA-2024:2549RHSA-2024:2549RHSA-2024:2549https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680462268046https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-2549.htmlALSA-2024:2549ALSA-2024:2549
�c�3skopeo-1.14.3-2.el9_4.x86_64.rpm�d�3skopeo-tests-1.14.3-2.el9_4.x86_64.rpm�c�3skopeo-1.14.3-2.el9_4.x86_64.rpm�d�3skopeo-tests-1.14.3-2.el9_4.x86_64.rpm���<�/	��;��wBBsecurityModerate: buildah bug fix update��/�Ohttps://access.redhat.com/errata/RHSA-2024:2550RHSA-2024:2550RHSA-2024:2550https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://bugzilla.redhat.com/22680462268046https://errata.almalinux.org/9/ALSA-2024-2550.htmlALSA-2024:2550ALSA-2024:2550
�0�>buildah-tests-1.33.7-1.el9_4.x86_64.rpm�/�>buildah-1.33.7-1.el9_4.x86_64.rpm�0�>buildah-tests-1.33.7-1.el9_4.x86_64.rpm�/�>buildah-1.33.7-1.el9_4.x86_64.rpm���<�0	����|BBBBBBBBBBBBBsecurityImportant: bind security update��~�https://access.redhat.com/errata/RHSA-2024:2551RHSA-2024:2551RHSA-2024:2551https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-2551.htmlALSA-2024:2551ALSA-2024:2551
	�p�|bind-dyndb-ldap-11.9-9.el9_4.alma.1.x86_64.rpm�\�bind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpm�[�bind-chroot-9.16.23-18.el9_4.1.x86_64.rpm�'�python3-bind-9.16.23-18.el9_4.1.noarch.rpm�"�bind-license-9.16.23-18.el9_4.1.noarch.rpm�Z�bind-9.16.23-18.el9_4.1.x86_64.rpm�^�bind-utils-9.16.23-18.el9_4.1.x86_64.rpm�!�bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm�]�bind-libs-9.16.23-18.el9_4.1.x86_64.rpm	�p�|bind-dyndb-ldap-11.9-9.el9_4.alma.1.x86_64.rpm�\�bind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpm�[�bind-chroot-9.16.23-18.el9_4.1.x86_64.rpm�'�python3-bind-9.16.23-18.el9_4.1.noarch.rpm�"�bind-license-9.16.23-18.el9_4.1.noarch.rpm�Z�bind-9.16.23-18.el9_4.1.x86_64.rpm�^�bind-utils-9.16.23-18.el9_4.1.x86_64.rpm�!�bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm�]�bind-libs-9.16.23-18.el9_4.1.x86_64.rpm���=�1	��
��securityModerate: python-jwcrypto security update���https://access.redhat.com/errata/RHSA-2024:2559RHSA-2024:2559RHSA-2024:2559https://access.redhat.com/security/cve/CVE-2024-28102CVE-2024-28102CVE-2024-28102https://bugzilla.redhat.com/22687582268758https://errata.almalinux.org/9/ALSA-2024-2559.htmlALSA-2024:2559ALSA-2024:2559
��python3-jwcrypto-0.8-5.el9_4.noarch.rpm��python3-jwcrypto-0.8-5.el9_4.noarch.rpm���	�2	����NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security and bug fix update���2https://access.redhat.com/errata/RHSA-2024:2560RHSA-2024:2560RHSA-2024:2560https://access.redhat.com/security/cve/CVE-2024-1441CVE-2024-1441CVE-2024-1441https://access.redhat.com/security/cve/CVE-2024-2494CVE-2024-2494CVE-2024-2494https://bugzilla.redhat.com/22638412263841https://bugzilla.redhat.com/22701152270115https://errata.almalinux.org/9/ALSA-2024-2560.htmlALSA-2024:2560ALSA-2024:2560
�p4libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�D4libvirt-daemon-common-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�E4libvirt-daemon-lock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�m4libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�z4libvirt-libs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�j4libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�{4libvirt-nss-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�r4libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�o4libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�n4libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�G4libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�g4libvirt-client-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�F4libvirt-daemon-log-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�l4libvirt-daemon-driver-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�v4libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�c4libvirt-client-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�s4libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�y4libvirt-daemon-kvm-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�h4libvirt-daemon-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�t4libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�w4libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�H4libvirt-daemon-proxy-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�x4libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�k4libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�i4libvirt-daemon-config-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�f4libvirt-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�u4libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�q4libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�p4libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�D4libvirt-daemon-common-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�E4libvirt-daemon-lock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�m4libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�z4libvirt-libs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�j4libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�{4libvirt-nss-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�r4libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�o4libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�n4libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�G4libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�g4libvirt-client-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�F4libvirt-daemon-log-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�l4libvirt-daemon-driver-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�v4libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�c4libvirt-client-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�s4libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�y4libvirt-daemon-kvm-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�h4libvirt-daemon-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�t4libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�w4libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�H4libvirt-daemon-proxy-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�x4libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�k4libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�i4libvirt-daemon-config-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�f4libvirt-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�u4libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�q4libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.alma.1.x86_64.rpm���K�3	����GBBBBBBBBsecurityImportant: golang security update��>�Xhttps://access.redhat.com/errata/RHSA-2024:2562RHSA-2024:2562RHSA-2024:2562https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://access.redhat.com/security/cve/CVE-2024-24784CVE-2024-24784CVE-2024-24784https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22680212268021https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2562.htmlALSA-2024:2562ALSA-2024:2562
�H�.golang-bin-1.21.9-2.el9_4.x86_64.rpm�N�.go-toolset-1.21.9-2.el9_4.x86_64.rpmn�.golang-misc-1.21.9-2.el9_4.noarch.rpmp�.golang-tests-1.21.9-2.el9_4.noarch.rpmo�.golang-src-1.21.9-2.el9_4.noarch.rpm�G�.golang-1.21.9-2.el9_4.x86_64.rpmm�.golang-docs-1.21.9-2.el9_4.noarch.rpm�H�.golang-bin-1.21.9-2.el9_4.x86_64.rpm�N�.go-toolset-1.21.9-2.el9_4.x86_64.rpmn�.golang-misc-1.21.9-2.el9_4.noarch.rpmp�.golang-tests-1.21.9-2.el9_4.noarch.rpmo�.golang-src-1.21.9-2.el9_4.noarch.rpm�G�.golang-1.21.9-2.el9_4.x86_64.rpmm�.golang-docs-1.21.9-2.el9_4.noarch.rpm���?�4	����RsecurityModerate: mod_http2 security update���https://access.redhat.com/errata/RHSA-2024:2564RHSA-2024:2564RHSA-2024:2564https://access.redhat.com/security/cve/CVE-2024-27316CVE-2024-27316CVE-2024-27316https://bugzilla.redhat.com/22682772268277https://errata.almalinux.org/9/ALSA-2024-2564.htmlALSA-2024:2564ALSA-2024:2564
�K�Dmod_http2-2.0.26-2.el9_4.x86_64.rpm�K�Dmod_http2-2.0.26-2.el9_4.x86_64.rpm����5	����UsecurityModerate: libreswan security update���Nhttps://access.redhat.com/errata/RHSA-2024:2565RHSA-2024:2565RHSA-2024:2565https://access.redhat.com/security/cve/CVE-2024-2357CVE-2024-2357CVE-2024-2357https://bugzilla.redhat.com/22689522268952https://errata.almalinux.org/9/ALSA-2024-2565.htmlALSA-2024:2565ALSA-2024:2565
�J�libreswan-4.12-2.el9_4.alma.1.x86_64.rpm�J�libreswan-4.12-2.el9_4.alma.1.x86_64.rpm����6	��+��XBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security, bug fix, and enhancement update��e�Mhttps://access.redhat.com/errata/RHSA-2024:2566RHSA-2024:2566RHSA-2024:2566https://access.redhat.com/security/cve/CVE-2024-3019CVE-2024-3019CVE-2024-3019https://bugzilla.redhat.com/22718982271898https://errata.almalinux.org/9/ALSA-2024-2566.htmlALSA-2024:2566ALSA-2024:2566
l�npcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm�;pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpm�;pcp-devel-6.2.0-2.el9_4.x86_64.rpm�,pcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpm�mpcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpm�rpcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpm�+pcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-2.el9_4.i686.rpm�|pcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm�opcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpm�(pcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm�Eperl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm�=pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpm�"pcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpm�!pcp-pmda-news-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpm�<pcp-libs-6.2.0-2.el9_4.i686.rpm�Dperl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpm�/pcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpm�}pcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpm�;pcp-devel-6.2.0-2.el9_4.i686.rpm�	pcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm�Apcp-selinux-6.2.0-2.el9_4.x86_64.rpm�<pcp-libs-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm�
pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm�Ipython3-pcp-6.2.0-2.el9_4.x86_64.rpm�)pcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm�
pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpm�*pcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm�:pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpm�%pcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm�>pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm�9pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpm�8pcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpm�'pcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm�Bpcp-system-tools-6.2.0-2.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-2.el9_4.i686.rpm�spcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm�upcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpm�4pcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpm� pcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpm�qpcp-gui-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm�Gperl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpm�7pcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpm�.pcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpm�3pcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpm�{pcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpm�zpcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpm�&pcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpm�$pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpm�fpcp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpm�lpcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm�<pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm�wpcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpm�6pcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm�Cpcp-zeroconf-6.2.0-2.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-2.el9_4.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpm�1pcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm�xpcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpm�~pcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpm�gpcp-conf-6.2.0-2.el9_4.x86_64.rpm�kpcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm�vpcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpm�ppcp-geolocate-6.2.0-2.el9_4.x86_64.rpm�0pcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-2.el9_4.x86_64.rpm�#pcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpm�hpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpm�Kpcp-doc-6.2.0-2.el9_4.noarch.rpm�ypcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm�?pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpm�5pcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm�Fperl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm�@pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpm�ipcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpm�2pcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm�tpcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpml�npcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm�;pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpm�;pcp-devel-6.2.0-2.el9_4.x86_64.rpm�,pcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpm�mpcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpm�rpcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpm�+pcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-2.el9_4.i686.rpm�|pcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm�opcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpm�(pcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm�Eperl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm�=pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpm�"pcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpm�!pcp-pmda-news-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpm�<pcp-libs-6.2.0-2.el9_4.i686.rpm�Dperl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpm�/pcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpm�}pcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpm�;pcp-devel-6.2.0-2.el9_4.i686.rpm�	pcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm�Apcp-selinux-6.2.0-2.el9_4.x86_64.rpm�<pcp-libs-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm�
pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm�Ipython3-pcp-6.2.0-2.el9_4.x86_64.rpm�)pcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm�
pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpm�*pcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm�:pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpm�%pcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm�>pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm�9pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpm�8pcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpm�'pcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm�Bpcp-system-tools-6.2.0-2.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-2.el9_4.i686.rpm�spcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm�upcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpm�4pcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpm� pcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpm�qpcp-gui-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm�Gperl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpm�7pcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpm�.pcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpm�3pcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpm�{pcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpm�zpcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpm�&pcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpm�$pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpm�fpcp-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpm�lpcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm�<pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm�wpcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpm�6pcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm�Cpcp-zeroconf-6.2.0-2.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-2.el9_4.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpm�1pcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm�xpcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpm�~pcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpm�gpcp-conf-6.2.0-2.el9_4.x86_64.rpm�kpcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm�vpcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpm�ppcp-geolocate-6.2.0-2.el9_4.x86_64.rpm�0pcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-2.el9_4.x86_64.rpm�#pcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpm�hpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpm�Kpcp-doc-6.2.0-2.el9_4.noarch.rpm�ypcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm�?pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpm�5pcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm�Fperl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm�@pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpm�ipcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpm�2pcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpm�pcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm�tpcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpm����7	��0��lBBsecurityModerate: grafana security update��2�jhttps://access.redhat.com/errata/RHSA-2024:2568RHSA-2024:2568RHSA-2024:2568https://access.redhat.com/security/cve/CVE-2024-1313CVE-2024-1313CVE-2024-1313https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22719032271903https://errata.almalinux.org/9/ALSA-2024-2568.htmlALSA-2024:2568ALSA-2024:2568
�I�kgrafana-9.2.10-16.el9_4.alma.1.x86_64.rpm�U�kgrafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpm�I�kgrafana-9.2.10-16.el9_4.alma.1.x86_64.rpm�U�kgrafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpm���A�8	��3��qsecurityImportant: grafana-pcp security update���xhttps://access.redhat.com/errata/RHSA-2024:2569RHSA-2024:2569RHSA-2024:2569https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-2569.htmlALSA-2024:2569ALSA-2024:2569
�~�2grafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpm�~�2grafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpm����9	��?��tBBBBBBBBBsecurityModerate: gnutls security update���https://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570
�)�gnutls-utils-3.8.3-4.el9_4.x86_64.rpm�c�gnutls-devel-3.8.3-4.el9_4.x86_64.rpm�a�gnutls-c++-3.8.3-4.el9_4.i686.rpm�c�gnutls-devel-3.8.3-4.el9_4.i686.rpm�a�gnutls-c++-3.8.3-4.el9_4.x86_64.rpm�b�gnutls-dane-3.8.3-4.el9_4.x86_64.rpm�b�gnutls-dane-3.8.3-4.el9_4.i686.rpm�)�gnutls-utils-3.8.3-4.el9_4.x86_64.rpm�c�gnutls-devel-3.8.3-4.el9_4.x86_64.rpm�a�gnutls-c++-3.8.3-4.el9_4.i686.rpm�c�gnutls-devel-3.8.3-4.el9_4.i686.rpm�a�gnutls-c++-3.8.3-4.el9_4.x86_64.rpm�b�gnutls-dane-3.8.3-4.el9_4.x86_64.rpm�b�gnutls-dane-3.8.3-4.el9_4.i686.rpm���K�:	����@securityModerate: sssd security and bug fix update��%�Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571
��^sssd-idp-2.9.4-6.el9_4.x86_64.rpm��^sssd-idp-2.9.4-6.el9_4.x86_64.rpm����;	����CBBBBBBBBBsecurityImportant: tigervnc security update��m�https://access.redhat.com/errata/RHSA-2024:2616RHSA-2024:2616RHSA-2024:2616https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-2616.htmlALSA-2024:2616ALSA-2024:2616
�X�tigervnc-server-1.13.1-8.el9_4.3.x86_64.rpm�W�tigervnc-1.13.1-8.el9_4.3.x86_64.rpm��tigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm��tigervnc-license-1.13.1-8.el9_4.3.noarch.rpm��tigervnc-icons-1.13.1-8.el9_4.3.noarch.rpm�Y�tigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpm�Z�tigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm�X�tigervnc-server-1.13.1-8.el9_4.3.x86_64.rpm�W�tigervnc-1.13.1-8.el9_4.3.x86_64.rpm��tigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm��tigervnc-license-1.13.1-8.el9_4.3.noarch.rpm��tigervnc-icons-1.13.1-8.el9_4.3.noarch.rpm�Y�tigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpm�Z�tigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm���7�<	����OBsecurityModerate: libxml2 security update��s�nhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679
�E�hlibxml2-devel-2.9.13-6.el9_4.i686.rpm�E�hlibxml2-devel-2.9.13-6.el9_4.x86_64.rpm�E�hlibxml2-devel-2.9.13-6.el9_4.i686.rpm�E�hlibxml2-devel-2.9.13-6.el9_4.x86_64.rpm����j�=	����SsecurityImportant: git-lfs security update��a�(
https://access.redhat.com/errata/RHSA-2024:2724RHSA-2024:2724RHSA-2024:2724https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2724.htmlALSA-2024:2724ALSA-2024:2724
�l�git-lfs-3.4.1-2.el9_4.x86_64.rpm�l�git-lfs-3.4.1-2.el9_4.x86_64.rpm���i�>	��'��VBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update��	�&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758
https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743	'�Kperf-5.14.0-427.16.1.el9_4.x86_64.rpm�Kkernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm#�Kkernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm%�Kkernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm&�Kkernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm+�Krv-5.14.0-427.16.1.el9_4.x86_64.rpm$�Kkernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm)�Krtla-5.14.0-427.16.1.el9_4.x86_64.rpm(�Kkernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm	'�Kperf-5.14.0-427.16.1.el9_4.x86_64.rpm�Kkernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm#�Kkernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm%�Kkernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm&�Kkernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm+�Krv-5.14.0-427.16.1.el9_4.x86_64.rpm$�Kkernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm)�Krtla-5.14.0-427.16.1.el9_4.x86_64.rpm(�Kkernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm����p�?	��1�aBF��BBBBBBBBsecurityImportant: nodejs:18 security update��/�Phttps://access.redhat.com/errata/RHSA-2024:2779RHSA-2024:2779RHSA-2024:2779https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2779.htmlALSA-2024:2779ALSA-2024:2779
,��I*�#�#nodejs-devel-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm>�#nodejs-docs-18.20.2-2.module_el9.4.0+99+a01f7676.noarch.rpme�#nodejs-full-i18n-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmd�$npm-10.5.0-1.18.20.2.2.module_el9.4.0+99+a01f7676.x86_64.rpm,�#nodejs-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm,��I*�#�#nodejs-devel-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm>�#nodejs-docs-18.20.2-2.module_el9.4.0+99+a01f7676.noarch.rpme�#nodejs-full-i18n-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmd�$npm-10.5.0-1.18.20.2.2.module_el9.4.0+99+a01f7676.x86_64.rpm,�#nodejs-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm����@�@	����rBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update���"https://access.redhat.com/errata/RHSA-2024:2842RHSA-2024:2842RHSA-2024:2842https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2842.htmlALSA-2024:2842ALSA-2024:2842

�|�Udotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm�`�?dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm�y�?dotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm�z�Udotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpm�x�?dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm�v�?aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm�"�Unetstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm�w�?dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpm�{�?dotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm�u�?aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm�!�?dotnet-host-8.0.5-1.el9_4.x86_64.rpm�a�Udotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm�Y�?aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm
�|�Udotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm�`�?dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm�y�?dotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm�z�Udotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpm�x�?dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm�v�?aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm�"�Unetstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm�w�?dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpm�{�?dotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm�u�?aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm�!�?dotnet-host-8.0.5-1.el9_4.x86_64.rpm�a�Udotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm�Y�?aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm����K�A	����MBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update��!�#https://access.redhat.com/errata/RHSA-2024:2843RHSA-2024:2843RHSA-2024:2843https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2843.htmlALSA-2024:2843ALSA-2024:2843
�x�Xaspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm�w�Xaspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm�|�gdotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpm�{�Xdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm�~�gdotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpm�z�Xdotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm�y�Xdotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpm�}�Xdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm�x�Xaspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm�w�Xaspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm�|�gdotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpm�{�Xdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm�~�gdotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpm�z�Xdotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm�y�Xdotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpm�}�Xdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm����o�B	��'�xB�a��FBBBBBBBsecurityImportant: nodejs:20 security update��D�Ohttps://access.redhat.com/errata/RHSA-2024:2853RHSA-2024:2853RHSA-2024:2853https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2853.htmlALSA-2024:2853ALSA-2024:2853
,�Q�J*>�'nodejs-docs-20.12.2-2.module_el9.4.0+100+71fc9528.noarch.rpm,�'nodejs-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpml�onodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm�	�znodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm�
�znodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm�#�'nodejs-devel-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmd�%npm-10.5.0-1.20.12.2.2.module_el9.4.0+100+71fc9528.x86_64.rpme�'nodejs-full-i18n-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm,�Q�J*>�'nodejs-docs-20.12.2-2.module_el9.4.0+100+71fc9528.noarch.rpm,�'nodejs-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpml�onodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm�	�znodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm�
�znodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm�#�'nodejs-devel-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmd�%npm-10.5.0-1.20.12.2.2.module_el9.4.0+100+71fc9528.x86_64.rpme�'nodejs-full-i18n-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm���� �C	��,��hBBsecurityImportant: firefox security update���
https://access.redhat.com/errata/RHSA-2024:2883RHSA-2024:2883RHSA-2024:2883https://access.redhat.com/security/cve/CVE-2024-4367CVE-2024-4367CVE-2024-4367https://access.redhat.com/security/cve/CVE-2024-4767CVE-2024-4767CVE-2024-4767https://access.redhat.com/security/cve/CVE-2024-4768CVE-2024-4768CVE-2024-4768https://access.redhat.com/security/cve/CVE-2024-4769CVE-2024-4769CVE-2024-4769https://access.redhat.com/security/cve/CVE-2024-4770CVE-2024-4770CVE-2024-4770https://access.redhat.com/security/cve/CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/22803822280382https://bugzilla.redhat.com/22803832280383https://bugzilla.redhat.com/22803842280384https://bugzilla.redhat.com/22803852280385https://bugzilla.redhat.com/22803862280386https://bugzilla.redhat.com/22803872280387https://errata.almalinux.org/9/ALSA-2024-2883.htmlALSA-2024:2883ALSA-2024:2883
P�afirefox-x11-115.11.0-1.el9_4.alma.1.x86_64.rpm8�afirefox-115.11.0-1.el9_4.alma.1.x86_64.rpmP�afirefox-x11-115.11.0-1.el9_4.alma.1.x86_64.rpm8�afirefox-115.11.0-1.el9_4.alma.1.x86_64.rpm����B�D	��/��msecurityImportant: thunderbird security update�� �Yhttps://access.redhat.com/errata/RHSA-2024:2888RHSA-2024:2888RHSA-2024:2888https://access.redhat.com/security/cve/CVE-2024-4367CVE-2024-4367CVE-2024-4367https://access.redhat.com/security/cve/CVE-2024-4767CVE-2024-4767CVE-2024-4767https://access.redhat.com/security/cve/CVE-2024-4768CVE-2024-4768CVE-2024-4768https://access.redhat.com/security/cve/CVE-2024-4769CVE-2024-4769CVE-2024-4769https://access.redhat.com/security/cve/CVE-2024-4770CVE-2024-4770CVE-2024-4770https://access.redhat.com/security/cve/CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/22803822280382https://bugzilla.redhat.com/22803832280383https://bugzilla.redhat.com/22803842280384https://bugzilla.redhat.com/22803852280385https://bugzilla.redhat.com/22803862280386https://bugzilla.redhat.com/22803872280387https://errata.almalinux.org/9/ALSA-2024-2888.htmlALSA-2024:2888ALSA-2024:2888
9�athunderbird-115.11.0-1.el9_4.alma.1.x86_64.rpm9�athunderbird-115.11.0-1.el9_4.alma.1.x86_64.rpm����M�E	��:��pBBBBBBBBsecurityImportant: nodejs security update��y�Phttps://access.redhat.com/errata/RHSA-2024:2910RHSA-2024:2910RHSA-2024:2910https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2910.htmlALSA-2024:2910ALSA-2024:2910
d�=npm-8.19.4-1.16.20.2.8.el9_4.x86_64.rpm��cnodejs-libs-16.20.2-8.el9_4.x86_64.rpm,�cnodejs-16.20.2-8.el9_4.x86_64.rpme�cnodejs-full-i18n-16.20.2-8.el9_4.x86_64.rpm>�cnodejs-docs-16.20.2-8.el9_4.noarch.rpm��cnodejs-libs-16.20.2-8.el9_4.i686.rpmd�=npm-8.19.4-1.16.20.2.8.el9_4.x86_64.rpm��cnodejs-libs-16.20.2-8.el9_4.x86_64.rpm,�cnodejs-16.20.2-8.el9_4.x86_64.rpme�cnodejs-full-i18n-16.20.2-8.el9_4.x86_64.rpm>�cnodejs-docs-16.20.2-8.el9_4.noarch.rpm��cnodejs-libs-16.20.2-8.el9_4.i686.rpm����c�F	����{BBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update��I�xhttps://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306
https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890	%�Lkernel-devel-5.14.0-427.18.1.el9_4.x86_64.rpm+�Lrv-5.14.0-427.18.1.el9_4.x86_64.rpm�Lkernel-doc-5.14.0-427.18.1.el9_4.noarch.rpm$�Lkernel-debug-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm&�Lkernel-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm)�Lrtla-5.14.0-427.18.1.el9_4.x86_64.rpm#�Lkernel-debug-devel-5.14.0-427.18.1.el9_4.x86_64.rpm(�Lkernel-headers-5.14.0-427.18.1.el9_4.x86_64.rpm'�Lperf-5.14.0-427.18.1.el9_4.x86_64.rpm	%�Lkernel-devel-5.14.0-427.18.1.el9_4.x86_64.rpm+�Lrv-5.14.0-427.18.1.el9_4.x86_64.rpm�Lkernel-doc-5.14.0-427.18.1.el9_4.noarch.rpm$�Lkernel-debug-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm&�Lkernel-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm)�Lrtla-5.14.0-427.18.1.el9_4.x86_64.rpm#�Lkernel-debug-devel-5.14.0-427.18.1.el9_4.x86_64.rpm(�Lkernel-headers-5.14.0-427.18.1.el9_4.x86_64.rpm'�Lperf-5.14.0-427.18.1.el9_4.x86_64.rpm�����G	����MBBBBBBsecurityImportant: tomcat security and bug fix update��A�}https://access.redhat.com/errata/RHSA-2024:3307RHSA-2024:3307RHSA-2024:3307https://access.redhat.com/security/cve/CVE-2024-23672CVE-2024-23672CVE-2024-23672https://access.redhat.com/security/cve/CVE-2024-24549CVE-2024-24549CVE-2024-24549https://bugzilla.redhat.com/22696072269607https://bugzilla.redhat.com/22696082269608https://errata.almalinux.org/9/ALSA-2024-3307.htmlALSA-2024:3307ALSA-2024:3307
��5tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-9.0.87-1.el9_4.1.noarch.rpm��5tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm����	�H	�� ��VBBBBBBBBsecurityImportant: glibc security update��>�https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339
�h�glibc-devel-2.34-100.el9_4.2.i686.rpm�A�glibc-utils-2.34-100.el9_4.2.x86_64.rpm�h�glibc-devel-2.34-100.el9_4.2.x86_64.rpm�(�glibc-doc-2.34-100.el9_4.2.noarch.rpm�@�glibc-locale-source-2.34-100.el9_4.2.x86_64.rpm�?�glibc-headers-2.34-100.el9_4.2.x86_64.rpm�h�glibc-devel-2.34-100.el9_4.2.i686.rpm�A�glibc-utils-2.34-100.el9_4.2.x86_64.rpm�h�glibc-devel-2.34-100.el9_4.2.x86_64.rpm�(�glibc-doc-2.34-100.el9_4.2.noarch.rpm�@�glibc-locale-source-2.34-100.el9_4.2.x86_64.rpm�?�glibc-headers-2.34-100.el9_4.2.x86_64.rpm����|�I	��2��aBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update��N�bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619
	(�Mkernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm)�Mrtla-5.14.0-427.20.1.el9_4.x86_64.rpm+�Mrv-5.14.0-427.20.1.el9_4.x86_64.rpm%�Mkernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$�Mkernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm�Mkernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm#�Mkernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm&�Mkernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm'�Mperf-5.14.0-427.20.1.el9_4.x86_64.rpm	(�Mkernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm)�Mrtla-5.14.0-427.20.1.el9_4.x86_64.rpm+�Mrv-5.14.0-427.20.1.el9_4.x86_64.rpm%�Mkernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$�Mkernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm�Mkernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm#�Mkernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm&�Mkernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm'�Mperf-5.14.0-427.20.1.el9_4.x86_64.rpm����L�J	���KBBBBB��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.1 security, bug fix, and enhancement update��0�/https://access.redhat.com/errata/RHSA-2024:3668RHSA-2024:3668RHSA-2024:3668https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3668.htmlALSA-2024:3668ALSA-2024:3668
��'�K*�1�rubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm�2�rubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm�-�Prubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpm�(�ruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm��rubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�K�\rubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�)�rrubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm�+�&rubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpm�,�[rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm�.�3rubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm��ruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm��Brubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�3�/rubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm�j�ruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm�:�ruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�0�rubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm�;�ruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�/�rubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm��vrubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�*�Crubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm��[rubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm��ruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�4�/rubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm��'�K*�1�rubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm�2�rubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm�-�Prubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpm�(�ruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm��rubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�K�\rubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�)�rrubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm�+�&rubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpm�,�[rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm�.�3rubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm��ruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm��Brubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�3�/rubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm�j�ruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm�:�ruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�0�rubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm�;�ruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�/�rubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm��vrubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�*�Crubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm��[rubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm��ruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm�4�/rubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm����^�K	���zBB�_BE��vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security, bug fix, and enhancement update��_�/https://access.redhat.com/errata/RHSA-2024:3671RHSA-2024:3671RHSA-2024:3671https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3671.htmlALSA-2024:3671ALSA-2024:3671
��O�L*&��rubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpm�4�4rubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm�B�[rubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpm��{ruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�)�yrubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm�0�rubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpm�L�rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm�M�9rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpm�K�xrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpm��]rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�M�9rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpm�:�{ruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�.�5rubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm��{ruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�-�Rrubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpm��rubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�K�[rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm�1�rubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpm�:�{ruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�/�rubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpm�C�rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm�*�'rubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpm�j�{ruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm�(�{ruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm��{ruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�;�{ruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm��]rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpm�,�`rubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpm��rrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpm�;�{ruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�2�rubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpm�K�xrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpm��rubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpm��rubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpm�3�4rubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm��{ruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�+�(rubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpm��rrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpm��O�L*&��rubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpm�4�4rubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm�B�[rubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpm��{ruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�)�yrubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm�0�rubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpm�L�rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm�M�9rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpm�K�xrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpm��]rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�M�9rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpm�:�{ruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�.�5rubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm��{ruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�-�Rrubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpm��rubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�K�[rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm�1�rubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpm�:�{ruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�/�rubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpm�C�rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm�*�'rubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpm�j�{ruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm�(�{ruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm��{ruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�;�{ruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm��]rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpm�,�`rubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpm��rrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpm�;�{ruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm�2�rubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpm�K�xrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpm��rubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpm��rubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpm�3�4rubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm��{ruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm�+�(rubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpm��rrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpm����f�L	����ABBBBBBBBBBBBBBBBsecurityImportant: ipa security update���whttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754

�a�Aipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpm�e�Aipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpm�i�Apython3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpm�h�Apython3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpm�d�Aipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpm�d�Aipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpm�a�Aipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpm�c�Aipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpm�e�Aipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpm�c�Aipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpm�b�Aipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpm�g�Apython3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpm�b�Aipa-common-4.11.0-15.el9_4.alma.1.noarch.rpm
�a�Aipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpm�e�Aipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpm�i�Apython3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpm�h�Apython3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpm�d�Aipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpm�d�Aipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpm�a�Aipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpm�c�Aipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpm�e�Aipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpm�c�Aipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpm�b�Aipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpm�g�Apython3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpm�b�Aipa-common-4.11.0-15.el9_4.alma.1.noarch.rpm��ѧ|�M	��*��TBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update���3https://access.redhat.com/errata/RHSA-2024:3820RHSA-2024:3820RHSA-2024:3820https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-3820.htmlALSA-2024:3820ALSA-2024:3820

�d�'fence-virt-4.10.0-62.el9_4.3.x86_64.rpm�$�'fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm�%�'fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm�c�'fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpm�f�'fence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpm�g�'fence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpm�h�'fence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpm�i�'fence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm�&�'fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm�j�'fence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpm�e�'fence-virtd-4.10.0-62.el9_4.3.x86_64.rpm�#�'fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm�b�'fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm
�d�'fence-virt-4.10.0-62.el9_4.3.x86_64.rpm�$�'fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm�%�'fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm�c�'fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpm�f�'fence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpm�g�'fence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpm�h�'fence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpm�i�'fence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm�&�'fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm�j�'fence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpm�e�'fence-virtd-4.10.0-62.el9_4.3.x86_64.rpm�#�'fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm�b�'fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm����)�N	��0��kBBBsecurityModerate: rpm-ostree security update��8�https://access.redhat.com/errata/RHSA-2024:3823RHSA-2024:3823RHSA-2024:3823https://access.redhat.com/security/cve/CVE-2024-2905CVE-2024-2905CVE-2024-2905https://bugzilla.redhat.com/22715852271585https://errata.almalinux.org/9/ALSA-2024-3823.htmlALSA-2024:3823ALSA-2024:3823
�G�|rpm-ostree-libs-2024.3-3.el9_4.x86_64.rpm�G�|rpm-ostree-libs-2024.3-3.el9_4.i686.rpm��|rpm-ostree-2024.3-3.el9_4.x86_64.rpm�G�|rpm-ostree-libs-2024.3-3.el9_4.x86_64.rpm�G�|rpm-ostree-libs-2024.3-3.el9_4.i686.rpm��|rpm-ostree-2024.3-3.el9_4.x86_64.rpm����V�O	��:��qBBBBBBBsecurityModerate: podman security and bug fix update��I�4https://access.redhat.com/errata/RHSA-2024:3826RHSA-2024:3826RHSA-2024:3826https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-3826.htmlALSA-2024:3826ALSA-2024:3826
�1�&podman-4.9.4-4.el9_4.x86_64.rpm�4�&podman-tests-4.9.4-4.el9_4.x86_64.rpmh�&podman-docker-4.9.4-4.el9_4.noarch.rpm�2�&podman-plugins-4.9.4-4.el9_4.x86_64.rpm�3�&podman-remote-4.9.4-4.el9_4.x86_64.rpm�1�&podman-4.9.4-4.el9_4.x86_64.rpm�4�&podman-tests-4.9.4-4.el9_4.x86_64.rpmh�&podman-docker-4.9.4-4.el9_4.noarch.rpm�2�&podman-plugins-4.9.4-4.el9_4.x86_64.rpm�3�&podman-remote-4.9.4-4.el9_4.x86_64.rpm����B�P	��?��{BBsecurityModerate: buildah security and bug fix update��}�=https://access.redhat.com/errata/RHSA-2024:3827RHSA-2024:3827RHSA-2024:3827https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-3827.htmlALSA-2024:3827ALSA-2024:3827
�0�?buildah-tests-1.33.7-2.el9_4.x86_64.rpm�/�?buildah-1.33.7-2.el9_4.x86_64.rpm�0�?buildah-tests-1.33.7-2.el9_4.x86_64.rpm�/�?buildah-1.33.7-2.el9_4.x86_64.rpm����)�Q	����@securityModerate: gvisor-tap-vsock security and bug fix update��:�{https://access.redhat.com/errata/RHSA-2024:3830RHSA-2024:3830RHSA-2024:3830https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://bugzilla.redhat.com/22680172268017https://errata.almalinux.org/9/ALSA-2024-3830.htmlALSA-2024:3830ALSA-2024:3830
�;�>gvisor-tap-vsock-0.7.3-3.el9_4.alma.1.x86_64.rpm�;�>gvisor-tap-vsock-0.7.3-3.el9_4.alma.1.x86_64.rpm����r�R	����CsecurityModerate: containernetworking-plugins security and bug fix update��5�;https://access.redhat.com/errata/RHSA-2024:3831RHSA-2024:3831RHSA-2024:3831https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://bugzilla.redhat.com/22680172268017https://errata.almalinux.org/9/ALSA-2024-3831.htmlALSA-2024:3831ALSA-2024:3831
�_�containernetworking-plugins-1.4.0-3.el9_4.x86_64.rpm�_�containernetworking-plugins-1.4.0-3.el9_4.x86_64.rpm����:�S	����FBBBBBBBsecurityModerate: gdk-pixbuf2 security update��p�Ahttps://access.redhat.com/errata/RHSA-2024:3834RHSA-2024:3834RHSA-2024:3834https://access.redhat.com/security/cve/CVE-2022-48622CVE-2022-48622CVE-2022-48622https://bugzilla.redhat.com/22605452260545https://errata.almalinux.org/9/ALSA-2024-3834.htmlALSA-2024:3834ALSA-2024:3834
�8�^gdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm�8�^gdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm�9�^gdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpm�7�^gdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpm�7�^gdk-pixbuf2-2.42.6-4.el9_4.i686.rpm�9�^gdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpm�8�^gdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm�8�^gdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm�9�^gdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpm�7�^gdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpm�7�^gdk-pixbuf2-2.42.6-4.el9_4.i686.rpm�9�^gdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpm�����T	��
��PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libreoffice security update��1�Xhttps://access.redhat.com/errata/RHSA-2024:3835RHSA-2024:3835RHSA-2024:3835https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-3835.htmlALSA-2024:3835ALSA-2024:3835
�1�;libreoffice-langpack-ve-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�uautocorr-ca-7.1.8.1-12.el9_4.alma.1.noarch.rpm�5libreoffice-langpack-te-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�wautocorr-da-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-lb-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-fr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�olibreoffice-help-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sv-7.1.8.1-12.el9_4.alma.1.noarch.rpm�*libreoffice-data-7.1.8.1-12.el9_4.alma.1.noarch.rpm�'libreoffice-langpack-pa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�blibreoffice-help-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-tr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�!libreoffice-langpack-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Flibreoffice-writer-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
autocorr-pt-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Dlibreoffice-ure-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-hr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Clibreoffice-pyuno-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�xlibreoffice-impress-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�]libreoffice-help-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-is-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-fa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ro-7.1.8.1-12.el9_4.alma.1.noarch.rpm�8libreoffice-langpack-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Clibreoffice-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-it-7.1.8.1-12.el9_4.alma.1.noarch.rpm�jlibreoffice-help-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�{autocorr-en-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�@libreoffice-math-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�}autocorr-fa-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�klibreoffice-help-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�"libreoffice-langpack-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-zh-7.1.8.1-12.el9_4.alma.1.noarch.rpm�/libreoffice-langpack-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�yautocorr-dsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�alibreoffice-help-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Jlibreoffice-gtk3-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ga-7.1.8.1-12.el9_4.alma.1.noarch.rpm�:libreoffice-langpack-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�mlibreoffice-help-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-nl-7.1.8.1-12.el9_4.alma.1.noarch.rpm�zautocorr-el-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Blibreoffice-base-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Glibreoffice-x11-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Plibreoffice-help-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-vi-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
autocorr-mn-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-vro-7.1.8.1-12.el9_4.alma.1.noarch.rpm�tautocorr-bg-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-hu-7.1.8.1-12.el9_4.alma.1.noarch.rpm�|libreoffice-langpack-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�vautocorr-cs-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�~autocorr-fi-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-pl-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�llibreoffice-help-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�dlibreoffice-help-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Dlibreoffice-core-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�	autocorr-lt-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ilibreofficekit-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�|autocorr-es-7.1.8.1-12.el9_4.alma.1.noarch.rpm�.libreoffice-langpack-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ja-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-hsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm�,libreoffice-langpack-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Tlibreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Elibreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�sautocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Clibreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Glibreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpm�&libreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�xautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Qlibreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpm�-libreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpm�`libreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpm�tlibreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Blibreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�1�;libreoffice-langpack-ve-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�uautocorr-ca-7.1.8.1-12.el9_4.alma.1.noarch.rpm�5libreoffice-langpack-te-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�wautocorr-da-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-lb-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-fr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�olibreoffice-help-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sv-7.1.8.1-12.el9_4.alma.1.noarch.rpm�*libreoffice-data-7.1.8.1-12.el9_4.alma.1.noarch.rpm�'libreoffice-langpack-pa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�blibreoffice-help-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-tr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�!libreoffice-langpack-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Flibreoffice-writer-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
autocorr-pt-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Dlibreoffice-ure-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-hr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Clibreoffice-pyuno-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�xlibreoffice-impress-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�]libreoffice-help-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-is-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-fa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ro-7.1.8.1-12.el9_4.alma.1.noarch.rpm�8libreoffice-langpack-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�flibreoffice-help-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Clibreoffice-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-it-7.1.8.1-12.el9_4.alma.1.noarch.rpm�jlibreoffice-help-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�{autocorr-en-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�@libreoffice-math-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�}autocorr-fa-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�klibreoffice-help-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�"libreoffice-langpack-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-zh-7.1.8.1-12.el9_4.alma.1.noarch.rpm�/libreoffice-langpack-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�yautocorr-dsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�alibreoffice-help-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Jlibreoffice-gtk3-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ga-7.1.8.1-12.el9_4.alma.1.noarch.rpm�:libreoffice-langpack-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�mlibreoffice-help-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-nl-7.1.8.1-12.el9_4.alma.1.noarch.rpm�zautocorr-el-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Blibreoffice-base-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Glibreoffice-x11-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Plibreoffice-help-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-vi-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�
autocorr-mn-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-vro-7.1.8.1-12.el9_4.alma.1.noarch.rpm�tautocorr-bg-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-hu-7.1.8.1-12.el9_4.alma.1.noarch.rpm�|libreoffice-langpack-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�vautocorr-cs-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�~autocorr-fi-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-pl-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�llibreoffice-help-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�dlibreoffice-help-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Dlibreoffice-core-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�	autocorr-lt-7.1.8.1-12.el9_4.alma.1.noarch.rpm�libreoffice-langpack-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ilibreofficekit-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�|autocorr-es-7.1.8.1-12.el9_4.alma.1.noarch.rpm�.libreoffice-langpack-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ja-7.1.8.1-12.el9_4.alma.1.noarch.rpm�autocorr-hsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm�,libreoffice-langpack-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Tlibreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Elibreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�sautocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Clibreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Glibreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpm�&libreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpm�xautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Qlibreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpm�-libreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpm�`libreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpm�tlibreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�autocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpm�Blibreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm����3�U	����KBBBsecurityImportant: 389-ds-base security update��	�mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837
�/�ypython3-lib389-2.4.5-8.el9_4.noarch.rpm��y389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm��y389-ds-base-2.4.5-8.el9_4.x86_64.rpm�/�ypython3-lib389-2.4.5-8.el9_4.noarch.rpm��y389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm��y389-ds-base-2.4.5-8.el9_4.x86_64.rpm�����V	��0��QBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security update��v�Xhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838
�K�?rubygem-rbs-1.4.0-162.el9_4.noarch.rpm�*�:rubygem-irb-1.3.5-162.el9_4.noarch.rpm�0�rubygem-rss-0.2.9-162.el9_4.noarch.rpm�;�=ruby-libs-3.0.7-162.el9_4.i686.rpm��Wrubygem-json-2.5.1-162.el9_4.x86_64.rpm�:�=ruby-devel-3.0.7-162.el9_4.i686.rpm�3�)rubygems-3.2.33-162.el9_4.noarch.rpm�-�Lrubygem-rake-13.0.3-162.el9_4.noarch.rpm��rrubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpm�)�mrubygem-bundler-2.2.33-162.el9_4.noarch.rpm�2�rubygem-typeprof-0.15.2-162.el9_4.noarch.rpm�.�.rubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpm��Drubygem-io-console-0.5.7-162.el9_4.x86_64.rpm��|rubygem-psych-3.3.2-162.el9_4.x86_64.rpm��=ruby-3.0.7-162.el9_4.i686.rpm�4�)rubygems-devel-3.2.33-162.el9_4.noarch.rpm�+�"rubygem-minitest-5.14.2-162.el9_4.noarch.rpm�:�=ruby-devel-3.0.7-162.el9_4.x86_64.rpm�,�-rubygem-power_assert-1.2.1-162.el9_4.noarch.rpm�/�rubygem-rexml-3.2.5-162.el9_4.noarch.rpm�;�=ruby-libs-3.0.7-162.el9_4.x86_64.rpm��=ruby-3.0.7-162.el9_4.x86_64.rpm�1�rubygem-test-unit-3.3.7-162.el9_4.noarch.rpm�(�=ruby-default-gems-3.0.7-162.el9_4.noarch.rpm�K�?rubygem-rbs-1.4.0-162.el9_4.noarch.rpm�*�:rubygem-irb-1.3.5-162.el9_4.noarch.rpm�0�rubygem-rss-0.2.9-162.el9_4.noarch.rpm�;�=ruby-libs-3.0.7-162.el9_4.i686.rpm��Wrubygem-json-2.5.1-162.el9_4.x86_64.rpm�:�=ruby-devel-3.0.7-162.el9_4.i686.rpm�3�)rubygems-3.2.33-162.el9_4.noarch.rpm�-�Lrubygem-rake-13.0.3-162.el9_4.noarch.rpm��rrubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpm�)�mrubygem-bundler-2.2.33-162.el9_4.noarch.rpm�2�rubygem-typeprof-0.15.2-162.el9_4.noarch.rpm�.�.rubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpm��Drubygem-io-console-0.5.7-162.el9_4.x86_64.rpm��|rubygem-psych-3.3.2-162.el9_4.x86_64.rpm��=ruby-3.0.7-162.el9_4.i686.rpm�4�)rubygems-devel-3.2.33-162.el9_4.noarch.rpm�+�"rubygem-minitest-5.14.2-162.el9_4.noarch.rpm�:�=ruby-devel-3.0.7-162.el9_4.x86_64.rpm�,�-rubygem-power_assert-1.2.1-162.el9_4.noarch.rpm�/�rubygem-rexml-3.2.5-162.el9_4.noarch.rpm�;�=ruby-libs-3.0.7-162.el9_4.x86_64.rpm��=ruby-3.0.7-162.el9_4.x86_64.rpm�1�rubygem-test-unit-3.3.7-162.el9_4.noarch.rpm�(�=ruby-default-gems-3.0.7-162.el9_4.noarch.rpm����F�W	��4��qBsecurityLow: c-ares security update�6��N�https://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842
�5�'c-ares-devel-1.19.1-2.el9_4.x86_64.rpm�5�'c-ares-devel-1.19.1-2.el9_4.i686.rpm�5�'c-ares-devel-1.19.1-2.el9_4.x86_64.rpm�5�'c-ares-devel-1.19.1-2.el9_4.i686.rpm����W�X	��9��uBBsecurityModerate: cockpit security update��P�Ehttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843
�U�Ocockpit-storaged-311.2-1.el9_4.noarch.rpm�T�Ocockpit-packagekit-311.2-1.el9_4.noarch.rpm�G�Ocockpit-pcp-311.2-1.el9_4.x86_64.rpm�U�Ocockpit-storaged-311.2-1.el9_4.noarch.rpm�T�Ocockpit-packagekit-311.2-1.el9_4.noarch.rpm�G�Ocockpit-pcp-311.2-1.el9_4.x86_64.rpm����b�Y	��>��zBBsecurityImportant: firefox security update���/https://access.redhat.com/errata/RHSA-2024:3955RHSA-2024:3955RHSA-2024:3955https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-3955.htmlALSA-2024:3955ALSA-2024:3955
8�firefox-115.12.0-1.el9_4.alma.1.x86_64.rpmP�firefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpm8�firefox-115.12.0-1.el9_4.alma.1.x86_64.rpmP�firefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpm���v�Z	����BBBBBBsecurityImportant: flatpak security update��D�|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959
�8�Tflatpak-selinux-1.12.9-1.el9_4.noarch.rpm�^�Tflatpak-1.12.9-1.el9_4.x86_64.rpm�2�Tflatpak-libs-1.12.9-1.el9_4.x86_64.rpm�_�Tflatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm�2�Tflatpak-libs-1.12.9-1.el9_4.i686.rpm�8�Tflatpak-selinux-1.12.9-1.el9_4.noarch.rpm�^�Tflatpak-1.12.9-1.el9_4.x86_64.rpm�2�Tflatpak-libs-1.12.9-1.el9_4.x86_64.rpm�_�Tflatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm�2�Tflatpak-libs-1.12.9-1.el9_4.i686.rpm����B�[	����HBBBBBBBBBBBBsecurityImportant: ghostscript security update��@�qhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999
�e�qlibgs-9.54.0-16.el9_4.x86_64.rpm��qghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm��qghostscript-9.54.0-16.el9_4.x86_64.rpm��qghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm�k�qghostscript-doc-9.54.0-16.el9_4.noarch.rpm��qghostscript-x11-9.54.0-16.el9_4.x86_64.rpm�e�qlibgs-9.54.0-16.el9_4.i686.rpm��qghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm�e�qlibgs-9.54.0-16.el9_4.x86_64.rpm��qghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm��qghostscript-9.54.0-16.el9_4.x86_64.rpm��qghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm�k�qghostscript-doc-9.54.0-16.el9_4.noarch.rpm��qghostscript-x11-9.54.0-16.el9_4.x86_64.rpm�e�qlibgs-9.54.0-16.el9_4.i686.rpm��qghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm���\	����WsecurityImportant: thunderbird security update��1�https://access.redhat.com/errata/RHSA-2024:4002RHSA-2024:4002RHSA-2024:4002https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-4002.htmlALSA-2024:4002ALSA-2024:4002
9�thunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpm9�thunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpm����E�]	����ZsecurityModerate: libreswan security update��G�Ohttps://access.redhat.com/errata/RHSA-2024:4050RHSA-2024:4050RHSA-2024:4050https://access.redhat.com/security/cve/CVE-2024-3652CVE-2024-3652CVE-2024-3652https://bugzilla.redhat.com/22744482274448https://errata.almalinux.org/9/ALSA-2024-4050.htmlALSA-2024:4050ALSA-2024:4050
�J�libreswan-4.12-2.el9_4.1.x86_64.rpm�J�libreswan-4.12-2.el9_4.1.x86_64.rpm����k�^	��'��]BBBBBBBBsecurityImportant: python3.11 security update���0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077
�P�(python3.11-3.11.7-1.el9_4.1.x86_64.rpm[�(python3.11-devel-3.11.7-1.el9_4.1.i686.rpm\�(python3.11-libs-3.11.7-1.el9_4.1.i686.rpm\�(python3.11-libs-3.11.7-1.el9_4.1.x86_64.rpm�Q�(python3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm[�(python3.11-devel-3.11.7-1.el9_4.1.x86_64.rpm�P�(python3.11-3.11.7-1.el9_4.1.x86_64.rpm[�(python3.11-devel-3.11.7-1.el9_4.1.i686.rpm\�(python3.11-libs-3.11.7-1.el9_4.1.i686.rpm\�(python3.11-libs-3.11.7-1.el9_4.1.x86_64.rpm�Q�(python3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm[�(python3.11-devel-3.11.7-1.el9_4.1.x86_64.rpm���I�_	��.��hBBBBsecurityImportant: python3.9 security update��F�https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078
Q�python3-devel-3.9.18-3.el9_4.1.i686.rpmf�python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm�+�python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.1.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.1.i686.rpmf�python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm�+�python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.1.x86_64.rpm���'�`	����oBBBBBBBBBBBBBBBBBBsecurityImportant: git security update��[�https://access.redhat.com/errata/RHSA-2024:4083RHSA-2024:4083RHSA-2024:4083https://access.redhat.com/security/cve/CVE-2024-32002CVE-2024-32002CVE-2024-32002https://access.redhat.com/security/cve/CVE-2024-32004CVE-2024-32004CVE-2024-32004https://access.redhat.com/security/cve/CVE-2024-32020CVE-2024-32020CVE-2024-32020https://access.redhat.com/security/cve/CVE-2024-32021CVE-2024-32021CVE-2024-32021https://access.redhat.com/security/cve/CVE-2024-32465CVE-2024-32465CVE-2024-32465https://bugzilla.redhat.com/22804212280421https://bugzilla.redhat.com/22804282280428https://bugzilla.redhat.com/22804462280446https://bugzilla.redhat.com/22804662280466https://bugzilla.redhat.com/22804842280484https://errata.almalinux.org/9/ALSA-2024-4083.htmlALSA-2024:4083ALSA-2024:4083
�-�perl-Git-2.43.5-1.el9_4.noarch.rpm�$�git-instaweb-2.43.5-1.el9_4.noarch.rpm�>�git-subtree-2.43.5-1.el9_4.x86_64.rpm�=�git-daemon-2.43.5-1.el9_4.x86_64.rpm�"�git-email-2.43.5-1.el9_4.noarch.rpm�%�git-svn-2.43.5-1.el9_4.noarch.rpm�<�git-credential-libsecret-2.43.5-1.el9_4.x86_64.rpm�!�git-core-doc-2.43.5-1.el9_4.noarch.rpm�.�perl-Git-SVN-2.43.5-1.el9_4.noarch.rpm�'�gitweb-2.43.5-1.el9_4.noarch.rpm�;�git-core-2.43.5-1.el9_4.x86_64.rpm�#�git-gui-2.43.5-1.el9_4.noarch.rpm� �git-all-2.43.5-1.el9_4.noarch.rpm�&�gitk-2.43.5-1.el9_4.noarch.rpm�:�git-2.43.5-1.el9_4.x86_64.rpm�-�perl-Git-2.43.5-1.el9_4.noarch.rpm�$�git-instaweb-2.43.5-1.el9_4.noarch.rpm�>�git-subtree-2.43.5-1.el9_4.x86_64.rpm�=�git-daemon-2.43.5-1.el9_4.x86_64.rpm�"�git-email-2.43.5-1.el9_4.noarch.rpm�%�git-svn-2.43.5-1.el9_4.noarch.rpm�<�git-credential-libsecret-2.43.5-1.el9_4.x86_64.rpm�!�git-core-doc-2.43.5-1.el9_4.noarch.rpm�.�perl-Git-SVN-2.43.5-1.el9_4.noarch.rpm�'�gitweb-2.43.5-1.el9_4.noarch.rpm�;�git-core-2.43.5-1.el9_4.x86_64.rpm�#�git-gui-2.43.5-1.el9_4.noarch.rpm� �git-all-2.43.5-1.el9_4.noarch.rpm�&�gitk-2.43.5-1.el9_4.noarch.rpm�:�git-2.43.5-1.el9_4.x86_64.rpm���T�a	����DBBBBBBBBsecurityImportant: pki-core security update��z�
https://access.redhat.com/errata/RHSA-2024:4165RHSA-2024:4165RHSA-2024:4165https://access.redhat.com/security/cve/CVE-2023-4727CVE-2023-4727CVE-2023-4727https://bugzilla.redhat.com/22322182232218https://errata.almalinux.org/9/ALSA-2024-4165.htmlALSA-2024:4165ALSA-2024:4165
	�Y�'idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpm�X�'idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpm�
�'python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpm�\�'idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpm�V�'idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpm�]�'idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpm�[�'idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpm�W�'idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpm�Z�'idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm	�Y�'idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpm�X�'idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpm�
�'python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpm�\�'idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpm�V�'idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpm�]�'idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpm�[�'idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpm�W�'idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpm�Z�'idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm����)�b	����OBBBBBBBBsecurityModerate: golang security update���Mhttps://access.redhat.com/errata/RHSA-2024:4212RHSA-2024:4212RHSA-2024:4212https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://errata.almalinux.org/9/ALSA-2024-4212.htmlALSA-2024:4212ALSA-2024:4212
o�+golang-src-1.21.11-1.el9_4.noarch.rpmm�+golang-docs-1.21.11-1.el9_4.noarch.rpm�G�+golang-1.21.11-1.el9_4.x86_64.rpmp�+golang-tests-1.21.11-1.el9_4.noarch.rpmn�+golang-misc-1.21.11-1.el9_4.noarch.rpm�N�+go-toolset-1.21.11-1.el9_4.x86_64.rpm�H�+golang-bin-1.21.11-1.el9_4.x86_64.rpmo�+golang-src-1.21.11-1.el9_4.noarch.rpmm�+golang-docs-1.21.11-1.el9_4.noarch.rpm�G�+golang-1.21.11-1.el9_4.x86_64.rpmp�+golang-tests-1.21.11-1.el9_4.noarch.rpmn�+golang-misc-1.21.11-1.el9_4.noarch.rpm�N�+go-toolset-1.21.11-1.el9_4.x86_64.rpm�H�+golang-bin-1.21.11-1.el9_4.x86_64.rpm����^�c	����ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security update��Q�rhttps://access.redhat.com/errata/RHSA-2024:4278RHSA-2024:4278RHSA-2024:4278https://access.redhat.com/security/cve/CVE-2024-4467CVE-2024-4467CVE-2024-4467https://bugzilla.redhat.com/22788752278875https://errata.almalinux.org/9/ALSA-2024-4278.htmlALSA-2024:4278ALSA-2024:4278
�;_qemu-kvm-device-usb-host-8.2.0-11.el9_4.4.x86_64.rpm�6_qemu-kvm-common-8.2.0-11.el9_4.4.x86_64.rpm�=_qemu-kvm-docs-8.2.0-11.el9_4.4.x86_64.rpm�:_qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4.x86_64.rpm�2_qemu-kvm-8.2.0-11.el9_4.4.x86_64.rpm�A_qemu-pr-helper-8.2.0-11.el9_4.4.x86_64.rpm�4_qemu-kvm-block-curl-8.2.0-11.el9_4.4.x86_64.rpm�3_qemu-kvm-audio-pa-8.2.0-11.el9_4.4.x86_64.rpm�1_qemu-img-8.2.0-11.el9_4.4.x86_64.rpm�<_qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4.x86_64.rpm�7_qemu-kvm-core-8.2.0-11.el9_4.4.x86_64.rpm�K_qemu-kvm-block-blkio-8.2.0-11.el9_4.4.x86_64.rpm�8_qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4.x86_64.rpm�?_qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4.x86_64.rpm�9_qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4.x86_64.rpm�>_qemu-kvm-tools-8.2.0-11.el9_4.4.x86_64.rpm�0_qemu-guest-agent-8.2.0-11.el9_4.4.x86_64.rpm�5_qemu-kvm-block-rbd-8.2.0-11.el9_4.4.x86_64.rpm�@_qemu-kvm-ui-opengl-8.2.0-11.el9_4.4.x86_64.rpm�;_qemu-kvm-device-usb-host-8.2.0-11.el9_4.4.x86_64.rpm�6_qemu-kvm-common-8.2.0-11.el9_4.4.x86_64.rpm�=_qemu-kvm-docs-8.2.0-11.el9_4.4.x86_64.rpm�:_qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4.x86_64.rpm�2_qemu-kvm-8.2.0-11.el9_4.4.x86_64.rpm�A_qemu-pr-helper-8.2.0-11.el9_4.4.x86_64.rpm�4_qemu-kvm-block-curl-8.2.0-11.el9_4.4.x86_64.rpm�3_qemu-kvm-audio-pa-8.2.0-11.el9_4.4.x86_64.rpm�1_qemu-img-8.2.0-11.el9_4.4.x86_64.rpm�<_qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4.x86_64.rpm�7_qemu-kvm-core-8.2.0-11.el9_4.4.x86_64.rpm�K_qemu-kvm-block-blkio-8.2.0-11.el9_4.4.x86_64.rpm�8_qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4.x86_64.rpm�?_qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4.x86_64.rpm�9_qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4.x86_64.rpm�>_qemu-kvm-tools-8.2.0-11.el9_4.4.x86_64.rpm�0_qemu-guest-agent-8.2.0-11.el9_4.4.x86_64.rpm�5_qemu-kvm-block-rbd-8.2.0-11.el9_4.4.x86_64.rpm�@_qemu-kvm-ui-opengl-8.2.0-11.el9_4.4.x86_64.rpm�����d	����ABBsecurityImportant: openssh security update��C�shttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312
��1pam_ssh_agent_auth-0.10.4-5.38.el9_4.1.x86_64.rpm��Sopenssh-askpass-8.7p1-38.el9_4.1.x86_64.rpm��1pam_ssh_agent_auth-0.10.4-5.38.el9_4.1.x86_64.rpm��Sopenssh-askpass-8.7p1-38.el9_4.1.x86_64.rpm�����e	����FBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update��6�https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349
	#�Nkernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm+�Nrv-5.14.0-427.24.1.el9_4.x86_64.rpm)�Nrtla-5.14.0-427.24.1.el9_4.x86_64.rpm'�Nperf-5.14.0-427.24.1.el9_4.x86_64.rpm$�Nkernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm(�Nkernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm�Nkernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm&�Nkernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm%�Nkernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpm	#�Nkernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm+�Nrv-5.14.0-427.24.1.el9_4.x86_64.rpm)�Nrtla-5.14.0-427.24.1.el9_4.x86_64.rpm'�Nperf-5.14.0-427.24.1.el9_4.x86_64.rpm$�Nkernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm(�Nkernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm�Nkernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm&�Nkernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm%�Nkernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpm����x�f	����XBBsecurityImportant: buildah security update��D�https://access.redhat.com/errata/RHSA-2024:4371RHSA-2024:4371RHSA-2024:4371https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4371.htmlALSA-2024:4371ALSA-2024:4371
�/�@buildah-1.33.7-3.el9_4.x86_64.rpm�0�@buildah-tests-1.33.7-3.el9_4.x86_64.rpm�/�@buildah-1.33.7-3.el9_4.x86_64.rpm�0�@buildah-tests-1.33.7-3.el9_4.x86_64.rpm����.�g	��&��]BBBBBBBsecurityImportant: podman security update��O�uhttps://access.redhat.com/errata/RHSA-2024:4378RHSA-2024:4378RHSA-2024:4378https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4378.htmlALSA-2024:4378ALSA-2024:4378
�3�'podman-remote-4.9.4-5.el9_4.x86_64.rpm�4�'podman-tests-4.9.4-5.el9_4.x86_64.rpm�2�'podman-plugins-4.9.4-5.el9_4.x86_64.rpm�1�'podman-4.9.4-5.el9_4.x86_64.rpmh�'podman-docker-4.9.4-5.el9_4.noarch.rpm�3�'podman-remote-4.9.4-5.el9_4.x86_64.rpm�4�'podman-tests-4.9.4-5.el9_4.x86_64.rpm�2�'podman-plugins-4.9.4-5.el9_4.x86_64.rpm�1�'podman-4.9.4-5.el9_4.x86_64.rpmh�'podman-docker-4.9.4-5.el9_4.noarch.rpm����M�h	��)��gsecurityImportant: gvisor-tap-vsock security update��D�Ghttps://access.redhat.com/errata/RHSA-2024:4379RHSA-2024:4379RHSA-2024:4379https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4379.htmlALSA-2024:4379ALSA-2024:4379
�;�?gvisor-tap-vsock-0.7.3-4.el9_4.alma.1.x86_64.rpm�;�?gvisor-tap-vsock-0.7.3-4.el9_4.alma.1.x86_64.rpm����F�i	����jBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update���https://access.redhat.com/errata/RHSA-2024:4422RHSA-2024:4422RHSA-2024:4422https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-4422.htmlALSA-2024:4422ALSA-2024:4422

�&�(fence-agents-virsh-4.10.0-62.el9_4.4.alma.1.noarch.rpm�e�(fence-virtd-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�i�(fence-virtd-serial-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�j�(fence-virtd-tcp-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�c�(fence-agents-kubevirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�h�(fence-virtd-multicast-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�g�(fence-virtd-libvirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�%�(fence-agents-ibm-vpc-4.10.0-62.el9_4.4.alma.1.noarch.rpm�f�(fence-virtd-cpg-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�b�(fence-agents-compute-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�$�(fence-agents-ibm-powervs-4.10.0-62.el9_4.4.alma.1.noarch.rpm�#�(fence-agents-common-4.10.0-62.el9_4.4.alma.1.noarch.rpm�d�(fence-virt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm
�&�(fence-agents-virsh-4.10.0-62.el9_4.4.alma.1.noarch.rpm�e�(fence-virtd-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�i�(fence-virtd-serial-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�j�(fence-virtd-tcp-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�c�(fence-agents-kubevirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�h�(fence-virtd-multicast-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�g�(fence-virtd-libvirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�%�(fence-agents-ibm-vpc-4.10.0-62.el9_4.4.alma.1.noarch.rpm�f�(fence-virtd-cpg-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�b�(fence-agents-compute-4.10.0-62.el9_4.4.alma.1.x86_64.rpm�$�(fence-agents-ibm-powervs-4.10.0-62.el9_4.4.alma.1.noarch.rpm�#�(fence-agents-common-4.10.0-62.el9_4.4.alma.1.noarch.rpm�d�(fence-virt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm����L�j	����ABBBBBBBBBBBBBBsecurityModerate: dotnet6.0 security update���Jhttps://access.redhat.com/errata/RHSA-2024:4439RHSA-2024:4439RHSA-2024:4439https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4439.htmlALSA-2024:4439ALSA-2024:4439
�M�Raspnetcore-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm�N�Rdotnet-apphost-pack-6.0-6.0.32-1.el9_4.x86_64.rpm�P�Rdotnet-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm�O�Rdotnet-hostfxr-6.0-6.0.32-1.el9_4.x86_64.rpm�S�_dotnet-templates-6.0-6.0.132-1.el9_4.x86_64.rpm�R�Rdotnet-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm�L�Raspnetcore-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm�Q�_dotnet-sdk-6.0-6.0.132-1.el9_4.x86_64.rpm�M�Raspnetcore-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm�N�Rdotnet-apphost-pack-6.0-6.0.32-1.el9_4.x86_64.rpm�P�Rdotnet-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm�O�Rdotnet-hostfxr-6.0-6.0.32-1.el9_4.x86_64.rpm�S�_dotnet-templates-6.0-6.0.132-1.el9_4.x86_64.rpm�R�Rdotnet-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm�L�Raspnetcore-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm�Q�_dotnet-sdk-6.0-6.0.132-1.el9_4.x86_64.rpm����Z�k	��,��RBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: dotnet8.0 security update��g�&https://access.redhat.com/errata/RHSA-2024:4450RHSA-2024:4450RHSA-2024:4450https://access.redhat.com/security/cve/CVE-2024-30105CVE-2024-30105CVE-2024-30105https://access.redhat.com/security/cve/CVE-2024-35264CVE-2024-35264CVE-2024-35264https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953202295320https://bugzilla.redhat.com/22953212295321https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4450.htmlALSA-2024:4450ALSA-2024:4450

�x�@dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm�`�@dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm�Y�@aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm�!�@dotnet-host-8.0.7-1.el9_4.x86_64.rpm�w�@dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpm�y�@dotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm�{�@dotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm�"�Vnetstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpm�z�Vdotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm�v�@aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm�u�@aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm�|�Vdotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm�a�Vdotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm
�x�@dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm�`�@dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm�Y�@aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm�!�@dotnet-host-8.0.7-1.el9_4.x86_64.rpm�w�@dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpm�y�@dotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm�{�@dotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm�"�Vnetstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpm�z�Vdotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm�v�@aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm�u�@aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm�|�Vdotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm�a�Vdotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm�����l	��1��mBBsecurityModerate: openssh security update��
�https://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457
��2pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm��Topenssh-askpass-8.7p1-38.el9_4.4.x86_64.rpm��2pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm��Topenssh-askpass-8.7p1-38.el9_4.4.x86_64.rpm��ߴ�m	��6��rBBsecurityImportant: firefox security update���4https://access.redhat.com/errata/RHSA-2024:4500RHSA-2024:4500RHSA-2024:4500https://access.redhat.com/security/cve/CVE-2024-6601CVE-2024-6601CVE-2024-6601https://access.redhat.com/security/cve/CVE-2024-6603CVE-2024-6603CVE-2024-6603https://access.redhat.com/security/cve/CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/22966362296636https://bugzilla.redhat.com/22966382296638https://bugzilla.redhat.com/22966392296639https://errata.almalinux.org/9/ALSA-2024-4500.htmlALSA-2024:4500ALSA-2024:4500
8�bfirefox-115.13.0-3.el9_4.alma.1.x86_64.rpmP�bfirefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm8�bfirefox-115.13.0-3.el9_4.alma.1.x86_64.rpmP�bfirefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm��߱m�n	��;��wBBsecurityImportant: skopeo security update��G�Nhttps://access.redhat.com/errata/RHSA-2024:4502RHSA-2024:4502RHSA-2024:4502https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4502.htmlALSA-2024:4502ALSA-2024:4502
�c�4skopeo-1.14.3-3.el9_4.x86_64.rpm�d�4skopeo-tests-1.14.3-3.el9_4.x86_64.rpm�c�4skopeo-1.14.3-3.el9_4.x86_64.rpm�d�4skopeo-tests-1.14.3-3.el9_4.x86_64.rpm��߱
�o	����|BBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update���Phttps://access.redhat.com/errata/RHSA-2024:4563RHSA-2024:4563RHSA-2024:4563https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4563.htmlALSA-2024:4563ALSA-2024:4563
�X�pjava-1.8.0-openjdk-src-1.8.0.422.b05-2.el9.x86_64.rpm�V�pjava-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9.x86_64.rpm�T�pjava-1.8.0-openjdk-1.8.0.422.b05-2.el9.x86_64.rpm�8�pjava-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9.noarch.rpm�W�pjava-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9.x86_64.rpm�7�pjava-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9.noarch.rpm�U�pjava-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9.x86_64.rpm�X�pjava-1.8.0-openjdk-src-1.8.0.422.b05-2.el9.x86_64.rpm�V�pjava-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9.x86_64.rpm�T�pjava-1.8.0-openjdk-1.8.0.422.b05-2.el9.x86_64.rpm�8�pjava-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9.noarch.rpm�W�pjava-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9.x86_64.rpm�7�pjava-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9.noarch.rpm�U�pjava-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9.x86_64.rpm����R�p	����IBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update��e�Ohttps://access.redhat.com/errata/RHSA-2024:4567RHSA-2024:4567RHSA-2024:4567https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4567.htmlALSA-2024:4567ALSA-2024:4567
	�I� java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9.x86_64.rpm�F� java-11-openjdk-devel-11.0.24.0.8-2.el9.x86_64.rpm�E� java-11-openjdk-demo-11.0.24.0.8-2.el9.x86_64.rpm�D� java-11-openjdk-11.0.24.0.8-2.el9.x86_64.rpm�G� java-11-openjdk-headless-11.0.24.0.8-2.el9.x86_64.rpm�J� java-11-openjdk-jmods-11.0.24.0.8-2.el9.x86_64.rpm�L� java-11-openjdk-static-libs-11.0.24.0.8-2.el9.x86_64.rpm�H� java-11-openjdk-javadoc-11.0.24.0.8-2.el9.x86_64.rpm�K� java-11-openjdk-src-11.0.24.0.8-2.el9.x86_64.rpm	�I� java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9.x86_64.rpm�F� java-11-openjdk-devel-11.0.24.0.8-2.el9.x86_64.rpm�E� java-11-openjdk-demo-11.0.24.0.8-2.el9.x86_64.rpm�D� java-11-openjdk-11.0.24.0.8-2.el9.x86_64.rpm�G� java-11-openjdk-headless-11.0.24.0.8-2.el9.x86_64.rpm�J� java-11-openjdk-jmods-11.0.24.0.8-2.el9.x86_64.rpm�L� java-11-openjdk-static-libs-11.0.24.0.8-2.el9.x86_64.rpm�H� java-11-openjdk-javadoc-11.0.24.0.8-2.el9.x86_64.rpm�K� java-11-openjdk-src-11.0.24.0.8-2.el9.x86_64.rpm����n�q	��.��\BBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update��4�ihttps://access.redhat.com/errata/RHSA-2024:4568RHSA-2024:4568RHSA-2024:4568https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4568.htmlALSA-2024:4568ALSA-2024:4568
	��$java-17-openjdk-headless-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-static-libs-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-devel-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-jmods-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-javadoc-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-demo-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-src-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9.x86_64.rpm	��$java-17-openjdk-headless-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-static-libs-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-devel-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-jmods-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-javadoc-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-demo-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-src-17.0.12.0.7-2.el9.x86_64.rpm��$java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9.x86_64.rpm����h�r	����oBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update���ihttps://access.redhat.com/errata/RHSA-2024:4573RHSA-2024:4573RHSA-2024:4573https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4573.htmlALSA-2024:4573ALSA-2024:4573
	�r�6java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�s�6java-21-openjdk-jmods-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�t�6java-21-openjdk-src-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�u�6java-21-openjdk-static-libs-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�q�6java-21-openjdk-javadoc-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�m�6java-21-openjdk-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�o�6java-21-openjdk-devel-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�n�6java-21-openjdk-demo-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�p�6java-21-openjdk-headless-21.0.4.0.7-1.el9.alma.1.x86_64.rpm	�r�6java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�s�6java-21-openjdk-jmods-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�t�6java-21-openjdk-src-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�u�6java-21-openjdk-static-libs-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�q�6java-21-openjdk-javadoc-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�m�6java-21-openjdk-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�o�6java-21-openjdk-devel-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�n�6java-21-openjdk-demo-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�p�6java-21-openjdk-headless-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�����s	����BBBBBBBBBBBBBBBBsecurityImportant: kernel security update���$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583
	%�Okernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm+�Orv-5.14.0-427.26.1.el9_4.x86_64.rpm�Okernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm#�Okernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm)�Ortla-5.14.0-427.26.1.el9_4.x86_64.rpm$�Okernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm'�Operf-5.14.0-427.26.1.el9_4.x86_64.rpm(�Okernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm&�Okernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm	%�Okernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm+�Orv-5.14.0-427.26.1.el9_4.x86_64.rpm�Okernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm#�Okernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm)�Ortla-5.14.0-427.26.1.el9_4.x86_64.rpm$�Okernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm'�Operf-5.14.0-427.26.1.el9_4.x86_64.rpm(�Okernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm&�Okernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm����#�t	��-��TBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qt5-qtbase security update�� �@https://access.redhat.com/errata/RHSA-2024:4623RHSA-2024:4623RHSA-2024:4623https://access.redhat.com/security/cve/CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/22958672295867https://errata.almalinux.org/9/ALSA-2024-4623.htmlALSA-2024:4623ALSA-2024:4623
�Hqt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm�Jqt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm�Hqt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm�Eqt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm�Gqt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm�Gqt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm�Iqt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm�Dqt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm�Cqt5-qtbase-5.15.9-10.el9_4.x86_64.rpm�Iqt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm�Dqt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm�Fqt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm�Fqt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm�Eqt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm�Cqt5-qtbase-5.15.9-10.el9_4.i686.rpm�Rqt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm�Jqt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm�Hqt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm�Jqt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm�Hqt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm�Eqt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm�Gqt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm�Gqt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm�Iqt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm�Dqt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm�Cqt5-qtbase-5.15.9-10.el9_4.x86_64.rpm�Iqt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm�Dqt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm�Fqt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm�Fqt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm�Eqt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm�Cqt5-qtbase-5.15.9-10.el9_4.i686.rpm�Rqt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm�Jqt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm����u	��0��nsecurityImportant: thunderbird security update��`�https://access.redhat.com/errata/RHSA-2024:4624RHSA-2024:4624RHSA-2024:4624https://access.redhat.com/security/cve/CVE-2024-6601CVE-2024-6601CVE-2024-6601https://access.redhat.com/security/cve/CVE-2024-6603CVE-2024-6603CVE-2024-6603https://access.redhat.com/security/cve/CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/22966362296636https://bugzilla.redhat.com/22966382296638https://bugzilla.redhat.com/22966392296639https://errata.almalinux.org/9/ALSA-2024-4624.htmlALSA-2024:4624ALSA-2024:4624
9�bthunderbird-115.13.0-3.el9_4.alma.1.x86_64.rpm9�bthunderbird-115.13.0-3.el9_4.alma.1.x86_64.rpm���1�v	����qBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security update��c�qhttps://access.redhat.com/errata/RHSA-2024:4726RHSA-2024:4726RHSA-2024:4726https://access.redhat.com/security/cve/CVE-2024-38473CVE-2024-38473CVE-2024-38473https://access.redhat.com/security/cve/CVE-2024-38474CVE-2024-38474CVE-2024-38474https://access.redhat.com/security/cve/CVE-2024-38475CVE-2024-38475CVE-2024-38475https://access.redhat.com/security/cve/CVE-2024-38477CVE-2024-38477CVE-2024-38477https://access.redhat.com/security/cve/CVE-2024-39573CVE-2024-39573CVE-2024-39573https://bugzilla.redhat.com/22950122295012https://bugzilla.redhat.com/22950132295013https://bugzilla.redhat.com/22950142295014https://bugzilla.redhat.com/22950162295016https://bugzilla.redhat.com/22950222295022https://errata.almalinux.org/9/ALSA-2024-4726.htmlALSA-2024:4726ALSA-2024:4726
�P�omod_session-2.4.57-11.el9_4.x86_64.rpm�M�omod_ldap-2.4.57-11.el9_4.x86_64.rpm�A�ohttpd-core-2.4.57-11.el9_4.x86_64.rpm�O�mod_proxy_html-2.4.57-11.el9_4.x86_64.rpm�B�ohttpd-devel-2.4.57-11.el9_4.x86_64.rpm�}�ohttpd-filesystem-2.4.57-11.el9_4.noarch.rpm�C�ohttpd-tools-2.4.57-11.el9_4.x86_64.rpm�Q�mod_ssl-2.4.57-11.el9_4.x86_64.rpm�~�ohttpd-manual-2.4.57-11.el9_4.noarch.rpm�N�omod_lua-2.4.57-11.el9_4.x86_64.rpm�@�ohttpd-2.4.57-11.el9_4.x86_64.rpm�P�omod_session-2.4.57-11.el9_4.x86_64.rpm�M�omod_ldap-2.4.57-11.el9_4.x86_64.rpm�A�ohttpd-core-2.4.57-11.el9_4.x86_64.rpm�O�mod_proxy_html-2.4.57-11.el9_4.x86_64.rpm�B�ohttpd-devel-2.4.57-11.el9_4.x86_64.rpm�}�ohttpd-filesystem-2.4.57-11.el9_4.noarch.rpm�C�ohttpd-tools-2.4.57-11.el9_4.x86_64.rpm�Q�mod_ssl-2.4.57-11.el9_4.x86_64.rpm�~�ohttpd-manual-2.4.57-11.el9_4.noarch.rpm�N�omod_lua-2.4.57-11.el9_4.x86_64.rpm�@�ohttpd-2.4.57-11.el9_4.x86_64.rpm����r�w	����FsecurityModerate: edk2 security update��T�Lhttps://access.redhat.com/errata/RHSA-2024:4749RHSA-2024:4749RHSA-2024:4749https://access.redhat.com/security/cve/CVE-2022-36765CVE-2022-36765CVE-2022-36765https://access.redhat.com/security/cve/CVE-2023-45236CVE-2023-45236CVE-2023-45236https://access.redhat.com/security/cve/CVE-2023-45237CVE-2023-45237CVE-2023-45237https://bugzilla.redhat.com/22575842257584https://bugzilla.redhat.com/22587032258703https://bugzilla.redhat.com/22587062258706https://errata.almalinux.org/9/ALSA-2024-4749.htmlALSA-2024:4749ALSA-2024:4749
�g� edk2-ovmf-20231122-6.el9_4.2.noarch.rpm�� edk2-aarch64-20231122-6.el9_4.2.noarch.rpm�g� edk2-ovmf-20231122-6.el9_4.2.noarch.rpm�� edk2-aarch64-20231122-6.el9_4.2.noarch.rpm����H�x	����IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update�� �https://access.redhat.com/errata/RHSA-2024:4755RHSA-2024:4755RHSA-2024:4755https://access.redhat.com/security/cve/CVE-2024-3044CVE-2024-3044CVE-2024-3044https://bugzilla.redhat.com/22805422280542https://errata.almalinux.org/9/ALSA-2024-4755.htmlALSA-2024:4755ALSA-2024:4755
�1�Hlibreoffice-gdb-debug-support-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�*libreoffice-data-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-ru-7.1.8.1-13.el9_4.alma.1.noarch.rpm�%libreoffice-langpack-nso-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-hr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�llibreoffice-help-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-ja-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�@libreoffice-math-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�alibreoffice-help-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�xlibreoffice-impress-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-zh-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Clibreoffice-calc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�"libreoffice-langpack-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�
autocorr-mn-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-pl-7.1.8.1-13.el9_4.alma.1.noarch.rpm�tlibreoffice-help-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�zautocorr-el-7.1.8.1-13.el9_4.alma.1.noarch.rpm�5libreoffice-langpack-te-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Plibreoffice-help-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-vi-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�	autocorr-lt-7.1.8.1-13.el9_4.alma.1.noarch.rpm�4libreoffice-langpack-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-lb-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-ro-7.1.8.1-13.el9_4.alma.1.noarch.rpm�}libreoffice-langpack-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�~autocorr-fi-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�sautocorr-af-7.1.8.1-13.el9_4.alma.1.noarch.rpm�
libreoffice-langpack-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Elibreoffice-draw-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-nl-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Jlibreoffice-gtk3-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�{autocorr-en-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-vro-7.1.8.1-13.el9_4.alma.1.noarch.rpm�flibreoffice-help-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�wautocorr-da-7.1.8.1-13.el9_4.alma.1.noarch.rpm�:libreoffice-langpack-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-sr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�}autocorr-fa-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-sl-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Tlibreoffice-help-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-hu-7.1.8.1-13.el9_4.alma.1.noarch.rpm�qlibreoffice-help-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Flibreoffice-writer-7.1.8.1-13.el9_4.alma.1.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Blibreoffice-base-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�olibreoffice-help-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ilibreofficekit-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�xautocorr-de-7.1.8.1-13.el9_4.alma.1.noarch.rpm�uautocorr-ca-7.1.8.1-13.el9_4.alma.1.noarch.rpm�yautocorr-dsb-7.1.8.1-13.el9_4.alma.1.noarch.rpm�|libreoffice-langpack-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-sk-7.1.8.1-13.el9_4.alma.1.noarch.rpm�zlibreoffice-langpack-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Clibreoffice-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�klibreoffice-help-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�blibreoffice-help-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-tr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-fr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-is-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ga-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�vautocorr-cs-7.1.8.1-13.el9_4.alma.1.noarch.rpm�#libreoffice-langpack-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�|autocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Glibreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpm�mlibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�]libreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpm�jlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�
autocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Dlibreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�tautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpm�dlibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Blibreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Glibreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�8libreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpm�1libreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�1�Hlibreoffice-gdb-debug-support-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�7libreoffice-langpack-tn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�*libreoffice-data-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-ru-7.1.8.1-13.el9_4.alma.1.noarch.rpm�%libreoffice-langpack-nso-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�plibreoffice-help-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-hr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�llibreoffice-help-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-ja-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�3libreoffice-langpack-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�@libreoffice-math-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�alibreoffice-help-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�xlibreoffice-impress-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-zh-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Clibreoffice-calc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�"libreoffice-langpack-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�
autocorr-mn-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Xlibreoffice-help-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-pl-7.1.8.1-13.el9_4.alma.1.noarch.rpm�tlibreoffice-help-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�zautocorr-el-7.1.8.1-13.el9_4.alma.1.noarch.rpm�5libreoffice-langpack-te-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Plibreoffice-help-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-vi-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�	autocorr-lt-7.1.8.1-13.el9_4.alma.1.noarch.rpm�4libreoffice-langpack-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-lb-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-ro-7.1.8.1-13.el9_4.alma.1.noarch.rpm�}libreoffice-langpack-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�~autocorr-fi-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�sautocorr-af-7.1.8.1-13.el9_4.alma.1.noarch.rpm�
libreoffice-langpack-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Elibreoffice-draw-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-nl-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Jlibreoffice-gtk3-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�{autocorr-en-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Flibreoffice-emailmerge-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-vro-7.1.8.1-13.el9_4.alma.1.noarch.rpm�flibreoffice-help-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�wautocorr-da-7.1.8.1-13.el9_4.alma.1.noarch.rpm�:libreoffice-langpack-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�+libreoffice-langpack-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-sr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�}autocorr-fa-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-sl-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Tlibreoffice-help-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-hu-7.1.8.1-13.el9_4.alma.1.noarch.rpm�qlibreoffice-help-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Flibreoffice-writer-7.1.8.1-13.el9_4.alma.1.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�clibreoffice-help-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cy-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Blibreoffice-base-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�2libreoffice-langpack-st-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�;libreoffice-langpack-ve-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�olibreoffice-help-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ilibreofficekit-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�xautocorr-de-7.1.8.1-13.el9_4.alma.1.noarch.rpm�uautocorr-ca-7.1.8.1-13.el9_4.alma.1.noarch.rpm�yautocorr-dsb-7.1.8.1-13.el9_4.alma.1.noarch.rpm�|libreoffice-langpack-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-sk-7.1.8.1-13.el9_4.alma.1.noarch.rpm�zlibreoffice-langpack-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Clibreoffice-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�klibreoffice-help-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�blibreoffice-help-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-tr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-fr-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-is-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ga-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�vautocorr-cs-7.1.8.1-13.el9_4.alma.1.noarch.rpm�#libreoffice-langpack-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�|autocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Glibreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpm�mlibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�]libreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpm�jlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�
autocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Dlibreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�?libreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�tautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpm�dlibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpm�libreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�elibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Blibreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpm�Glibreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Slibreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Zlibreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�8libreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�autocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpm�autocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpm�1libreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�nlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Hlibreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�Alibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm����b�y	����DBsecurityModerate: libuv security update��7�whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756
�h�Dlibuv-1.42.0-2.el9_4.i686.rpm�h�Dlibuv-1.42.0-2.el9_4.x86_64.rpm�h�Dlibuv-1.42.0-2.el9_4.i686.rpm�h�Dlibuv-1.42.0-2.el9_4.x86_64.rpm����0�z	����HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update��.�\https://access.redhat.com/errata/RHSA-2024:4757RHSA-2024:4757RHSA-2024:4757https://access.redhat.com/security/cve/CVE-2024-4418CVE-2024-4418CVE-2024-4418https://bugzilla.redhat.com/22786162278616https://errata.almalinux.org/9/ALSA-2024-4757.htmlALSA-2024:4757ALSA-2024:4757
�z5libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�H5libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�s5libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�y5libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�o5libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�{5libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�f5libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�n5libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�q5libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�u5libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�l5libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�G5libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�F5libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�j5libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�t5libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�i5libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�w5libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�r5libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�g5libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�v5libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�k5libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�m5libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�p5libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�E5libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�h5libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�c5libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�D5libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�x5libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�z5libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�H5libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�s5libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�y5libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�o5libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�{5libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�f5libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�n5libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�q5libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�u5libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�l5libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�G5libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�F5libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�j5libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�t5libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�i5libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�w5libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�r5libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�g5libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�v5libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�k5libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�m5libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�p5libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�E5libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�h5libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�c5libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�D5libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�x5libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm���� �{	����AsecurityImportant: containernetworking-plugins security update��
�https://access.redhat.com/errata/RHSA-2024:4761RHSA-2024:4761RHSA-2024:4761https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4761.htmlALSA-2024:4761ALSA-2024:4761
�_�containernetworking-plugins-1.4.0-4.el9_4.x86_64.rpm�_�containernetworking-plugins-1.4.0-4.el9_4.x86_64.rpm����f�|	����DsecurityImportant: runc security update���1https://access.redhat.com/errata/RHSA-2024:4762RHSA-2024:4762RHSA-2024:4762https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4762.htmlALSA-2024:4762ALSA-2024:4762
�z�$runc-1.1.12-3.el9_4.x86_64.rpm�z�$runc-1.1.12-3.el9_4.x86_64.rpm����W�}	����GBBBBBBBBsecurityLow: python3 security update�6��B�,https://access.redhat.com/errata/RHSA-2024:4766RHSA-2024:4766RHSA-2024:4766https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4766.htmlALSA-2024:4766ALSA-2024:4766
\�)python3.11-libs-3.11.7-1.el9_4.3.i686.rpm[�)python3.11-devel-3.11.7-1.el9_4.3.i686.rpm\�)python3.11-libs-3.11.7-1.el9_4.3.x86_64.rpm�Q�)python3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpm�P�)python3.11-3.11.7-1.el9_4.3.x86_64.rpm[�)python3.11-devel-3.11.7-1.el9_4.3.x86_64.rpm\�)python3.11-libs-3.11.7-1.el9_4.3.i686.rpm[�)python3.11-devel-3.11.7-1.el9_4.3.i686.rpm\�)python3.11-libs-3.11.7-1.el9_4.3.x86_64.rpm�Q�)python3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpm�P�)python3.11-3.11.7-1.el9_4.3.x86_64.rpm[�)python3.11-devel-3.11.7-1.el9_4.3.x86_64.rpm�����~	�� ��RBBBBBBBBBBBBsecurityModerate: cups security update��n�
https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776
�f�gcups-devel-2.3.3op2-27.el9_4.i686.rpm�,�gcups-client-2.3.3op2-27.el9_4.x86_64.rpm�/�gcups-printerapp-2.3.3op2-27.el9_4.x86_64.rpm��gcups-filesystem-2.3.3op2-27.el9_4.noarch.rpm�-�gcups-ipptool-2.3.3op2-27.el9_4.x86_64.rpm�f�gcups-devel-2.3.3op2-27.el9_4.x86_64.rpm�+�gcups-2.3.3op2-27.el9_4.x86_64.rpm�.�gcups-lpd-2.3.3op2-27.el9_4.x86_64.rpm�f�gcups-devel-2.3.3op2-27.el9_4.i686.rpm�,�gcups-client-2.3.3op2-27.el9_4.x86_64.rpm�/�gcups-printerapp-2.3.3op2-27.el9_4.x86_64.rpm��gcups-filesystem-2.3.3op2-27.el9_4.noarch.rpm�-�gcups-ipptool-2.3.3op2-27.el9_4.x86_64.rpm�f�gcups-devel-2.3.3op2-27.el9_4.x86_64.rpm�+�gcups-2.3.3op2-27.el9_4.x86_64.rpm�.�gcups-lpd-2.3.3op2-27.el9_4.x86_64.rpm�����	��'��aBBBBsecurityLow: python3 security update�6��x�,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779
Q�python3-devel-3.9.18-3.el9_4.3.x86_64.rpmf�python-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm�+�python3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.3.i686.rpmQ�python3-devel-3.9.18-3.el9_4.3.x86_64.rpmf�python-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm�+�python3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.3.i686.rpm����7�	��*��hsecurityModerate: squid security update��$�~https://access.redhat.com/errata/RHSA-2024:4861RHSA-2024:4861RHSA-2024:4861https://access.redhat.com/security/cve/CVE-2024-23638CVE-2024-23638CVE-2024-23638https://access.redhat.com/security/cve/CVE-2024-37894CVE-2024-37894CVE-2024-37894https://bugzilla.redhat.com/22600512260051https://bugzilla.redhat.com/22943532294353https://errata.almalinux.org/9/ALSA-2024-4861.htmlALSA-2024:4861ALSA-2024:4861
�{�Fsquid-5.5-13.el9_4.x86_64.rpm�{�Fsquid-5.5-13.el9_4.x86_64.rpm����I�	��<��kBBBBBBBBBBBBBBBsecurityModerate: kernel security update��"�1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928
	'�Pperf-5.14.0-427.28.1.el9_4.x86_64.rpm&�Pkernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm%�Pkernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm�Pkernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm)�Prtla-5.14.0-427.28.1.el9_4.x86_64.rpm$�Pkernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm(�Pkernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm#�Pkernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm+�Prv-5.14.0-427.28.1.el9_4.x86_64.rpm	'�Pperf-5.14.0-427.28.1.el9_4.x86_64.rpm&�Pkernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm%�Pkernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm�Pkernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm)�Prtla-5.14.0-427.28.1.el9_4.x86_64.rpm$�Pkernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm(�Pkernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm#�Pkernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm+�Prv-5.14.0-427.28.1.el9_4.x86_64.rpm����M�	����}BBBBBBBBBBBBsecurityImportant: freeradius security update��S�Ghttps://access.redhat.com/errata/RHSA-2024:4935RHSA-2024:4935RHSA-2024:4935https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-4935.htmlALSA-2024:4935ALSA-2024:4935
�R�Efreeradius-krb5-3.0.21-40.el9_4.x86_64.rpm�P�Efreeradius-devel-3.0.21-40.el9_4.x86_64.rpm�	�Epython3-freeradius-3.0.21-40.el9_4.x86_64.rpm�Q�Efreeradius-doc-3.0.21-40.el9_4.x86_64.rpm�S�Efreeradius-ldap-3.0.21-40.el9_4.x86_64.rpm�T�Efreeradius-utils-3.0.21-40.el9_4.x86_64.rpm�O�Efreeradius-3.0.21-40.el9_4.x86_64.rpm�R�Efreeradius-krb5-3.0.21-40.el9_4.x86_64.rpm�P�Efreeradius-devel-3.0.21-40.el9_4.x86_64.rpm�	�Epython3-freeradius-3.0.21-40.el9_4.x86_64.rpm�Q�Efreeradius-doc-3.0.21-40.el9_4.x86_64.rpm�S�Efreeradius-ldap-3.0.21-40.el9_4.x86_64.rpm�T�Efreeradius-utils-3.0.21-40.el9_4.x86_64.rpm�O�Efreeradius-3.0.21-40.el9_4.x86_64.rpm��ʚN�	�� ��LBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security update���.https://access.redhat.com/errata/RHSA-2024:5138RHSA-2024:5138RHSA-2024:5138https://access.redhat.com/security/cve/CVE-2024-38476CVE-2024-38476CVE-2024-38476https://bugzilla.redhat.com/22950152295015https://errata.almalinux.org/9/ALSA-2024-5138.htmlALSA-2024:5138ALSA-2024:5138
�M�pmod_ldap-2.4.57-11.el9_4.1.x86_64.rpm�@�phttpd-2.4.57-11.el9_4.1.x86_64.rpm�O�mod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm�~�phttpd-manual-2.4.57-11.el9_4.1.noarch.rpm�B�phttpd-devel-2.4.57-11.el9_4.1.x86_64.rpm�}�phttpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm�N�pmod_lua-2.4.57-11.el9_4.1.x86_64.rpm�P�pmod_session-2.4.57-11.el9_4.1.x86_64.rpm�A�phttpd-core-2.4.57-11.el9_4.1.x86_64.rpm�Q�mod_ssl-2.4.57-11.el9_4.1.x86_64.rpm�C�phttpd-tools-2.4.57-11.el9_4.1.x86_64.rpm�M�pmod_ldap-2.4.57-11.el9_4.1.x86_64.rpm�@�phttpd-2.4.57-11.el9_4.1.x86_64.rpm�O�mod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm�~�phttpd-manual-2.4.57-11.el9_4.1.noarch.rpm�B�phttpd-devel-2.4.57-11.el9_4.1.x86_64.rpm�}�phttpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm�N�pmod_lua-2.4.57-11.el9_4.1.x86_64.rpm�P�pmod_session-2.4.57-11.el9_4.1.x86_64.rpm�A�phttpd-core-2.4.57-11.el9_4.1.x86_64.rpm�Q�mod_ssl-2.4.57-11.el9_4.1.x86_64.rpm�C�phttpd-tools-2.4.57-11.el9_4.1.x86_64.rpm��ԫ}�	��&��aBBBsecurityModerate: 389-ds-base security update��H�jhttps://access.redhat.com/errata/RHSA-2024:5192RHSA-2024:5192RHSA-2024:5192https://access.redhat.com/security/cve/CVE-2024-5953CVE-2024-5953CVE-2024-5953https://access.redhat.com/security/cve/CVE-2024-6237CVE-2024-6237CVE-2024-6237https://bugzilla.redhat.com/22921042292104https://bugzilla.redhat.com/22935792293579https://errata.almalinux.org/9/ALSA-2024-5192.htmlALSA-2024:5192ALSA-2024:5192
��z389-ds-base-2.4.5-9.el9_4.x86_64.rpm�/�zpython3-lib389-2.4.5-9.el9_4.noarch.rpm��z389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm��z389-ds-base-2.4.5-9.el9_4.x86_64.rpm�/�zpython3-lib389-2.4.5-9.el9_4.noarch.rpm��z389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm���>�	��6��gBBBBBBBBBBBBBsecurityImportant: bind and bind-dyndb-ldap security update��2�"https://access.redhat.com/errata/RHSA-2024:5231RHSA-2024:5231RHSA-2024:5231https://access.redhat.com/security/cve/CVE-2024-1737CVE-2024-1737CVE-2024-1737https://access.redhat.com/security/cve/CVE-2024-1975CVE-2024-1975CVE-2024-1975https://access.redhat.com/security/cve/CVE-2024-4076CVE-2024-4076CVE-2024-4076https://bugzilla.redhat.com/22988932298893https://bugzilla.redhat.com/22989012298901https://bugzilla.redhat.com/22989042298904https://errata.almalinux.org/9/ALSA-2024-5231.htmlALSA-2024:5231ALSA-2024:5231
	�]�bind-libs-9.16.23-18.el9_4.6.x86_64.rpm�^�bind-utils-9.16.23-18.el9_4.6.x86_64.rpm�'�python3-bind-9.16.23-18.el9_4.6.noarch.rpm�[�bind-chroot-9.16.23-18.el9_4.6.x86_64.rpm�p�zbind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpm�!�bind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm�"�bind-license-9.16.23-18.el9_4.6.noarch.rpm�Z�bind-9.16.23-18.el9_4.6.x86_64.rpm�\�bind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm	�]�bind-libs-9.16.23-18.el9_4.6.x86_64.rpm�^�bind-utils-9.16.23-18.el9_4.6.x86_64.rpm�'�python3-bind-9.16.23-18.el9_4.6.noarch.rpm�[�bind-chroot-9.16.23-18.el9_4.6.x86_64.rpm�p�zbind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpm�!�bind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm�"�bind-license-9.16.23-18.el9_4.6.noarch.rpm�Z�bind-9.16.23-18.el9_4.6.x86_64.rpm�\�bind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm����q�	��9��wsecurityImportant: python3.11-setuptools security update��T�https://access.redhat.com/errata/RHSA-2024:5279RHSA-2024:5279RHSA-2024:5279https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5279.htmlALSA-2024:5279ALSA-2024:5279
��7python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm�
�7python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm��7python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm�
�7python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm����5�	��>��zBBsecurityImportant: firefox security update��k�https://access.redhat.com/errata/RHSA-2024:5322RHSA-2024:5322RHSA-2024:5322https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7524CVE-2024-7524CVE-2024-7524https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031412303141https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5322.htmlALSA-2024:5322ALSA-2024:5322
P�firefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm8�firefox-115.14.0-2.el9_4.alma.1.x86_64.rpmP�firefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm8�firefox-115.14.0-2.el9_4.alma.1.x86_64.rpm����^�	����BBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security update��|�}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334

�|�Wdotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpm�"�Wnetstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpm�a�Wdotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpm�x�Adotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpm�w�Adotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpm�v�Aaspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpm�z�Wdotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpm�y�Adotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm�`�Adotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm�Y�Aaspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm�u�Aaspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm�{�Adotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpm�!�Adotnet-host-8.0.8-1.el9_4.x86_64.rpm
�|�Wdotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpm�"�Wnetstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpm�a�Wdotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpm�x�Adotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpm�w�Adotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpm�v�Aaspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpm�z�Wdotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpm�y�Adotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm�`�Adotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm�Y�Aaspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm�u�Aaspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm�{�Adotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpm�!�Adotnet-host-8.0.8-1.el9_4.x86_64.rpm����V�		��+��ZBBBBBBBBBBBBBBBsecurityImportant: kernel security update��y�4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363
	&�Qkernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm(�Qkernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm+�Qrv-5.14.0-427.31.1.el9_4.x86_64.rpm%�Qkernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm)�Qrtla-5.14.0-427.31.1.el9_4.x86_64.rpm$�Qkernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm�Qkernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm'�Qperf-5.14.0-427.31.1.el9_4.x86_64.rpm#�Qkernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm	&�Qkernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm(�Qkernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm+�Qrv-5.14.0-427.31.1.el9_4.x86_64.rpm%�Qkernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm)�Qrtla-5.14.0-427.31.1.el9_4.x86_64.rpm$�Qkernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm�Qkernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm'�Qperf-5.14.0-427.31.1.el9_4.x86_64.rpm#�Qkernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm����y�
	��.��lsecurityImportant: thunderbird security update��-�https://access.redhat.com/errata/RHSA-2024:5392RHSA-2024:5392RHSA-2024:5392https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5392.htmlALSA-2024:5392ALSA-2024:5392
9�thunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpm9�thunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpm����f�	��2��oBsecurityModerate: curl security update��D�(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529
��libcurl-devel-7.76.1-29.el9_4.1.i686.rpm��libcurl-devel-7.76.1-29.el9_4.1.x86_64.rpm��libcurl-devel-7.76.1-29.el9_4.1.i686.rpm��libcurl-devel-7.76.1-29.el9_4.1.x86_64.rpm����*�	��4��3securityImportant: python3.12-setuptools security update��l�https://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533
��9python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm��9python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm����_�
	��/��uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update���{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583
�1�clibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Glibreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpm�autocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpm�3libreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�dlibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Flibreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�jlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�llibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpm�nlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Elibreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Plibreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpm�{autocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpm�
libreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Tlibreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�yautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpm�plibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpm�autocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpm�]libreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpm�klibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�|autocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Slibreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Clibreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�*libreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpm�flibreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Blibreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�mlibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�~autocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Zlibreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Alibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Blibreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�"libreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�}autocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Dlibreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpm�elibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Hlibreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�	autocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpm�uautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpm�|libreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Flibreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ilibreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Glibreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpm�8libreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�sautocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�xlibreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�tautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�blibreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�wautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Xlibreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�xautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Jlibreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�olibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpm�
autocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpm�vautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm�+libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpm�@libreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�alibreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�tlibreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpm�autocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�;libreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpm�?libreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�
autocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpm�2libreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�zautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpm�7libreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Clibreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�1�clibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�-libreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Glibreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�[libreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpm�autocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpm�3libreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�dlibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Nlibreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�`libreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�)libreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Flibreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�jlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Klibreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Mlibreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�5libreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�llibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpm�nlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Elibreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Wlibreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Plibreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�,libreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpm�{autocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpm�
libreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Tlibreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�yautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpm�plibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpm�autocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpm�]libreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�,libreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpm�klibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�<libreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�~libreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpm�vlibreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�|autocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Slibreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�glibreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Olibreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�0libreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Clibreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�*libreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpm�flibreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�	libreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�'libreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�qlibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�%libreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Blibreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�mlibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�~autocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Zlibreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�>libreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Alibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�ulibreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Blibreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�"libreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�}autocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�.libreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�ilibreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Dlibreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ilibreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpm�elibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�
libreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�ylibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Hlibreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Rlibreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�^libreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�4libreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�	autocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpm�uautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpm�|libreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�_libreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Vlibreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Flibreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ilibreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�/libreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�9libreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Glibreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�$libreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpm�8libreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�&libreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�{libreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Clibreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�sautocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpm�*libreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�!libreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ulibreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Llibreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�xlibreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Ylibreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�1libreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�zlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�=libreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�6libreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Hlibreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�}libreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�tautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Elibreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Dlibreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�blibreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�wlibreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�wautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Xlibreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�(libreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�xautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpm�Jlibreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�olibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpm�
autocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpm�vautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�#libreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpm�libreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm�+libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpm�@libreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�alibreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�tlibreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�slibreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Qlibreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�+libreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpm�autocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpm�;libreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�autocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpm�?libreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�
autocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpm�2libreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�\libreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�zautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpm�7libreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�Clibreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�hlibreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�rlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�:libreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�libreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm� libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�����	��8��pBBBBBBsecurityImportant: tomcat security update��~�|https://access.redhat.com/errata/RHSA-2024:5693RHSA-2024:5693RHSA-2024:5693https://access.redhat.com/security/cve/CVE-2024-34750CVE-2024-34750CVE-2024-34750https://bugzilla.redhat.com/22956512295651https://errata.almalinux.org/9/ALSA-2024-5693.htmlALSA-2024:5693ALSA-2024:5693
��6tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm��6tomcat-9.0.87-1.el9_4.2.noarch.rpm�����	���xB�a��aBBBBBBBsecurityModerate: nodejs:20 security update��z�(https://access.redhat.com/errata/RHSA-2024:5815RHSA-2024:5815RHSA-2024:5815https://access.redhat.com/security/cve/CVE-2024-22018CVE-2024-22018CVE-2024-22018https://access.redhat.com/security/cve/CVE-2024-22020CVE-2024-22020CVE-2024-22020https://access.redhat.com/security/cve/CVE-2024-36137CVE-2024-36137CVE-2024-36137https://bugzilla.redhat.com/22964172296417https://bugzilla.redhat.com/22969902296990https://bugzilla.redhat.com/22992812299281https://errata.almalinux.org/9/ALSA-2024-5815.htmlALSA-2024:5815ALSA-2024:5815
,�Q�M*e�(nodejs-full-i18n-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm>�(nodejs-docs-20.16.0-1.module_el9.4.0+107+dbd477e4.noarch.rpm,�(nodejs-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm�#�(nodejs-devel-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpml�onodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm�	�znodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm�
�znodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmd�'npm-10.8.1-1.20.16.0.1.module_el9.4.0+107+dbd477e4.x86_64.rpm,�Q�M*e�(nodejs-full-i18n-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm>�(nodejs-docs-20.16.0-1.module_el9.4.0+107+dbd477e4.noarch.rpm,�(nodejs-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm�#�(nodejs-devel-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpml�onodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm�	�znodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm�
�znodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmd�'npm-10.8.1-1.20.16.0.1.module_el9.4.0+107+dbd477e4.x86_64.rpm����i�	����CBBBBBBBBBBBBBBBsecurityImportant: kernel security update��"�Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928
	&�Rkernel-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm$�Rkernel-debug-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm%�Rkernel-devel-5.14.0-427.33.1.el9_4.x86_64.rpm(�Rkernel-headers-5.14.0-427.33.1.el9_4.x86_64.rpm'�Rperf-5.14.0-427.33.1.el9_4.x86_64.rpm)�Rrtla-5.14.0-427.33.1.el9_4.x86_64.rpm#�Rkernel-debug-devel-5.14.0-427.33.1.el9_4.x86_64.rpm�Rkernel-doc-5.14.0-427.33.1.el9_4.noarch.rpm+�Rrv-5.14.0-427.33.1.el9_4.x86_64.rpm	&�Rkernel-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm$�Rkernel-debug-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm%�Rkernel-devel-5.14.0-427.33.1.el9_4.x86_64.rpm(�Rkernel-headers-5.14.0-427.33.1.el9_4.x86_64.rpm'�Rperf-5.14.0-427.33.1.el9_4.x86_64.rpm)�Rrtla-5.14.0-427.33.1.el9_4.x86_64.rpm#�Rkernel-debug-devel-5.14.0-427.33.1.el9_4.x86_64.rpm�Rkernel-doc-5.14.0-427.33.1.el9_4.noarch.rpm+�Rrv-5.14.0-427.33.1.el9_4.x86_64.rpm����&�	��4�lBBB��gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update��:�lhttps://access.redhat.com/errata/RHSA-2024:5929RHSA-2024:5929RHSA-2024:5929https://access.redhat.com/security/cve/CVE-2024-4317CVE-2024-4317CVE-2024-4317https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/22799352279935https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5929.htmlALSA-2024:5929ALSA-2024:5929
Z�_�N*�^}postgresql-server-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�a}postgresql-upgrade-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-server-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�`}postgresql-test-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�}postgresql-plpython3-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmZ}postgresql-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�_}postgresql-static-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-private-libs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�9}postgresql-test-rpm-macros-16.4-1.module_el9.4.0+109+624ac33a.noarch.rpm�}postgresql-plperl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-pltcl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-upgrade-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�\}postgresql-docs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-contrib-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�]}postgresql-private-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�Y�`pg_repack-1.4.8-1.module_el9.4.0+66+eb9878bc.x86_64.rpmZ�_�N*�^}postgresql-server-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�a}postgresql-upgrade-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-server-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�`}postgresql-test-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�}postgresql-plpython3-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmZ}postgresql-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�_}postgresql-static-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-private-libs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�9}postgresql-test-rpm-macros-16.4-1.module_el9.4.0+109+624ac33a.noarch.rpm�}postgresql-plperl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-pltcl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-upgrade-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�\}postgresql-docs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�}postgresql-contrib-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�]}postgresql-private-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm�Y�`pg_repack-1.4.8-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�����	����uBBBBBBBBBBBBBBsecurityImportant: postgresql security update��&�https://access.redhat.com/errata/RHSA-2024:5999RHSA-2024:5999RHSA-2024:5999https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5999.htmlALSA-2024:5999ALSA-2024:5999
��<postgresql-pltcl-13.16-1.el9_4.x86_64.rpm��<postgresql-plpython3-13.16-1.el9_4.x86_64.rpm��<postgresql-contrib-13.16-1.el9_4.x86_64.rpmZ�<postgresql-13.16-1.el9_4.x86_64.rpm��<postgresql-server-13.16-1.el9_4.x86_64.rpm��<postgresql-upgrade-13.16-1.el9_4.x86_64.rpm��<postgresql-private-libs-13.16-1.el9_4.x86_64.rpm��<postgresql-plperl-13.16-1.el9_4.x86_64.rpm��<postgresql-pltcl-13.16-1.el9_4.x86_64.rpm��<postgresql-plpython3-13.16-1.el9_4.x86_64.rpm��<postgresql-contrib-13.16-1.el9_4.x86_64.rpmZ�<postgresql-13.16-1.el9_4.x86_64.rpm��<postgresql-server-13.16-1.el9_4.x86_64.rpm��<postgresql-upgrade-13.16-1.el9_4.x86_64.rpm��<postgresql-private-libs-13.16-1.el9_4.x86_64.rpm��<postgresql-plperl-13.16-1.el9_4.x86_64.rpm����z�	��%�hBBB��\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update��+�lhttps://access.redhat.com/errata/RHSA-2024:6020RHSA-2024:6020RHSA-2024:6020https://access.redhat.com/security/cve/CVE-2024-4317CVE-2024-4317CVE-2024-4317https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/22799352279935https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-6020.htmlALSA-2024:6020ALSA-2024:6020
Z�L�O*�ypostgresql-plpython3-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�aypostgresql-upgrade-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmZypostgresql-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-plperl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-server-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�\ypostgresql-docs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-pltcl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�Y�_pg_repack-1.4.8-1.module_el9.3.0+52+21733919.x86_64.rpm�ypostgresql-private-libs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�]ypostgresql-private-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-upgrade-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�^ypostgresql-server-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�_ypostgresql-static-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-contrib-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�9ypostgresql-test-rpm-macros-15.8-1.module_el9.4.0+111+667b9e9e.noarch.rpm�`ypostgresql-test-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmZ�L�O*�ypostgresql-plpython3-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�aypostgresql-upgrade-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmZypostgresql-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-plperl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-server-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�\ypostgresql-docs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-pltcl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�Y�_pg_repack-1.4.8-1.module_el9.3.0+52+21733919.x86_64.rpm�ypostgresql-private-libs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�]ypostgresql-private-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-upgrade-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�^ypostgresql-server-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�_ypostgresql-static-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�ypostgresql-contrib-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm�9ypostgresql-test-rpm-macros-15.8-1.module_el9.4.0+111+667b9e9e.noarch.rpm�`ypostgresql-test-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm����K�	��0��fBBBBBBBBsecurityModerate: python3.12 security update���https://access.redhat.com/errata/RHSA-2024:6146RHSA-2024:6146RHSA-2024:6146https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6146.htmlALSA-2024:6146ALSA-2024:6146
��0python3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-devel-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-libs-3.12.1-4.el9_4.3.i686.rpm��0python3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-devel-3.12.1-4.el9_4.3.i686.rpm��0python3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-devel-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-libs-3.12.1-4.el9_4.3.i686.rpm��0python3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-3.12.1-4.el9_4.3.x86_64.rpm��0python3.12-devel-3.12.1-4.el9_4.3.i686.rpm���&�	��:�aBF��KBBBBBBBsecurityModerate: nodejs:18 security update��3�https://access.redhat.com/errata/RHSA-2024:6147RHSA-2024:6147RHSA-2024:6147https://access.redhat.com/security/cve/CVE-2024-22020CVE-2024-22020CVE-2024-22020https://access.redhat.com/security/cve/CVE-2024-28863CVE-2024-28863CVE-2024-28863https://bugzilla.redhat.com/22932002293200https://bugzilla.redhat.com/22964172296417https://errata.almalinux.org/9/ALSA-2024-6147.htmlALSA-2024:6147ALSA-2024:6147
,��P*l�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�$nodejs-full-i18n-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm,�$nodejs-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm>�$nodejs-docs-18.20.4-1.module_el9.4.0+112+bb28ff81.noarch.rpmd�&npm-10.7.0-1.18.20.4.1.module_el9.4.0+112+bb28ff81.x86_64.rpm�#�$nodejs-devel-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm,��P*l�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�
nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpme�$nodejs-full-i18n-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm�
�
nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm,�$nodejs-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm>�$nodejs-docs-18.20.4-1.module_el9.4.0+112+bb28ff81.noarch.rpmd�&npm-10.7.0-1.18.20.4.1.module_el9.4.0+112+bb28ff81.x86_64.rpm�#�$nodejs-devel-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm��ܕ�	����{BBBBsecurityModerate: python3.9 security update��G�hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163
Q�python3-devel-3.9.18-3.el9_4.5.x86_64.rpm�+�python3-tkinter-3.9.18-3.el9_4.5.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.5.i686.rpmf�python-unversioned-command-3.9.18-3.el9_4.5.noarch.rpmQ�python3-devel-3.9.18-3.el9_4.5.x86_64.rpm�+�python3-tkinter-3.9.18-3.el9_4.5.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.5.i686.rpmf�python-unversioned-command-3.9.18-3.el9_4.5.noarch.rpm����	����BBsecurityModerate: krb5 security update��/�https://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166
�d�,krb5-devel-1.21.1-2.el9_4.i686.rpm�d�,krb5-devel-1.21.1-2.el9_4.x86_64.rpm�d�,krb5-devel-1.21.1-2.el9_4.i686.rpm�d�,krb5-devel-1.21.1-2.el9_4.x86_64.rpm����	����FBBBBBBBBsecurityModerate: python3.11 security update��5�hhttps://access.redhat.com/errata/RHSA-2024:6179RHSA-2024:6179RHSA-2024:6179https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6179.htmlALSA-2024:6179ALSA-2024:6179
\�*python3.11-libs-3.11.7-1.el9_4.5.i686.rpm[�*python3.11-devel-3.11.7-1.el9_4.5.x86_64.rpm[�*python3.11-devel-3.11.7-1.el9_4.5.i686.rpm�P�*python3.11-3.11.7-1.el9_4.5.x86_64.rpm\�*python3.11-libs-3.11.7-1.el9_4.5.x86_64.rpm�Q�*python3.11-tkinter-3.11.7-1.el9_4.5.x86_64.rpm\�*python3.11-libs-3.11.7-1.el9_4.5.i686.rpm[�*python3.11-devel-3.11.7-1.el9_4.5.x86_64.rpm[�*python3.11-devel-3.11.7-1.el9_4.5.i686.rpm�P�*python3.11-3.11.7-1.el9_4.5.x86_64.rpm\�*python3.11-libs-3.11.7-1.el9_4.5.x86_64.rpm�Q�*python3.11-tkinter-3.11.7-1.el9_4.5.x86_64.rpm���7�	����QBBBBBBsecurityModerate: orc security update���Qhttps://access.redhat.com/errata/RHSA-2024:6184RHSA-2024:6184RHSA-2024:6184https://access.redhat.com/security/cve/CVE-2024-40897CVE-2024-40897CVE-2024-40897https://bugzilla.redhat.com/23000102300010https://errata.almalinux.org/9/ALSA-2024-6184.htmlALSA-2024:6184ALSA-2024:6184
�r�Qorc-devel-0.4.31-7.el9_4.i686.rpm�q�Qorc-0.4.31-7.el9_4.x86_64.rpm�r�Qorc-devel-0.4.31-7.el9_4.x86_64.rpm�
�Qorc-compiler-0.4.31-7.el9_4.x86_64.rpm�q�Qorc-0.4.31-7.el9_4.i686.rpm�r�Qorc-devel-0.4.31-7.el9_4.i686.rpm�q�Qorc-0.4.31-7.el9_4.x86_64.rpm�r�Qorc-devel-0.4.31-7.el9_4.x86_64.rpm�
�Qorc-compiler-0.4.31-7.el9_4.x86_64.rpm�q�Qorc-0.4.31-7.el9_4.i686.rpm����,�	����ZsecurityModerate: containernetworking-plugins security update��n�https://access.redhat.com/errata/RHSA-2024:6186RHSA-2024:6186RHSA-2024:6186https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6186.htmlALSA-2024:6186ALSA-2024:6186
�_�containernetworking-plugins-1.4.0-5.el9_4.x86_64.rpm�_�containernetworking-plugins-1.4.0-5.el9_4.x86_64.rpm���m�	����]securityModerate: gvisor-tap-vsock security update��}�Ohttps://access.redhat.com/errata/RHSA-2024:6187RHSA-2024:6187RHSA-2024:6187https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6187.htmlALSA-2024:6187ALSA-2024:6187
�;�@gvisor-tap-vsock-0.7.3-5.el9_4.alma.1.x86_64.rpm�;�@gvisor-tap-vsock-0.7.3-5.el9_4.alma.1.x86_64.rpm��ܜQ�	��"��`securityModerate: runc security update��L�9https://access.redhat.com/errata/RHSA-2024:6188RHSA-2024:6188RHSA-2024:6188https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6188.htmlALSA-2024:6188ALSA-2024:6188
�z�%runc-1.1.12-4.el9_4.x86_64.rpm�z�%runc-1.1.12-4.el9_4.x86_64.rpm���:�	��'��cBBsecurityModerate: buildah security update���https://access.redhat.com/errata/RHSA-2024:6189RHSA-2024:6189RHSA-2024:6189https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6189.htmlALSA-2024:6189ALSA-2024:6189
�0�Abuildah-tests-1.33.7-4.el9_4.x86_64.rpm�/�Abuildah-1.33.7-4.el9_4.x86_64.rpm�0�Abuildah-tests-1.33.7-4.el9_4.x86_64.rpm�/�Abuildah-1.33.7-4.el9_4.x86_64.rpm��ܛ}�	��*��hsecurityModerate: wget security update���https://access.redhat.com/errata/RHSA-2024:6192RHSA-2024:6192RHSA-2024:6192https://access.redhat.com/security/cve/CVE-2024-38428CVE-2024-38428CVE-2024-38428https://bugzilla.redhat.com/22928362292836https://errata.almalinux.org/9/ALSA-2024-6192.htmlALSA-2024:6192ALSA-2024:6192
�w�Swget-1.21.1-8.el9_4.x86_64.rpm�w�Swget-1.21.1-8.el9_4.x86_64.rpm���f�	��4��kBBBBBBBsecurityImportant: podman security update���=https://access.redhat.com/errata/RHSA-2024:6194RHSA-2024:6194RHSA-2024:6194https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://access.redhat.com/security/cve/CVE-2024-37298CVE-2024-37298CVE-2024-37298https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22950102295010https://errata.almalinux.org/9/ALSA-2024-6194.htmlALSA-2024:6194ALSA-2024:6194
�1�"podman-4.9.4-10.el9_4.x86_64.rpm�4�"podman-tests-4.9.4-10.el9_4.x86_64.rpm�3�"podman-remote-4.9.4-10.el9_4.x86_64.rpmh�"podman-docker-4.9.4-10.el9_4.noarch.rpm�2�"podman-plugins-4.9.4-10.el9_4.x86_64.rpm�1�"podman-4.9.4-10.el9_4.x86_64.rpm�4�"podman-tests-4.9.4-10.el9_4.x86_64.rpm�3�"podman-remote-4.9.4-10.el9_4.x86_64.rpmh�"podman-docker-4.9.4-10.el9_4.noarch.rpm�2�"podman-plugins-4.9.4-10.el9_4.x86_64.rpm���� 	��9��uBBsecurityModerate: skopeo security update��[�Vhttps://access.redhat.com/errata/RHSA-2024:6195RHSA-2024:6195RHSA-2024:6195https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6195.htmlALSA-2024:6195ALSA-2024:6195
�c�5skopeo-1.14.5-1.el9_4.x86_64.rpm�d�5skopeo-tests-1.14.5-1.el9_4.x86_64.rpm�c�5skopeo-1.14.5-1.el9_4.x86_64.rpm�d�5skopeo-tests-1.14.5-1.el9_4.x86_64.rpm��ܛ'�!	����zBBBBBBBBBBBBsecurityModerate: ghostscript security update��1�Mhttps://access.redhat.com/errata/RHSA-2024:6197RHSA-2024:6197RHSA-2024:6197https://access.redhat.com/security/cve/CVE-2024-29510CVE-2024-29510CVE-2024-29510https://access.redhat.com/security/cve/CVE-2024-33869CVE-2024-33869CVE-2024-33869https://access.redhat.com/security/cve/CVE-2024-33870CVE-2024-33870CVE-2024-33870https://bugzilla.redhat.com/22939502293950https://bugzilla.redhat.com/22939582293958https://bugzilla.redhat.com/22939592293959https://errata.almalinux.org/9/ALSA-2024-6197.htmlALSA-2024:6197ALSA-2024:6197
��rghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm��rghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm�e�rlibgs-9.54.0-17.el9_4.x86_64.rpm��rghostscript-9.54.0-17.el9_4.x86_64.rpm�k�rghostscript-doc-9.54.0-17.el9_4.noarch.rpm��rghostscript-x11-9.54.0-17.el9_4.x86_64.rpm��rghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm�e�rlibgs-9.54.0-17.el9_4.i686.rpm��rghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm��rghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm�e�rlibgs-9.54.0-17.el9_4.x86_64.rpm��rghostscript-9.54.0-17.el9_4.x86_64.rpm�k�rghostscript-doc-9.54.0-17.el9_4.noarch.rpm��rghostscript-x11-9.54.0-17.el9_4.x86_64.rpm��rghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm�e�rlibgs-9.54.0-17.el9_4.i686.rpm���1�"	����IBBBBBBsecurityImportant: bubblewrap and flatpak security update��~�Jhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356
�2�Uflatpak-libs-1.12.9-3.el9_4.x86_64.rpm�8�Uflatpak-selinux-1.12.9-3.el9_4.noarch.rpm�_�Uflatpak-session-helper-1.12.9-3.el9_4.x86_64.rpm�2�Uflatpak-libs-1.12.9-3.el9_4.i686.rpm�^�Uflatpak-1.12.9-3.el9_4.x86_64.rpm�2�Uflatpak-libs-1.12.9-3.el9_4.x86_64.rpm�8�Uflatpak-selinux-1.12.9-3.el9_4.noarch.rpm�_�Uflatpak-session-helper-1.12.9-3.el9_4.x86_64.rpm�2�Uflatpak-libs-1.12.9-3.el9_4.i686.rpm�^�Uflatpak-1.12.9-3.el9_4.x86_64.rpm���i�#	����RBBBBsecurityModerate: glib2 security update��H�
https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464
�:�eglib2-doc-2.68.4-14.el9_4.1.noarch.rpm��eglib2-devel-2.68.4-14.el9_4.1.i686.rpm��eglib2-devel-2.68.4-14.el9_4.1.x86_64.rpm�:�eglib2-tests-2.68.4-14.el9_4.1.x86_64.rpm�:�eglib2-doc-2.68.4-14.el9_4.1.noarch.rpm��eglib2-devel-2.68.4-14.el9_4.1.i686.rpm��eglib2-devel-2.68.4-14.el9_4.1.x86_64.rpm�:�eglib2-tests-2.68.4-14.el9_4.1.x86_64.rpm����3�$	��"��YBBBBBBBsecurityModerate: emacs security update��U�jhttps://access.redhat.com/errata/RHSA-2024:6510RHSA-2024:6510RHSA-2024:6510https://access.redhat.com/security/cve/CVE-2024-39331CVE-2024-39331CVE-2024-39331https://bugzilla.redhat.com/22939422293942https://errata.almalinux.org/9/ALSA-2024-6510.htmlALSA-2024:6510ALSA-2024:6510
�_�emacs-lucid-27.2-10.el9_4.x86_64.rpm�]�emacs-27.2-10.el9_4.x86_64.rpm�^�emacs-common-27.2-10.el9_4.x86_64.rpm�`�emacs-nox-27.2-10.el9_4.x86_64.rpm�`�emacs-filesystem-27.2-10.el9_4.noarch.rpm�_�emacs-lucid-27.2-10.el9_4.x86_64.rpm�]�emacs-27.2-10.el9_4.x86_64.rpm�^�emacs-common-27.2-10.el9_4.x86_64.rpm�`�emacs-nox-27.2-10.el9_4.x86_64.rpm�`�emacs-filesystem-27.2-10.el9_4.noarch.rpm�����%	��+��cBBBBBBsecurityModerate: dovecot security update��?�,https://access.redhat.com/errata/RHSA-2024:6529RHSA-2024:6529RHSA-2024:6529https://access.redhat.com/security/cve/CVE-2024-23184CVE-2024-23184CVE-2024-23184https://access.redhat.com/security/cve/CVE-2024-23185CVE-2024-23185CVE-2024-23185https://bugzilla.redhat.com/23059092305909https://bugzilla.redhat.com/23059102305910https://errata.almalinux.org/9/ALSA-2024-6529.htmlALSA-2024:6529ALSA-2024:6529
�w�Mdovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm�v�Mdovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpm�u�Mdovecot-mysql-2.3.16-11.el9_4.1.x86_64.rpm�t�Mdovecot-2.3.16-11.el9_4.1.x86_64.rpm�w�Mdovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm�v�Mdovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpm�u�Mdovecot-mysql-2.3.16-11.el9_4.1.x86_64.rpm�t�Mdovecot-2.3.16-11.el9_4.1.x86_64.rpm����[�&	��=��lBBBBBBBBBBBBBBBsecurityModerate: kernel security update��k�l8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567
	)�Srtla-5.14.0-427.35.1.el9_4.x86_64.rpm&�Skernel-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm+�Srv-5.14.0-427.35.1.el9_4.x86_64.rpm�Skernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm#�Skernel-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm$�Skernel-debug-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm'�Sperf-5.14.0-427.35.1.el9_4.x86_64.rpm%�Skernel-devel-5.14.0-427.35.1.el9_4.x86_64.rpm(�Skernel-headers-5.14.0-427.35.1.el9_4.x86_64.rpm	)�Srtla-5.14.0-427.35.1.el9_4.x86_64.rpm&�Skernel-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm+�Srv-5.14.0-427.35.1.el9_4.x86_64.rpm�Skernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm#�Skernel-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm$�Skernel-debug-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm'�Sperf-5.14.0-427.35.1.el9_4.x86_64.rpm%�Skernel-devel-5.14.0-427.35.1.el9_4.x86_64.rpm(�Skernel-headers-5.14.0-427.35.1.el9_4.x86_64.rpm����U�'	����~BBsecurityImportant: firefox security update��W�~https://access.redhat.com/errata/RHSA-2024:6681RHSA-2024:6681RHSA-2024:6681https://access.redhat.com/security/cve/CVE-2024-7652CVE-2024-7652CVE-2024-7652https://access.redhat.com/security/cve/CVE-2024-8381CVE-2024-8381CVE-2024-8381https://access.redhat.com/security/cve/CVE-2024-8382CVE-2024-8382CVE-2024-8382https://access.redhat.com/security/cve/CVE-2024-8383CVE-2024-8383CVE-2024-8383https://access.redhat.com/security/cve/CVE-2024-8384CVE-2024-8384CVE-2024-8384https://access.redhat.com/security/cve/CVE-2024-8385CVE-2024-8385CVE-2024-8385https://access.redhat.com/security/cve/CVE-2024-8386CVE-2024-8386CVE-2024-8386https://access.redhat.com/security/cve/CVE-2024-8387CVE-2024-8387CVE-2024-8387https://bugzilla.redhat.com/23094272309427https://bugzilla.redhat.com/23094282309428https://bugzilla.redhat.com/23094292309429https://bugzilla.redhat.com/23094302309430https://bugzilla.redhat.com/23094312309431https://bugzilla.redhat.com/23094322309432https://bugzilla.redhat.com/23094332309433https://bugzilla.redhat.com/23104902310490https://errata.almalinux.org/9/ALSA-2024-6681.htmlALSA-2024:6681ALSA-2024:6681
8�lfirefox-128.2.0-1.el9_4.alma.1.x86_64.rpmP�lfirefox-x11-128.2.0-1.el9_4.alma.1.x86_64.rpm8�lfirefox-128.2.0-1.el9_4.alma.1.x86_64.rpmP�lfirefox-x11-128.2.0-1.el9_4.alma.1.x86_64.rpm�����(	����CsecurityImportant: thunderbird security update��U�3https://access.redhat.com/errata/RHSA-2024:6683RHSA-2024:6683RHSA-2024:6683https://access.redhat.com/security/cve/CVE-2024-7652CVE-2024-7652CVE-2024-7652https://access.redhat.com/security/cve/CVE-2024-8381CVE-2024-8381CVE-2024-8381https://access.redhat.com/security/cve/CVE-2024-8382CVE-2024-8382CVE-2024-8382https://access.redhat.com/security/cve/CVE-2024-8384CVE-2024-8384CVE-2024-8384https://access.redhat.com/security/cve/CVE-2024-8385CVE-2024-8385CVE-2024-8385https://access.redhat.com/security/cve/CVE-2024-8386CVE-2024-8386CVE-2024-8386https://access.redhat.com/security/cve/CVE-2024-8387CVE-2024-8387CVE-2024-8387https://access.redhat.com/security/cve/CVE-2024-8394CVE-2024-8394CVE-2024-8394https://bugzilla.redhat.com/23094272309427https://bugzilla.redhat.com/23094282309428https://bugzilla.redhat.com/23094302309430https://bugzilla.redhat.com/23094312309431https://bugzilla.redhat.com/23094322309432https://bugzilla.redhat.com/23094332309433https://bugzilla.redhat.com/23104812310481https://bugzilla.redhat.com/23104902310490https://errata.almalinux.org/9/ALSA-2024-6683.htmlALSA-2024:6683ALSA-2024:6683
9�lthunderbird-128.2.0-1.el9_4.alma.1.x86_64.rpm9�lthunderbird-128.2.0-1.el9_4.alma.1.x86_64.rpm����6�)	����FBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update���$https://access.redhat.com/errata/RHSA-2024:6726RHSA-2024:6726RHSA-2024:6726https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-6726.htmlALSA-2024:6726ALSA-2024:6726

�%�)fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm�$�)fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm�f�)fence-virtd-cpg-4.10.0-62.el9_4.5.x86_64.rpm�c�)fence-agents-kubevirt-4.10.0-62.el9_4.5.x86_64.rpm�g�)fence-virtd-libvirt-4.10.0-62.el9_4.5.x86_64.rpm�h�)fence-virtd-multicast-4.10.0-62.el9_4.5.x86_64.rpm�j�)fence-virtd-tcp-4.10.0-62.el9_4.5.x86_64.rpm�#�)fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm�b�)fence-agents-compute-4.10.0-62.el9_4.5.x86_64.rpm�d�)fence-virt-4.10.0-62.el9_4.5.x86_64.rpm�&�)fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm�e�)fence-virtd-4.10.0-62.el9_4.5.x86_64.rpm�i�)fence-virtd-serial-4.10.0-62.el9_4.5.x86_64.rpm
�%�)fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm�$�)fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm�f�)fence-virtd-cpg-4.10.0-62.el9_4.5.x86_64.rpm�c�)fence-agents-kubevirt-4.10.0-62.el9_4.5.x86_64.rpm�g�)fence-virtd-libvirt-4.10.0-62.el9_4.5.x86_64.rpm�h�)fence-virtd-multicast-4.10.0-62.el9_4.5.x86_64.rpm�j�)fence-virtd-tcp-4.10.0-62.el9_4.5.x86_64.rpm�#�)fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm�b�)fence-agents-compute-4.10.0-62.el9_4.5.x86_64.rpm�d�)fence-virt-4.10.0-62.el9_4.5.x86_64.rpm�&�)fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm�e�)fence-virtd-4.10.0-62.el9_4.5.x86_64.rpm�i�)fence-virtd-serial-4.10.0-62.el9_4.5.x86_64.rpm����]�*	�� ��]BsecurityModerate: expat security update��,�;https://access.redhat.com/errata/RHSA-2024:6754RHSA-2024:6754RHSA-2024:6754https://access.redhat.com/security/cve/CVE-2024-45490CVE-2024-45490CVE-2024-45490https://access.redhat.com/security/cve/CVE-2024-45491CVE-2024-45491CVE-2024-45491https://access.redhat.com/security/cve/CVE-2024-45492CVE-2024-45492CVE-2024-45492https://bugzilla.redhat.com/23086152308615https://bugzilla.redhat.com/23086162308616https://bugzilla.redhat.com/23086172308617https://errata.almalinux.org/9/ALSA-2024-6754.htmlALSA-2024:6754ALSA-2024:6754
��Texpat-devel-2.5.0-2.el9_4.1.i686.rpm��Texpat-devel-2.5.0-2.el9_4.1.x86_64.rpm��Texpat-devel-2.5.0-2.el9_4.1.i686.rpm��Texpat-devel-2.5.0-2.el9_4.1.x86_64.rpm����2�+	��)��aBBBBBBsecurityModerate: libnbd security update��g�Qhttps://access.redhat.com/errata/RHSA-2024:6757RHSA-2024:6757RHSA-2024:6757https://access.redhat.com/security/cve/CVE-2024-7383CVE-2024-7383CVE-2024-7383https://bugzilla.redhat.com/23028652302865https://errata.almalinux.org/9/ALSA-2024-6757.htmlALSA-2024:6757ALSA-2024:6757
�A�Xlibnbd-1.18.1-4.el9_4.x86_64.rpm��Xnbdfuse-1.18.1-4.el9_4.x86_64.rpm�{�Xlibnbd-bash-completion-1.18.1-4.el9_4.noarch.rpm��Xpython3-libnbd-1.18.1-4.el9_4.x86_64.rpm�A�Xlibnbd-1.18.1-4.el9_4.i686.rpm�A�Xlibnbd-1.18.1-4.el9_4.x86_64.rpm��Xnbdfuse-1.18.1-4.el9_4.x86_64.rpm�{�Xlibnbd-bash-completion-1.18.1-4.el9_4.noarch.rpm��Xpython3-libnbd-1.18.1-4.el9_4.x86_64.rpm�A�Xlibnbd-1.18.1-4.el9_4.i686.rpm�����,	��/��jBBBsecurityModerate: openssl security update��8�Phttps://access.redhat.com/errata/RHSA-2024:6783RHSA-2024:6783RHSA-2024:6783https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-6783.htmlALSA-2024:6783ALSA-2024:6783
��nopenssl-perl-3.0.7-28.el9_4.x86_64.rpm��nopenssl-devel-3.0.7-28.el9_4.i686.rpm��nopenssl-devel-3.0.7-28.el9_4.x86_64.rpm��nopenssl-perl-3.0.7-28.el9_4.x86_64.rpm��nopenssl-devel-3.0.7-28.el9_4.i686.rpm��nopenssl-devel-3.0.7-28.el9_4.x86_64.rpm����R�-	���zBB�_BE��RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security update���
https://access.redhat.com/errata/RHSA-2024:6785RHSA-2024:6785RHSA-2024:6785https://access.redhat.com/security/cve/CVE-2024-39908CVE-2024-39908CVE-2024-39908https://access.redhat.com/security/cve/CVE-2024-41123CVE-2024-41123CVE-2024-41123https://access.redhat.com/security/cve/CVE-2024-41946CVE-2024-41946CVE-2024-41946https://access.redhat.com/security/cve/CVE-2024-43398CVE-2024-43398CVE-2024-43398https://bugzilla.redhat.com/22982432298243https://bugzilla.redhat.com/23022682302268https://bugzilla.redhat.com/23022722302272https://bugzilla.redhat.com/23072972307297https://errata.almalinux.org/9/ALSA-2024-6785.htmlALSA-2024:6785ALSA-2024:6785
��O�Q*&��~ruby-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm�/�rubygem-rexml-3.3.6-3.module_el9.4.0+115+226a984b.noarch.rpm�(�~ruby-default-gems-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm��~ruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm�j�~ruby-doc-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm�M�:rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.i686.rpm�)�vrubygem-bundler-2.5.16-3.module_el9.4.0+115+226a984b.noarch.rpm�B�[rubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpm�3�1rubygems-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpm�4�1rubygems-devel-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpm�K�yrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.i686.rpm��^rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.i686.rpm�1�rubygem-test-unit-3.6.1-3.module_el9.4.0+115+226a984b.noarch.rpm�L�rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm�M�:rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.x86_64.rpm��srubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�;�~ruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�K�[rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm�,�arubygem-power_assert-2.0.3-3.module_el9.4.0+115+226a984b.noarch.rpm��rubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.x86_64.rpm��~ruby-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�C�rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm�.�6rubygem-rdoc-6.6.3.1-3.module_el9.4.0+115+226a984b.noarch.rpm�-�Srubygem-rake-13.1.0-3.module_el9.4.0+115+226a984b.noarch.rpm��srubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.i686.rpm�K�yrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.x86_64.rpm�:�~ruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm��^rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpm�:�~ruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm��rubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpm��rubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.i686.rpm�*�(rubygem-irb-1.13.1-3.module_el9.4.0+115+226a984b.noarch.rpm�+�)rubygem-minitest-5.20.0-3.module_el9.4.0+115+226a984b.noarch.rpm��rubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.i686.rpm�;�~ruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm��~ruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�0�rubygem-rss-0.3.1-3.module_el9.4.0+115+226a984b.noarch.rpm�2�rubygem-typeprof-0.21.9-3.module_el9.4.0+115+226a984b.noarch.rpm��O�Q*&��~ruby-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm�/�rubygem-rexml-3.3.6-3.module_el9.4.0+115+226a984b.noarch.rpm�(�~ruby-default-gems-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm��~ruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm�j�~ruby-doc-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm�M�:rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.i686.rpm�)�vrubygem-bundler-2.5.16-3.module_el9.4.0+115+226a984b.noarch.rpm�B�[rubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpm�3�1rubygems-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpm�4�1rubygems-devel-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpm�K�yrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.i686.rpm��^rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.i686.rpm�1�rubygem-test-unit-3.6.1-3.module_el9.4.0+115+226a984b.noarch.rpm�L�rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm�M�:rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.x86_64.rpm��srubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�;�~ruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�K�[rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm�,�arubygem-power_assert-2.0.3-3.module_el9.4.0+115+226a984b.noarch.rpm��rubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.x86_64.rpm��~ruby-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�C�rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm�.�6rubygem-rdoc-6.6.3.1-3.module_el9.4.0+115+226a984b.noarch.rpm�-�Srubygem-rake-13.1.0-3.module_el9.4.0+115+226a984b.noarch.rpm��srubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.i686.rpm�K�yrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.x86_64.rpm�:�~ruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm��^rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpm�:�~ruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm��rubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpm��rubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.i686.rpm�*�(rubygem-irb-1.13.1-3.module_el9.4.0+115+226a984b.noarch.rpm�+�)rubygem-minitest-5.20.0-3.module_el9.4.0+115+226a984b.noarch.rpm��rubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.i686.rpm�;�~ruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm��~ruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm�0�rubygem-rss-0.3.1-3.module_el9.4.0+115+226a984b.noarch.rpm�2�rubygem-typeprof-0.21.9-3.module_el9.4.0+115+226a984b.noarch.rpm����q�.	��0��]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security update���https://access.redhat.com/errata/RHSA-2024:6848RHSA-2024:6848RHSA-2024:6848https://access.redhat.com/security/cve/CVE-2024-45769CVE-2024-45769CVE-2024-45769https://access.redhat.com/security/cve/CVE-2024-45770CVE-2024-45770CVE-2024-45770https://bugzilla.redhat.com/23104512310451https://bugzilla.redhat.com/23104522310452https://errata.almalinux.org/9/ALSA-2024-6848.htmlALSA-2024:6848ALSA-2024:6848
l�Gperl-PCP-PMDA-6.2.0-5.el9_4.x86_64.rpm�8pcp-pmda-sockets-6.2.0-5.el9_4.x86_64.rpm�*pcp-pmda-podman-6.2.0-5.el9_4.x86_64.rpm�#pcp-pmda-nginx-6.2.0-5.el9_4.x86_64.rpm�/pcp-pmda-resctrl-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mysql-6.2.0-5.el9_4.x86_64.rpm�kpcp-export-pcp2json-6.2.0-5.el9_4.x86_64.rpm�upcp-import-mrtg2pcp-6.2.0-5.el9_4.x86_64.rpm�Apcp-selinux-6.2.0-5.el9_4.x86_64.rpm�{pcp-pmda-bind2-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-named-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-dbping-6.2.0-5.el9_4.x86_64.rpm�%pcp-pmda-openmetrics-6.2.0-5.el9_4.x86_64.rpm�!pcp-pmda-news-6.2.0-5.el9_4.x86_64.rpm�zpcp-pmda-bcc-6.2.0-5.el9_4.x86_64.rpm�ypcp-pmda-bash-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mailq-6.2.0-5.el9_4.x86_64.rpm� pcp-pmda-netfilter-6.2.0-5.el9_4.x86_64.rpm�Cpcp-zeroconf-6.2.0-5.el9_4.x86_64.rpm�
pcp-pmda-gluster-6.2.0-5.el9_4.x86_64.rpm�}pcp-pmda-bpf-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mic-6.2.0-5.el9_4.x86_64.rpm�	pcp-pmda-gfs2-6.2.0-5.el9_4.x86_64.rpm�;pcp-devel-6.2.0-5.el9_4.i686.rpm�<pcp-pmda-trace-6.2.0-5.el9_4.x86_64.rpm�rpcp-import-collectl2pcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mssql-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-cifs-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-memcache-6.2.0-5.el9_4.x86_64.rpm�:pcp-pmda-summary-6.2.0-5.el9_4.x86_64.rpm�ppcp-geolocate-6.2.0-5.el9_4.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.0-5.el9_4.x86_64.rpm�7pcp-pmda-snmp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-docker-6.2.0-5.el9_4.x86_64.rpm�,pcp-pmda-postgresql-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-gpsd-6.2.0-5.el9_4.x86_64.rpm�+pcp-pmda-postfix-6.2.0-5.el9_4.x86_64.rpm�opcp-export-zabbix-agent-6.2.0-5.el9_4.x86_64.rpm�;pcp-devel-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-ds389-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-infiniband-6.2.0-5.el9_4.x86_64.rpm�?pcp-pmda-zimbra-6.2.0-5.el9_4.x86_64.rpm�3pcp-pmda-sendmail-6.2.0-5.el9_4.x86_64.rpm�)pcp-pmda-perfevent-6.2.0-5.el9_4.x86_64.rpm�.pcp-pmda-redis-6.2.0-5.el9_4.x86_64.rpm�5pcp-pmda-slurm-6.2.0-5.el9_4.x86_64.rpm�@pcp-pmda-zswap-6.2.0-5.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-cisco-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-lustrecomm-6.2.0-5.el9_4.x86_64.rpm�Ipython3-pcp-6.2.0-5.el9_4.x86_64.rpm�vpcp-import-sar2pcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mongodb-6.2.0-5.el9_4.x86_64.rpm�mpcp-export-pcp2xml-6.2.0-5.el9_4.x86_64.rpm�Kpcp-doc-6.2.0-5.el9_4.noarch.rpm�pcp-pmda-lmsensors-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-lustre-6.2.0-5.el9_4.x86_64.rpm�gpcp-conf-6.2.0-5.el9_4.x86_64.rpm�(pcp-pmda-pdns-6.2.0-5.el9_4.x86_64.rpm�&pcp-pmda-openvswitch-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mounts-6.2.0-5.el9_4.x86_64.rpm�2pcp-pmda-samba-6.2.0-5.el9_4.x86_64.rpm�lpcp-export-pcp2spark-6.2.0-5.el9_4.x86_64.rpm�'pcp-pmda-oracle-6.2.0-5.el9_4.x86_64.rpm�$pcp-pmda-nvidia-gpu-6.2.0-5.el9_4.x86_64.rpm�ipcp-export-pcp2graphite-6.2.0-5.el9_4.x86_64.rpm�hpcp-export-pcp2elasticsearch-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-elasticsearch-6.2.0-5.el9_4.x86_64.rpm�<pcp-libs-6.2.0-5.el9_4.x86_64.rpm�|pcp-pmda-bonding-6.2.0-5.el9_4.x86_64.rpm�npcp-export-pcp2zabbix-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-gpfs-6.2.0-5.el9_4.x86_64.rpm�;pcp-pmda-systemd-6.2.0-5.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-5.el9_4.x86_64.rpm�1pcp-pmda-rsyslog-6.2.0-5.el9_4.x86_64.rpm�Eperl-PCP-LogSummary-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-netcheck-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-logger-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-farm-6.2.0-5.el9_4.x86_64.rpm�~pcp-pmda-bpftrace-6.2.0-5.el9_4.x86_64.rpm�qpcp-gui-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-lio-6.2.0-5.el9_4.x86_64.rpm�xpcp-pmda-apache-6.2.0-5.el9_4.x86_64.rpm�Fperl-PCP-MMV-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-dm-6.2.0-5.el9_4.x86_64.rpm�Dperl-PCP-LogImport-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-haproxy-6.2.0-5.el9_4.x86_64.rpm�Bpcp-system-tools-6.2.0-5.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-5.el9_4.i686.rpm�4pcp-pmda-shping-6.2.0-5.el9_4.x86_64.rpm�
pcp-pmda-hacluster-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-libvirt-6.2.0-5.el9_4.x86_64.rpm�"pcp-pmda-nfsclient-6.2.0-5.el9_4.x86_64.rpm�>pcp-pmda-weblog-6.2.0-5.el9_4.x86_64.rpm�=pcp-pmda-unbound-6.2.0-5.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-5.el9_4.i686.rpm�<pcp-libs-6.2.0-5.el9_4.i686.rpm�tpcp-import-iostat2pcp-6.2.0-5.el9_4.x86_64.rpm�9pcp-pmda-statsd-6.2.0-5.el9_4.x86_64.rpm�wpcp-pmda-activemq-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-json-6.2.0-5.el9_4.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.0-5.el9_4.x86_64.rpm�spcp-import-ganglia2pcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-ds389log-6.2.0-5.el9_4.x86_64.rpm�6pcp-pmda-smart-6.2.0-5.el9_4.x86_64.rpm�fpcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-denki-6.2.0-5.el9_4.x86_64.rpm�0pcp-pmda-roomtemp-6.2.0-5.el9_4.x86_64.rpml�Gperl-PCP-PMDA-6.2.0-5.el9_4.x86_64.rpm�8pcp-pmda-sockets-6.2.0-5.el9_4.x86_64.rpm�*pcp-pmda-podman-6.2.0-5.el9_4.x86_64.rpm�#pcp-pmda-nginx-6.2.0-5.el9_4.x86_64.rpm�/pcp-pmda-resctrl-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mysql-6.2.0-5.el9_4.x86_64.rpm�kpcp-export-pcp2json-6.2.0-5.el9_4.x86_64.rpm�upcp-import-mrtg2pcp-6.2.0-5.el9_4.x86_64.rpm�Apcp-selinux-6.2.0-5.el9_4.x86_64.rpm�{pcp-pmda-bind2-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-named-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-dbping-6.2.0-5.el9_4.x86_64.rpm�%pcp-pmda-openmetrics-6.2.0-5.el9_4.x86_64.rpm�!pcp-pmda-news-6.2.0-5.el9_4.x86_64.rpm�zpcp-pmda-bcc-6.2.0-5.el9_4.x86_64.rpm�ypcp-pmda-bash-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mailq-6.2.0-5.el9_4.x86_64.rpm� pcp-pmda-netfilter-6.2.0-5.el9_4.x86_64.rpm�Cpcp-zeroconf-6.2.0-5.el9_4.x86_64.rpm�
pcp-pmda-gluster-6.2.0-5.el9_4.x86_64.rpm�}pcp-pmda-bpf-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mic-6.2.0-5.el9_4.x86_64.rpm�	pcp-pmda-gfs2-6.2.0-5.el9_4.x86_64.rpm�;pcp-devel-6.2.0-5.el9_4.i686.rpm�<pcp-pmda-trace-6.2.0-5.el9_4.x86_64.rpm�rpcp-import-collectl2pcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mssql-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-cifs-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-memcache-6.2.0-5.el9_4.x86_64.rpm�:pcp-pmda-summary-6.2.0-5.el9_4.x86_64.rpm�ppcp-geolocate-6.2.0-5.el9_4.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.0-5.el9_4.x86_64.rpm�7pcp-pmda-snmp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-docker-6.2.0-5.el9_4.x86_64.rpm�,pcp-pmda-postgresql-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-gpsd-6.2.0-5.el9_4.x86_64.rpm�+pcp-pmda-postfix-6.2.0-5.el9_4.x86_64.rpm�opcp-export-zabbix-agent-6.2.0-5.el9_4.x86_64.rpm�;pcp-devel-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-ds389-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-infiniband-6.2.0-5.el9_4.x86_64.rpm�?pcp-pmda-zimbra-6.2.0-5.el9_4.x86_64.rpm�3pcp-pmda-sendmail-6.2.0-5.el9_4.x86_64.rpm�)pcp-pmda-perfevent-6.2.0-5.el9_4.x86_64.rpm�.pcp-pmda-redis-6.2.0-5.el9_4.x86_64.rpm�5pcp-pmda-slurm-6.2.0-5.el9_4.x86_64.rpm�@pcp-pmda-zswap-6.2.0-5.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-cisco-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-lustrecomm-6.2.0-5.el9_4.x86_64.rpm�Ipython3-pcp-6.2.0-5.el9_4.x86_64.rpm�vpcp-import-sar2pcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mongodb-6.2.0-5.el9_4.x86_64.rpm�mpcp-export-pcp2xml-6.2.0-5.el9_4.x86_64.rpm�Kpcp-doc-6.2.0-5.el9_4.noarch.rpm�pcp-pmda-lmsensors-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-lustre-6.2.0-5.el9_4.x86_64.rpm�gpcp-conf-6.2.0-5.el9_4.x86_64.rpm�(pcp-pmda-pdns-6.2.0-5.el9_4.x86_64.rpm�&pcp-pmda-openvswitch-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-mounts-6.2.0-5.el9_4.x86_64.rpm�2pcp-pmda-samba-6.2.0-5.el9_4.x86_64.rpm�lpcp-export-pcp2spark-6.2.0-5.el9_4.x86_64.rpm�'pcp-pmda-oracle-6.2.0-5.el9_4.x86_64.rpm�$pcp-pmda-nvidia-gpu-6.2.0-5.el9_4.x86_64.rpm�ipcp-export-pcp2graphite-6.2.0-5.el9_4.x86_64.rpm�hpcp-export-pcp2elasticsearch-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-elasticsearch-6.2.0-5.el9_4.x86_64.rpm�<pcp-libs-6.2.0-5.el9_4.x86_64.rpm�|pcp-pmda-bonding-6.2.0-5.el9_4.x86_64.rpm�npcp-export-pcp2zabbix-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-gpfs-6.2.0-5.el9_4.x86_64.rpm�;pcp-pmda-systemd-6.2.0-5.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-5.el9_4.x86_64.rpm�1pcp-pmda-rsyslog-6.2.0-5.el9_4.x86_64.rpm�Eperl-PCP-LogSummary-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-netcheck-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-logger-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-farm-6.2.0-5.el9_4.x86_64.rpm�~pcp-pmda-bpftrace-6.2.0-5.el9_4.x86_64.rpm�qpcp-gui-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-lio-6.2.0-5.el9_4.x86_64.rpm�xpcp-pmda-apache-6.2.0-5.el9_4.x86_64.rpm�Fperl-PCP-MMV-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-dm-6.2.0-5.el9_4.x86_64.rpm�Dperl-PCP-LogImport-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-haproxy-6.2.0-5.el9_4.x86_64.rpm�Bpcp-system-tools-6.2.0-5.el9_4.x86_64.rpm�=pcp-libs-devel-6.2.0-5.el9_4.i686.rpm�4pcp-pmda-shping-6.2.0-5.el9_4.x86_64.rpm�
pcp-pmda-hacluster-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-libvirt-6.2.0-5.el9_4.x86_64.rpm�"pcp-pmda-nfsclient-6.2.0-5.el9_4.x86_64.rpm�>pcp-pmda-weblog-6.2.0-5.el9_4.x86_64.rpm�=pcp-pmda-unbound-6.2.0-5.el9_4.x86_64.rpm�>pcp-testsuite-6.2.0-5.el9_4.i686.rpm�<pcp-libs-6.2.0-5.el9_4.i686.rpm�tpcp-import-iostat2pcp-6.2.0-5.el9_4.x86_64.rpm�9pcp-pmda-statsd-6.2.0-5.el9_4.x86_64.rpm�wpcp-pmda-activemq-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-json-6.2.0-5.el9_4.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.0-5.el9_4.x86_64.rpm�spcp-import-ganglia2pcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-ds389log-6.2.0-5.el9_4.x86_64.rpm�6pcp-pmda-smart-6.2.0-5.el9_4.x86_64.rpm�fpcp-6.2.0-5.el9_4.x86_64.rpm�pcp-pmda-denki-6.2.0-5.el9_4.x86_64.rpm�0pcp-pmda-roomtemp-6.2.0-5.el9_4.x86_64.rpm����d�/	��;��qBBBBBBBBsecurityImportant: golang security update���I
https://access.redhat.com/errata/RHSA-2024:6913RHSA-2024:6913RHSA-2024:6913https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://bugzilla.redhat.com/22953102295310https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://errata.almalinux.org/9/ALSA-2024-6913.htmlALSA-2024:6913ALSA-2024:6913
p�,golang-tests-1.21.13-3.el9_4.noarch.rpm�H�,golang-bin-1.21.13-3.el9_4.x86_64.rpmn�,golang-misc-1.21.13-3.el9_4.noarch.rpm�N�,go-toolset-1.21.13-3.el9_4.x86_64.rpmm�,golang-docs-1.21.13-3.el9_4.noarch.rpm�G�,golang-1.21.13-3.el9_4.x86_64.rpmo�,golang-src-1.21.13-3.el9_4.noarch.rpmp�,golang-tests-1.21.13-3.el9_4.noarch.rpm�H�,golang-bin-1.21.13-3.el9_4.x86_64.rpmn�,golang-misc-1.21.13-3.el9_4.noarch.rpm�N�,go-toolset-1.21.13-3.el9_4.x86_64.rpmm�,golang-docs-1.21.13-3.el9_4.noarch.rpm�G�,golang-1.21.13-3.el9_4.x86_64.rpmo�,golang-src-1.21.13-3.el9_4.noarch.rpm��ʐP�0	��>��|securityImportant: grafana-pcp security update��g�<https://access.redhat.com/errata/RHSA-2024:6946RHSA-2024:6946RHSA-2024:6946https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-6946.htmlALSA-2024:6946ALSA-2024:6946
�~�3grafana-pcp-5.1.1-3.el9_4.x86_64.rpm�~�3grafana-pcp-5.1.1-3.el9_4.x86_64.rpm��ʎp�1	����BBsecurityImportant: grafana security update��#�`https://access.redhat.com/errata/RHSA-2024:6947RHSA-2024:6947RHSA-2024:6947https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-6947.htmlALSA-2024:6947ALSA-2024:6947
�I�lgrafana-9.2.10-17.el9_4.x86_64.rpm�U�lgrafana-selinux-9.2.10-17.el9_4.x86_64.rpm�I�lgrafana-9.2.10-17.el9_4.x86_64.rpm�U�lgrafana-selinux-9.2.10-17.el9_4.x86_64.rpm��ʍz�2	����DBBBBBBBBBBBBBBBsecurityImportant: kernel security update���+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997
	(�Tkernel-headers-5.14.0-427.37.1.el9_4.x86_64.rpm&�Tkernel-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm%�Tkernel-devel-5.14.0-427.37.1.el9_4.x86_64.rpm$�Tkernel-debug-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm)�Trtla-5.14.0-427.37.1.el9_4.x86_64.rpm'�Tperf-5.14.0-427.37.1.el9_4.x86_64.rpm#�Tkernel-debug-devel-5.14.0-427.37.1.el9_4.x86_64.rpm+�Trv-5.14.0-427.37.1.el9_4.x86_64.rpm�Tkernel-doc-5.14.0-427.37.1.el9_4.noarch.rpm	(�Tkernel-headers-5.14.0-427.37.1.el9_4.x86_64.rpm&�Tkernel-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm%�Tkernel-devel-5.14.0-427.37.1.el9_4.x86_64.rpm$�Tkernel-debug-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm)�Trtla-5.14.0-427.37.1.el9_4.x86_64.rpm'�Tperf-5.14.0-427.37.1.el9_4.x86_64.rpm#�Tkernel-debug-devel-5.14.0-427.37.1.el9_4.x86_64.rpm+�Trv-5.14.0-427.37.1.el9_4.x86_64.rpm�Tkernel-doc-5.14.0-427.37.1.el9_4.noarch.rpm�����3	����VsecurityImportant: git-lfs security update���,https://access.redhat.com/errata/RHSA-2024:7136RHSA-2024:7136RHSA-2024:7136https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-7136.htmlALSA-2024:7136ALSA-2024:7136
�l�git-lfs-3.4.1-4.el9_4.x86_64.rpm�l�git-lfs-3.4.1-4.el9_4.x86_64.rpm����L�4	����YBBBBsecurityImportant: osbuild-composer security update��D�https://access.redhat.com/errata/RHSA-2024:7204RHSA-2024:7204RHSA-2024:7204https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-7204.htmlALSA-2024:7204ALSA-2024:7204
�x�Zosbuild-composer-core-101-2.el9_4.alma.1.x86_64.rpm�w�Zosbuild-composer-101-2.el9_4.alma.1.x86_64.rpm�y�Zosbuild-composer-worker-101-2.el9_4.alma.1.x86_64.rpm�x�Zosbuild-composer-core-101-2.el9_4.alma.1.x86_64.rpm�w�Zosbuild-composer-101-2.el9_4.alma.1.x86_64.rpm�y�Zosbuild-composer-worker-101-2.el9_4.alma.1.x86_64.rpm���d�5	��1��`BBBBBBBBBBBBBBBsecurityModerate: net-snmp security update��E�dhttps://access.redhat.com/errata/RHSA-2024:7260RHSA-2024:7260RHSA-2024:7260https://access.redhat.com/security/cve/CVE-2022-24805CVE-2022-24805CVE-2022-24805https://access.redhat.com/security/cve/CVE-2022-24806CVE-2022-24806CVE-2022-24806https://access.redhat.com/security/cve/CVE-2022-24807CVE-2022-24807CVE-2022-24807https://access.redhat.com/security/cve/CVE-2022-24808CVE-2022-24808CVE-2022-24808https://access.redhat.com/security/cve/CVE-2022-24809CVE-2022-24809CVE-2022-24809https://access.redhat.com/security/cve/CVE-2022-24810CVE-2022-24810CVE-2022-24810https://bugzilla.redhat.com/21032252103225https://bugzilla.redhat.com/21047592104759https://bugzilla.redhat.com/21047632104763https://bugzilla.redhat.com/21047662104766https://bugzilla.redhat.com/21047682104768https://bugzilla.redhat.com/21047692104769https://errata.almalinux.org/9/ALSA-2024-7260.htmlALSA-2024:7260ALSA-2024:7260

�@�net-snmp-devel-5.9.1-13.el9_4.3.x86_64.rpm�	�net-snmp-utils-5.9.1-13.el9_4.3.x86_64.rpm�A�net-snmp-libs-5.9.1-13.el9_4.3.x86_64.rpm�@�net-snmp-devel-5.9.1-13.el9_4.3.i686.rpm��net-snmp-perl-5.9.1-13.el9_4.3.x86_64.rpm�
�python3-net-snmp-5.9.1-13.el9_4.3.x86_64.rpm�?�net-snmp-agent-libs-5.9.1-13.el9_4.3.i686.rpm�?�net-snmp-agent-libs-5.9.1-13.el9_4.3.x86_64.rpm�A�net-snmp-libs-5.9.1-13.el9_4.3.i686.rpm��net-snmp-5.9.1-13.el9_4.3.x86_64.rpm
�@�net-snmp-devel-5.9.1-13.el9_4.3.x86_64.rpm�	�net-snmp-utils-5.9.1-13.el9_4.3.x86_64.rpm�A�net-snmp-libs-5.9.1-13.el9_4.3.x86_64.rpm�@�net-snmp-devel-5.9.1-13.el9_4.3.i686.rpm��net-snmp-perl-5.9.1-13.el9_4.3.x86_64.rpm�
�python3-net-snmp-5.9.1-13.el9_4.3.x86_64.rpm�?�net-snmp-agent-libs-5.9.1-13.el9_4.3.i686.rpm�?�net-snmp-agent-libs-5.9.1-13.el9_4.3.x86_64.rpm�A�net-snmp-libs-5.9.1-13.el9_4.3.i686.rpm��net-snmp-5.9.1-13.el9_4.3.x86_64.rpm��ٺG�6	��7��rBBBsecurityImportant: cups-filters security update��)�Lhttps://access.redhat.com/errata/RHSA-2024:7346RHSA-2024:7346RHSA-2024:7346https://access.redhat.com/security/cve/CVE-2024-47076CVE-2024-47076CVE-2024-47076https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://access.redhat.com/security/cve/CVE-2024-47176CVE-2024-47176CVE-2024-47176https://bugzilla.redhat.com/23142522314252https://bugzilla.redhat.com/23142532314253https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-7346.htmlALSA-2024:7346ALSA-2024:7346
�#�bcups-filters-libs-1.28.7-17.el9_4.x86_64.rpm�H�bcups-filters-1.28.7-17.el9_4.x86_64.rpm�#�bcups-filters-libs-1.28.7-17.el9_4.i686.rpm�#�bcups-filters-libs-1.28.7-17.el9_4.x86_64.rpm�H�bcups-filters-1.28.7-17.el9_4.x86_64.rpm�#�bcups-filters-libs-1.28.7-17.el9_4.i686.rpm��߷*�7	��:��xsecurityModerate: mod_jk bug fix update��u�6https://access.redhat.com/errata/RHSA-2024:7457RHSA-2024:7457RHSA-2024:7457https://access.redhat.com/security/cve/CVE-2024-46544CVE-2024-46544CVE-2024-46544https://bugzilla.redhat.com/23141942314194https://errata.almalinux.org/9/ALSA-2024-7457.htmlALSA-2024:7457ALSA-2024:7457
�~�Qmod_jk-1.2.50-1.el9_4.1.x86_64.rpm�~�Qmod_jk-1.2.50-1.el9_4.1.x86_64.rpm����p�8	��?��{BBsecurityImportant: firefox security update��+�:https://access.redhat.com/errata/RHSA-2024:7505RHSA-2024:7505RHSA-2024:7505https://access.redhat.com/security/cve/CVE-2024-9392CVE-2024-9392CVE-2024-9392https://access.redhat.com/security/cve/CVE-2024-9393CVE-2024-9393CVE-2024-9393https://access.redhat.com/security/cve/CVE-2024-9394CVE-2024-9394CVE-2024-9394https://access.redhat.com/security/cve/CVE-2024-9401CVE-2024-9401CVE-2024-9401https://access.redhat.com/security/cve/CVE-2024-9402CVE-2024-9402CVE-2024-9402https://bugzilla.redhat.com/23159502315950https://bugzilla.redhat.com/23159512315951https://bugzilla.redhat.com/23159562315956https://bugzilla.redhat.com/23159572315957https://bugzilla.redhat.com/23159592315959https://errata.almalinux.org/9/ALSA-2024-7505.htmlALSA-2024:7505ALSA-2024:7505
P�mfirefox-x11-128.3.0-1.el9_4.alma.1.x86_64.rpm8�mfirefox-128.3.0-1.el9_4.alma.1.x86_64.rpmP�mfirefox-x11-128.3.0-1.el9_4.alma.1.x86_64.rpm8�mfirefox-128.3.0-1.el9_4.alma.1.x86_64.rpm����.�9	��
��@BBBBBBBBsecurityModerate: golang security update��e�Mhttps://access.redhat.com/errata/RHSA-2024:7550RHSA-2024:7550RHSA-2024:7550https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2024-7550.htmlALSA-2024:7550ALSA-2024:7550
�N�-go-toolset-1.21.13-4.el9_4.x86_64.rpmn�-golang-misc-1.21.13-4.el9_4.noarch.rpmp�-golang-tests-1.21.13-4.el9_4.noarch.rpm�G�-golang-1.21.13-4.el9_4.x86_64.rpmo�-golang-src-1.21.13-4.el9_4.noarch.rpm�H�-golang-bin-1.21.13-4.el9_4.x86_64.rpmm�-golang-docs-1.21.13-4.el9_4.noarch.rpm�N�-go-toolset-1.21.13-4.el9_4.x86_64.rpmn�-golang-misc-1.21.13-4.el9_4.noarch.rpmp�-golang-tests-1.21.13-4.el9_4.noarch.rpm�G�-golang-1.21.13-4.el9_4.x86_64.rpmo�-golang-src-1.21.13-4.el9_4.noarch.rpm�H�-golang-bin-1.21.13-4.el9_4.x86_64.rpmm�-golang-docs-1.21.13-4.el9_4.noarch.rpm�����:	��
��KsecurityImportant: thunderbird security update��2�`https://access.redhat.com/errata/RHSA-2024:7552RHSA-2024:7552RHSA-2024:7552https://access.redhat.com/security/cve/CVE-2024-9392CVE-2024-9392CVE-2024-9392https://access.redhat.com/security/cve/CVE-2024-9393CVE-2024-9393CVE-2024-9393https://access.redhat.com/security/cve/CVE-2024-9394CVE-2024-9394CVE-2024-9394https://access.redhat.com/security/cve/CVE-2024-9396CVE-2024-9396CVE-2024-9396https://access.redhat.com/security/cve/CVE-2024-9397CVE-2024-9397CVE-2024-9397https://access.redhat.com/security/cve/CVE-2024-9398CVE-2024-9398CVE-2024-9398https://access.redhat.com/security/cve/CVE-2024-9399CVE-2024-9399CVE-2024-9399https://access.redhat.com/security/cve/CVE-2024-9400CVE-2024-9400CVE-2024-9400https://access.redhat.com/security/cve/CVE-2024-9401CVE-2024-9401CVE-2024-9401https://access.redhat.com/security/cve/CVE-2024-9402CVE-2024-9402CVE-2024-9402https://access.redhat.com/security/cve/CVE-2024-9403CVE-2024-9403CVE-2024-9403https://bugzilla.redhat.com/23159452315945https://bugzilla.redhat.com/23159472315947https://bugzilla.redhat.com/23159492315949https://bugzilla.redhat.com/23159502315950https://bugzilla.redhat.com/23159512315951https://bugzilla.redhat.com/23159522315952https://bugzilla.redhat.com/23159532315953https://bugzilla.redhat.com/23159542315954https://bugzilla.redhat.com/23159562315956https://bugzilla.redhat.com/23159572315957https://bugzilla.redhat.com/23159592315959https://errata.almalinux.org/9/ALSA-2024-7552.htmlALSA-2024:7552ALSA-2024:7552
9�mthunderbird-128.3.0-1.el9_4.alma.1.x86_64.rpm9�mthunderbird-128.3.0-1.el9_4.alma.1.x86_64.rpm����5�;	����NBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security update���"https://access.redhat.com/errata/RHSA-2024:7867RHSA-2024:7867RHSA-2024:7867https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://errata.almalinux.org/9/ALSA-2024-7867.htmlALSA-2024:7867ALSA-2024:7867
�P�Sdotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm�L�Saspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm�O�Sdotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm�S�`dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm�Q�`dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpm�M�Saspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm�N�Sdotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm�R�Sdotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm�P�Sdotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm�L�Saspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm�O�Sdotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm�S�`dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm�Q�`dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpm�M�Saspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm�N�Sdotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm�R�Sdotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm����3�<	��9��_BBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update��4�
https://access.redhat.com/errata/RHSA-2024:7869RHSA-2024:7869RHSA-2024:7869https://access.redhat.com/security/cve/CVE-2024-38229CVE-2024-38229CVE-2024-38229https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://bugzilla.redhat.com/23161612316161https://errata.almalinux.org/9/ALSA-2024-7869.htmlALSA-2024:7869ALSA-2024:7869

�y�=dotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm�!�=dotnet-host-8.0.10-1.el9_4.x86_64.rpm�x�=dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpm�|�Xdotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpm�z�Xdotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm�v�=aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm�w�=dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm�"�Xnetstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm�`�=dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm�u�=aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm�a�Xdotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm�Y�=aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm�{�=dotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm
�y�=dotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm�!�=dotnet-host-8.0.10-1.el9_4.x86_64.rpm�x�=dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpm�|�Xdotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpm�z�Xdotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm�v�=aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm�w�=dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm�"�Xnetstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm�`�=dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm�u�=aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm�a�Xdotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm�Y�=aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm�{�=dotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm����Q�=	��>��zBBsecurityImportant: firefox security update��J�https://access.redhat.com/errata/RHSA-2024:7958RHSA-2024:7958RHSA-2024:7958https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-7958.htmlALSA-2024:7958ALSA-2024:7958
8�	firefox-128.3.1-2.el9_4.alma.1.x86_64.rpmP�	firefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpm8�	firefox-128.3.1-2.el9_4.alma.1.x86_64.rpmP�	firefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpm����Z�>	����securityImportant: thunderbird security update��d�ihttps://access.redhat.com/errata/RHSA-2024:8025RHSA-2024:8025RHSA-2024:8025https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-8025.htmlALSA-2024:8025ALSA-2024:8025
9�	thunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm9�	thunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm����@�?	����BBBBBBBBsecurityModerate: OpenIPMI security update��M�:https://access.redhat.com/errata/RHSA-2024:8037RHSA-2024:8037RHSA-2024:8037https://access.redhat.com/security/cve/CVE-2024-42934CVE-2024-42934CVE-2024-42934https://bugzilla.redhat.com/23083752308375https://errata.almalinux.org/9/ALSA-2024-8037.htmlALSA-2024:8037ALSA-2024:8037
��\OpenIPMI-2.0.32-5.el9_4.i686.rpm��\OpenIPMI-2.0.32-5.el9_4.x86_64.rpm��\OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpm��\OpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm��\OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpm��\OpenIPMI-libs-2.0.32-5.el9_4.i686.rpm��\OpenIPMI-2.0.32-5.el9_4.i686.rpm��\OpenIPMI-2.0.32-5.el9_4.x86_64.rpm��\OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpm��\OpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm��\OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpm��\OpenIPMI-libs-2.0.32-5.el9_4.i686.rpm����`�@	����LBBBBBBBsecurityImportant: podman security update���\
https://access.redhat.com/errata/RHSA-2024:8039RHSA-2024:8039RHSA-2024:8039https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8039.htmlALSA-2024:8039ALSA-2024:8039
�3�#podman-remote-4.9.4-13.el9_4.x86_64.rpm�1�#podman-4.9.4-13.el9_4.x86_64.rpm�4�#podman-tests-4.9.4-13.el9_4.x86_64.rpm�2�#podman-plugins-4.9.4-13.el9_4.x86_64.rpmh�#podman-docker-4.9.4-13.el9_4.noarch.rpm�3�#podman-remote-4.9.4-13.el9_4.x86_64.rpm�1�#podman-4.9.4-13.el9_4.x86_64.rpm�4�#podman-tests-4.9.4-13.el9_4.x86_64.rpm�2�#podman-plugins-4.9.4-13.el9_4.x86_64.rpmh�#podman-docker-4.9.4-13.el9_4.noarch.rpm����*�A	����VsecurityImportant: containernetworking-plugins security update��c�Chttps://access.redhat.com/errata/RHSA-2024:8110RHSA-2024:8110RHSA-2024:8110https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8110.htmlALSA-2024:8110ALSA-2024:8110
�_�containernetworking-plugins-1.4.0-6.el9_4.x86_64.rpm�_�containernetworking-plugins-1.4.0-6.el9_4.x86_64.rpm�����B	����YBBsecurityImportant: skopeo security update��&�
https://access.redhat.com/errata/RHSA-2024:8111RHSA-2024:8111RHSA-2024:8111https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8111.htmlALSA-2024:8111ALSA-2024:8111
�d�6skopeo-tests-1.14.5-2.el9_4.x86_64.rpm�c�6skopeo-1.14.5-2.el9_4.x86_64.rpm�d�6skopeo-tests-1.14.5-2.el9_4.x86_64.rpm�c�6skopeo-1.14.5-2.el9_4.x86_64.rpm����y�C	��"��^BBsecurityImportant: buildah security update��0�r
https://access.redhat.com/errata/RHSA-2024:8112RHSA-2024:8112RHSA-2024:8112https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8112.htmlALSA-2024:8112ALSA-2024:8112
�0�Bbuildah-tests-1.33.9-1.el9_4.x86_64.rpm�/�Bbuildah-1.33.9-1.el9_4.x86_64.rpm�0�Bbuildah-tests-1.33.9-1.el9_4.x86_64.rpm�/�Bbuildah-1.33.9-1.el9_4.x86_64.rpm����g�D	��/��cBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update��"�rhttps://access.redhat.com/errata/RHSA-2024:8117RHSA-2024:8117RHSA-2024:8117https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8117.htmlALSA-2024:8117ALSA-2024:8117
�U�qjava-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm�W�qjava-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm�8�qjava-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm�X�qjava-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm�V�qjava-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm�7�qjava-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm�T�qjava-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpm�U�qjava-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm�W�qjava-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm�8�qjava-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm�X�qjava-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm�V�qjava-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm�7�qjava-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm�T�qjava-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpm����v�E	����pBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update���qhttps://access.redhat.com/errata/RHSA-2024:8121RHSA-2024:8121RHSA-2024:8121https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8121.htmlALSA-2024:8121ALSA-2024:8121
	�I�!java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpm�H�!java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpm�D�!java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpm�E�!java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpm�K�!java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpm�L�!java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpm�G�!java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpm�J�!java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpm�F�!java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm	�I�!java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpm�H�!java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpm�D�!java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpm�E�!java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpm�K�!java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpm�L�!java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpm�G�!java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpm�J�!java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpm�F�!java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm����f�F	����CBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update���qhttps://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124
	��%java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpm	��%java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm��%java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpm����l�G	��(��VBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update��v�https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127
	�s�7java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�r�7java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�q�7java-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�o�7java-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�m�7java-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�t�7java-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�p�7java-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�n�7java-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�u�7java-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm	�s�7java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�r�7java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�q�7java-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�o�7java-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�m�7java-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�t�7java-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�p�7java-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�n�7java-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�u�7java-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm����^�H	��:��iBBBBBBBBBBBBBBBsecurityModerate: kernel security update���<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162
	&�Ukernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm+�Urv-5.14.0-427.40.1.el9_4.x86_64.rpm#�Ukernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm�Ukernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm)�Urtla-5.14.0-427.40.1.el9_4.x86_64.rpm(�Ukernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm'�Uperf-5.14.0-427.40.1.el9_4.x86_64.rpm$�Ukernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm%�Ukernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm	&�Ukernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm+�Urv-5.14.0-427.40.1.el9_4.x86_64.rpm#�Ukernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm�Ukernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm)�Urtla-5.14.0-427.40.1.el9_4.x86_64.rpm(�Ukernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm'�Uperf-5.14.0-427.40.1.el9_4.x86_64.rpm$�Ukernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm%�Ukernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm����I	����{BBBBBBBBBBsecurityImportant: webkit2gtk3 security update��H�nhttps://access.redhat.com/errata/RHSA-2024:8180RHSA-2024:8180RHSA-2024:8180https://access.redhat.com/security/cve/CVE-2024-23271CVE-2024-23271CVE-2024-23271https://access.redhat.com/security/cve/CVE-2024-27820CVE-2024-27820CVE-2024-27820https://access.redhat.com/security/cve/CVE-2024-27838CVE-2024-27838CVE-2024-27838https://access.redhat.com/security/cve/CVE-2024-27851CVE-2024-27851CVE-2024-27851https://access.redhat.com/security/cve/CVE-2024-40776CVE-2024-40776CVE-2024-40776https://access.redhat.com/security/cve/CVE-2024-40779CVE-2024-40779CVE-2024-40779https://access.redhat.com/security/cve/CVE-2024-40780CVE-2024-40780CVE-2024-40780https://access.redhat.com/security/cve/CVE-2024-40782CVE-2024-40782CVE-2024-40782https://access.redhat.com/security/cve/CVE-2024-40789CVE-2024-40789CVE-2024-40789https://access.redhat.com/security/cve/CVE-2024-40866CVE-2024-40866CVE-2024-40866https://access.redhat.com/security/cve/CVE-2024-44187CVE-2024-44187CVE-2024-44187https://bugzilla.redhat.com/23018412301841https://bugzilla.redhat.com/23020672302067https://bugzilla.redhat.com/23020692302069https://bugzilla.redhat.com/23020702302070https://bugzilla.redhat.com/23020712302071https://bugzilla.redhat.com/23127242312724https://bugzilla.redhat.com/23146962314696https://bugzilla.redhat.com/23146982314698https://bugzilla.redhat.com/23147022314702https://bugzilla.redhat.com/23147042314704https://bugzilla.redhat.com/23147062314706https://errata.almalinux.org/9/ALSA-2024-8180.htmlALSA-2024:8180ALSA-2024:8180
3�5webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm3�5webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm0�5webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm0�5webkit2gtk3-2.46.1-2.el9_4.i686.rpm1�5webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm2�5webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm1�5webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm2�5webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm3�5webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm3�5webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm0�5webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm0�5webkit2gtk3-2.46.1-2.el9_4.i686.rpm1�5webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm2�5webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm1�5webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm2�5webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm����i�J	����HBBBBBBBBsecurityModerate: python3.11 security update��6�Thttps://access.redhat.com/errata/RHSA-2024:8374RHSA-2024:8374RHSA-2024:8374https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8374.htmlALSA-2024:8374ALSA-2024:8374
\�+python3.11-libs-3.11.7-1.el9_4.6.i686.rpm\�+python3.11-libs-3.11.7-1.el9_4.6.x86_64.rpm�P�+python3.11-3.11.7-1.el9_4.6.x86_64.rpm[�+python3.11-devel-3.11.7-1.el9_4.6.x86_64.rpm[�+python3.11-devel-3.11.7-1.el9_4.6.i686.rpm�Q�+python3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpm\�+python3.11-libs-3.11.7-1.el9_4.6.i686.rpm\�+python3.11-libs-3.11.7-1.el9_4.6.x86_64.rpm�P�+python3.11-3.11.7-1.el9_4.6.x86_64.rpm[�+python3.11-devel-3.11.7-1.el9_4.6.x86_64.rpm[�+python3.11-devel-3.11.7-1.el9_4.6.i686.rpm�Q�+python3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpm����v�K	����SBBBBsecurityModerate: python3.9 security update��
�\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446
Q�python3-devel-3.9.18-3.el9_4.6.i686.rpm�+�python3-tkinter-3.9.18-3.el9_4.6.x86_64.rpmf�python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpmQ�python3-devel-3.9.18-3.el9_4.6.x86_64.rpmQ�python3-devel-3.9.18-3.el9_4.6.i686.rpm�+�python3-tkinter-3.9.18-3.el9_4.6.x86_64.rpmf�python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpmQ�python3-devel-3.9.18-3.el9_4.6.x86_64.rpm���!�L	��$��ZBBBBBBBBsecurityModerate: python3.12 security update��f�
https://access.redhat.com/errata/RHSA-2024:8447RHSA-2024:8447RHSA-2024:8447https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8447.htmlALSA-2024:8447ALSA-2024:8447
��1python3.12-libs-3.12.1-4.el9_4.4.i686.rpm��1python3.12-devel-3.12.1-4.el9_4.4.i686.rpm��1python3.12-devel-3.12.1-4.el9_4.4.x86_64.rpm��1python3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm��1python3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm��1python3.12-3.12.1-4.el9_4.4.x86_64.rpm��1python3.12-libs-3.12.1-4.el9_4.4.i686.rpm��1python3.12-devel-3.12.1-4.el9_4.4.i686.rpm��1python3.12-devel-3.12.1-4.el9_4.4.x86_64.rpm��1python3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm��1python3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm��1python3.12-3.12.1-4.el9_4.4.x86_64.rpm����M	��)��eBBsecurityImportant: buildah security update��s�thttps://access.redhat.com/errata/RHSA-2024:8563RHSA-2024:8563RHSA-2024:8563https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://bugzilla.redhat.com/23174582317458https://errata.almalinux.org/9/ALSA-2024-8563.htmlALSA-2024:8563ALSA-2024:8563
�0�<buildah-tests-1.33.10-1.el9_4.x86_64.rpm�/�<buildah-1.33.10-1.el9_4.x86_64.rpm�0�<buildah-tests-1.33.10-1.el9_4.x86_64.rpm�/�<buildah-1.33.10-1.el9_4.x86_64.rpm����.�N	��;��jBBBBBBBBBBBBBBBsecurityModerate: kernel security update��g�>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617
	#�Vkernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm�Vkernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm&�Vkernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm(�Vkernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm$�Vkernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm+�Vrv-5.14.0-427.42.1.el9_4.x86_64.rpm'�Vperf-5.14.0-427.42.1.el9_4.x86_64.rpm%�Vkernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm)�Vrtla-5.14.0-427.42.1.el9_4.x86_64.rpm	#�Vkernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm�Vkernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm&�Vkernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm(�Vkernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm$�Vkernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm+�Vrv-5.14.0-427.42.1.el9_4.x86_64.rpm'�Vperf-5.14.0-427.42.1.el9_4.x86_64.rpm%�Vkernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm)�Vrtla-5.14.0-427.42.1.el9_4.x86_64.rpm����B�O	����|BBsecurityImportant: grafana security update��%�Khttps://access.redhat.com/errata/RHSA-2024:8678RHSA-2024:8678RHSA-2024:8678https://access.redhat.com/security/cve/CVE-2024-47875CVE-2024-47875CVE-2024-47875https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/23157192315719https://bugzilla.redhat.com/23180522318052https://errata.almalinux.org/9/ALSA-2024-8678.htmlALSA-2024:8678ALSA-2024:8678
�U�mgrafana-selinux-9.2.10-19.el9_4.x86_64.rpm�I�mgrafana-9.2.10-19.el9_4.x86_64.rpm�U�mgrafana-selinux-9.2.10-19.el9_4.x86_64.rpm�I�mgrafana-9.2.10-19.el9_4.x86_64.rpm�����P	����AsecurityLow: mod_http2 security update�6��p�https://access.redhat.com/errata/RHSA-2024:8680RHSA-2024:8680RHSA-2024:8680https://access.redhat.com/security/cve/CVE-2024-36387CVE-2024-36387CVE-2024-36387https://bugzilla.redhat.com/22950062295006https://errata.almalinux.org/9/ALSA-2024-8680.htmlALSA-2024:8680ALSA-2024:8680
�K�Emod_http2-2.0.26-2.el9_4.1.x86_64.rpm�K�Emod_http2-2.0.26-2.el9_4.1.x86_64.rpm����@�Q	����DBBsecurityModerate: firefox security update���Mhttps://access.redhat.com/errata/RHSA-2024:8726RHSA-2024:8726RHSA-2024:8726https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-8726.htmlALSA-2024:8726ALSA-2024:8726
P�
firefox-x11-128.4.0-1.el9_4.x86_64.rpm8�
firefox-128.4.0-1.el9_4.x86_64.rpmP�
firefox-x11-128.4.0-1.el9_4.x86_64.rpm8�
firefox-128.4.0-1.el9_4.x86_64.rpm�����R	����IsecurityModerate: thunderbird security update��T�https://access.redhat.com/errata/RHSA-2024:8793RHSA-2024:8793RHSA-2024:8793https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-8793.htmlALSA-2024:8793ALSA-2024:8793
9�
thunderbird-128.4.0-1.el9_4.alma.1.x86_64.rpm9�
thunderbird-128.4.0-1.el9_4.alma.1.x86_64.rpm�����S	����LBBBsecurityImportant: openexr security update��p�:https://access.redhat.com/errata/RHSA-2024:8800RHSA-2024:8800RHSA-2024:8800https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-8800.htmlALSA-2024:8800ALSA-2024:8800
�:�openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm�e�openexr-3.1.1-2.el9_4.1.x86_64.rpm�:�openexr-libs-3.1.1-2.el9_4.1.i686.rpm�:�openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm�e�openexr-3.1.1-2.el9_4.1.x86_64.rpm�:�openexr-libs-3.1.1-2.el9_4.1.i686.rpm�����T	����RBBBBsecurityModerate: libtiff security update��*�https://access.redhat.com/errata/RHSA-2024:8914RHSA-2024:8914RHSA-2024:8914https://access.redhat.com/security/cve/CVE-2024-7006CVE-2024-7006CVE-2024-7006https://bugzilla.redhat.com/23029962302996https://errata.almalinux.org/9/ALSA-2024-8914.htmlALSA-2024:8914ALSA-2024:8914
�C�libtiff-4.4.0-12.el9_4.1.x86_64.rpm�D�libtiff-devel-4.4.0-12.el9_4.1.x86_64.rpm�C�libtiff-4.4.0-12.el9_4.1.i686.rpm�D�libtiff-devel-4.4.0-12.el9_4.1.i686.rpm�C�libtiff-4.4.0-12.el9_4.1.x86_64.rpm�D�libtiff-devel-4.4.0-12.el9_4.1.x86_64.rpm�C�libtiff-4.4.0-12.el9_4.1.i686.rpm�D�libtiff-devel-4.4.0-12.el9_4.1.i686.rpm���� �U	����YsecurityModerate: edk2 security update��5�Ehttps://access.redhat.com/errata/RHSA-2024:8935RHSA-2024:8935RHSA-2024:8935https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-8935.htmlALSA-2024:8935ALSA-2024:8935
��!edk2-aarch64-20231122-6.el9_4.4.noarch.rpm�g�!edk2-ovmf-20231122-6.el9_4.4.noarch.rpm��!edk2-aarch64-20231122-6.el9_4.4.noarch.rpm�g�!edk2-ovmf-20231122-6.el9_4.4.noarch.rpm����t�V	��%��\BBBBBBBsecurityImportant: podman security update��z�nhttps://access.redhat.com/errata/RHSA-2024:9051RHSA-2024:9051RHSA-2024:9051https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9051.htmlALSA-2024:9051ALSA-2024:9051
�1�$podman-4.9.4-16.el9_4.x86_64.rpm�2�$podman-plugins-4.9.4-16.el9_4.x86_64.rpm�3�$podman-remote-4.9.4-16.el9_4.x86_64.rpmh�$podman-docker-4.9.4-16.el9_4.noarch.rpm�4�$podman-tests-4.9.4-16.el9_4.x86_64.rpm�1�$podman-4.9.4-16.el9_4.x86_64.rpm�2�$podman-plugins-4.9.4-16.el9_4.x86_64.rpm�3�$podman-remote-4.9.4-16.el9_4.x86_64.rpmh�$podman-docker-4.9.4-16.el9_4.noarch.rpm�4�$podman-tests-4.9.4-16.el9_4.x86_64.rpm����u�W	��'��&securityModerate: edk2 security update��h�=
https://access.redhat.com/errata/RHSA-2024:9088RHSA-2024:9088RHSA-2024:9088https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://access.redhat.com/security/cve/CVE-2024-1298CVE-2024-1298CVE-2024-1298https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://bugzilla.redhat.com/22842432284243https://errata.almalinux.org/9/ALSA-2024-9088.htmlALSA-2024:9088ALSA-2024:9088
�g�edk2-ovmf-20240524-6.el9_5.noarch.rpm�g�edk2-ovmf-20240524-6.el9_5.noarch.rpm����
�X	��*��hsecurityModerate: containernetworking-plugins security update��%�yhttps://access.redhat.com/errata/RHSA-2024:9089RHSA-2024:9089RHSA-2024:9089https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9089.htmlALSA-2024:9089ALSA-2024:9089
�_�containernetworking-plugins-1.5.1-2.el9.x86_64.rpm�_�containernetworking-plugins-1.5.1-2.el9.x86_64.rpm����,�Y	��-��ksecurityModerate: xorg-x11-server-Xwayland security update���:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093
��fxorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm��fxorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm����,�Z	��2��nBBsecurityModerate: buildah security update��X�}https://access.redhat.com/errata/RHSA-2024:9097RHSA-2024:9097RHSA-2024:9097https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9097.htmlALSA-2024:9097ALSA-2024:9097
�0�Cbuildah-tests-1.37.2-1.el9.x86_64.rpm�/�Cbuildah-1.37.2-1.el9.x86_64.rpm�0�Cbuildah-tests-1.37.2-1.el9.x86_64.rpm�/�Cbuildah-1.37.2-1.el9.x86_64.rpm����h�[	��7��sBBsecurityModerate: skopeo security update��U�q
https://access.redhat.com/errata/RHSA-2024:9098RHSA-2024:9098RHSA-2024:9098https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9098.htmlALSA-2024:9098ALSA-2024:9098
�c�7skopeo-1.16.1-1.el9.x86_64.rpm�d�7skopeo-tests-1.16.1-1.el9.x86_64.rpm�c�7skopeo-1.16.1-1.el9.x86_64.rpm�d�7skopeo-tests-1.16.1-1.el9.x86_64.rpm����<�\	����xBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gnome-shell and gnome-shell-extensions security update��F�https://access.redhat.com/errata/RHSA-2024:9114RHSA-2024:9114RHSA-2024:9114https://access.redhat.com/security/cve/CVE-2024-36472CVE-2024-36472CVE-2024-36472https://bugzilla.redhat.com/22837502283750https://errata.almalinux.org/9/ALSA-2024-9114.htmlALSA-2024:9114ALSA-2024:9114
�Ncgnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm�Mcgnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpm�Acgnome-shell-extension-common-40.7-19.el9.noarch.rpm�Tcgnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm�Pcgnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm�Gcgnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm�@cgnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm�Ecgnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm�<�gnome-shell-40.10-21.el9.x86_64.rpm�Hcgnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm�Qcgnome-shell-extension-user-theme-40.7-19.el9.noarch.rpm�Bcgnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm�Ccgnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm�Rcgnome-shell-extension-window-list-40.7-19.el9.noarch.rpm�Kcgnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm�Scgnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm�=cgnome-classic-session-40.7-19.el9.noarch.rpm�>cgnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm�Lcgnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm�Ocgnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm�Icgnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm�Fcgnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm�Jcgnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm�Dcgnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm�?cgnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm�Ncgnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm�Mcgnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpm�Acgnome-shell-extension-common-40.7-19.el9.noarch.rpm�Tcgnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm�Pcgnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm�Gcgnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm�@cgnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm�Ecgnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm�<�gnome-shell-40.10-21.el9.x86_64.rpm�Hcgnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm�Qcgnome-shell-extension-user-theme-40.7-19.el9.noarch.rpm�Bcgnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm�Ccgnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm�Rcgnome-shell-extension-window-list-40.7-19.el9.noarch.rpm�Kcgnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm�Scgnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm�=cgnome-classic-session-40.7-19.el9.noarch.rpm�>cgnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm�Lcgnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm�Ocgnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm�Icgnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm�Fcgnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm�Jcgnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm�Dcgnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm�?cgnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm����X�]	����SBBsecurityModerate: grafana security update��F�4https://access.redhat.com/errata/RHSA-2024:9115RHSA-2024:9115RHSA-2024:9115https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9115.htmlALSA-2024:9115ALSA-2024:9115
�U�xgrafana-selinux-10.2.6-4.el9.x86_64.rpm�I�xgrafana-10.2.6-4.el9.x86_64.rpm�U�xgrafana-selinux-10.2.6-4.el9.x86_64.rpm�I�xgrafana-10.2.6-4.el9.x86_64.rpm�����^	��$��XBBBBBBBBBBsecurityModerate: xorg-x11-server security update��z�)https://access.redhat.com/errata/RHSA-2024:9122RHSA-2024:9122RHSA-2024:9122https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9122.htmlALSA-2024:9122ALSA-2024:9122
��#xorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-common-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-common-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpm��#xorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm�����_	����eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update��#�|https://access.redhat.com/errata/RHSA-2024:9128RHSA-2024:9128RHSA-2024:9128https://access.redhat.com/security/cve/CVE-2024-8235CVE-2024-8235CVE-2024-8235https://bugzilla.redhat.com/23086802308680https://errata.almalinux.org/9/ALSA-2024-9128.htmlALSA-2024:9128ALSA-2024:9128
�F/libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpm�m/libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpm�u/libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpm�j/libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm�v/libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpm�h/libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpm�G/libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpm�o/libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm�s/libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpm�D/libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpm�x/libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm�y/libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpm�c/libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm�f/libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpm�/libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm�n/libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm�r/libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm�z/libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpm�p/libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpm�g/libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpm�i/libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpm�l/libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpm�E/libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm�{/libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpm�t/libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpm�H/libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm�k/libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpm�q/libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpm�w/libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpm�F/libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpm�m/libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpm�u/libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpm�j/libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm�v/libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpm�h/libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpm�G/libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpm�o/libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm�s/libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpm�D/libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpm�x/libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm�y/libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpm�c/libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm�f/libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpm�/libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm�n/libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm�r/libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm�z/libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpm�p/libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpm�g/libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpm�i/libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpm�l/libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpm�E/libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm�{/libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpm�t/libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpm�H/libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm�k/libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpm�q/libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpm�w/libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpm����v�`	��$��`BBsecurityModerate: toolbox security update���h
https://access.redhat.com/errata/RHSA-2024:9135RHSA-2024:9135RHSA-2024:9135https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9135.htmlALSA-2024:9135ALSA-2024:9135
��dtoolbox-0.0.99.5-5.el9.x86_64.rpm�
�dtoolbox-tests-0.0.99.5-5.el9.x86_64.rpm��dtoolbox-0.0.99.5-5.el9.x86_64.rpm�
�dtoolbox-tests-0.0.99.5-5.el9.x86_64.rpm����=�a	����eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security update���ahttps://access.redhat.com/errata/RHSA-2024:9136RHSA-2024:9136RHSA-2024:9136https://access.redhat.com/security/cve/CVE-2024-26327CVE-2024-26327CVE-2024-26327https://access.redhat.com/security/cve/CVE-2024-3446CVE-2024-3446CVE-2024-3446https://access.redhat.com/security/cve/CVE-2024-7409CVE-2024-7409CVE-2024-7409https://bugzilla.redhat.com/22648442264844https://bugzilla.redhat.com/22742112274211https://bugzilla.redhat.com/23024872302487https://errata.almalinux.org/9/ALSA-2024-9136.htmlALSA-2024:9136ALSA-2024:9136
�A`qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpm�=`qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpm�>`qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpm�9`qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpm�@`qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpm�5`qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpm�2`qemu-kvm-9.0.0-10.el9_5.x86_64.rpm�8`qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpm�6`qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpm�3`qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpm�?`qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpm�:`qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpm�0`qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpm�4`qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm�K`qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpm�;`qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpm�<`qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpm�7`qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpm�1`qemu-img-9.0.0-10.el9_5.x86_64.rpm�A`qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpm�=`qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpm�>`qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpm�9`qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpm�@`qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpm�5`qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpm�2`qemu-kvm-9.0.0-10.el9_5.x86_64.rpm�8`qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpm�6`qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpm�3`qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpm�?`qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpm�:`qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpm�0`qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpm�4`qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm�K`qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpm�;`qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpm�<`qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpm�7`qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpm�1`qemu-img-9.0.0-10.el9_5.x86_64.rpm����8�b	����LBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��h�
https://access.redhat.com/errata/RHSA-2024:9144RHSA-2024:9144RHSA-2024:9144https://access.redhat.com/security/cve/CVE-2023-42843CVE-2023-42843CVE-2023-42843https://access.redhat.com/security/cve/CVE-2023-42950CVE-2023-42950CVE-2023-42950https://access.redhat.com/security/cve/CVE-2023-42956CVE-2023-42956CVE-2023-42956https://access.redhat.com/security/cve/CVE-2024-4558CVE-2024-4558CVE-2024-4558https://bugzilla.redhat.com/22717172271717https://bugzilla.redhat.com/22717182271718https://bugzilla.redhat.com/22717192271719https://bugzilla.redhat.com/22796892279689https://errata.almalinux.org/9/ALSA-2024-9144.htmlALSA-2024:9144ALSA-2024:9144
2�4webkit2gtk3-jsc-2.44.3-2.el9.i686.rpm0�4webkit2gtk3-2.44.3-2.el9.i686.rpm1�4webkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm3�4webkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm0�4webkit2gtk3-2.44.3-2.el9.x86_64.rpm3�4webkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm1�4webkit2gtk3-devel-2.44.3-2.el9.i686.rpm2�4webkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm2�4webkit2gtk3-jsc-2.44.3-2.el9.i686.rpm0�4webkit2gtk3-2.44.3-2.el9.i686.rpm1�4webkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm3�4webkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm0�4webkit2gtk3-2.44.3-2.el9.x86_64.rpm3�4webkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm1�4webkit2gtk3-devel-2.44.3-2.el9.i686.rpm2�4webkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm�����c	����securityModerate: python-jinja2 security update��w�https://access.redhat.com/errata/RHSA-2024:9150RHSA-2024:9150RHSA-2024:9150https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-9150.htmlALSA-2024:9150ALSA-2024:9150
�N�gpython3-jinja2-2.11.3-6.el9.noarch.rpm�N�gpython3-jinja2-2.11.3-6.el9.noarch.rpm�����d	��!��[BBBBsecurityModerate: lldpd security update��~�Mhttps://access.redhat.com/errata/RHSA-2024:9158RHSA-2024:9158RHSA-2024:9158https://access.redhat.com/security/cve/CVE-2020-27827CVE-2020-27827CVE-2020-27827https://access.redhat.com/security/cve/CVE-2021-43612CVE-2021-43612CVE-2021-43612https://access.redhat.com/security/cve/CVE-2023-41910CVE-2023-41910CVE-2023-41910https://bugzilla.redhat.com/19214381921438https://bugzilla.redhat.com/20403882040388https://bugzilla.redhat.com/22374112237411https://errata.almalinux.org/9/ALSA-2024-9158.htmlALSA-2024:9158ALSA-2024:9158
�i�Qlldpd-1.0.18-4.el9.x86_64.rpm�j�Qlldpd-devel-1.0.18-4.el9.x86_64.rpm�j�Qlldpd-devel-1.0.18-4.el9.i686.rpm�i�Qlldpd-1.0.18-4.el9.i686.rpm�i�Qlldpd-1.0.18-4.el9.x86_64.rpm�j�Qlldpd-devel-1.0.18-4.el9.x86_64.rpm�j�Qlldpd-devel-1.0.18-4.el9.i686.rpm�i�Qlldpd-1.0.18-4.el9.i686.rpm�����e	��0��bBBBBBBBBBBBBsecurityModerate: poppler security update��K�+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167
	�?�Cpoppler-21.01.0-21.el9.i686.rpm�A�Cpoppler-glib-21.01.0-21.el9.i686.rpm�?�Cpoppler-21.01.0-21.el9.x86_64.rpm�@�Cpoppler-cpp-21.01.0-21.el9.i686.rpm�A�Cpoppler-glib-21.01.0-21.el9.x86_64.rpm�B�Cpoppler-qt5-21.01.0-21.el9.i686.rpm�H�Cpoppler-utils-21.01.0-21.el9.x86_64.rpm�@�Cpoppler-cpp-21.01.0-21.el9.x86_64.rpm�B�Cpoppler-qt5-21.01.0-21.el9.x86_64.rpm	�?�Cpoppler-21.01.0-21.el9.i686.rpm�A�Cpoppler-glib-21.01.0-21.el9.i686.rpm�?�Cpoppler-21.01.0-21.el9.x86_64.rpm�@�Cpoppler-cpp-21.01.0-21.el9.i686.rpm�A�Cpoppler-glib-21.01.0-21.el9.x86_64.rpm�B�Cpoppler-qt5-21.01.0-21.el9.i686.rpm�H�Cpoppler-utils-21.01.0-21.el9.x86_64.rpm�@�Cpoppler-cpp-21.01.0-21.el9.x86_64.rpm�B�Cpoppler-qt5-21.01.0-21.el9.x86_64.rpm�����f	��3��qsecurityModerate: mod_auth_openidc security update��v�$https://access.redhat.com/errata/RHSA-2024:9180RHSA-2024:9180RHSA-2024:9180https://access.redhat.com/security/cve/CVE-2024-24814CVE-2024-24814CVE-2024-24814https://bugzilla.redhat.com/22640922264092https://errata.almalinux.org/9/ALSA-2024-9180.htmlALSA-2024:9180ALSA-2024:9180
�d�Mmod_auth_openidc-2.4.10-1.el9.x86_64.rpm�d�Mmod_auth_openidc-2.4.10-1.el9.x86_64.rpm����/�g	��9��tBBBsecurityModerate: jose security update���Rhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181
�k�hjose-14-1.el9.x86_64.rpm�Y�hlibjose-14-1.el9.i686.rpm�Y�hlibjose-14-1.el9.x86_64.rpm�k�hjose-14-1.el9.x86_64.rpm�Y�hlibjose-14-1.el9.i686.rpm�Y�hlibjose-14-1.el9.x86_64.rpm����b�h	����zBBBBBBBBsecurityModerate: gtk3 security update��l�+https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184
�L�>gtk3-devel-3.24.31-5.el9.x86_64.rpm�?�>gtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm�L�>gtk3-devel-3.24.31-5.el9.i686.rpm�@�>gtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm�K�>gtk3-3.24.31-5.el9.i686.rpm�K�>gtk3-3.24.31-5.el9.x86_64.rpm�L�>gtk3-devel-3.24.31-5.el9.x86_64.rpm�?�>gtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm�L�>gtk3-devel-3.24.31-5.el9.i686.rpm�@�>gtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm�K�>gtk3-3.24.31-5.el9.i686.rpm�K�>gtk3-3.24.31-5.el9.x86_64.rpm�����i	����EBsecurityModerate: iperf3 security update���?https://access.redhat.com/errata/RHSA-2024:9185RHSA-2024:9185RHSA-2024:9185https://access.redhat.com/security/cve/CVE-2023-7250CVE-2023-7250CVE-2023-7250https://access.redhat.com/security/cve/CVE-2024-26306CVE-2024-26306CVE-2024-26306https://bugzilla.redhat.com/22447072244707https://bugzilla.redhat.com/22702702270270https://errata.almalinux.org/9/ALSA-2024-9185.htmlALSA-2024:9185ALSA-2024:9185
�5�}iperf3-3.9-13.el9.x86_64.rpm�5�}iperf3-3.9-13.el9.i686.rpm�5�}iperf3-3.9-13.el9.x86_64.rpm�5�}iperf3-3.9-13.el9.i686.rpm����A�j	����IBBBBBsecurityLow: bcc security update�6��V�vhttps://access.redhat.com/errata/RHSA-2024:9187RHSA-2024:9187RHSA-2024:9187https://access.redhat.com/security/cve/CVE-2024-2314CVE-2024-2314CVE-2024-2314https://bugzilla.redhat.com/22690192269019https://errata.almalinux.org/9/ALSA-2024-9187.htmlALSA-2024:9187ALSA-2024:9187
�{�bcc-tools-0.30.0-6.el9.x86_64.rpm�o�libbpf-tools-0.30.0-6.el9.x86_64.rpm�8�python3-bcc-0.30.0-6.el9.noarch.rpm�z�bcc-0.30.0-6.el9.x86_64.rpm�{�bcc-tools-0.30.0-6.el9.x86_64.rpm�o�libbpf-tools-0.30.0-6.el9.x86_64.rpm�8�python3-bcc-0.30.0-6.el9.noarch.rpm�z�bcc-0.30.0-6.el9.x86_64.rpm����A�k	����QsecurityLow: bpftrace security update�6��L�@https://access.redhat.com/errata/RHSA-2024:9188RHSA-2024:9188RHSA-2024:9188https://access.redhat.com/security/cve/CVE-2024-2313CVE-2024-2313CVE-2024-2313https://bugzilla.redhat.com/22690142269014https://errata.almalinux.org/9/ALSA-2024-9188.htmlALSA-2024:9188ALSA-2024:9188
��Ybpftrace-0.21.1-1.el9.x86_64.rpm��Ybpftrace-0.21.1-1.el9.x86_64.rpm����0�l	����TBBBBBBBBsecurityModerate: python3.12 security update���Fhttps://access.redhat.com/errata/RHSA-2024:9190RHSA-2024:9190RHSA-2024:9190https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/22929212292921https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9190.htmlALSA-2024:9190ALSA-2024:9190
��7python3.12-devel-3.12.5-2.el9.i686.rpm��7python3.12-devel-3.12.5-2.el9.x86_64.rpm��7python3.12-libs-3.12.5-2.el9.i686.rpm��7python3.12-tkinter-3.12.5-2.el9.x86_64.rpm��7python3.12-libs-3.12.5-2.el9.x86_64.rpm��7python3.12-3.12.5-2.el9.x86_64.rpm��7python3.12-devel-3.12.5-2.el9.i686.rpm��7python3.12-devel-3.12.5-2.el9.x86_64.rpm��7python3.12-libs-3.12.5-2.el9.i686.rpm��7python3.12-tkinter-3.12.5-2.el9.x86_64.rpm��7python3.12-libs-3.12.5-2.el9.x86_64.rpm��7python3.12-3.12.5-2.el9.x86_64.rpm���<�m	��)��_BBBBBBBBsecurityModerate: python3.11 security update��R�Rhttps://access.redhat.com/errata/RHSA-2024:9192RHSA-2024:9192RHSA-2024:9192https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9192.htmlALSA-2024:9192ALSA-2024:9192
[�,python3.11-devel-3.11.9-7.el9.i686.rpm[�,python3.11-devel-3.11.9-7.el9.x86_64.rpm�P�,python3.11-3.11.9-7.el9.x86_64.rpm�Q�,python3.11-tkinter-3.11.9-7.el9.x86_64.rpm\�,python3.11-libs-3.11.9-7.el9.x86_64.rpm\�,python3.11-libs-3.11.9-7.el9.i686.rpm[�,python3.11-devel-3.11.9-7.el9.i686.rpm[�,python3.11-devel-3.11.9-7.el9.x86_64.rpm�P�,python3.11-3.11.9-7.el9.x86_64.rpm�Q�,python3.11-tkinter-3.11.9-7.el9.x86_64.rpm\�,python3.11-libs-3.11.9-7.el9.x86_64.rpm\�,python3.11-libs-3.11.9-7.el9.i686.rpm���d�n	��,��jsecurityModerate: python3.12-PyMySQL security update��$�khttps://access.redhat.com/errata/RHSA-2024:9193RHSA-2024:9193RHSA-2024:9193https://access.redhat.com/security/cve/CVE-2024-36039CVE-2024-36039CVE-2024-36039https://bugzilla.redhat.com/22828212282821https://errata.almalinux.org/9/ALSA-2024-9193.htmlALSA-2024:9193ALSA-2024:9193
�G�python3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpm�F�python3.12-PyMySQL-1.1.0-3.el9.noarch.rpm�G�python3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpm�F�python3.12-PyMySQL-1.1.0-3.el9.noarch.rpm����l�o	��/��msecurityModerate: python3.11-PyMySQL security update���khttps://access.redhat.com/errata/RHSA-2024:9194RHSA-2024:9194RHSA-2024:9194https://access.redhat.com/security/cve/CVE-2024-36039CVE-2024-36039CVE-2024-36039https://bugzilla.redhat.com/22828212282821https://errata.almalinux.org/9/ALSA-2024-9194.htmlALSA-2024:9194ALSA-2024:9194
�B�python3.11-PyMySQL-1.0.2-2.el9.noarch.rpm�C�python3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpm�B�python3.11-PyMySQL-1.0.2-2.el9.noarch.rpm�C�python3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpm����l�p	��9��pBBBBBBBsecurityModerate: cyrus-imapd security update��z�@https://access.redhat.com/errata/RHSA-2024:9195RHSA-2024:9195RHSA-2024:9195https://access.redhat.com/security/cve/CVE-2024-34055CVE-2024-34055CVE-2024-34055https://bugzilla.redhat.com/22905102290510https://errata.almalinux.org/9/ALSA-2024-9195.htmlALSA-2024:9195ALSA-2024:9195
��!perl-Cyrus-3.4.8-1.el9.x86_64.rpm�
�!cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm�(�!cyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm�(�!cyrus-imapd-libs-3.4.8-1.el9.i686.rpm�	�!cyrus-imapd-3.4.8-1.el9.x86_64.rpm��!perl-Cyrus-3.4.8-1.el9.x86_64.rpm�
�!cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm�(�!cyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm�(�!cyrus-imapd-libs-3.4.8-1.el9.i686.rpm�	�!cyrus-imapd-3.4.8-1.el9.x86_64.rpm����W�q	��<��zsecurityModerate: runc security update��:�7https://access.redhat.com/errata/RHSA-2024:9200RHSA-2024:9200RHSA-2024:9200https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://bugzilla.redhat.com/22798142279814https://errata.almalinux.org/9/ALSA-2024-9200.htmlALSA-2024:9200ALSA-2024:9200
�z�&runc-1.1.13-4.el9.x86_64.rpm�z�&runc-1.1.13-4.el9.x86_64.rpm����1�r	����}BBBBBBBBBBBBBBBBsecurityModerate: postfix security update��q� https://access.redhat.com/errata/RHSA-2024:9243RHSA-2024:9243RHSA-2024:9243https://access.redhat.com/security/cve/CVE-2023-51764CVE-2023-51764CVE-2023-51764https://bugzilla.redhat.com/22555632255563https://errata.almalinux.org/9/ALSA-2024-9243.htmlALSA-2024:9243ALSA-2024:9243
	�4�<postfix-mysql-3.5.25-1.el9.x86_64.rpm�7�<postfix-pgsql-3.5.25-1.el9.x86_64.rpm�2�<postfix-ldap-3.5.25-1.el9.x86_64.rpm�6�<postfix-perl-scripts-3.5.25-1.el9.x86_64.rpm�5�<postfix-pcre-3.5.25-1.el9.x86_64.rpm�1�<postfix-cdb-3.5.25-1.el9.x86_64.rpm�8�<postfix-sqlite-3.5.25-1.el9.x86_64.rpm�3�<postfix-lmdb-3.5.25-1.el9.x86_64.rpm�0�<postfix-3.5.25-1.el9.x86_64.rpm	�4�<postfix-mysql-3.5.25-1.el9.x86_64.rpm�7�<postfix-pgsql-3.5.25-1.el9.x86_64.rpm�2�<postfix-ldap-3.5.25-1.el9.x86_64.rpm�6�<postfix-perl-scripts-3.5.25-1.el9.x86_64.rpm�5�<postfix-pcre-3.5.25-1.el9.x86_64.rpm�1�<postfix-cdb-3.5.25-1.el9.x86_64.rpm�8�<postfix-sqlite-3.5.25-1.el9.x86_64.rpm�3�<postfix-lmdb-3.5.25-1.el9.x86_64.rpm�0�<postfix-3.5.25-1.el9.x86_64.rpm�����s	����PsecurityModerate: oci-seccomp-bpf-hook security update���https://access.redhat.com/errata/RHSA-2024:9277RHSA-2024:9277RHSA-2024:9277https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://bugzilla.redhat.com/22798142279814https://errata.almalinux.org/9/ALSA-2024-9277.htmlALSA-2024:9277ALSA-2024:9277
�
�Noci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm�
�Noci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm����1�t	����securityModerate: python-jwcrypto security update���https://access.redhat.com/errata/RHSA-2024:9281RHSA-2024:9281RHSA-2024:9281https://access.redhat.com/security/cve/CVE-2023-6681CVE-2023-6681CVE-2023-6681https://bugzilla.redhat.com/22608432260843https://errata.almalinux.org/9/ALSA-2024-9281.htmlALSA-2024:9281ALSA-2024:9281
��Fpython3-jwcrypto-1.5.6-2.el9.noarch.rpm��Fpython3-jwcrypto-1.5.6-2.el9.noarch.rpm�����u	��)��UBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security update��+�Lhttps://access.redhat.com/errata/RHSA-2024:9306RHSA-2024:9306RHSA-2024:9306https://access.redhat.com/security/cve/CVE-2023-38709CVE-2023-38709CVE-2023-38709https://access.redhat.com/security/cve/CVE-2024-24795CVE-2024-24795CVE-2024-24795https://bugzilla.redhat.com/22734912273491https://bugzilla.redhat.com/22734992273499https://errata.almalinux.org/9/ALSA-2024-9306.htmlALSA-2024:9306ALSA-2024:9306
�B�shttpd-devel-2.4.62-1.el9.x86_64.rpm�}�shttpd-filesystem-2.4.62-1.el9.noarch.rpm�M�smod_ldap-2.4.62-1.el9.x86_64.rpm�Q�"mod_ssl-2.4.62-1.el9.x86_64.rpm�@�shttpd-2.4.62-1.el9.x86_64.rpm�O�"mod_proxy_html-2.4.62-1.el9.x86_64.rpm�C�shttpd-tools-2.4.62-1.el9.x86_64.rpm�A�shttpd-core-2.4.62-1.el9.x86_64.rpm�P�smod_session-2.4.62-1.el9.x86_64.rpm�N�smod_lua-2.4.62-1.el9.x86_64.rpm�~�shttpd-manual-2.4.62-1.el9.noarch.rpm�B�shttpd-devel-2.4.62-1.el9.x86_64.rpm�}�shttpd-filesystem-2.4.62-1.el9.noarch.rpm�M�smod_ldap-2.4.62-1.el9.x86_64.rpm�Q�"mod_ssl-2.4.62-1.el9.x86_64.rpm�@�shttpd-2.4.62-1.el9.x86_64.rpm�O�"mod_proxy_html-2.4.62-1.el9.x86_64.rpm�C�shttpd-tools-2.4.62-1.el9.x86_64.rpm�A�shttpd-core-2.4.62-1.el9.x86_64.rpm�P�smod_session-2.4.62-1.el9.x86_64.rpm�N�smod_lua-2.4.62-1.el9.x86_64.rpm�~�shttpd-manual-2.4.62-1.el9.noarch.rpm����%�v	��2��jBBBBBBsecurityLow: NetworkManager security update�6��w�jhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317
�A�YNetworkManager-config-connectivity-redhat-1.48.10-2.el9_5.alma.1.noarch.rpm�@�YNetworkManager-cloud-setup-1.48.10-2.el9_5.alma.1.x86_64.rpm�B�YNetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5.alma.1.noarch.rpm�C�YNetworkManager-ovs-1.48.10-2.el9_5.alma.1.x86_64.rpm�D�YNetworkManager-ppp-1.48.10-2.el9_5.alma.1.x86_64.rpm�A�YNetworkManager-config-connectivity-redhat-1.48.10-2.el9_5.alma.1.noarch.rpm�@�YNetworkManager-cloud-setup-1.48.10-2.el9_5.alma.1.x86_64.rpm�B�YNetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5.alma.1.noarch.rpm�C�YNetworkManager-ovs-1.48.10-2.el9_5.alma.1.x86_64.rpm�D�YNetworkManager-ppp-1.48.10-2.el9_5.alma.1.x86_64.rpm����H�w	��7��sBBsecurityLow: cockpit security update�6��a�2https://access.redhat.com/errata/RHSA-2024:9325RHSA-2024:9325RHSA-2024:9325https://access.redhat.com/security/cve/CVE-2024-6126CVE-2024-6126CVE-2024-6126https://bugzilla.redhat.com/22928972292897https://errata.almalinux.org/9/ALSA-2024-9325.htmlALSA-2024:9325ALSA-2024:9325
�G�Pcockpit-pcp-323.1-1.el9_5.x86_64.rpm�U�Pcockpit-storaged-323.1-1.el9_5.noarch.rpm�T�Pcockpit-packagekit-323.1-1.el9_5.noarch.rpm�G�Pcockpit-pcp-323.1-1.el9_5.x86_64.rpm�U�Pcockpit-storaged-323.1-1.el9_5.noarch.rpm�T�Pcockpit-packagekit-323.1-1.el9_5.noarch.rpm�����x	��;��xBsecurityModerate: krb5 security update���https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331
�d�-krb5-devel-1.21.1-3.el9.x86_64.rpm�d�-krb5-devel-1.21.1-3.el9.i686.rpm�d�-krb5-devel-1.21.1-3.el9.x86_64.rpm�d�-krb5-devel-1.21.1-3.el9.i686.rpm���d�y	����|BBBsecurityLow: openssl security update�6���L
https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:9333
��popenssl-devel-3.2.2-6.el9_5.x86_64.rpm��popenssl-perl-3.2.2-6.el9_5.x86_64.rpm��popenssl-devel-3.2.2-6.el9_5.i686.rpm��popenssl-devel-3.2.2-6.el9_5.x86_64.rpm��popenssl-perl-3.2.2-6.el9_5.x86_64.rpm��popenssl-devel-3.2.2-6.el9_5.i686.rpm����e�z	����BBBBBsecurityModerate: python3.9 security update��j�khttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371
Q�python3-devel-3.9.19-8.el9.x86_64.rpm�+�python3-tkinter-3.9.19-8.el9.x86_64.rpmf�python-unversioned-command-3.9.19-8.el9.noarch.rpmQ�python3-devel-3.9.19-8.el9.i686.rpmQ�python3-devel-3.9.19-8.el9.x86_64.rpm�+�python3-tkinter-3.9.19-8.el9.x86_64.rpmf�python-unversioned-command-3.9.19-8.el9.noarch.rpmQ�python3-devel-3.9.19-8.el9.i686.rpm���<�{	����IBsecurityModerate: libgcrypt security update��U�
https://access.redhat.com/errata/RHSA-2024:9404RHSA-2024:9404RHSA-2024:9404https://access.redhat.com/security/cve/CVE-2024-2236CVE-2024-2236CVE-2024-2236https://bugzilla.redhat.com/22452182245218https://errata.almalinux.org/9/ALSA-2024-9404.htmlALSA-2024:9404ALSA-2024:9404
�T�#libgcrypt-devel-1.10.0-11.el9.i686.rpm�T�#libgcrypt-devel-1.10.0-11.el9.x86_64.rpm�T�#libgcrypt-devel-1.10.0-11.el9.i686.rpm�T�#libgcrypt-devel-1.10.0-11.el9.x86_64.rpm����H�|	����MBBBBsecurityLow: vim security update�6��_�thttps://access.redhat.com/errata/RHSA-2024:9405RHSA-2024:9405RHSA-2024:9405https://access.redhat.com/security/cve/CVE-2021-3903CVE-2021-3903CVE-2021-3903https://bugzilla.redhat.com/20185582018558https://errata.almalinux.org/9/ALSA-2024-9405.htmlALSA-2024:9405ALSA-2024:9405
�Z�}vim-enhanced-8.2.2637-21.el9.x86_64.rpm�X�}vim-X11-8.2.2637-21.el9.x86_64.rpm�Y�}vim-common-8.2.2637-21.el9.x86_64.rpm�Z�}vim-enhanced-8.2.2637-21.el9.x86_64.rpm�X�}vim-X11-8.2.2637-21.el9.x86_64.rpm�Y�}vim-common-8.2.2637-21.el9.x86_64.rpm����s�}	����TBBsecurityModerate: bluez security update��S�+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413
�}�Tbluez-obexd-5.72-2.el9.x86_64.rpm�|�Tbluez-cups-5.72-2.el9.x86_64.rpm�}�Tbluez-obexd-5.72-2.el9.x86_64.rpm�|�Tbluez-cups-5.72-2.el9.x86_64.rpm����J�~	��!��YBBBBBBsecurityImportant: bubblewrap and flatpak security update��~�Rhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449
�2�Vflatpak-libs-1.12.9-3.el9_5.x86_64.rpm�2�Vflatpak-libs-1.12.9-3.el9_5.i686.rpm�_�Vflatpak-session-helper-1.12.9-3.el9_5.x86_64.rpm�^�Vflatpak-1.12.9-3.el9_5.x86_64.rpm�8�Vflatpak-selinux-1.12.9-3.el9_5.noarch.rpm�2�Vflatpak-libs-1.12.9-3.el9_5.x86_64.rpm�2�Vflatpak-libs-1.12.9-3.el9_5.i686.rpm�_�Vflatpak-session-helper-1.12.9-3.el9_5.x86_64.rpm�^�Vflatpak-1.12.9-3.el9_5.x86_64.rpm�8�Vflatpak-selinux-1.12.9-3.el9_5.noarch.rpm����x�	��,��bBBBBBBBBsecurityModerate: python3.11 security update��P�\https://access.redhat.com/errata/RHSA-2024:9450RHSA-2024:9450RHSA-2024:9450https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9450.htmlALSA-2024:9450ALSA-2024:9450
\�-python3.11-libs-3.11.9-7.el9_5.1.x86_64.rpm\�-python3.11-libs-3.11.9-7.el9_5.1.i686.rpm�Q�-python3.11-tkinter-3.11.9-7.el9_5.1.x86_64.rpm�P�-python3.11-3.11.9-7.el9_5.1.x86_64.rpm[�-python3.11-devel-3.11.9-7.el9_5.1.x86_64.rpm[�-python3.11-devel-3.11.9-7.el9_5.1.i686.rpm\�-python3.11-libs-3.11.9-7.el9_5.1.x86_64.rpm\�-python3.11-libs-3.11.9-7.el9_5.1.i686.rpm�Q�-python3.11-tkinter-3.11.9-7.el9_5.1.x86_64.rpm�P�-python3.11-3.11.9-7.el9_5.1.x86_64.rpm[�-python3.11-devel-3.11.9-7.el9_5.1.x86_64.rpm[�-python3.11-devel-3.11.9-7.el9_5.1.i686.rpm����%�	��7��mBBBBBBBBsecurityModerate: python3.12 security update��,�
https://access.redhat.com/errata/RHSA-2024:9451RHSA-2024:9451RHSA-2024:9451https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9451.htmlALSA-2024:9451ALSA-2024:9451
��8python3.12-libs-3.12.5-2.el9_5.1.x86_64.rpm��8python3.12-devel-3.12.5-2.el9_5.1.x86_64.rpm��8python3.12-libs-3.12.5-2.el9_5.1.i686.rpm��8python3.12-3.12.5-2.el9_5.1.x86_64.rpm��8python3.12-devel-3.12.5-2.el9_5.1.i686.rpm��8python3.12-tkinter-3.12.5-2.el9_5.1.x86_64.rpm��8python3.12-libs-3.12.5-2.el9_5.1.x86_64.rpm��8python3.12-devel-3.12.5-2.el9_5.1.x86_64.rpm��8python3.12-libs-3.12.5-2.el9_5.1.i686.rpm��8python3.12-3.12.5-2.el9_5.1.x86_64.rpm��8python3.12-devel-3.12.5-2.el9_5.1.i686.rpm��8python3.12-tkinter-3.12.5-2.el9_5.1.x86_64.rpm����(�	����xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: pcp security update��9�https://access.redhat.com/errata/RHSA-2024:9452RHSA-2024:9452RHSA-2024:9452https://access.redhat.com/security/cve/CVE-2024-45769CVE-2024-45769CVE-2024-45769https://access.redhat.com/security/cve/CVE-2024-45770CVE-2024-45770CVE-2024-45770https://bugzilla.redhat.com/23104512310451https://bugzilla.redhat.com/23104522310452https://errata.almalinux.org/9/ALSA-2024-9452.htmlALSA-2024:9452ALSA-2024:9452
n�1pcp-pmda-rsyslog-6.2.2-7.el9_5.alma.1.x86_64.rpm�	pcp-pmda-gfs2-6.2.2-7.el9_5.alma.1.x86_64.rpm�Eperl-PCP-LogSummary-6.2.2-7.el9_5.alma.1.x86_64.rpm�ypcp-pmda-bash-6.2.2-7.el9_5.alma.1.x86_64.rpm�2pcp-pmda-samba-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mounts-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-cisco-6.2.2-7.el9_5.alma.1.x86_64.rpm�Fperl-PCP-MMV-6.2.2-7.el9_5.alma.1.x86_64.rpm�+pcp-pmda-postfix-6.2.2-7.el9_5.alma.1.x86_64.rpm�!pcp-pmda-news-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-denki-6.2.2-7.el9_5.alma.1.x86_64.rpm�#pcp-pmda-nginx-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lustre-6.2.2-7.el9_5.alma.1.x86_64.rpm�8pcp-pmda-sockets-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-dbping-6.2.2-7.el9_5.alma.1.x86_64.rpm�
pcp-pmda-gluster-6.2.2-7.el9_5.alma.1.x86_64.rpm� pcp-pmda-netfilter-6.2.2-7.el9_5.alma.1.x86_64.rpm�=pcp-pmda-unbound-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lio-6.2.2-7.el9_5.alma.1.x86_64.rpm�}pcp-pmda-bpf-6.2.2-7.el9_5.alma.1.x86_64.rpm�?pcp-pmda-zimbra-6.2.2-7.el9_5.alma.1.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.2-7.el9_5.alma.1.x86_64.rpm�)pcp-pmda-perfevent-6.2.2-7.el9_5.alma.1.x86_64.rpm�6pcp-pmda-smart-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-named-6.2.2-7.el9_5.alma.1.x86_64.rpm�upcp-import-mrtg2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�kpcp-export-pcp2json-6.2.2-7.el9_5.alma.1.x86_64.rpm�Kpcp-doc-6.2.2-7.el9_5.alma.1.noarch.rpm�pcp-pmda-libvirt-6.2.2-7.el9_5.alma.1.x86_64.rpm�;pcp-pmda-systemd-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-netcheck-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-export-pcp2openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpm�;pcp-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-ds389log-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-json-6.2.2-7.el9_5.alma.1.x86_64.rpm�Dperl-PCP-LogImport-6.2.2-7.el9_5.alma.1.x86_64.rpm�Cpcp-zeroconf-6.2.2-7.el9_5.alma.1.x86_64.rpm�:pcp-pmda-summary-6.2.2-7.el9_5.alma.1.x86_64.rpm�mpcp-export-pcp2xml-6.2.2-7.el9_5.alma.1.x86_64.rpm�<pcp-libs-6.2.2-7.el9_5.alma.1.i686.rpm�$pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.alma.1.x86_64.rpm�xpcp-pmda-apache-6.2.2-7.el9_5.alma.1.x86_64.rpm�|pcp-pmda-bonding-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-dm-6.2.2-7.el9_5.alma.1.x86_64.rpm�=pcp-libs-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm�zpcp-pmda-bcc-6.2.2-7.el9_5.alma.1.x86_64.rpm�5pcp-pmda-slurm-6.2.2-7.el9_5.alma.1.x86_64.rpm�Apcp-selinux-6.2.2-7.el9_5.alma.1.x86_64.rpm�
pcp-pmda-hacluster-6.2.2-7.el9_5.alma.1.x86_64.rpm�3pcp-pmda-sendmail-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-memcache-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-gpsd-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-logger-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mssql-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-gpfs-6.2.2-7.el9_5.alma.1.x86_64.rpm�Bpcp-system-tools-6.2.2-7.el9_5.alma.1.x86_64.rpm�hpcp-export-pcp2elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm�tpcp-import-iostat2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�&pcp-pmda-openvswitch-6.2.2-7.el9_5.alma.1.x86_64.rpm�npcp-export-pcp2zabbix-6.2.2-7.el9_5.alma.1.x86_64.rpm�%pcp-pmda-openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpm�Gperl-PCP-PMDA-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mic-6.2.2-7.el9_5.alma.1.x86_64.rpm�7pcp-pmda-snmp-6.2.2-7.el9_5.alma.1.x86_64.rpm�spcp-import-ganglia2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mongodb-6.2.2-7.el9_5.alma.1.x86_64.rpm�fpcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�>pcp-testsuite-6.2.2-7.el9_5.alma.1.x86_64.rpm�opcp-export-zabbix-agent-6.2.2-7.el9_5.alma.1.x86_64.rpm�.pcp-pmda-redis-6.2.2-7.el9_5.alma.1.x86_64.rpm�<pcp-libs-6.2.2-7.el9_5.alma.1.x86_64.rpm�ipcp-export-pcp2graphite-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-uwsgi-6.2.2-7.el9_5.alma.1.x86_64.rpm�rpcp-import-collectl2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-docker-6.2.2-7.el9_5.alma.1.x86_64.rpm�;pcp-devel-6.2.2-7.el9_5.alma.1.i686.rpm�pcp-pmda-mysql-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lustrecomm-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-farm-6.2.2-7.el9_5.alma.1.x86_64.rpm�gpcp-conf-6.2.2-7.el9_5.alma.1.x86_64.rpm�,pcp-pmda-postgresql-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-ds389-6.2.2-7.el9_5.alma.1.x86_64.rpm�{pcp-pmda-bind2-6.2.2-7.el9_5.alma.1.x86_64.rpm�>pcp-testsuite-6.2.2-7.el9_5.alma.1.i686.rpm�ppcp-geolocate-6.2.2-7.el9_5.alma.1.x86_64.rpm�<pcp-pmda-trace-6.2.2-7.el9_5.alma.1.x86_64.rpm�~pcp-pmda-bpftrace-6.2.2-7.el9_5.alma.1.x86_64.rpm�0pcp-pmda-roomtemp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lmsensors-6.2.2-7.el9_5.alma.1.x86_64.rpm�'pcp-pmda-oracle-6.2.2-7.el9_5.alma.1.x86_64.rpm�4pcp-pmda-shping-6.2.2-7.el9_5.alma.1.x86_64.rpm�qpcp-gui-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-infiniband-6.2.2-7.el9_5.alma.1.x86_64.rpm�/pcp-pmda-resctrl-6.2.2-7.el9_5.alma.1.x86_64.rpm�wpcp-pmda-activemq-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mailq-6.2.2-7.el9_5.alma.1.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.2-7.el9_5.alma.1.x86_64.rpm�*pcp-pmda-podman-6.2.2-7.el9_5.alma.1.x86_64.rpm�lpcp-export-pcp2spark-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-haproxy-6.2.2-7.el9_5.alma.1.x86_64.rpm�Ipython3-pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-cifs-6.2.2-7.el9_5.alma.1.x86_64.rpm�=pcp-libs-devel-6.2.2-7.el9_5.alma.1.i686.rpm�(pcp-pmda-pdns-6.2.2-7.el9_5.alma.1.x86_64.rpm�>pcp-pmda-weblog-6.2.2-7.el9_5.alma.1.x86_64.rpm�9pcp-pmda-statsd-6.2.2-7.el9_5.alma.1.x86_64.rpm�vpcp-import-sar2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�@pcp-pmda-zswap-6.2.2-7.el9_5.alma.1.x86_64.rpm�"pcp-pmda-nfsclient-6.2.2-7.el9_5.alma.1.x86_64.rpmn�1pcp-pmda-rsyslog-6.2.2-7.el9_5.alma.1.x86_64.rpm�	pcp-pmda-gfs2-6.2.2-7.el9_5.alma.1.x86_64.rpm�Eperl-PCP-LogSummary-6.2.2-7.el9_5.alma.1.x86_64.rpm�ypcp-pmda-bash-6.2.2-7.el9_5.alma.1.x86_64.rpm�2pcp-pmda-samba-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mounts-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-cisco-6.2.2-7.el9_5.alma.1.x86_64.rpm�Fperl-PCP-MMV-6.2.2-7.el9_5.alma.1.x86_64.rpm�+pcp-pmda-postfix-6.2.2-7.el9_5.alma.1.x86_64.rpm�!pcp-pmda-news-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-denki-6.2.2-7.el9_5.alma.1.x86_64.rpm�#pcp-pmda-nginx-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lustre-6.2.2-7.el9_5.alma.1.x86_64.rpm�8pcp-pmda-sockets-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-dbping-6.2.2-7.el9_5.alma.1.x86_64.rpm�
pcp-pmda-gluster-6.2.2-7.el9_5.alma.1.x86_64.rpm� pcp-pmda-netfilter-6.2.2-7.el9_5.alma.1.x86_64.rpm�=pcp-pmda-unbound-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lio-6.2.2-7.el9_5.alma.1.x86_64.rpm�}pcp-pmda-bpf-6.2.2-7.el9_5.alma.1.x86_64.rpm�?pcp-pmda-zimbra-6.2.2-7.el9_5.alma.1.x86_64.rpm�-pcp-pmda-rabbitmq-6.2.2-7.el9_5.alma.1.x86_64.rpm�)pcp-pmda-perfevent-6.2.2-7.el9_5.alma.1.x86_64.rpm�6pcp-pmda-smart-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-named-6.2.2-7.el9_5.alma.1.x86_64.rpm�upcp-import-mrtg2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�kpcp-export-pcp2json-6.2.2-7.el9_5.alma.1.x86_64.rpm�Kpcp-doc-6.2.2-7.el9_5.alma.1.noarch.rpm�pcp-pmda-libvirt-6.2.2-7.el9_5.alma.1.x86_64.rpm�;pcp-pmda-systemd-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-netcheck-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-export-pcp2openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpm�;pcp-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-ds389log-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-json-6.2.2-7.el9_5.alma.1.x86_64.rpm�Dperl-PCP-LogImport-6.2.2-7.el9_5.alma.1.x86_64.rpm�Cpcp-zeroconf-6.2.2-7.el9_5.alma.1.x86_64.rpm�:pcp-pmda-summary-6.2.2-7.el9_5.alma.1.x86_64.rpm�mpcp-export-pcp2xml-6.2.2-7.el9_5.alma.1.x86_64.rpm�<pcp-libs-6.2.2-7.el9_5.alma.1.i686.rpm�$pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.alma.1.x86_64.rpm�xpcp-pmda-apache-6.2.2-7.el9_5.alma.1.x86_64.rpm�|pcp-pmda-bonding-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-dm-6.2.2-7.el9_5.alma.1.x86_64.rpm�=pcp-libs-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm�zpcp-pmda-bcc-6.2.2-7.el9_5.alma.1.x86_64.rpm�5pcp-pmda-slurm-6.2.2-7.el9_5.alma.1.x86_64.rpm�Apcp-selinux-6.2.2-7.el9_5.alma.1.x86_64.rpm�
pcp-pmda-hacluster-6.2.2-7.el9_5.alma.1.x86_64.rpm�3pcp-pmda-sendmail-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-memcache-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-gpsd-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-logger-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mssql-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-gpfs-6.2.2-7.el9_5.alma.1.x86_64.rpm�Bpcp-system-tools-6.2.2-7.el9_5.alma.1.x86_64.rpm�hpcp-export-pcp2elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm�tpcp-import-iostat2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�&pcp-pmda-openvswitch-6.2.2-7.el9_5.alma.1.x86_64.rpm�npcp-export-pcp2zabbix-6.2.2-7.el9_5.alma.1.x86_64.rpm�%pcp-pmda-openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpm�Gperl-PCP-PMDA-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mic-6.2.2-7.el9_5.alma.1.x86_64.rpm�7pcp-pmda-snmp-6.2.2-7.el9_5.alma.1.x86_64.rpm�spcp-import-ganglia2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mongodb-6.2.2-7.el9_5.alma.1.x86_64.rpm�fpcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�>pcp-testsuite-6.2.2-7.el9_5.alma.1.x86_64.rpm�opcp-export-zabbix-agent-6.2.2-7.el9_5.alma.1.x86_64.rpm�.pcp-pmda-redis-6.2.2-7.el9_5.alma.1.x86_64.rpm�<pcp-libs-6.2.2-7.el9_5.alma.1.x86_64.rpm�ipcp-export-pcp2graphite-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-uwsgi-6.2.2-7.el9_5.alma.1.x86_64.rpm�rpcp-import-collectl2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-docker-6.2.2-7.el9_5.alma.1.x86_64.rpm�;pcp-devel-6.2.2-7.el9_5.alma.1.i686.rpm�pcp-pmda-mysql-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lustrecomm-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-farm-6.2.2-7.el9_5.alma.1.x86_64.rpm�gpcp-conf-6.2.2-7.el9_5.alma.1.x86_64.rpm�,pcp-pmda-postgresql-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-ds389-6.2.2-7.el9_5.alma.1.x86_64.rpm�{pcp-pmda-bind2-6.2.2-7.el9_5.alma.1.x86_64.rpm�>pcp-testsuite-6.2.2-7.el9_5.alma.1.i686.rpm�ppcp-geolocate-6.2.2-7.el9_5.alma.1.x86_64.rpm�<pcp-pmda-trace-6.2.2-7.el9_5.alma.1.x86_64.rpm�~pcp-pmda-bpftrace-6.2.2-7.el9_5.alma.1.x86_64.rpm�0pcp-pmda-roomtemp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-lmsensors-6.2.2-7.el9_5.alma.1.x86_64.rpm�'pcp-pmda-oracle-6.2.2-7.el9_5.alma.1.x86_64.rpm�4pcp-pmda-shping-6.2.2-7.el9_5.alma.1.x86_64.rpm�qpcp-gui-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-infiniband-6.2.2-7.el9_5.alma.1.x86_64.rpm�/pcp-pmda-resctrl-6.2.2-7.el9_5.alma.1.x86_64.rpm�wpcp-pmda-activemq-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-mailq-6.2.2-7.el9_5.alma.1.x86_64.rpm�jpcp-export-pcp2influxdb-6.2.2-7.el9_5.alma.1.x86_64.rpm�*pcp-pmda-podman-6.2.2-7.el9_5.alma.1.x86_64.rpm�lpcp-export-pcp2spark-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-haproxy-6.2.2-7.el9_5.alma.1.x86_64.rpm�Ipython3-pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�pcp-pmda-cifs-6.2.2-7.el9_5.alma.1.x86_64.rpm�=pcp-libs-devel-6.2.2-7.el9_5.alma.1.i686.rpm�(pcp-pmda-pdns-6.2.2-7.el9_5.alma.1.x86_64.rpm�>pcp-pmda-weblog-6.2.2-7.el9_5.alma.1.x86_64.rpm�9pcp-pmda-statsd-6.2.2-7.el9_5.alma.1.x86_64.rpm�vpcp-import-sar2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm�@pcp-pmda-zswap-6.2.2-7.el9_5.alma.1.x86_64.rpm�"pcp-pmda-nfsclient-6.2.2-7.el9_5.alma.1.x86_64.rpm���S�	����PBBBBBBBsecurityImportant: podman security update��H�@https://access.redhat.com/errata/RHSA-2024:9454RHSA-2024:9454RHSA-2024:9454https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9454.htmlALSA-2024:9454ALSA-2024:9454
�3�)podman-remote-5.2.2-9.el9_5.x86_64.rpm�2�)podman-plugins-5.2.2-9.el9_5.x86_64.rpmh�)podman-docker-5.2.2-9.el9_5.noarch.rpm�4�)podman-tests-5.2.2-9.el9_5.x86_64.rpm�1�)podman-5.2.2-9.el9_5.x86_64.rpm�3�)podman-remote-5.2.2-9.el9_5.x86_64.rpm�2�)podman-plugins-5.2.2-9.el9_5.x86_64.rpmh�)podman-docker-5.2.2-9.el9_5.noarch.rpm�4�)podman-tests-5.2.2-9.el9_5.x86_64.rpm�1�)podman-5.2.2-9.el9_5.x86_64.rpm����|�	�� ��ZBBBBsecurityImportant: osbuild-composer security update���https://access.redhat.com/errata/RHSA-2024:9456RHSA-2024:9456RHSA-2024:9456https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-9456.htmlALSA-2024:9456ALSA-2024:9456
�x�fosbuild-composer-core-118-2.el9_5.alma.1.x86_64.rpm�w�fosbuild-composer-118-2.el9_5.alma.1.x86_64.rpm�y�fosbuild-composer-worker-118-2.el9_5.alma.1.x86_64.rpm�x�fosbuild-composer-core-118-2.el9_5.alma.1.x86_64.rpm�w�fosbuild-composer-118-2.el9_5.alma.1.x86_64.rpm�y�fosbuild-composer-worker-118-2.el9_5.alma.1.x86_64.rpm����}�	��"��!securityModerate: python3.12-urllib3 security update���&https://access.redhat.com/errata/RHSA-2024:9457RHSA-2024:9457RHSA-2024:9457https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-9457.htmlALSA-2024:9457ALSA-2024:9457
��7python3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm��7python3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm����8�	��$��#securityModerate: python3.11-urllib3 security update��6�3https://access.redhat.com/errata/RHSA-2024:9458RHSA-2024:9458RHSA-2024:9458https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-9458.htmlALSA-2024:9458ALSA-2024:9458
�Q�4python3.11-urllib3-1.26.12-2.el9_5.1.noarch.rpm�Q�4python3.11-urllib3-1.26.12-2.el9_5.1.noarch.rpm����9�	��)��eBBsecurityImportant: buildah security update��i�Vhttps://access.redhat.com/errata/RHSA-2024:9459RHSA-2024:9459RHSA-2024:9459https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9459.htmlALSA-2024:9459ALSA-2024:9459
�/�Dbuildah-1.37.5-1.el9_5.x86_64.rpm�0�Dbuildah-tests-1.37.5-1.el9_5.x86_64.rpm�/�Dbuildah-1.37.5-1.el9_5.x86_64.rpm�0�Dbuildah-tests-1.37.5-1.el9_5.x86_64.rpm����R�	��0��jBBBBsecurityModerate: python3.9 security update��?�\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468
Q�	python3-devel-3.9.19-8.el9_5.1.x86_64.rpmf�	python-unversioned-command-3.9.19-8.el9_5.1.noarch.rpm�+�	python3-tkinter-3.9.19-8.el9_5.1.x86_64.rpmQ�	python3-devel-3.9.19-8.el9_5.1.i686.rpmQ�	python3-devel-3.9.19-8.el9_5.1.x86_64.rpmf�	python-unversioned-command-3.9.19-8.el9_5.1.noarch.rpm�+�	python3-tkinter-3.9.19-8.el9_5.1.x86_64.rpmQ�	python3-devel-3.9.19-8.el9_5.1.i686.rpm����V�	��?��qBBBBBBBBBBBBsecurityLow: cups security update�6���)https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470
�f�hcups-devel-2.3.3op2-31.el9_5.x86_64.rpm�.�hcups-lpd-2.3.3op2-31.el9_5.x86_64.rpm�+�hcups-2.3.3op2-31.el9_5.x86_64.rpm�/�hcups-printerapp-2.3.3op2-31.el9_5.x86_64.rpm�f�hcups-devel-2.3.3op2-31.el9_5.i686.rpm�,�hcups-client-2.3.3op2-31.el9_5.x86_64.rpm��hcups-filesystem-2.3.3op2-31.el9_5.noarch.rpm�-�hcups-ipptool-2.3.3op2-31.el9_5.x86_64.rpm�f�hcups-devel-2.3.3op2-31.el9_5.x86_64.rpm�.�hcups-lpd-2.3.3op2-31.el9_5.x86_64.rpm�+�hcups-2.3.3op2-31.el9_5.x86_64.rpm�/�hcups-printerapp-2.3.3op2-31.el9_5.x86_64.rpm�f�hcups-devel-2.3.3op2-31.el9_5.i686.rpm�,�hcups-client-2.3.3op2-31.el9_5.x86_64.rpm��hcups-filesystem-2.3.3op2-31.el9_5.noarch.rpm�-�hcups-ipptool-2.3.3op2-31.el9_5.x86_64.rpm����P�		����@securityImportant: grafana-pcp security update��D�Dhttps://access.redhat.com/errata/RHSA-2024:9472RHSA-2024:9472RHSA-2024:9472https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-9472.htmlALSA-2024:9472ALSA-2024:9472
�~�4grafana-pcp-5.1.1-9.el9_5.x86_64.rpm�~�4grafana-pcp-5.1.1-9.el9_5.x86_64.rpm����8�
	����CBBsecurityImportant: grafana security update���1https://access.redhat.com/errata/RHSA-2024:9473RHSA-2024:9473RHSA-2024:9473https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-47875CVE-2024-47875CVE-2024-47875https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23180522318052https://errata.almalinux.org/9/ALSA-2024-9473.htmlALSA-2024:9473ALSA-2024:9473
�U�ygrafana-selinux-10.2.6-7.el9_5.x86_64.rpm�I�ygrafana-10.2.6-7.el9_5.x86_64.rpm�U�ygrafana-selinux-10.2.6-7.el9_5.x86_64.rpm�I�ygrafana-10.2.6-7.el9_5.x86_64.rpm����T�	����HBsecurityImportant: krb5 security update��9�Shttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474
�d�.krb5-devel-1.21.1-4.el9_5.i686.rpm�d�.krb5-devel-1.21.1-4.el9_5.x86_64.rpm�d�.krb5-devel-1.21.1-4.el9_5.i686.rpm�d�.krb5-devel-1.21.1-4.el9_5.x86_64.rpm����T�	����LBsecurityModerate: expat security update���Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541
��Uexpat-devel-2.5.0-3.el9_5.1.x86_64.rpm��Uexpat-devel-2.5.0-3.el9_5.1.i686.rpm��Uexpat-devel-2.5.0-3.el9_5.1.x86_64.rpm��Uexpat-devel-2.5.0-3.el9_5.1.i686.rpm����U�
	��,��PBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update��S�fhttps://access.redhat.com/errata/RHSA-2024:9543RHSA-2024:9543RHSA-2024:9543https://access.redhat.com/security/cve/CVE-2024-43498CVE-2024-43498CVE-2024-43498https://access.redhat.com/security/cve/CVE-2024-43499CVE-2024-43499CVE-2024-43499https://bugzilla.redhat.com/23232392323239https://bugzilla.redhat.com/23232402323240https://errata.almalinux.org/9/ALSA-2024-9543.htmlALSA-2024:9543ALSA-2024:9543
�7�Bdotnet-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm�!�Bdotnet-host-9.0.0-1.el9_5.x86_64.rpm�)�Baspnetcore-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm�"�xnetstandard-targeting-pack-2.1-9.0.100-1.el9_5.x86_64.rpm�2�Bdotnet-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm�5�xdotnet-sdk-aot-9.0-9.0.100-1.el9_5.x86_64.rpm�8�xdotnet-templates-9.0-9.0.100-1.el9_5.x86_64.rpm�1�Bdotnet-hostfxr-9.0-9.0.0-1.el9_5.x86_64.rpm�6�xdotnet-sdk-dbg-9.0-9.0.100-1.el9_5.x86_64.rpm�0�Bdotnet-apphost-pack-9.0-9.0.0-1.el9_5.x86_64.rpm�(�Baspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm�'�Baspnetcore-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm�4�xdotnet-sdk-9.0-9.0.100-1.el9_5.x86_64.rpm�3�Bdotnet-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm�7�Bdotnet-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm�!�Bdotnet-host-9.0.0-1.el9_5.x86_64.rpm�)�Baspnetcore-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm�"�xnetstandard-targeting-pack-2.1-9.0.100-1.el9_5.x86_64.rpm�2�Bdotnet-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm�5�xdotnet-sdk-aot-9.0-9.0.100-1.el9_5.x86_64.rpm�8�xdotnet-templates-9.0-9.0.100-1.el9_5.x86_64.rpm�1�Bdotnet-hostfxr-9.0-9.0.0-1.el9_5.x86_64.rpm�6�xdotnet-sdk-dbg-9.0-9.0.100-1.el9_5.x86_64.rpm�0�Bdotnet-apphost-pack-9.0-9.0.0-1.el9_5.x86_64.rpm�(�Baspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm�'�Baspnetcore-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm�4�xdotnet-sdk-9.0-9.0.100-1.el9_5.x86_64.rpm�3�Bdotnet-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm����U�	��2��mBBBsecurityImportant: openexr security update��9�:https://access.redhat.com/errata/RHSA-2024:9548RHSA-2024:9548RHSA-2024:9548https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-9548.htmlALSA-2024:9548ALSA-2024:9548
�:�openexr-libs-3.1.1-2.el9_5.1.i686.rpm�e�openexr-3.1.1-2.el9_5.1.x86_64.rpm�:�openexr-libs-3.1.1-2.el9_5.1.x86_64.rpm�:�openexr-libs-3.1.1-2.el9_5.1.i686.rpm�e�openexr-3.1.1-2.el9_5.1.x86_64.rpm�:�openexr-libs-3.1.1-2.el9_5.1.x86_64.rpm�����	��5��ssecurityImportant: thunderbird security update��s�vhttps://access.redhat.com/errata/RHSA-2024:9552RHSA-2024:9552RHSA-2024:9552https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-9552.htmlALSA-2024:9552ALSA-2024:9552
9�thunderbird-128.4.0-1.el9_5.alma.1.x86_64.rpm9�thunderbird-128.4.0-1.el9_5.alma.1.x86_64.rpm����	����vBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��i�ohttps://access.redhat.com/errata/RHSA-2024:9553RHSA-2024:9553RHSA-2024:9553https://access.redhat.com/security/cve/CVE-2024-40866CVE-2024-40866CVE-2024-40866https://access.redhat.com/security/cve/CVE-2024-44185CVE-2024-44185CVE-2024-44185https://access.redhat.com/security/cve/CVE-2024-44187CVE-2024-44187CVE-2024-44187https://access.redhat.com/security/cve/CVE-2024-44244CVE-2024-44244CVE-2024-44244https://access.redhat.com/security/cve/CVE-2024-44296CVE-2024-44296CVE-2024-44296https://bugzilla.redhat.com/23127242312724https://bugzilla.redhat.com/23147062314706https://bugzilla.redhat.com/23232632323263https://bugzilla.redhat.com/23232782323278https://bugzilla.redhat.com/23232892323289https://errata.almalinux.org/9/ALSA-2024-9553.htmlALSA-2024:9553ALSA-2024:9553
2�6webkit2gtk3-jsc-2.46.3-1.el9_5.x86_64.rpm1�6webkit2gtk3-devel-2.46.3-1.el9_5.i686.rpm2�6webkit2gtk3-jsc-2.46.3-1.el9_5.i686.rpm0�6webkit2gtk3-2.46.3-1.el9_5.x86_64.rpm3�6webkit2gtk3-jsc-devel-2.46.3-1.el9_5.i686.rpm1�6webkit2gtk3-devel-2.46.3-1.el9_5.x86_64.rpm0�6webkit2gtk3-2.46.3-1.el9_5.i686.rpm3�6webkit2gtk3-jsc-devel-2.46.3-1.el9_5.x86_64.rpm2�6webkit2gtk3-jsc-2.46.3-1.el9_5.x86_64.rpm1�6webkit2gtk3-devel-2.46.3-1.el9_5.i686.rpm2�6webkit2gtk3-jsc-2.46.3-1.el9_5.i686.rpm0�6webkit2gtk3-2.46.3-1.el9_5.x86_64.rpm3�6webkit2gtk3-jsc-devel-2.46.3-1.el9_5.i686.rpm1�6webkit2gtk3-devel-2.46.3-1.el9_5.x86_64.rpm0�6webkit2gtk3-2.46.3-1.el9_5.i686.rpm3�6webkit2gtk3-jsc-devel-2.46.3-1.el9_5.x86_64.rpm�����	����CBBsecurityImportant: firefox security update��X�'https://access.redhat.com/errata/RHSA-2024:9554RHSA-2024:9554RHSA-2024:9554https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-9554.htmlALSA-2024:9554ALSA-2024:9554
8�firefox-128.4.0-1.el9_5.x86_64.rpmP�firefox-x11-128.4.0-1.el9_5.x86_64.rpm8�firefox-128.4.0-1.el9_5.x86_64.rpmP�firefox-x11-128.4.0-1.el9_5.x86_64.rpm���R�	����HBBsecurityImportant: NetworkManager-libreswan security update���$https://access.redhat.com/errata/RHSA-2024:9555RHSA-2024:9555RHSA-2024:9555https://access.redhat.com/security/cve/CVE-2024-9050CVE-2024-9050CVE-2024-9050https://bugzilla.redhat.com/23138282313828https://errata.almalinux.org/9/ALSA-2024-9555.htmlALSA-2024:9555ALSA-2024:9555
�g�iNetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpm�f�iNetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm�g�iNetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpm�f�iNetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm����:�	����MBBBBsecurityImportant: libsoup security update��#�Whttps://access.redhat.com/errata/RHSA-2024:9559RHSA-2024:9559RHSA-2024:9559https://access.redhat.com/security/cve/CVE-2024-52530CVE-2024-52530CVE-2024-52530https://access.redhat.com/security/cve/CVE-2024-52532CVE-2024-52532CVE-2024-52532https://bugzilla.redhat.com/23252762325276https://bugzilla.redhat.com/23252842325284https://errata.almalinux.org/9/ALSA-2024-9559.htmlALSA-2024:9559ALSA-2024:9559
�f�qlibsoup-2.72.0-8.el9_5.2.x86_64.rpm�g�qlibsoup-devel-2.72.0-8.el9_5.2.i686.rpm�g�qlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpm�f�qlibsoup-2.72.0-8.el9_5.2.i686.rpm�f�qlibsoup-2.72.0-8.el9_5.2.x86_64.rpm�g�qlibsoup-devel-2.72.0-8.el9_5.2.i686.rpm�g�qlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpm�f�qlibsoup-2.72.0-8.el9_5.2.i686.rpm����E�	��%��TBBBBBBBBBBBBBBBsecurityModerate: kernel security update��z�'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605
	$�Wkernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm�Wkernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm+�Wrv-5.14.0-503.14.1.el9_5.x86_64.rpm&�Wkernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm#�Wkernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm'�Wperf-5.14.0-503.14.1.el9_5.x86_64.rpm)�Wrtla-5.14.0-503.14.1.el9_5.x86_64.rpm%�Wkernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm(�Wkernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpm	$�Wkernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm�Wkernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm+�Wrv-5.14.0-503.14.1.el9_5.x86_64.rpm&�Wkernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm#�Wkernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm'�Wperf-5.14.0-503.14.1.el9_5.x86_64.rpm)�Wrtla-5.14.0-503.14.1.el9_5.x86_64.rpm%�Wkernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm(�Wkernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpm����B�	��(��fsecurityImportant: squid security update��!�https://access.redhat.com/errata/RHSA-2024:9625RHSA-2024:9625RHSA-2024:9625https://access.redhat.com/security/cve/CVE-2024-45802CVE-2024-45802CVE-2024-45802https://bugzilla.redhat.com/23221542322154https://errata.almalinux.org/9/ALSA-2024-9625.htmlALSA-2024:9625ALSA-2024:9625
�{�Gsquid-5.5-14.el9_5.3.x86_64.rpm�{�Gsquid-5.5-14.el9_5.3.x86_64.rpm����:�	��,��iBsecurityModerate: libvpx security update��8�>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827
�7�?libvpx-1.9.0-8.el9_5.x86_64.rpm�7�?libvpx-1.9.0-8.el9_5.i686.rpm�7�?libvpx-1.9.0-8.el9_5.x86_64.rpm�7�?libvpx-1.9.0-8.el9_5.i686.rpm����Y�	��>��mBBBBBBBBBBBBBBBsecurityImportant: kernel security update��v�

https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:0059
	#�[kernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm&�[kernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm$�[kernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm%�[kernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpm�[kernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm(�[kernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm)�[rtla-5.14.0-503.21.1.el9_5.x86_64.rpm'�[perf-5.14.0-503.21.1.el9_5.x86_64.rpm+�[rv-5.14.0-503.21.1.el9_5.x86_64.rpm	#�[kernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm&�[kernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm$�[kernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm%�[kernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpm�[kernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm(�[kernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm)�[rtla-5.14.0-503.21.1.el9_5.x86_64.rpm'�[perf-5.14.0-503.21.1.el9_5.x86_64.rpm+�[rv-5.14.0-503.21.1.el9_5.x86_64.rpm����:�	����BBsecurityImportant: firefox security update���https://access.redhat.com/errata/RHSA-2025:0080RHSA-2025:0080RHSA-2025:0080https://access.redhat.com/security/cve/CVE-2025-0237CVE-2025-0237CVE-2025-0237https://access.redhat.com/security/cve/CVE-2025-0238CVE-2025-0238CVE-2025-0238https://access.redhat.com/security/cve/CVE-2025-0239CVE-2025-0239CVE-2025-0239https://access.redhat.com/security/cve/CVE-2025-0240CVE-2025-0240CVE-2025-0240https://access.redhat.com/security/cve/CVE-2025-0241CVE-2025-0241CVE-2025-0241https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361652336165https://bugzilla.redhat.com/23361682336168https://bugzilla.redhat.com/23361702336170https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://bugzilla.redhat.com/23361822336182https://bugzilla.redhat.com/23361882336188https://errata.almalinux.org/9/ALSA-2025-0080.htmlALSA-2025:0080ALSA-2025:0080
P�
firefox-x11-128.6.0-1.el9_5.x86_64.rpm8�
firefox-128.6.0-1.el9_5.x86_64.rpmP�
firefox-x11-128.6.0-1.el9_5.x86_64.rpm8�
firefox-128.6.0-1.el9_5.x86_64.rpm����L�	����DBBBBBBBBBBsecurityImportant: webkit2gtk3 security update���h
https://access.redhat.com/errata/RHSA-2025:0146RHSA-2025:0146RHSA-2025:0146https://access.redhat.com/security/cve/CVE-2024-54479CVE-2024-54479CVE-2024-54479https://access.redhat.com/security/cve/CVE-2024-54502CVE-2024-54502CVE-2024-54502https://access.redhat.com/security/cve/CVE-2024-54505CVE-2024-54505CVE-2024-54505https://access.redhat.com/security/cve/CVE-2024-54508CVE-2024-54508CVE-2024-54508https://bugzilla.redhat.com/23338412333841https://bugzilla.redhat.com/23338432333843https://bugzilla.redhat.com/23338442333844https://bugzilla.redhat.com/23338452333845https://errata.almalinux.org/9/ALSA-2025-0146.htmlALSA-2025:0146ALSA-2025:0146
3�8webkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm0�8webkit2gtk3-2.46.5-1.el9_5.x86_64.rpm3�8webkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm2�8webkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm1�8webkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm2�8webkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm1�8webkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm0�8webkit2gtk3-2.46.5-1.el9_5.i686.rpm3�8webkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm0�8webkit2gtk3-2.46.5-1.el9_5.x86_64.rpm3�8webkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm2�8webkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm1�8webkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm2�8webkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm1�8webkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm0�8webkit2gtk3-2.46.5-1.el9_5.i686.rpm�����	����QsecurityImportant: thunderbird security update���Yhttps://access.redhat.com/errata/RHSA-2025:0147RHSA-2025:0147RHSA-2025:0147https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://errata.almalinux.org/9/ALSA-2025-0147.htmlALSA-2025:0147ALSA-2025:0147
9�
thunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm9�
thunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm����9�	����TBsecurityImportant: iperf3 security update��`�Uhttps://access.redhat.com/errata/RHSA-2025:0161RHSA-2025:0161RHSA-2025:0161https://access.redhat.com/security/cve/CVE-2024-53580CVE-2024-53580CVE-2024-53580https://bugzilla.redhat.com/23331462333146https://errata.almalinux.org/9/ALSA-2025-0161.htmlALSA-2025:0161ALSA-2025:0161
�5�~iperf3-3.9-13.el9_5.1.i686.rpm�5�~iperf3-3.9-13.el9_5.1.x86_64.rpm�5�~iperf3-3.9-13.el9_5.1.i686.rpm�5�~iperf3-3.9-13.el9_5.1.x86_64.rpm�����	����XBBBBBsecurityImportant: dpdk security update��5�Rhttps://access.redhat.com/errata/RHSA-2025:0210RHSA-2025:0210RHSA-2025:0210https://access.redhat.com/security/cve/CVE-2024-11614CVE-2024-11614CVE-2024-11614https://bugzilla.redhat.com/23279552327955https://errata.almalinux.org/9/ALSA-2025-0210.htmlALSA-2025:0210ALSA-2025:0210
�N�2dpdk-tools-23.11-2.el9_5.x86_64.rpm�K�2dpdk-23.11-2.el9_5.x86_64.rpm�M�2dpdk-doc-23.11-2.el9_5.noarch.rpm�L�2dpdk-devel-23.11-2.el9_5.x86_64.rpm�N�2dpdk-tools-23.11-2.el9_5.x86_64.rpm�K�2dpdk-23.11-2.el9_5.x86_64.rpm�M�2dpdk-doc-23.11-2.el9_5.noarch.rpm�L�2dpdk-devel-23.11-2.el9_5.x86_64.rpm�����	��6��`BBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update���Zhttps://access.redhat.com/errata/RHSA-2025:0308RHSA-2025:0308RHSA-2025:0308https://access.redhat.com/security/cve/CVE-2024-56201CVE-2024-56201CVE-2024-56201https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://errata.almalinux.org/9/ALSA-2025-0308.htmlALSA-2025:0308ALSA-2025:0308

�e�*fence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�c�*fence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�f�*fence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�j�*fence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�d�*fence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�h�*fence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�#�*fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm�$�*fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm�%�*fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm�&�*fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpm�b�*fence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�g�*fence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�i�*fence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpm
�e�*fence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�c�*fence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�f�*fence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�j�*fence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�d�*fence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�h�*fence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�#�*fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm�$�*fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm�%�*fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm�&�*fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpm�b�*fence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�g�*fence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�i�*fence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpm�����	��:��wBsecurityImportant: raptor2 security update��a�@https://access.redhat.com/errata/RHSA-2025:0312RHSA-2025:0312RHSA-2025:0312https://access.redhat.com/security/cve/CVE-2024-57823CVE-2024-57823CVE-2024-57823https://bugzilla.redhat.com/23369212336921https://errata.almalinux.org/9/ALSA-2025-0312.htmlALSA-2025:0312ALSA-2025:0312
�}�Graptor2-2.0.15-32.el9_5.x86_64.rpm�}�Graptor2-2.0.15-32.el9_5.i686.rpm�}�Graptor2-2.0.15-32.el9_5.x86_64.rpm�}�Graptor2-2.0.15-32.el9_5.i686.rpm����@�	��<��;securityImportant: rsync security update��!�8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324
�S�rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm�S�rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm����e� 	����}BBBBBBBBBBBBBBBBBBsecurityModerate: ipa security update��Y�ahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334
�e� ipa-server-dns-4.12.2-1.el9_5.3.noarch.rpm�i� python3-ipaserver-4.12.2-1.el9_5.3.noarch.rpm�h� python3-ipalib-4.12.2-1.el9_5.3.noarch.rpm�c� ipa-selinux-4.12.2-1.el9_5.3.noarch.rpm�b� ipa-common-4.12.2-1.el9_5.3.noarch.rpm�d� ipa-server-common-4.12.2-1.el9_5.3.noarch.rpm�=� ipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpm�a� ipa-client-common-4.12.2-1.el9_5.3.noarch.rpm�g� python3-ipaclient-4.12.2-1.el9_5.3.noarch.rpm�d� ipa-server-4.12.2-1.el9_5.3.x86_64.rpm�<� ipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpm�a� ipa-client-4.12.2-1.el9_5.3.x86_64.rpm�e� ipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpm�c� ipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpm�b� ipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpm�e� ipa-server-dns-4.12.2-1.el9_5.3.noarch.rpm�i� python3-ipaserver-4.12.2-1.el9_5.3.noarch.rpm�h� python3-ipalib-4.12.2-1.el9_5.3.noarch.rpm�c� ipa-selinux-4.12.2-1.el9_5.3.noarch.rpm�b� ipa-common-4.12.2-1.el9_5.3.noarch.rpm�d� ipa-server-common-4.12.2-1.el9_5.3.noarch.rpm�=� ipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpm�a� ipa-client-common-4.12.2-1.el9_5.3.noarch.rpm�g� python3-ipaclient-4.12.2-1.el9_5.3.noarch.rpm�d� ipa-server-4.12.2-1.el9_5.3.x86_64.rpm�<� ipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpm�a� ipa-client-4.12.2-1.el9_5.3.x86_64.rpm�e� ipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpm�c� ipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpm�b� ipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpm�����!	����RBBBBBBsecurityModerate: Security and bug fixes for NetworkManager��:�Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377
�D�ZNetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm�A�ZNetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm�@�ZNetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm�C�ZNetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm�B�ZNetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm�D�ZNetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm�A�ZNetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm�@�ZNetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm�C�ZNetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm�B�ZNetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm����%�"	��-��[BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5���fhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422
	��&java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpm	��&java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm��&java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpm����O�#	����nBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5��l�https://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426
	�o�8java-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�r�8java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�s�8java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�m�8java-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�n�8java-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�t�8java-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�p�8java-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�u�8java-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�q�8java-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpm	�o�8java-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�r�8java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�s�8java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�m�8java-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�n�8java-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�t�8java-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�p�8java-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�u�8java-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�q�8java-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpm��ɲ"�$	����ABBBBBBBBBBBBBBBsecurityModerate: kernel security update��o�Ehttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578
	#�\kernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm+�\rv-5.14.0-503.22.1.el9_5.x86_64.rpm%�\kernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm(�\kernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm&�\kernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm�\kernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm)�\rtla-5.14.0-503.22.1.el9_5.x86_64.rpm'�\perf-5.14.0-503.22.1.el9_5.x86_64.rpm$�\kernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm	#�\kernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm+�\rv-5.14.0-503.22.1.el9_5.x86_64.rpm%�\kernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm(�\kernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm&�\kernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm�\kernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm)�\rtla-5.14.0-503.22.1.el9_5.x86_64.rpm'�\perf-5.14.0-503.22.1.el9_5.x86_64.rpm$�\kernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm��Օ�%	����securityImportant: python-jinja2 security update��4�Whttps://access.redhat.com/errata/RHSA-2025:0667RHSA-2025:0667RHSA-2025:0667https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://bugzilla.redhat.com/23338562333856https://errata.almalinux.org/9/ALSA-2025-0667.htmlALSA-2025:0667ALSA-2025:0667
�N�hpython3-jinja2-2.11.3-7.el9_5.noarch.rpm�N�hpython3-jinja2-2.11.3-7.el9_5.noarch.rpm����R�&	����UsecurityImportant: git-lfs security update���shttps://access.redhat.com/errata/RHSA-2025:0673RHSA-2025:0673RHSA-2025:0673https://access.redhat.com/security/cve/CVE-2024-53263CVE-2024-53263CVE-2024-53263https://bugzilla.redhat.com/23380022338002https://errata.almalinux.org/9/ALSA-2025-0673.htmlALSA-2025:0673ALSA-2025:0673
�l�git-lfs-3.4.1-4.el9_5.x86_64.rpm�l�git-lfs-3.4.1-4.el9_5.x86_64.rpm����e�'	����XBBBsecurityImportant: redis:7 security update��~�\https://access.redhat.com/errata/RHSA-2025:0692RHSA-2025:0692RHSA-2025:0692https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://access.redhat.com/security/cve/CVE-2024-51741CVE-2024-51741CVE-2024-51741https://bugzilla.redhat.com/23360042336004https://bugzilla.redhat.com/23360072336007https://errata.almalinux.org/9/ALSA-2025-0692.htmlALSA-2025:0692ALSA-2025:0692
�I��X*�i�redis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm�I�redis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm�b�redis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpm�I��X*�i�redis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm�I�redis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm�b�redis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpm���X�(	��$��^BBBBsecurityImportant: redis security update��Z�\https://access.redhat.com/errata/RHSA-2025:0693RHSA-2025:0693RHSA-2025:0693https://access.redhat.com/security/cve/CVE-2022-24834CVE-2022-24834CVE-2022-24834https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://bugzilla.redhat.com/22216622221662https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://bugzilla.redhat.com/23360042336004https://errata.almalinux.org/9/ALSA-2025-0693.htmlALSA-2025:0693ALSA-2025:0693
�I�"redis-6.2.17-1.el9_5.x86_64.rpm�b�"redis-doc-6.2.17-1.el9_5.noarch.rpm�i�"redis-devel-6.2.17-1.el9_5.i686.rpm�i�"redis-devel-6.2.17-1.el9_5.x86_64.rpm�I�"redis-6.2.17-1.el9_5.x86_64.rpm�b�"redis-doc-6.2.17-1.el9_5.noarch.rpm�i�"redis-devel-6.2.17-1.el9_5.i686.rpm�i�"redis-devel-6.2.17-1.el9_5.x86_64.rpm���'�)	��+��eBBBBsecurityImportant: libsoup security update��6�https://access.redhat.com/errata/RHSA-2025:0791RHSA-2025:0791RHSA-2025:0791https://access.redhat.com/security/cve/CVE-2024-52531CVE-2024-52531CVE-2024-52531https://bugzilla.redhat.com/23252772325277https://errata.almalinux.org/9/ALSA-2025-0791.htmlALSA-2025:0791ALSA-2025:0791
�f�rlibsoup-2.72.0-8.el9_5.3.i686.rpm�f�rlibsoup-2.72.0-8.el9_5.3.x86_64.rpm�g�rlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpm�g�rlibsoup-devel-2.72.0-8.el9_5.3.i686.rpm�f�rlibsoup-2.72.0-8.el9_5.3.i686.rpm�f�rlibsoup-2.72.0-8.el9_5.3.x86_64.rpm�g�rlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpm�g�rlibsoup-devel-2.72.0-8.el9_5.3.i686.rpm����*	���xB��tBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: mariadb:10.11 security update��B�https://access.redhat.com/errata/RHSA-2025:0912RHSA-2025:0912RHSA-2025:0912https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0912.htmlALSA-2025:0912ALSA-2025:0912
��l�`*��mariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�~�mariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�|�mariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�9�&galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm�}�mariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�~�mariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��l�`*��mariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�~�mariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�|�mariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�9�&galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm�}�mariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�~�mariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm��mariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm�����+	��!��IBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security update��T�4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914
�~�=mariadb-embedded-10.5.27-1.el9_5.x86_64.rpm��=mariadb-10.5.27-1.el9_5.x86_64.rpm��=mariadb-server-10.5.27-1.el9_5.x86_64.rpm��=mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm�|�=mariadb-backup-10.5.27-1.el9_5.x86_64.rpm��=mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpm�9�mgalera-26.4.20-1.el9_5.x86_64.rpm��=mariadb-pam-10.5.27-1.el9_5.x86_64.rpm��=mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpm��=mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm�}�=mariadb-common-10.5.27-1.el9_5.x86_64.rpm��=mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm�~�=mariadb-embedded-10.5.27-1.el9_5.x86_64.rpm��=mariadb-10.5.27-1.el9_5.x86_64.rpm��=mariadb-server-10.5.27-1.el9_5.x86_64.rpm��=mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm�|�=mariadb-backup-10.5.27-1.el9_5.x86_64.rpm��=mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpm�9�mgalera-26.4.20-1.el9_5.x86_64.rpm��=mariadb-pam-10.5.27-1.el9_5.x86_64.rpm��=mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpm��=mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm�}�=mariadb-common-10.5.27-1.el9_5.x86_64.rpm��=mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm����8�,	��$��bsecurityModerate: keepalived security update���Uhttps://access.redhat.com/errata/RHSA-2025:0917RHSA-2025:0917RHSA-2025:0917https://access.redhat.com/security/cve/CVE-2024-41184CVE-2024-41184CVE-2024-41184https://bugzilla.redhat.com/22985322298532https://errata.almalinux.org/9/ALSA-2025-0917.htmlALSA-2025:0917ALSA-2025:0917
�l�Jkeepalived-2.2.8-4.el9_5.x86_64.rpm�l�Jkeepalived-2.2.8-4.el9_5.x86_64.rpm����c�-	��.��eBBBBBBBsecurityImportant: podman security update��]� https://access.redhat.com/errata/RHSA-2025:0922RHSA-2025:0922RHSA-2025:0922https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0922.htmlALSA-2025:0922ALSA-2025:0922
�1�(podman-5.2.2-13.el9_5.x86_64.rpm�4�(podman-tests-5.2.2-13.el9_5.x86_64.rpmh�(podman-docker-5.2.2-13.el9_5.noarch.rpm�2�(podman-plugins-5.2.2-13.el9_5.x86_64.rpm�3�(podman-remote-5.2.2-13.el9_5.x86_64.rpm�1�(podman-5.2.2-13.el9_5.x86_64.rpm�4�(podman-tests-5.2.2-13.el9_5.x86_64.rpmh�(podman-docker-5.2.2-13.el9_5.noarch.rpm�2�(podman-plugins-5.2.2-13.el9_5.x86_64.rpm�3�(podman-remote-5.2.2-13.el9_5.x86_64.rpm����Z�.	��3��oBBsecurityImportant: buildah security update��}�6https://access.redhat.com/errata/RHSA-2025:0923RHSA-2025:0923RHSA-2025:0923https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0923.htmlALSA-2025:0923ALSA-2025:0923
�/�Ebuildah-1.37.6-1.el9_5.x86_64.rpm�0�Ebuildah-tests-1.37.6-1.el9_5.x86_64.rpm�/�Ebuildah-1.37.6-1.el9_5.x86_64.rpm�0�Ebuildah-tests-1.37.6-1.el9_5.x86_64.rpm����%�/	��7��tBsecurityModerate: bzip2 security update��3�https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925
�%�"bzip2-devel-1.0.8-10.el9_5.x86_64.rpm�%�"bzip2-devel-1.0.8-10.el9_5.i686.rpm�%�"bzip2-devel-1.0.8-10.el9_5.x86_64.rpm�%�"bzip2-devel-1.0.8-10.el9_5.i686.rpm�����0	��<��xBBsecurityImportant: firefox security update��D�?
https://access.redhat.com/errata/RHSA-2025:10072RHSA-2025:10072RHSA-2025:10072https://access.redhat.com/security/cve/CVE-2025-6424CVE-2025-6424CVE-2025-6424https://access.redhat.com/security/cve/CVE-2025-6425CVE-2025-6425CVE-2025-6425https://access.redhat.com/security/cve/CVE-2025-6429CVE-2025-6429CVE-2025-6429https://access.redhat.com/security/cve/CVE-2025-6430CVE-2025-6430CVE-2025-6430https://bugzilla.redhat.com/23745552374555https://bugzilla.redhat.com/23745592374559https://bugzilla.redhat.com/23745612374561https://bugzilla.redhat.com/23745622374562https://errata.almalinux.org/9/ALSA-2025-10072.htmlALSA-2025:10072ALSA-2025:10072
P�kfirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm8�kfirefox-128.12.0-1.el9_6.alma.1.x86_64.rpmP�kfirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm8�kfirefox-128.12.0-1.el9_6.alma.1.x86_64.rpm��K�1	����}BBBBsecurityImportant: python3.9 security update���ghttps://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136
�+�python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmf�python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmQ�python3-devel-3.9.21-2.el9_6.1.x86_64.rpmQ�python3-devel-3.9.21-2.el9_6.1.i686.rpm�+�python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmf�python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmQ�python3-devel-3.9.21-2.el9_6.1.x86_64.rpmQ�python3-devel-3.9.21-2.el9_6.1.i686.rpm��=�2	����DBBBBBBBBsecurityImportant: python3.11 security update��j�ghttps://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148
�Q�python3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpm�P�python3.11-3.11.11-2.el9_6.1.x86_64.rpm[�python3.11-devel-3.11.11-2.el9_6.1.x86_64.rpm\�python3.11-libs-3.11.11-2.el9_6.1.i686.rpm[�python3.11-devel-3.11.11-2.el9_6.1.i686.rpm\�python3.11-libs-3.11.11-2.el9_6.1.x86_64.rpm�Q�python3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpm�P�python3.11-3.11.11-2.el9_6.1.x86_64.rpm[�python3.11-devel-3.11.11-2.el9_6.1.x86_64.rpm\�python3.11-libs-3.11.11-2.el9_6.1.i686.rpm[�python3.11-devel-3.11.11-2.el9_6.1.i686.rpm\�python3.11-libs-3.11.11-2.el9_6.1.x86_64.rpm��o�3	����OBBBBBBBBsecurityImportant: python3.12 security update��Q�ghttps://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189
��<python3.12-libs-3.12.9-1.el9_6.1.i686.rpm��<python3.12-3.12.9-1.el9_6.1.x86_64.rpm��<python3.12-devel-3.12.9-1.el9_6.1.i686.rpm��<python3.12-libs-3.12.9-1.el9_6.1.x86_64.rpm��<python3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm��<python3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpm��<python3.12-libs-3.12.9-1.el9_6.1.i686.rpm��<python3.12-3.12.9-1.el9_6.1.x86_64.rpm��<python3.12-devel-3.12.9-1.el9_6.1.i686.rpm��<python3.12-libs-3.12.9-1.el9_6.1.x86_64.rpm��<python3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm��<python3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpm��c�4	����ZsecurityImportant: thunderbird security update��8�https://access.redhat.com/errata/RHSA-2025:10196RHSA-2025:10196RHSA-2025:10196https://access.redhat.com/security/cve/CVE-2025-5986CVE-2025-5986CVE-2025-5986https://bugzilla.redhat.com/23722812372281https://errata.almalinux.org/9/ALSA-2025-10196.htmlALSA-2025:10196ALSA-2025:10196
9�kthunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpm9�kthunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpm���5	����]securityModerate: socat security update��O�vhttps://access.redhat.com/errata/RHSA-2025:10353RHSA-2025:10353RHSA-2025:10353https://access.redhat.com/security/cve/CVE-2024-54661CVE-2024-54661CVE-2024-54661https://bugzilla.redhat.com/23302972330297https://errata.almalinux.org/9/ALSA-2025-10353.htmlALSA-2025:10353ALSA-2025:10353
�O�dsocat-1.7.4.1-6.el9_6.1.x86_64.rpm�O�dsocat-1.7.4.1-6.el9_6.1.x86_64.rpm�ø�J�6	��3��`BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��E�]https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379

$�[kernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm�[kernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm+�[rv-5.14.0-570.25.1.el9_6.x86_64.rpm(�[kernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm)�[rtla-5.14.0-570.25.1.el9_6.x86_64.rpm;�[python3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm&�[kernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm#�[kernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm'�[perf-5.14.0-570.25.1.el9_6.x86_64.rpm%�[kernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpm
$�[kernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm�[kernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm+�[rv-5.14.0-570.25.1.el9_6.x86_64.rpm(�[kernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm)�[rtla-5.14.0-570.25.1.el9_6.x86_64.rpm;�[python3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm&�[kernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm#�[kernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm'�[perf-5.14.0-570.25.1.el9_6.x86_64.rpm%�[kernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpm�ÿ��7	��=��tBBBBBBBsecurityImportant: podman security update��"�Thttps://access.redhat.com/errata/RHSA-2025:10550RHSA-2025:10550RHSA-2025:10550https://access.redhat.com/security/cve/CVE-2025-6032CVE-2025-6032CVE-2025-6032https://bugzilla.redhat.com/23725012372501https://errata.almalinux.org/9/ALSA-2025-10550.htmlALSA-2025:10550ALSA-2025:10550
�2�+podman-plugins-5.4.0-12.el9_6.x86_64.rpm�3�+podman-remote-5.4.0-12.el9_6.x86_64.rpm�4�+podman-tests-5.4.0-12.el9_6.x86_64.rpmh�+podman-docker-5.4.0-12.el9_6.noarch.rpm�1�+podman-5.4.0-12.el9_6.x86_64.rpm�2�+podman-plugins-5.4.0-12.el9_6.x86_64.rpm�3�+podman-remote-5.4.0-12.el9_6.x86_64.rpm�4�+podman-tests-5.4.0-12.el9_6.x86_64.rpmh�+podman-docker-5.4.0-12.el9_6.noarch.rpm�1�+podman-5.4.0-12.el9_6.x86_64.rpm�ø�
�8	����~securityModerate: gnome-remote-desktop security update��v�%https://access.redhat.com/errata/RHSA-2025:10631RHSA-2025:10631RHSA-2025:10631https://access.redhat.com/security/cve/CVE-2025-5024CVE-2025-5024CVE-2025-5024https://bugzilla.redhat.com/23677172367717https://errata.almalinux.org/9/ALSA-2025-10631.htmlALSA-2025:10631ALSA-2025:10631
�;�gnome-remote-desktop-40.0-11.el9_6.x86_64.rpm�;�gnome-remote-desktop-40.0-11.el9_6.x86_64.rpm�þ��9	����ABBsecurityImportant: firefox security update���https://access.redhat.com/errata/RHSA-2025:1066RHSA-2025:1066RHSA-2025:1066https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1066.htmlALSA-2025:1066ALSA-2025:1066
P�firefox-x11-128.7.0-1.el9_5.x86_64.rpm8�firefox-128.7.0-1.el9_5.x86_64.rpmP�firefox-x11-128.7.0-1.el9_5.x86_64.rpm8�firefox-128.7.0-1.el9_5.x86_64.rpm����$�:	����FBBBBBBBBBBsecurityModerate: golang security update��:�https://access.redhat.com/errata/RHSA-2025:10676RHSA-2025:10676RHSA-2025:10676https://access.redhat.com/security/cve/CVE-2025-4673CVE-2025-4673CVE-2025-4673https://bugzilla.redhat.com/23733052373305https://errata.almalinux.org/9/ALSA-2025-10676.htmlALSA-2025:10676ALSA-2025:10676
�G� golang-1.24.4-1.el9_6.x86_64.rpm�N� go-toolset-1.24.4-1.el9_6.x86_64.rpmn� golang-misc-1.24.4-1.el9_6.noarch.rpm�T� golang-race-1.24.4-1.el9_6.x86_64.rpmm� golang-docs-1.24.4-1.el9_6.noarch.rpmp� golang-tests-1.24.4-1.el9_6.noarch.rpm�H� golang-bin-1.24.4-1.el9_6.x86_64.rpmo� golang-src-1.24.4-1.el9_6.noarch.rpm�G� golang-1.24.4-1.el9_6.x86_64.rpm�N� go-toolset-1.24.4-1.el9_6.x86_64.rpmn� golang-misc-1.24.4-1.el9_6.noarch.rpm�T� golang-race-1.24.4-1.el9_6.x86_64.rpmm� golang-docs-1.24.4-1.el9_6.noarch.rpmp� golang-tests-1.24.4-1.el9_6.noarch.rpm�H� golang-bin-1.24.4-1.el9_6.x86_64.rpmo� golang-src-1.24.4-1.el9_6.noarch.rpm���\�;	����SBsecurityImportant: libxml2 security update��>�Lhttps://access.redhat.com/errata/RHSA-2025:10699RHSA-2025:10699RHSA-2025:10699https://access.redhat.com/security/cve/CVE-2025-49794CVE-2025-49794CVE-2025-49794https://access.redhat.com/security/cve/CVE-2025-49796CVE-2025-49796CVE-2025-49796https://access.redhat.com/security/cve/CVE-2025-6021CVE-2025-6021CVE-2025-6021https://bugzilla.redhat.com/23723732372373https://bugzilla.redhat.com/23723852372385https://bugzilla.redhat.com/23724062372406https://errata.almalinux.org/9/ALSA-2025-10699.htmlALSA-2025:10699ALSA-2025:10699
�E�alibxml2-devel-2.9.13-10.el9_6.x86_64.rpm�E�alibxml2-devel-2.9.13-10.el9_6.i686.rpm�E�alibxml2-devel-2.9.13-10.el9_6.x86_64.rpm�E�alibxml2-devel-2.9.13-10.el9_6.i686.rpm�þ�#�<	��*��WBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��
�https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837

$�\kernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm�\kernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm'�\perf-5.14.0-570.26.1.el9_6.x86_64.rpm#�\kernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm+�\rv-5.14.0-570.26.1.el9_6.x86_64.rpm)�\rtla-5.14.0-570.26.1.el9_6.x86_64.rpm;�\python3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm&�\kernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm(�\kernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm%�\kernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpm
$�\kernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm�\kernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm'�\perf-5.14.0-570.26.1.el9_6.x86_64.rpm#�\kernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm+�\rv-5.14.0-570.26.1.el9_6.x86_64.rpm)�\rtla-5.14.0-570.26.1.el9_6.x86_64.rpm;�\python3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm&�\kernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm(�\kernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm%�\kernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpm����h�=	��,��+securityImportant: cloud-init security update���lhttps://access.redhat.com/errata/RHSA-2025:10848RHSA-2025:10848RHSA-2025:10848https://access.redhat.com/security/cve/CVE-2024-6174CVE-2024-6174CVE-2024-6174https://bugzilla.redhat.com/23749242374924https://errata.almalinux.org/9/ALSA-2025-10848.htmlALSA-2025:10848ALSA-2025:10848
�F�cloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm�F�cloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm���{�>	��9��mBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update��
�ahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862
�V�sjava-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpm�8�sjava-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpm�T�sjava-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpm�X�sjava-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpm�7�sjava-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpm�U�sjava-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpm�W�sjava-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpm�V�sjava-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpm�8�sjava-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpm�T�sjava-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpm�X�sjava-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpm�7�sjava-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpm�U�sjava-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpm�W�sjava-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpm���,�?	����zBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update��k�
https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867
	��(java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm	��(java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��(java-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��޿i�@	����MBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��x�qhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873
	�o�:java-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�r�:java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�t�:java-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�q�:java-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�m�:java-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�u�:java-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�s�:java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�n�:java-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�p�:java-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpm	�o�:java-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�r�:java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�t�:java-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�q�:java-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�m�:java-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�u�:java-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�s�:java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�n�:java-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�p�:java-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�Ĩ�n�A	��&��`BBBBsecurityModerate: glib2 security update��i�https://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140
�:�fglib2-doc-2.68.4-16.el9_6.2.noarch.rpm�:�fglib2-tests-2.68.4-16.el9_6.2.x86_64.rpm��fglib2-devel-2.68.4-16.el9_6.2.i686.rpm��fglib2-devel-2.68.4-16.el9_6.2.x86_64.rpm�:�fglib2-doc-2.68.4-16.el9_6.2.noarch.rpm�:�fglib2-tests-2.68.4-16.el9_6.2.x86_64.rpm��fglib2-devel-2.68.4-16.el9_6.2.i686.rpm��fglib2-devel-2.68.4-16.el9_6.2.x86_64.rpm��޽5�B	��/��gBBBBBBsecurityImportant: tomcat security update��m�https://access.redhat.com/errata/RHSA-2025:11335RHSA-2025:11335RHSA-2025:11335https://access.redhat.com/security/cve/CVE-2024-56337CVE-2024-56337CVE-2024-56337https://access.redhat.com/security/cve/CVE-2025-31650CVE-2025-31650CVE-2025-31650https://bugzilla.redhat.com/23335212333521https://bugzilla.redhat.com/23627832362783https://errata.almalinux.org/9/ALSA-2025-11335.htmlALSA-2025:11335ALSA-2025:11335
��8tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-lib-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-lib-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm��8tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm����-�C	����pBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��o�Vhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411

'�]perf-5.14.0-570.28.1.el9_6.x86_64.rpm+�]rv-5.14.0-570.28.1.el9_6.x86_64.rpm$�]kernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm)�]rtla-5.14.0-570.28.1.el9_6.x86_64.rpm#�]kernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm%�]kernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpm�]kernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm(�]kernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm&�]kernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm;�]python3-perf-5.14.0-570.28.1.el9_6.x86_64.rpm
'�]perf-5.14.0-570.28.1.el9_6.x86_64.rpm+�]rv-5.14.0-570.28.1.el9_6.x86_64.rpm$�]kernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm)�]rtla-5.14.0-570.28.1.el9_6.x86_64.rpm#�]kernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm%�]kernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpm�]kernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm(�]kernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm&�]kernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm;�]python3-perf-5.14.0-570.28.1.el9_6.x86_64.rpm��>�D	����DBBBBBBBBBBBBBBBBBBsecurityImportant: git security update��E�Mhttps://access.redhat.com/errata/RHSA-2025:11462RHSA-2025:11462RHSA-2025:11462https://access.redhat.com/security/cve/CVE-2024-50349CVE-2024-50349CVE-2024-50349https://access.redhat.com/security/cve/CVE-2024-52006CVE-2024-52006CVE-2024-52006https://access.redhat.com/security/cve/CVE-2025-27613CVE-2025-27613CVE-2025-27613https://access.redhat.com/security/cve/CVE-2025-27614CVE-2025-27614CVE-2025-27614https://access.redhat.com/security/cve/CVE-2025-46835CVE-2025-46835CVE-2025-46835https://access.redhat.com/security/cve/CVE-2025-48384CVE-2025-48384CVE-2025-48384https://access.redhat.com/security/cve/CVE-2025-48385CVE-2025-48385CVE-2025-48385https://bugzilla.redhat.com/23378242337824https://bugzilla.redhat.com/23379562337956https://bugzilla.redhat.com/23788062378806https://bugzilla.redhat.com/23788082378808https://bugzilla.redhat.com/23791242379124https://bugzilla.redhat.com/23791252379125https://bugzilla.redhat.com/23793262379326https://errata.almalinux.org/9/ALSA-2025-11462.htmlALSA-2025:11462ALSA-2025:11462
�;�git-core-2.47.3-1.el9_6.x86_64.rpm�%�git-svn-2.47.3-1.el9_6.noarch.rpm�!�git-core-doc-2.47.3-1.el9_6.noarch.rpm�"�git-email-2.47.3-1.el9_6.noarch.rpm�.�perl-Git-SVN-2.47.3-1.el9_6.noarch.rpm�'�gitweb-2.47.3-1.el9_6.noarch.rpm�:�git-2.47.3-1.el9_6.x86_64.rpm�-�perl-Git-2.47.3-1.el9_6.noarch.rpm�#�git-gui-2.47.3-1.el9_6.noarch.rpm�>�git-subtree-2.47.3-1.el9_6.x86_64.rpm�&�gitk-2.47.3-1.el9_6.noarch.rpm� �git-all-2.47.3-1.el9_6.noarch.rpm�$�git-instaweb-2.47.3-1.el9_6.noarch.rpm�<�git-credential-libsecret-2.47.3-1.el9_6.x86_64.rpm�=�git-daemon-2.47.3-1.el9_6.x86_64.rpm�;�git-core-2.47.3-1.el9_6.x86_64.rpm�%�git-svn-2.47.3-1.el9_6.noarch.rpm�!�git-core-doc-2.47.3-1.el9_6.noarch.rpm�"�git-email-2.47.3-1.el9_6.noarch.rpm�.�perl-Git-SVN-2.47.3-1.el9_6.noarch.rpm�'�gitweb-2.47.3-1.el9_6.noarch.rpm�:�git-2.47.3-1.el9_6.x86_64.rpm�-�perl-Git-2.47.3-1.el9_6.noarch.rpm�#�git-gui-2.47.3-1.el9_6.noarch.rpm�>�git-subtree-2.47.3-1.el9_6.x86_64.rpm�&�gitk-2.47.3-1.el9_6.noarch.rpm� �git-all-2.47.3-1.el9_6.noarch.rpm�$�git-instaweb-2.47.3-1.el9_6.noarch.rpm�<�git-credential-libsecret-2.47.3-1.el9_6.x86_64.rpm�=�git-daemon-2.47.3-1.el9_6.x86_64.rpm���@�E	��!��YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update���https://access.redhat.com/errata/RHSA-2025:11463RHSA-2025:11463RHSA-2025:11463https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-11463.htmlALSA-2025:11463ALSA-2025:11463
6�4"fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpm�e"fence-virtd-4.10.0-86.el9_6.7.x86_64.rpm�("fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpm�."fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpm�7"fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpm�""fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm�1"fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpm�-"fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm�2"fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpm�/"fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpm�d"fence-virt-4.10.0-86.el9_6.7.x86_64.rpm�*"fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm�%"fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm�$"fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpm�&"fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm�3"fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm�b"fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpm�)"fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpm�]"fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm�"fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpm�$"fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpm�W"fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm�&"fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm� "fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpm�#"fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpm�i"fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpm�g"fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpm�'"fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpm�["fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpm�j"fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm�"fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpm�%"fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpm�V"fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpm�,"fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm�#"fence-agents-common-4.10.0-86.el9_6.7.noarch.rpm�Z"fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpm�f"fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpm�\"fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpm�!"fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpm�+"fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm�c"fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm�"fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpm�X"fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm�0"fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpm�6"fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpm�Y"fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpm�h"fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpm�a"ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm�5"fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm6�4"fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpm�e"fence-virtd-4.10.0-86.el9_6.7.x86_64.rpm�("fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpm�."fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpm�7"fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpm�""fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm�1"fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpm�-"fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm�2"fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpm�/"fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpm�d"fence-virt-4.10.0-86.el9_6.7.x86_64.rpm�*"fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm�%"fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm�$"fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpm�&"fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm�3"fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm�b"fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpm�)"fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpm�]"fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm�"fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpm�$"fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpm�W"fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm�&"fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm� "fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpm�#"fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpm�i"fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpm�g"fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpm�'"fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpm�["fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpm�j"fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm�"fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpm�%"fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpm�V"fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpm�,"fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm�#"fence-agents-common-4.10.0-86.el9_6.7.noarch.rpm�Z"fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpm�f"fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpm�\"fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpm�!"fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm�"fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpm�+"fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm�c"fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm�"fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpm�X"fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm�0"fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpm�6"fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpm�Y"fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpm�h"fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpm�a"ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm�5"fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm����F	��&��bBBsecurityImportant: firefox security update���:https://access.redhat.com/errata/RHSA-2025:11748RHSA-2025:11748RHSA-2025:11748https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-11748.htmlALSA-2025:11748ALSA-2025:11748
8�firefox-128.13.0-1.el9_6.alma.1.x86_64.rpmP�firefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpm8�firefox-128.13.0-1.el9_6.alma.1.x86_64.rpmP�firefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpm�Ĩ�D�G	��)��gsecurityImportant: thunderbird security update��P�https://access.redhat.com/errata/RHSA-2025:1184RHSA-2025:1184RHSA-2025:1184https://access.redhat.com/security/cve/CVE-2025-0510CVE-2025-0510CVE-2025-0510https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1015CVE-2025-1015CVE-2025-1015https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437592343759https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437622343762https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1184.htmlALSA-2025:1184ALSA-2025:1184
9�thunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm9�thunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm����(�H	��3��jBBBBBBBsecurityImportant: unbound security update��[�hhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849
��
unbound-libs-1.16.2-19.el9_6.1.x86_64.rpm�U�
unbound-1.16.2-19.el9_6.1.x86_64.rpm��
unbound-libs-1.16.2-19.el9_6.1.i686.rpm�p�
unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpm�P�
python3-unbound-1.16.2-19.el9_6.1.x86_64.rpm��
unbound-libs-1.16.2-19.el9_6.1.x86_64.rpm�U�
unbound-1.16.2-19.el9_6.1.x86_64.rpm��
unbound-libs-1.16.2-19.el9_6.1.i686.rpm�p�
unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpm�P�
python3-unbound-1.16.2-19.el9_6.1.x86_64.rpm��_�I	����tBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��C�https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861

'�^perf-5.14.0-570.30.1.el9_6.x86_64.rpm&�^kernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm)�^rtla-5.14.0-570.30.1.el9_6.x86_64.rpm#�^kernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpm;�^python3-perf-5.14.0-570.30.1.el9_6.x86_64.rpm�^kernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm$�^kernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm%�^kernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm(�^kernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm+�^rv-5.14.0-570.30.1.el9_6.x86_64.rpm
'�^perf-5.14.0-570.30.1.el9_6.x86_64.rpm&�^kernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm)�^rtla-5.14.0-570.30.1.el9_6.x86_64.rpm#�^kernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpm;�^python3-perf-5.14.0-570.30.1.el9_6.x86_64.rpm�^kernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm$�^kernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm%�^kernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm(�^kernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm+�^rv-5.14.0-570.30.1.el9_6.x86_64.rpm�į�'�J	����HBBBBsecurityImportant: sqlite security update��Q�	https://access.redhat.com/errata/RHSA-2025:11992RHSA-2025:11992RHSA-2025:11992https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-11992.htmlALSA-2025:11992ALSA-2025:11992
�N�vsqlite-3.34.1-8.el9_6.i686.rpm�N�vsqlite-3.34.1-8.el9_6.x86_64.rpm�O�vsqlite-devel-3.34.1-8.el9_6.i686.rpm�O�vsqlite-devel-3.34.1-8.el9_6.x86_64.rpm�N�vsqlite-3.34.1-8.el9_6.i686.rpm�N�vsqlite-3.34.1-8.el9_6.x86_64.rpm�O�vsqlite-devel-3.34.1-8.el9_6.i686.rpm�O�vsqlite-devel-3.34.1-8.el9_6.x86_64.rpm���K	����OBBBsecurityImportant: redis:7 security update��Z�thttps://access.redhat.com/errata/RHSA-2025:12008RHSA-2025:12008RHSA-2025:12008https://access.redhat.com/security/cve/CVE-2025-27151CVE-2025-27151CVE-2025-27151https://access.redhat.com/security/cve/CVE-2025-32023CVE-2025-32023CVE-2025-32023https://access.redhat.com/security/cve/CVE-2025-48367CVE-2025-48367CVE-2025-48367https://bugzilla.redhat.com/23691532369153https://errata.almalinux.org/9/ALSA-2025-12008.htmlALSA-2025:12008ALSA-2025:12008
�I��d*�I�redis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm�i�redis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm�b�redis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpm�I��d*�I�redis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm�i�redis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm�b�redis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpm��,�L	����UBBBsecurityModerate: icu security update��N�https://access.redhat.com/errata/RHSA-2025:12083RHSA-2025:12083RHSA-2025:12083https://access.redhat.com/security/cve/CVE-2025-5222CVE-2025-5222CVE-2025-5222https://bugzilla.redhat.com/23686002368600https://errata.almalinux.org/9/ALSA-2025-12083.htmlALSA-2025:12083ALSA-2025:12083
�U�libicu-devel-67.1-10.el9_6.x86_64.rpm�C�icu-67.1-10.el9_6.x86_64.rpm�U�libicu-devel-67.1-10.el9_6.i686.rpm�U�libicu-devel-67.1-10.el9_6.x86_64.rpm�C�icu-67.1-10.el9_6.x86_64.rpm�U�libicu-devel-67.1-10.el9_6.i686.rpm�ħ�H�M	��%��[BBBBBBBBsecurityModerate: tbb security update��`�ahttps://access.redhat.com/errata/RHSA-2025:1210RHSA-2025:1210RHSA-2025:1210https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1210.htmlALSA-2025:1210ALSA-2025:1210
��tbb-2020.3-8.el9_5.1.i686.rpm�>�python3-tbb-2020.3-8.el9_5.1.x86_64.rpm��tbb-devel-2020.3-8.el9_5.1.i686.rpm��tbb-2020.3-8.el9_5.1.x86_64.rpm��tbb-devel-2020.3-8.el9_5.1.x86_64.rpm�U�tbb-doc-2020.3-8.el9_5.1.x86_64.rpm��tbb-2020.3-8.el9_5.1.i686.rpm�>�python3-tbb-2020.3-8.el9_5.1.x86_64.rpm��tbb-devel-2020.3-8.el9_5.1.i686.rpm��tbb-2020.3-8.el9_5.1.x86_64.rpm��tbb-devel-2020.3-8.el9_5.1.x86_64.rpm�U�tbb-doc-2020.3-8.el9_5.1.x86_64.rpm�����N	��)��fBsecurityModerate: libtpms security update��A�https://access.redhat.com/errata/RHSA-2025:12100RHSA-2025:12100RHSA-2025:12100https://access.redhat.com/security/cve/CVE-2025-49133CVE-2025-49133CVE-2025-49133https://bugzilla.redhat.com/23715852371585https://errata.almalinux.org/9/ALSA-2025-12100.htmlALSA-2025:12100ALSA-2025:12100
�C� libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm�C� libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm�C� libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm�C� libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm�ħ�D�O	��,��jsecurityImportant: thunderbird security update��E�	https://access.redhat.com/errata/RHSA-2025:12187RHSA-2025:12187RHSA-2025:12187https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-12187.htmlALSA-2025:12187ALSA-2025:12187
9�thunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpm9�thunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpm�Ĩ�H�P	��3��mBBBBsecurityImportant: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update��N�https://access.redhat.com/errata/RHSA-2025:12280RHSA-2025:12280RHSA-2025:12280https://access.redhat.com/security/cve/CVE-2025-52999CVE-2025-52999CVE-2025-52999https://bugzilla.redhat.com/23748042374804https://errata.almalinux.org/9/ALSA-2025-12280.htmlALSA-2025:12280ALSA-2025:12280
�1�fpki-jackson-annotations-2.19.1-1.el9_6.noarch.rpm�2�fpki-jackson-core-2.19.1-1.el9_6.noarch.rpm�3�fpki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpm�4�fpki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpm��fpki-jackson-databind-2.19.1-1.el9_6.noarch.rpm�5�fpki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpm�1�fpki-jackson-annotations-2.19.1-1.el9_6.noarch.rpm�2�fpki-jackson-core-2.19.1-1.el9_6.noarch.rpm�3�fpki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpm�4�fpki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpm��fpki-jackson-databind-2.19.1-1.el9_6.noarch.rpm�5�fpki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpm��ݘ
�Q	��7��tBsecurityImportant: libxml2 security update��d�!https://access.redhat.com/errata/RHSA-2025:12447RHSA-2025:12447RHSA-2025:12447https://access.redhat.com/security/cve/CVE-2025-7425CVE-2025-7425CVE-2025-7425https://bugzilla.redhat.com/23792742379274https://errata.almalinux.org/9/ALSA-2025-12447.htmlALSA-2025:12447ALSA-2025:12447
�E�blibxml2-devel-2.9.13-11.el9_6.x86_64.rpm�E�blibxml2-devel-2.9.13-11.el9_6.i686.rpm�E�blibxml2-devel-2.9.13-11.el9_6.x86_64.rpm�E�blibxml2-devel-2.9.13-11.el9_6.i686.rpm�ij�x�R	��:��xsecurityModerate: python-requests security update���Rhttps://access.redhat.com/errata/RHSA-2025:12519RHSA-2025:12519RHSA-2025:12519https://access.redhat.com/security/cve/CVE-2024-47081CVE-2024-47081CVE-2024-47081https://bugzilla.redhat.com/23712722371272https://errata.almalinux.org/9/ALSA-2025-12519.htmlALSA-2025:12519ALSA-2025:12519
�]�python3-requests+socks-2.25.1-10.el9_6.noarch.rpm�\�python3-requests+security-2.25.1-10.el9_6.noarch.rpm�]�python3-requests+socks-2.25.1-10.el9_6.noarch.rpm�\�python3-requests+security-2.25.1-10.el9_6.noarch.rpm����h�S	����{BBBBBBBBBBBBBBBsecurityImportant: kernel security update��W�https://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262
	#�]kernel-debug-devel-5.14.0-503.23.2.el9_5.x86_64.rpm(�]kernel-headers-5.14.0-503.23.2.el9_5.x86_64.rpm'�]perf-5.14.0-503.23.2.el9_5.x86_64.rpm$�]kernel-debug-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm�]kernel-doc-5.14.0-503.23.2.el9_5.noarch.rpm&�]kernel-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm)�]rtla-5.14.0-503.23.2.el9_5.x86_64.rpm+�]rv-5.14.0-503.23.2.el9_5.x86_64.rpm%�]kernel-devel-5.14.0-503.23.2.el9_5.x86_64.rpm	#�]kernel-debug-devel-5.14.0-503.23.2.el9_5.x86_64.rpm(�]kernel-headers-5.14.0-503.23.2.el9_5.x86_64.rpm'�]perf-5.14.0-503.23.2.el9_5.x86_64.rpm$�]kernel-debug-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm�]kernel-doc-5.14.0-503.23.2.el9_5.noarch.rpm&�]kernel-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm)�]rtla-5.14.0-503.23.2.el9_5.x86_64.rpm+�]rv-5.14.0-503.23.2.el9_5.x86_64.rpm%�]kernel-devel-5.14.0-503.23.2.el9_5.x86_64.rpm����~�T	�� ��MBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��t�ohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746

$�_kernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm�_kernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm(�_kernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm+�_rv-5.14.0-570.32.1.el9_6.x86_64.rpm%�_kernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm)�_rtla-5.14.0-570.32.1.el9_6.x86_64.rpm#�_kernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpm;�_python3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm&�_kernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm'�_perf-5.14.0-570.32.1.el9_6.x86_64.rpm
$�_kernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm�_kernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm(�_kernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm+�_rv-5.14.0-570.32.1.el9_6.x86_64.rpm%�_kernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm)�_rtla-5.14.0-570.32.1.el9_6.x86_64.rpm#�_kernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpm;�_python3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm&�_kernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm'�_perf-5.14.0-570.32.1.el9_6.x86_64.rpm��Қ�U	��#��asecurityModerate: opentelemetry-collector security update��c�https://access.redhat.com/errata/RHSA-2025:12831RHSA-2025:12831RHSA-2025:12831https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-12831.htmlALSA-2025:12831ALSA-2025:12831
�I�7opentelemetry-collector-0.127.0-1.el9_6.x86_64.rpm�I�7opentelemetry-collector-0.127.0-1.el9_6.x86_64.rpm���D�V	��%��$securityModerate: python3.12-setuptools security update��z�Jhttps://access.redhat.com/errata/RHSA-2025:12834RHSA-2025:12834RHSA-2025:12834https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-12834.htmlALSA-2025:12834ALSA-2025:12834
��:python3.12-setuptools-68.2.2-5.el9_6.noarch.rpm��:python3.12-setuptools-68.2.2-5.el9_6.noarch.rpm����s�W	����fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-14-gcc security update��D�https://access.redhat.com/errata/RHSA-2025:1300RHSA-2025:1300RHSA-2025:1300https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1300.htmlALSA-2025:1300ALSA-2025:1300
�0=gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpm�.=libasan8-14.2.1-1.3.el9_5.x86_64.rpm�B=gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm�B=gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpm�.=gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm�C=gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm�?=gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpm�,=gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm�<=gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpm�/=gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm�==gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpm�-=gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm�C=gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpm�2=gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm�<=gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm�>=gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm�A=gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpm�}=libtsan2-14.2.1-1.3.el9_5.x86_64.rpm�>=gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpm�.=libasan8-14.2.1-1.3.el9_5.i686.rpm�1=gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm�==gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm�A=gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm�@=gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpm�3=gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm�?=gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm�;=gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm�;=gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm�@=gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm�0=gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpm�.=libasan8-14.2.1-1.3.el9_5.x86_64.rpm�B=gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm�B=gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpm�.=gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm�C=gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm�?=gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpm�,=gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm�<=gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpm�/=gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm�==gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpm�-=gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm�C=gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpm�2=gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm�<=gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm�>=gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm�A=gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpm�}=libtsan2-14.2.1-1.3.el9_5.x86_64.rpm�>=gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpm�.=libasan8-14.2.1-1.3.el9_5.i686.rpm�1=gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm�==gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm�A=gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm�@=gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpm�3=gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm�?=gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm�;=gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm�;=gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm�@=gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm����#�X	����WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-13-gcc security update��`�https://access.redhat.com/errata/RHSA-2025:1309RHSA-2025:1309RHSA-2025:1309https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1309.htmlALSA-2025:1309ALSA-2025:1309
�4<gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpm�2<gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpm�2<gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm�9<gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpm�%<gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpm�.<libasan8-13.3.1-2.2.el9_5.x86_64.rpm�#<gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpm�$<gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpm�3<gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm�9<gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm�4<gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpm�'<gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpm�.<libasan8-13.3.1-2.2.el9_5.i686.rpm�1<gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpm�"<gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpm�3<gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm�5<gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm�7<gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpm�1<gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm�6<gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm�5<gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpm�(<gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm�7<gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpm�}<libtsan2-13.3.1-2.2.el9_5.x86_64.rpm�8<gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm�6<gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpm�!<gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm�8<gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpm�&<gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm�4<gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpm�2<gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpm�2<gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm�9<gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpm�%<gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpm�.<libasan8-13.3.1-2.2.el9_5.x86_64.rpm�#<gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpm�$<gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpm�3<gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm�9<gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm�4<gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpm�'<gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpm�.<libasan8-13.3.1-2.2.el9_5.i686.rpm�1<gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpm�"<gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpm�3<gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm�5<gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm�7<gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpm�1<gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm�6<gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm�5<gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpm�(<gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm�7<gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpm�}<libtsan2-13.3.1-2.2.el9_5.x86_64.rpm�8<gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm�6<gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpm�!<gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm�8<gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpm�&<gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm����0�Y	��
��HBBBsecurityImportant: openssl security update��|�qhttps://access.redhat.com/errata/RHSA-2025:1330RHSA-2025:1330RHSA-2025:1330https://access.redhat.com/security/cve/CVE-2024-12797CVE-2024-12797CVE-2024-12797https://bugzilla.redhat.com/23427572342757https://errata.almalinux.org/9/ALSA-2025-1330.htmlALSA-2025:1330ALSA-2025:1330
��qopenssl-devel-3.2.2-6.el9_5.1.i686.rpm��qopenssl-perl-3.2.2-6.el9_5.1.x86_64.rpm��qopenssl-devel-3.2.2-6.el9_5.1.x86_64.rpm��qopenssl-devel-3.2.2-6.el9_5.1.i686.rpm��qopenssl-perl-3.2.2-6.el9_5.1.x86_64.rpm��qopenssl-devel-3.2.2-6.el9_5.1.x86_64.rpm����]�Z	����NBsecurityModerate: libxml2 security update��m�https://access.redhat.com/errata/RHSA-2025:13428RHSA-2025:13428RHSA-2025:13428https://access.redhat.com/security/cve/CVE-2025-32414CVE-2025-32414CVE-2025-32414https://access.redhat.com/security/cve/CVE-2025-32415CVE-2025-32415CVE-2025-32415https://bugzilla.redhat.com/23581212358121https://bugzilla.redhat.com/23607682360768https://errata.almalinux.org/9/ALSA-2025-13428.htmlALSA-2025:13428ALSA-2025:13428
�E�clibxml2-devel-2.9.13-12.el9_6.i686.rpm�E�clibxml2-devel-2.9.13-12.el9_6.x86_64.rpm�E�clibxml2-devel-2.9.13-12.el9_6.i686.rpm�E�clibxml2-devel-2.9.13-12.el9_6.x86_64.rpm��Լ>�[	��>��RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc security update���Khttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346
�eOlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpm�WOlibitm-11.5.0-5.el9_5.alma.1.x86_64.rpm�_Olibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpm�Ogcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpm�ROlibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpm�eOlibubsan-11.5.0-5.el9_5.alma.1.i686.rpm�Ogcc-11.5.0-5.el9_5.alma.1.x86_64.rpm�ROlibgccjit-11.5.0-5.el9_5.alma.1.i686.rpm�_Olibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�WOlibitm-11.5.0-5.el9_5.alma.1.i686.rpm�Ocpp-11.5.0-5.el9_5.alma.1.x86_64.rpm�SOlibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�Ogcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm�Ogcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpm�NOlibasan-11.5.0-5.el9_5.alma.1.x86_64.rpm�SOlibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm�rOlibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm�dOlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�XOlibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�XOlibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm�zOliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpm�Ogcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm�Olibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpm�NOlibasan-11.5.0-5.el9_5.alma.1.i686.rpm�dOlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpm�~Olibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpm�eOlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpm�WOlibitm-11.5.0-5.el9_5.alma.1.x86_64.rpm�_Olibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpm�Ogcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpm�ROlibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpm�eOlibubsan-11.5.0-5.el9_5.alma.1.i686.rpm�Ogcc-11.5.0-5.el9_5.alma.1.x86_64.rpm�ROlibgccjit-11.5.0-5.el9_5.alma.1.i686.rpm�_Olibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�WOlibitm-11.5.0-5.el9_5.alma.1.i686.rpm�Ocpp-11.5.0-5.el9_5.alma.1.x86_64.rpm�SOlibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�Ogcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm�Ogcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpm�NOlibasan-11.5.0-5.el9_5.alma.1.x86_64.rpm�SOlibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm�rOlibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm�dOlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�XOlibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�XOlibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm�zOliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpm�Ogcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm�Olibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpm�NOlibasan-11.5.0-5.el9_5.alma.1.i686.rpm�dOlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpm�~Olibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpm�����\	����BsecurityImportant: libxml2 security update��M�~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350
�E�ilibxml2-devel-2.9.13-6.el9_5.1.i686.rpm�E�ilibxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm�E�ilibxml2-devel-2.9.13-6.el9_5.1.i686.rpm�E�ilibxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm�����]	����CsecurityModerate: python3.11-setuptools security update��K�3https://access.redhat.com/errata/RHSA-2025:13578RHSA-2025:13578RHSA-2025:13578https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-13578.htmlALSA-2025:13578ALSA-2025:13578
�
�8python3.11-setuptools-65.5.1-4.el9_6.noarch.rpm��8python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm�
�8python3.11-setuptools-65.5.1-4.el9_6.noarch.rpm��8python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm���8�^	����FBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��~�Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602

+�`rv-5.14.0-570.33.2.el9_6.x86_64.rpm;�`python3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm&�`kernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm)�`rtla-5.14.0-570.33.2.el9_6.x86_64.rpm#�`kernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm$�`kernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm�`kernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm%�`kernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm'�`perf-5.14.0-570.33.2.el9_6.x86_64.rpm(�`kernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm
+�`rv-5.14.0-570.33.2.el9_6.x86_64.rpm;�`python3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm&�`kernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm)�`rtla-5.14.0-570.33.2.el9_6.x86_64.rpm#�`kernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm$�`kernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm�`kernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm%�`kernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm'�`perf-5.14.0-570.33.2.el9_6.x86_64.rpm(�`kernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm����_	����ZBBsecurityImportant: toolbox security update��F�https://access.redhat.com/errata/RHSA-2025:13673RHSA-2025:13673RHSA-2025:13673https://access.redhat.com/security/cve/CVE-2025-23266CVE-2025-23266CVE-2025-23266https://bugzilla.redhat.com/23817942381794https://errata.almalinux.org/9/ALSA-2025-13673.htmlALSA-2025:13673ALSA-2025:13673
��etoolbox-0.2-1.el9_6.x86_64.rpm�
�etoolbox-tests-0.2-1.el9_6.x86_64.rpm��etoolbox-0.2-1.el9_6.x86_64.rpm�
�etoolbox-tests-0.2-1.el9_6.x86_64.rpm���D�`	��+��_BBBBBBBBBBsecurityImportant: webkit2gtk3 security update��W�Jhttps://access.redhat.com/errata/RHSA-2025:13782RHSA-2025:13782RHSA-2025:13782https://access.redhat.com/security/cve/CVE-2025-31273CVE-2025-31273CVE-2025-31273https://access.redhat.com/security/cve/CVE-2025-31278CVE-2025-31278CVE-2025-31278https://access.redhat.com/security/cve/CVE-2025-43211CVE-2025-43211CVE-2025-43211https://access.redhat.com/security/cve/CVE-2025-43212CVE-2025-43212CVE-2025-43212https://access.redhat.com/security/cve/CVE-2025-43216CVE-2025-43216CVE-2025-43216https://access.redhat.com/security/cve/CVE-2025-43227CVE-2025-43227CVE-2025-43227https://access.redhat.com/security/cve/CVE-2025-43240CVE-2025-43240CVE-2025-43240https://access.redhat.com/security/cve/CVE-2025-43265CVE-2025-43265CVE-2025-43265https://access.redhat.com/security/cve/CVE-2025-6558CVE-2025-6558CVE-2025-6558https://bugzilla.redhat.com/23802542380254https://bugzilla.redhat.com/23843852384385https://bugzilla.redhat.com/23862682386268https://bugzilla.redhat.com/23862692386269https://bugzilla.redhat.com/23862702386270https://bugzilla.redhat.com/23862712386271https://bugzilla.redhat.com/23862732386273https://bugzilla.redhat.com/23862742386274https://bugzilla.redhat.com/23862762386276https://errata.almalinux.org/9/ALSA-2025-13782.htmlALSA-2025:13782ALSA-2025:13782
3�>webkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm2�>webkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm3�>webkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm0�>webkit2gtk3-2.48.5-1.el9_6.x86_64.rpm0�>webkit2gtk3-2.48.5-1.el9_6.i686.rpm2�>webkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm1�>webkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm1�>webkit2gtk3-devel-2.48.5-1.el9_6.i686.rpm3�>webkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm2�>webkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm3�>webkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm0�>webkit2gtk3-2.48.5-1.el9_6.x86_64.rpm0�>webkit2gtk3-2.48.5-1.el9_6.i686.rpm2�>webkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm1�>webkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm1�>webkit2gtk3-devel-2.48.5-1.el9_6.i686.rpm���b�a	��8��lBBBBBBBBBBsecurityImportant: golang security update��!�]https://access.redhat.com/errata/RHSA-2025:13935RHSA-2025:13935RHSA-2025:13935https://access.redhat.com/security/cve/CVE-2025-4674CVE-2025-4674CVE-2025-4674https://bugzilla.redhat.com/23843292384329https://errata.almalinux.org/9/ALSA-2025-13935.htmlALSA-2025:13935ALSA-2025:13935
�H�!golang-bin-1.24.6-1.el9_6.x86_64.rpm�G�!golang-1.24.6-1.el9_6.x86_64.rpmp�!golang-tests-1.24.6-1.el9_6.noarch.rpmn�!golang-misc-1.24.6-1.el9_6.noarch.rpmm�!golang-docs-1.24.6-1.el9_6.noarch.rpmo�!golang-src-1.24.6-1.el9_6.noarch.rpm�T�!golang-race-1.24.6-1.el9_6.x86_64.rpm�N�!go-toolset-1.24.6-1.el9_6.x86_64.rpm�H�!golang-bin-1.24.6-1.el9_6.x86_64.rpm�G�!golang-1.24.6-1.el9_6.x86_64.rpmp�!golang-tests-1.24.6-1.el9_6.noarch.rpmn�!golang-misc-1.24.6-1.el9_6.noarch.rpmm�!golang-docs-1.24.6-1.el9_6.noarch.rpmo�!golang-src-1.24.6-1.el9_6.noarch.rpm�T�!golang-race-1.24.6-1.el9_6.x86_64.rpm�N�!go-toolset-1.24.6-1.el9_6.x86_64.rpm��Y�b	����yBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��~�https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962

'�aperf-5.14.0-570.35.1.el9_6.x86_64.rpm(�akernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm%�akernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpm;�apython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm&�akernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm)�artla-5.14.0-570.35.1.el9_6.x86_64.rpm�akernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm#�akernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm+�arv-5.14.0-570.35.1.el9_6.x86_64.rpm$�akernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm
'�aperf-5.14.0-570.35.1.el9_6.x86_64.rpm(�akernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm%�akernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpm;�apython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm&�akernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm)�artla-5.14.0-570.35.1.el9_6.x86_64.rpm�akernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm#�akernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm+�arv-5.14.0-570.35.1.el9_6.x86_64.rpm$�akernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm��}�c	����MBBsecurityModerate: xterm security update���^https://access.redhat.com/errata/RHSA-2025:14075RHSA-2025:14075RHSA-2025:14075https://access.redhat.com/security/cve/CVE-2022-24130CVE-2022-24130CVE-2022-24130https://bugzilla.redhat.com/20486762048676https://errata.almalinux.org/9/ALSA-2025-14075.htmlALSA-2025:14075ALSA-2025:14075
�#�Rxterm-366-12.el9_6.x86_64.rpm�$�Rxterm-resize-366-12.el9_6.x86_64.rpm�#�Rxterm-366-12.el9_6.x86_64.rpm�$�Rxterm-resize-366-12.el9_6.x86_64.rpm�ő�I�d	����RBBBsecurityImportant: libarchive security update��m�}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130
�*�bsdtar-3.5.3-6.el9_6.x86_64.rpm�f�libarchive-devel-3.5.3-6.el9_6.i686.rpm�f�libarchive-devel-3.5.3-6.el9_6.x86_64.rpm�*�bsdtar-3.5.3-6.el9_6.x86_64.rpm�f�libarchive-devel-3.5.3-6.el9_6.i686.rpm�f�libarchive-devel-3.5.3-6.el9_6.x86_64.rpm�ŗ�l�e	�� ��XBBBBBBsecurityImportant: tomcat security update��j�Nhttps://access.redhat.com/errata/RHSA-2025:14181RHSA-2025:14181RHSA-2025:14181https://access.redhat.com/security/cve/CVE-2025-48976CVE-2025-48976CVE-2025-48976https://access.redhat.com/security/cve/CVE-2025-48988CVE-2025-48988CVE-2025-48988https://access.redhat.com/security/cve/CVE-2025-48989CVE-2025-48989CVE-2025-48989https://access.redhat.com/security/cve/CVE-2025-49125CVE-2025-49125CVE-2025-49125https://access.redhat.com/security/cve/CVE-2025-52434CVE-2025-52434CVE-2025-52434https://access.redhat.com/security/cve/CVE-2025-52520CVE-2025-52520CVE-2025-52520https://access.redhat.com/security/cve/CVE-2025-53506CVE-2025-53506CVE-2025-53506https://bugzilla.redhat.com/23730152373015https://bugzilla.redhat.com/23730182373018https://bugzilla.redhat.com/23730202373020https://bugzilla.redhat.com/23733092373309https://bugzilla.redhat.com/23793742379374https://bugzilla.redhat.com/23793822379382https://bugzilla.redhat.com/23793862379386https://errata.almalinux.org/9/ALSA-2025-14181.htmlALSA-2025:14181ALSA-2025:14181
��9tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-lib-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-webapps-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-lib-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpm��9tomcat-webapps-9.0.87-3.el9_6.3.noarch.rpm�š�#�f	��%��aBBsecurityImportant: firefox security update��8�Jhttps://access.redhat.com/errata/RHSA-2025:14416RHSA-2025:14416RHSA-2025:14416https://access.redhat.com/security/cve/CVE-2025-9179CVE-2025-9179CVE-2025-9179https://access.redhat.com/security/cve/CVE-2025-9180CVE-2025-9180CVE-2025-9180https://access.redhat.com/security/cve/CVE-2025-9181CVE-2025-9181CVE-2025-9181https://access.redhat.com/security/cve/CVE-2025-9182CVE-2025-9182CVE-2025-9182https://access.redhat.com/security/cve/CVE-2025-9185CVE-2025-9185CVE-2025-9185https://bugzilla.redhat.com/23895752389575https://bugzilla.redhat.com/23895802389580https://bugzilla.redhat.com/23895812389581https://bugzilla.redhat.com/23895832389583https://bugzilla.redhat.com/23895842389584https://errata.almalinux.org/9/ALSA-2025-14416.htmlALSA-2025:14416ALSA-2025:14416
8�firefox-128.14.0-2.el9_6.alma.1.x86_64.rpmP�firefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpm8�firefox-128.14.0-2.el9_6.alma.1.x86_64.rpmP�firefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpm��t�g	��9��fBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update���!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420

+�brv-5.14.0-570.37.1.el9_6.x86_64.rpm$�bkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%�bkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm)�brtla-5.14.0-570.37.1.el9_6.x86_64.rpm#�bkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm(�bkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm&�bkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm'�bperf-5.14.0-570.37.1.el9_6.x86_64.rpm�bkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpm;�bpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpm
+�brv-5.14.0-570.37.1.el9_6.x86_64.rpm$�bkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%�bkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm)�brtla-5.14.0-570.37.1.el9_6.x86_64.rpm#�bkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm(�bkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm&�bkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm'�bperf-5.14.0-570.37.1.el9_6.x86_64.rpm�bkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpm;�bpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpm��s�h	���g�S�|��GBBBBBBBsecurityImportant: nodejs:20 security update��#�Khttps://access.redhat.com/errata/RHSA-2025:1443RHSA-2025:1443RHSA-2025:1443https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23083CVE-2025-23083CVE-2025-23083https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23393922339392https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1443.htmlALSA-2025:1443ALSA-2025:1443
,�Q�Y*e�)nodejs-full-i18n-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm,�)nodejs-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�znodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm>�)nodejs-docs-20.18.2-1.module_el9.5.0+137+381f3eaf.noarch.rpmd�)npm-10.8.2-1.20.18.2.1.module_el9.5.0+137+381f3eaf.x86_64.rpm�
�&nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm�#�)nodejs-devel-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm,�Q�Y*e�)nodejs-full-i18n-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm,�)nodejs-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpml�Tnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm�	�znodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm>�)nodejs-docs-20.18.2-1.module_el9.5.0+137+381f3eaf.noarch.rpmd�)npm-10.8.2-1.20.18.2.1.module_el9.5.0+137+381f3eaf.x86_64.rpm�
�&nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm�#�)nodejs-devel-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm����4�i	��
�tBB��OBBBBBBBsecurityModerate: nodejs:18 security update��n�whttps://access.redhat.com/errata/RHSA-2025:1446RHSA-2025:1446RHSA-2025:1446https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1446.htmlALSA-2025:1446ALSA-2025:1446
,��a*>�%nodejs-docs-18.20.6-1.module_el9.5.0+136+92f38f3c.noarch.rpmd�(npm-10.8.2-1.18.20.6.1.module_el9.5.0+136+92f38f3c.x86_64.rpm,�%nodejs-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm�#�%nodejs-devel-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpml�*nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpme�%nodejs-full-i18n-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm�	�'nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpm�
�&nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm,��a*>�%nodejs-docs-18.20.6-1.module_el9.5.0+136+92f38f3c.noarch.rpmd�(npm-10.8.2-1.18.20.6.1.module_el9.5.0+136+92f38f3c.x86_64.rpm,�%nodejs-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm�#�%nodejs-devel-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpml�*nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpme�%nodejs-full-i18n-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm�	�'nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpm�
�&nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm����O�j	����NsecurityImportant: aide security update��e�dhttps://access.redhat.com/errata/RHSA-2025:14493RHSA-2025:14493RHSA-2025:14493https://access.redhat.com/security/cve/CVE-2025-54389CVE-2025-54389CVE-2025-54389https://bugzilla.redhat.com/23880192388019https://errata.almalinux.org/9/ALSA-2025-14493.htmlALSA-2025:14493ALSA-2025:14493
�m�<aide-0.16-103.el9_6.2.x86_64.rpm�m�<aide-0.16-103.el9_6.2.x86_64.rpm��T�k	����QsecurityImportant: thunderbird security update��I�https://access.redhat.com/errata/RHSA-2025:14640RHSA-2025:14640RHSA-2025:14640https://access.redhat.com/security/cve/CVE-2025-9179CVE-2025-9179CVE-2025-9179https://access.redhat.com/security/cve/CVE-2025-9180CVE-2025-9180CVE-2025-9180https://access.redhat.com/security/cve/CVE-2025-9181CVE-2025-9181CVE-2025-9181https://access.redhat.com/security/cve/CVE-2025-9182CVE-2025-9182CVE-2025-9182https://access.redhat.com/security/cve/CVE-2025-9185CVE-2025-9185CVE-2025-9185https://bugzilla.redhat.com/23895752389575https://bugzilla.redhat.com/23895802389580https://bugzilla.redhat.com/23895812389581https://bugzilla.redhat.com/23895832389583https://bugzilla.redhat.com/23895842389584https://errata.almalinux.org/9/ALSA-2025-14640.htmlALSA-2025:14640ALSA-2025:14640
9�thunderbird-128.14.0-3.el9_6.alma.1.x86_64.rpm9�thunderbird-128.14.0-3.el9_6.alma.1.x86_64.rpm����b�l	��1�lBBB�OBBB��UBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update��b�Nhttps://access.redhat.com/errata/RHSA-2025:14827RHSA-2025:14827RHSA-2025:14827https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14827.htmlALSA-2025:14827ALSA-2025:14827
Z�_�>*�L�fpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm�zpostgresql-pltcl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�zpostgresql-private-libs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�azpostgresql-upgrade-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�_zpostgresql-static-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�zpostgresql-upgrade-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�zpostgresql-plperl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�zpostgresql-plpython3-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�]zpostgresql-private-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�zpostgresql-server-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�9zpostgresql-test-rpm-macros-16.10-1.module_el9.6.0+174+80cb77f0.noarch.rpm�\zpostgresql-docs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�Y�npg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm�zpostgresql-contrib-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�`zpostgresql-test-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmZzpostgresql-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�^zpostgresql-server-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmZ�_�>*�L�fpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm�zpostgresql-pltcl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�zpostgresql-private-libs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�azpostgresql-upgrade-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�_zpostgresql-static-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�zpostgresql-upgrade-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�zpostgresql-plperl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�zpostgresql-plpython3-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�]zpostgresql-private-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�zpostgresql-server-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�9zpostgresql-test-rpm-macros-16.10-1.module_el9.6.0+174+80cb77f0.noarch.rpm�\zpostgresql-docs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�Y�npg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm�zpostgresql-contrib-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�`zpostgresql-test-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmZzpostgresql-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm�^zpostgresql-server-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm��ƈ;�m	���hBBB�WB��qBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update��0�Nhttps://access.redhat.com/errata/RHSA-2025:14862RHSA-2025:14862RHSA-2025:14862https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14862.htmlALSA-2025:14862ALSA-2025:14862
Z�L�=*�spostgresql-private-libs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�Y�mpg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm�\spostgresql-docs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�^spostgresql-server-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-upgrade-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmZspostgresql-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�]spostgresql-private-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�`spostgresql-test-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�9spostgresql-test-rpm-macros-15.14-1.module_el9.6.0+176+c508cfa2.noarch.rpm�spostgresql-contrib-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-plpython3-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-server-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-plperl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-pltcl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�_spostgresql-static-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�aspostgresql-upgrade-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmZ�L�=*�spostgresql-private-libs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�Y�mpg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm�\spostgresql-docs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�^spostgresql-server-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-upgrade-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmZspostgresql-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�]spostgresql-private-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�`spostgresql-test-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�9spostgresql-test-rpm-macros-15.14-1.module_el9.6.0+176+c508cfa2.noarch.rpm�spostgresql-contrib-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-plpython3-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-server-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-plperl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�spostgresql-pltcl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�_spostgresql-static-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm�aspostgresql-upgrade-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm��ۓ*�n	�� ��PBBBBBBBBBBBBBBsecurityImportant: postgresql security update��~�Nhttps://access.redhat.com/errata/RHSA-2025:14878RHSA-2025:14878RHSA-2025:14878https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14878.htmlALSA-2025:14878ALSA-2025:14878
��>postgresql-plpython3-13.22-1.el9_6.x86_64.rpm��>postgresql-upgrade-13.22-1.el9_6.x86_64.rpm��>postgresql-server-13.22-1.el9_6.x86_64.rpm��>postgresql-pltcl-13.22-1.el9_6.x86_64.rpm��>postgresql-plperl-13.22-1.el9_6.x86_64.rpm��>postgresql-private-libs-13.22-1.el9_6.x86_64.rpm��>postgresql-contrib-13.22-1.el9_6.x86_64.rpmZ�>postgresql-13.22-1.el9_6.x86_64.rpm��>postgresql-plpython3-13.22-1.el9_6.x86_64.rpm��>postgresql-upgrade-13.22-1.el9_6.x86_64.rpm��>postgresql-server-13.22-1.el9_6.x86_64.rpm��>postgresql-pltcl-13.22-1.el9_6.x86_64.rpm��>postgresql-plperl-13.22-1.el9_6.x86_64.rpm��>postgresql-private-libs-13.22-1.el9_6.x86_64.rpm��>postgresql-contrib-13.22-1.el9_6.x86_64.rpmZ�>postgresql-13.22-1.el9_6.x86_64.rpm��Śg�o	��#��asecurityModerate: mod_http2 security update��L�Vhttps://access.redhat.com/errata/RHSA-2025:14983RHSA-2025:14983RHSA-2025:14983https://access.redhat.com/security/cve/CVE-2025-49630CVE-2025-49630CVE-2025-49630https://bugzilla.redhat.com/23745782374578https://errata.almalinux.org/9/ALSA-2025-14983.htmlALSA-2025:14983ALSA-2025:14983
�K�Fmod_http2-2.0.26-4.el9_6.1.x86_64.rpm�K�Fmod_http2-2.0.26-4.el9_6.1.x86_64.rpm��ے�p	��.��dBBBBBBBBsecurityModerate: python3.12 security update��"�;https://access.redhat.com/errata/RHSA-2025:15007RHSA-2025:15007RHSA-2025:15007https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15007.htmlALSA-2025:15007ALSA-2025:15007
��=python3.12-devel-3.12.9-1.el9_6.2.x86_64.rpm��=python3.12-3.12.9-1.el9_6.2.x86_64.rpm��=python3.12-libs-3.12.9-1.el9_6.2.i686.rpm��=python3.12-devel-3.12.9-1.el9_6.2.i686.rpm��=python3.12-libs-3.12.9-1.el9_6.2.x86_64.rpm��=python3.12-tkinter-3.12.9-1.el9_6.2.x86_64.rpm��=python3.12-devel-3.12.9-1.el9_6.2.x86_64.rpm��=python3.12-3.12.9-1.el9_6.2.x86_64.rpm��=python3.12-libs-3.12.9-1.el9_6.2.i686.rpm��=python3.12-devel-3.12.9-1.el9_6.2.i686.rpm��=python3.12-libs-3.12.9-1.el9_6.2.x86_64.rpm��=python3.12-tkinter-3.12.9-1.el9_6.2.x86_64.rpm���$�q	��9��oBBBBBBBBsecurityModerate: python3.11 security update��]�;https://access.redhat.com/errata/RHSA-2025:15010RHSA-2025:15010RHSA-2025:15010https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15010.htmlALSA-2025:15010ALSA-2025:15010
\�python3.11-libs-3.11.11-2.el9_6.2.x86_64.rpm�P�python3.11-3.11.11-2.el9_6.2.x86_64.rpm\�python3.11-libs-3.11.11-2.el9_6.2.i686.rpm�Q�python3.11-tkinter-3.11.11-2.el9_6.2.x86_64.rpm[�python3.11-devel-3.11.11-2.el9_6.2.x86_64.rpm[�python3.11-devel-3.11.11-2.el9_6.2.i686.rpm\�python3.11-libs-3.11.11-2.el9_6.2.x86_64.rpm�P�python3.11-3.11.11-2.el9_6.2.x86_64.rpm\�python3.11-libs-3.11.11-2.el9_6.2.i686.rpm�Q�python3.11-tkinter-3.11.11-2.el9_6.2.x86_64.rpm[�python3.11-devel-3.11.11-2.el9_6.2.x86_64.rpm[�python3.11-devel-3.11.11-2.el9_6.2.i686.rpm��� �r	��
��zBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update���https://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011
https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684
;�cpython3-perf-5.14.0-570.39.1.el9_6.x86_64.rpm(�ckernel-headers-5.14.0-570.39.1.el9_6.x86_64.rpm+�crv-5.14.0-570.39.1.el9_6.x86_64.rpm#�ckernel-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm)�crtla-5.14.0-570.39.1.el9_6.x86_64.rpm$�ckernel-debug-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm%�ckernel-devel-5.14.0-570.39.1.el9_6.x86_64.rpm�ckernel-doc-5.14.0-570.39.1.el9_6.noarch.rpm&�ckernel-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm'�cperf-5.14.0-570.39.1.el9_6.x86_64.rpm
;�cpython3-perf-5.14.0-570.39.1.el9_6.x86_64.rpm(�ckernel-headers-5.14.0-570.39.1.el9_6.x86_64.rpm+�crv-5.14.0-570.39.1.el9_6.x86_64.rpm#�ckernel-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm)�crtla-5.14.0-570.39.1.el9_6.x86_64.rpm$�ckernel-debug-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm%�ckernel-devel-5.14.0-570.39.1.el9_6.x86_64.rpm�ckernel-doc-5.14.0-570.39.1.el9_6.noarch.rpm&�ckernel-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm'�cperf-5.14.0-570.39.1.el9_6.x86_64.rpm���#�s	����NBBBBBBBBBsecurityImportant: udisks2 security update��/�https://access.redhat.com/errata/RHSA-2025:15018RHSA-2025:15018RHSA-2025:15018https://access.redhat.com/security/cve/CVE-2025-8067CVE-2025-8067CVE-2025-8067https://bugzilla.redhat.com/23886232388623https://errata.almalinux.org/9/ALSA-2025-15018.htmlALSA-2025:15018ALSA-2025:15018
�f�}libudisks2-2.9.4-11.el9_6.1.i686.rpm�m�}udisks2-iscsi-2.9.4-11.el9_6.1.x86_64.rpm�n�}udisks2-lsm-2.9.4-11.el9_6.1.x86_64.rpm�f�}libudisks2-2.9.4-11.el9_6.1.x86_64.rpm�l�}udisks2-2.9.4-11.el9_6.1.x86_64.rpm�o�}udisks2-lvm2-2.9.4-11.el9_6.1.x86_64.rpm�f�}libudisks2-2.9.4-11.el9_6.1.i686.rpm�m�}udisks2-iscsi-2.9.4-11.el9_6.1.x86_64.rpm�n�}udisks2-lsm-2.9.4-11.el9_6.1.x86_64.rpm�f�}libudisks2-2.9.4-11.el9_6.1.x86_64.rpm�l�}udisks2-2.9.4-11.el9_6.1.x86_64.rpm�o�}udisks2-lvm2-2.9.4-11.el9_6.1.x86_64.rpm���X�t	�� ��ZBBBBsecurityModerate: python3.9 security update��E�;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019
�+�
python3-tkinter-3.9.21-2.el9_6.2.x86_64.rpmf�
python-unversioned-command-3.9.21-2.el9_6.2.noarch.rpmQ�
python3-devel-3.9.21-2.el9_6.2.i686.rpmQ�
python3-devel-3.9.21-2.el9_6.2.x86_64.rpm�+�
python3-tkinter-3.9.21-2.el9_6.2.x86_64.rpmf�
python-unversioned-command-3.9.21-2.el9_6.2.noarch.rpmQ�
python3-devel-3.9.21-2.el9_6.2.i686.rpmQ�
python3-devel-3.9.21-2.el9_6.2.x86_64.rpm����u	��5��aBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security update���Mhttps://access.redhat.com/errata/RHSA-2025:15023RHSA-2025:15023RHSA-2025:15023https://access.redhat.com/security/cve/CVE-2024-47252CVE-2024-47252CVE-2024-47252https://access.redhat.com/security/cve/CVE-2025-23048CVE-2025-23048CVE-2025-23048https://access.redhat.com/security/cve/CVE-2025-49812CVE-2025-49812CVE-2025-49812https://bugzilla.redhat.com/23745712374571https://bugzilla.redhat.com/23745762374576https://bugzilla.redhat.com/23745802374580https://errata.almalinux.org/9/ALSA-2025-15023.htmlALSA-2025:15023ALSA-2025:15023
�O�#mod_proxy_html-2.4.62-4.el9_6.4.x86_64.rpm�B�thttpd-devel-2.4.62-4.el9_6.4.x86_64.rpm�N�tmod_lua-2.4.62-4.el9_6.4.x86_64.rpm�C�thttpd-tools-2.4.62-4.el9_6.4.x86_64.rpm�}�thttpd-filesystem-2.4.62-4.el9_6.4.noarch.rpm�P�tmod_session-2.4.62-4.el9_6.4.x86_64.rpm�Q�#mod_ssl-2.4.62-4.el9_6.4.x86_64.rpm�@�thttpd-2.4.62-4.el9_6.4.x86_64.rpm�A�thttpd-core-2.4.62-4.el9_6.4.x86_64.rpm�M�tmod_ldap-2.4.62-4.el9_6.4.x86_64.rpm�~�thttpd-manual-2.4.62-4.el9_6.4.noarch.rpm�O�#mod_proxy_html-2.4.62-4.el9_6.4.x86_64.rpm�B�thttpd-devel-2.4.62-4.el9_6.4.x86_64.rpm�N�tmod_lua-2.4.62-4.el9_6.4.x86_64.rpm�C�thttpd-tools-2.4.62-4.el9_6.4.x86_64.rpm�}�thttpd-filesystem-2.4.62-4.el9_6.4.noarch.rpm�P�tmod_session-2.4.62-4.el9_6.4.x86_64.rpm�Q�#mod_ssl-2.4.62-4.el9_6.4.x86_64.rpm�@�thttpd-2.4.62-4.el9_6.4.x86_64.rpm�A�thttpd-core-2.4.62-4.el9_6.4.x86_64.rpm�M�tmod_ldap-2.4.62-4.el9_6.4.x86_64.rpm�~�thttpd-manual-2.4.62-4.el9_6.4.noarch.rpm���Y�v	��;��vBBBsecurityImportant: pam security update��M�phttps://access.redhat.com/errata/RHSA-2025:15099RHSA-2025:15099RHSA-2025:15099https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://access.redhat.com/security/cve/CVE-2025-8941CVE-2025-8941CVE-2025-8941https://bugzilla.redhat.com/23725122372512https://bugzilla.redhat.com/23882202388220https://errata.almalinux.org/9/ALSA-2025-15099.htmlALSA-2025:15099ALSA-2025:15099
��gpam-devel-1.5.1-26.el9_6.i686.rpm��gpam-devel-1.5.1-26.el9_6.x86_64.rpm�J�gpam-docs-1.5.1-26.el9_6.x86_64.rpm��gpam-devel-1.5.1-26.el9_6.i686.rpm��gpam-devel-1.5.1-26.el9_6.x86_64.rpm�J�gpam-docs-1.5.1-26.el9_6.x86_64.rpm����w	����|BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��=�Whttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429

�dkernel-doc-5.14.0-570.41.1.el9_6.noarch.rpm)�drtla-5.14.0-570.41.1.el9_6.x86_64.rpm(�dkernel-headers-5.14.0-570.41.1.el9_6.x86_64.rpm#�dkernel-debug-devel-5.14.0-570.41.1.el9_6.x86_64.rpm+�drv-5.14.0-570.41.1.el9_6.x86_64.rpm'�dperf-5.14.0-570.41.1.el9_6.x86_64.rpm&�dkernel-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpm;�dpython3-perf-5.14.0-570.41.1.el9_6.x86_64.rpm%�dkernel-devel-5.14.0-570.41.1.el9_6.x86_64.rpm$�dkernel-debug-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpm
�dkernel-doc-5.14.0-570.41.1.el9_6.noarch.rpm)�drtla-5.14.0-570.41.1.el9_6.x86_64.rpm(�dkernel-headers-5.14.0-570.41.1.el9_6.x86_64.rpm#�dkernel-debug-devel-5.14.0-570.41.1.el9_6.x86_64.rpm+�drv-5.14.0-570.41.1.el9_6.x86_64.rpm'�dperf-5.14.0-570.41.1.el9_6.x86_64.rpm&�dkernel-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpm;�dpython3-perf-5.14.0-570.41.1.el9_6.x86_64.rpm%�dkernel-devel-5.14.0-570.41.1.el9_6.x86_64.rpm$�dkernel-debug-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpm�Ɵ�'�x	����PsecurityImportant: python3.12-cryptography security update���5https://access.redhat.com/errata/RHSA-2025:15608RHSA-2025:15608RHSA-2025:15608https://access.redhat.com/security/cve/CVE-2024-26130CVE-2024-26130CVE-2024-26130https://bugzilla.redhat.com/22696172269617https://errata.almalinux.org/9/ALSA-2025-15608.htmlALSA-2025:15608ALSA-2025:15608
��!python3.12-cryptography-41.0.7-2.el9_6.1.x86_64.rpm��!python3.12-cryptography-41.0.7-2.el9_6.1.x86_64.rpm�Ɔ��y	��&��SBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��I�
https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661

(�ekernel-headers-5.14.0-570.42.2.el9_6.x86_64.rpm)�ertla-5.14.0-570.42.2.el9_6.x86_64.rpm$�ekernel-debug-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm+�erv-5.14.0-570.42.2.el9_6.x86_64.rpm;�epython3-perf-5.14.0-570.42.2.el9_6.x86_64.rpm#�ekernel-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm'�eperf-5.14.0-570.42.2.el9_6.x86_64.rpm&�ekernel-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm�ekernel-doc-5.14.0-570.42.2.el9_6.noarch.rpm%�ekernel-devel-5.14.0-570.42.2.el9_6.x86_64.rpm
(�ekernel-headers-5.14.0-570.42.2.el9_6.x86_64.rpm)�ertla-5.14.0-570.42.2.el9_6.x86_64.rpm$�ekernel-debug-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm+�erv-5.14.0-570.42.2.el9_6.x86_64.rpm;�epython3-perf-5.14.0-570.42.2.el9_6.x86_64.rpm#�ekernel-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm'�eperf-5.14.0-570.42.2.el9_6.x86_64.rpm&�ekernel-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm�ekernel-doc-5.14.0-570.42.2.el9_6.noarch.rpm%�ekernel-devel-5.14.0-570.42.2.el9_6.x86_64.rpm�Ƥ�Q�z	��5��gBBBBBBBBBBBBsecurityImportant: cups security update��c�
https://access.redhat.com/errata/RHSA-2025:15700RHSA-2025:15700RHSA-2025:15700https://access.redhat.com/security/cve/CVE-2025-58060CVE-2025-58060CVE-2025-58060https://access.redhat.com/security/cve/CVE-2025-58364CVE-2025-58364CVE-2025-58364https://bugzilla.redhat.com/23925952392595https://bugzilla.redhat.com/23930782393078https://errata.almalinux.org/9/ALSA-2025-15700.htmlALSA-2025:15700ALSA-2025:15700
�+�icups-2.3.3op2-33.el9_6.1.x86_64.rpm�,�icups-client-2.3.3op2-33.el9_6.1.x86_64.rpm�/�icups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpm�-�icups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm�f�icups-devel-2.3.3op2-33.el9_6.1.i686.rpm��icups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm�f�icups-devel-2.3.3op2-33.el9_6.1.x86_64.rpm�.�icups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpm�+�icups-2.3.3op2-33.el9_6.1.x86_64.rpm�,�icups-client-2.3.3op2-33.el9_6.1.x86_64.rpm�/�icups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpm�-�icups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm�f�icups-devel-2.3.3op2-33.el9_6.1.i686.rpm��icups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm�f�icups-devel-2.3.3op2-33.el9_6.1.x86_64.rpm�.�icups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpm���V�{	��	��vBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��p�https://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740

&�fkernel-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm$�fkernel-debug-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm�fkernel-doc-5.14.0-570.44.1.el9_6.noarch.rpm)�frtla-5.14.0-570.44.1.el9_6.x86_64.rpm(�fkernel-headers-5.14.0-570.44.1.el9_6.x86_64.rpm#�fkernel-debug-devel-5.14.0-570.44.1.el9_6.x86_64.rpm%�fkernel-devel-5.14.0-570.44.1.el9_6.x86_64.rpm'�fperf-5.14.0-570.44.1.el9_6.x86_64.rpm;�fpython3-perf-5.14.0-570.44.1.el9_6.x86_64.rpm+�frv-5.14.0-570.44.1.el9_6.x86_64.rpm
&�fkernel-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm$�fkernel-debug-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm�fkernel-doc-5.14.0-570.44.1.el9_6.noarch.rpm)�frtla-5.14.0-570.44.1.el9_6.x86_64.rpm(�fkernel-headers-5.14.0-570.44.1.el9_6.x86_64.rpm#�fkernel-debug-devel-5.14.0-570.44.1.el9_6.x86_64.rpm%�fkernel-devel-5.14.0-570.44.1.el9_6.x86_64.rpm'�fperf-5.14.0-570.44.1.el9_6.x86_64.rpm;�fpython3-perf-5.14.0-570.44.1.el9_6.x86_64.rpm+�frv-5.14.0-570.44.1.el9_6.x86_64.rpm��ԃ:�|	����JsecurityModerate: opentelemetry-collector security update��p�https://access.redhat.com/errata/RHSA-2025:15887RHSA-2025:15887RHSA-2025:15887https://access.redhat.com/security/cve/CVE-2025-4673CVE-2025-4673CVE-2025-4673https://bugzilla.redhat.com/23733052373305https://errata.almalinux.org/9/ALSA-2025-15887.htmlALSA-2025:15887ALSA-2025:15887
�I�8opentelemetry-collector-0.127.0-2.el9_6.x86_64.rpm�I�8opentelemetry-collector-0.127.0-2.el9_6.x86_64.rpm�Ư�z�}	����MBBBBBBBsecurityImportant: podman security update���fhttps://access.redhat.com/errata/RHSA-2025:15900RHSA-2025:15900RHSA-2025:15900https://access.redhat.com/security/cve/CVE-2025-9566CVE-2025-9566CVE-2025-9566https://bugzilla.redhat.com/23931522393152https://errata.almalinux.org/9/ALSA-2025-15900.htmlALSA-2025:15900ALSA-2025:15900
h�,podman-docker-5.4.0-13.el9_6.noarch.rpm�2�,podman-plugins-5.4.0-13.el9_6.x86_64.rpm�1�,podman-5.4.0-13.el9_6.x86_64.rpm�4�,podman-tests-5.4.0-13.el9_6.x86_64.rpm�3�,podman-remote-5.4.0-13.el9_6.x86_64.rpmh�,podman-docker-5.4.0-13.el9_6.noarch.rpm�2�,podman-plugins-5.4.0-13.el9_6.x86_64.rpm�1�,podman-5.4.0-13.el9_6.x86_64.rpm�4�,podman-tests-5.4.0-13.el9_6.x86_64.rpm�3�,podman-remote-5.4.0-13.el9_6.x86_64.rpm���~�~	��$�CBBBBBBBBBB��KBBBBBBBBBBBsecurityModerate: mysql:8.4 security update��g�	khttps://access.redhat.com/errata/RHSA-2025:16046RHSA-2025:16046RHSA-2025:16046https://access.redhat.com/security/cve/CVE-2024-13176CVE-2024-13176CVE-2024-13176https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-21588CVE-2025-21588CVE-2025-21588https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-5399CVE-2025-5399CVE-2025-5399https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599112359911https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23709202370920https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16046.htmlALSA-2025:16046ALSA-2025:16046
�V�;�e*�R�mysql-server-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-errmsg-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm�L�mysql-libs-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��mysql-common-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm��Pmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��Imecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��Pmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-test-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��Imecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm�V�mysql-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��mysql-devel-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm�Y�mysql-test-data-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm�|�rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm�V�;�e*�R�mysql-server-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-errmsg-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm�L�mysql-libs-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��mysql-common-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm��Pmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��Imecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��Pmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-test-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��Imecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm�V�mysql-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm��mysql-devel-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm�Y�mysql-test-data-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm�|�rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm�Ư�h�	��/��eBBBBBBBBsecurityModerate: mysql security update��p�hhttps://access.redhat.com/errata/RHSA-2025:16086RHSA-2025:16086RHSA-2025:16086https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-53023CVE-2025-53023CVE-2025-53023https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803112380311https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16086.htmlALSA-2025:16086ALSA-2025:16086
�R�umysql-server-8.0.43-1.el9_6.x86_64.rpm��umysql-errmsg-8.0.43-1.el9_6.x86_64.rpm�L�umysql-libs-8.0.43-1.el9_6.x86_64.rpm��umysql-common-8.0.43-1.el9_6.x86_64.rpm�V�umysql-8.0.43-1.el9_6.x86_64.rpm�R�umysql-server-8.0.43-1.el9_6.x86_64.rpm��umysql-errmsg-8.0.43-1.el9_6.x86_64.rpm�L�umysql-libs-8.0.43-1.el9_6.x86_64.rpm��umysql-common-8.0.43-1.el9_6.x86_64.rpm�V�umysql-8.0.43-1.el9_6.x86_64.rpm���p�	��4��pBBsecurityImportant: firefox security update��v�Rhttps://access.redhat.com/errata/RHSA-2025:16108RHSA-2025:16108RHSA-2025:16108https://access.redhat.com/security/cve/CVE-2025-10527CVE-2025-10527CVE-2025-10527https://access.redhat.com/security/cve/CVE-2025-10528CVE-2025-10528CVE-2025-10528https://access.redhat.com/security/cve/CVE-2025-10529CVE-2025-10529CVE-2025-10529https://access.redhat.com/security/cve/CVE-2025-10532CVE-2025-10532CVE-2025-10532https://access.redhat.com/security/cve/CVE-2025-10533CVE-2025-10533CVE-2025-10533https://access.redhat.com/security/cve/CVE-2025-10536CVE-2025-10536CVE-2025-10536https://access.redhat.com/security/cve/CVE-2025-10537CVE-2025-10537CVE-2025-10537https://bugzilla.redhat.com/23957452395745https://bugzilla.redhat.com/23957542395754https://bugzilla.redhat.com/23957552395755https://bugzilla.redhat.com/23957562395756https://bugzilla.redhat.com/23957592395759https://bugzilla.redhat.com/23957642395764https://bugzilla.redhat.com/23957662395766https://errata.almalinux.org/9/ALSA-2025-16108.htmlALSA-2025:16108ALSA-2025:16108
8�rfirefox-140.3.0-1.el9_6.alma.1.x86_64.rpmP�rfirefox-x11-140.3.0-1.el9_6.alma.1.x86_64.rpm8�rfirefox-140.3.0-1.el9_6.alma.1.x86_64.rpmP�rfirefox-x11-140.3.0-1.el9_6.alma.1.x86_64.rpm���Q�	����uBBBBBBBBBsecurityModerate: gnutls security, bug fix, and enhancement update��H�
https://access.redhat.com/errata/RHSA-2025:16116RHSA-2025:16116RHSA-2025:16116https://access.redhat.com/security/cve/CVE-2025-32988CVE-2025-32988CVE-2025-32988https://access.redhat.com/security/cve/CVE-2025-32989CVE-2025-32989CVE-2025-32989https://access.redhat.com/security/cve/CVE-2025-32990CVE-2025-32990CVE-2025-32990https://access.redhat.com/security/cve/CVE-2025-6395CVE-2025-6395CVE-2025-6395https://bugzilla.redhat.com/23596202359620https://bugzilla.redhat.com/23596212359621https://bugzilla.redhat.com/23596222359622https://bugzilla.redhat.com/23767552376755https://errata.almalinux.org/9/ALSA-2025-16116.htmlALSA-2025:16116ALSA-2025:16116
�a�gnutls-c++-3.8.3-6.el9_6.2.x86_64.rpm�c�gnutls-devel-3.8.3-6.el9_6.2.i686.rpm�b�gnutls-dane-3.8.3-6.el9_6.2.x86_64.rpm�)�gnutls-utils-3.8.3-6.el9_6.2.x86_64.rpm�c�gnutls-devel-3.8.3-6.el9_6.2.x86_64.rpm�b�gnutls-dane-3.8.3-6.el9_6.2.i686.rpm�a�gnutls-c++-3.8.3-6.el9_6.2.i686.rpm�a�gnutls-c++-3.8.3-6.el9_6.2.x86_64.rpm�c�gnutls-devel-3.8.3-6.el9_6.2.i686.rpm�b�gnutls-dane-3.8.3-6.el9_6.2.x86_64.rpm�)�gnutls-utils-3.8.3-6.el9_6.2.x86_64.rpm�c�gnutls-devel-3.8.3-6.el9_6.2.x86_64.rpm�b�gnutls-dane-3.8.3-6.el9_6.2.i686.rpm�a�gnutls-c++-3.8.3-6.el9_6.2.i686.rpm����	���N�hB��LBBBBBBBBBBBsecurityImportant: nodejs:22 security update��Y�Khttps://access.redhat.com/errata/RHSA-2025:1613RHSA-2025:1613RHSA-2025:1613https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23083CVE-2025-23083CVE-2025-23083https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23393922339392https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1613.htmlALSA-2025:1613ALSA-2025:1613
,��a*
,�nodejs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm�M�v8-12.4-devel-12.4.254.21-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm��nodejs-libs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm�
�{nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpml�*nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpm>�nodejs-docs-22.13.1-1.module_el9.5.0+139+09296491.noarch.rpm�#�nodejs-devel-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm�	�'nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpme�nodejs-full-i18n-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmd�.npm-10.9.2-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm,��a*
,�nodejs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm�M�v8-12.4-devel-12.4.254.21-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm��nodejs-libs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm�
�{nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpml�*nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpm>�nodejs-docs-22.13.1-1.module_el9.5.0+139+09296491.noarch.rpm�#�nodejs-devel-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm�	�'nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpme�nodejs-full-i18n-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmd�.npm-10.9.2-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm����7�	����OsecurityImportant: thunderbird security update��$�!https://access.redhat.com/errata/RHSA-2025:16156RHSA-2025:16156RHSA-2025:16156https://access.redhat.com/security/cve/CVE-2025-10527CVE-2025-10527CVE-2025-10527https://access.redhat.com/security/cve/CVE-2025-10528CVE-2025-10528CVE-2025-10528https://access.redhat.com/security/cve/CVE-2025-10529CVE-2025-10529CVE-2025-10529https://access.redhat.com/security/cve/CVE-2025-10532CVE-2025-10532CVE-2025-10532https://access.redhat.com/security/cve/CVE-2025-10533CVE-2025-10533CVE-2025-10533https://access.redhat.com/security/cve/CVE-2025-10536CVE-2025-10536CVE-2025-10536https://access.redhat.com/security/cve/CVE-2025-10537CVE-2025-10537CVE-2025-10537https://bugzilla.redhat.com/23957452395745https://bugzilla.redhat.com/23957542395754https://bugzilla.redhat.com/23957552395755https://bugzilla.redhat.com/23957562395756https://bugzilla.redhat.com/23957592395759https://bugzilla.redhat.com/23957642395764https://bugzilla.redhat.com/23957662395766https://errata.almalinux.org/9/ALSA-2025-16156.htmlALSA-2025:16156ALSA-2025:16156
9�rthunderbird-140.3.0-1.el9_6.alma.1.x86_64.rpm9�rthunderbird-140.3.0-1.el9_6.alma.1.x86_64.rpm����
�	��%��RBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��E�
https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398

&�gkernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm)�grtla-5.14.0-570.46.1.el9_6.x86_64.rpm%�gkernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm'�gperf-5.14.0-570.46.1.el9_6.x86_64.rpm(�gkernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpm�gkernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm$�gkernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm;�gpython3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm#�gkernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm+�grv-5.14.0-570.46.1.el9_6.x86_64.rpm
&�gkernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm)�grtla-5.14.0-570.46.1.el9_6.x86_64.rpm%�gkernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm'�gperf-5.14.0-570.46.1.el9_6.x86_64.rpm(�gkernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpm�gkernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm$�gkernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm;�gpython3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm#�gkernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm+�grv-5.14.0-570.46.1.el9_6.x86_64.rpm���m�	��7��fBBBBBBBBBBBBBBBsecurityModerate: kernel security update��L�https://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:1659
	#�^kernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm%�^kernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpm�^kernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm'�^perf-5.14.0-503.26.1.el9_5.x86_64.rpm+�^rv-5.14.0-503.26.1.el9_5.x86_64.rpm$�^kernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm)�^rtla-5.14.0-503.26.1.el9_5.x86_64.rpm&�^kernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm(�^kernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm	#�^kernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm%�^kernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpm�^kernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm'�^perf-5.14.0-503.26.1.el9_5.x86_64.rpm+�^rv-5.14.0-503.26.1.el9_5.x86_64.rpm$�^kernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm)�^rtla-5.14.0-503.26.1.el9_5.x86_64.rpm&�^kernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm(�^kernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm����@�	����xBBBBBBBBsecurityImportant: bind9.18 security update��]�rhttps://access.redhat.com/errata/RHSA-2025:1670RHSA-2025:1670RHSA-2025:1670https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://access.redhat.com/security/cve/CVE-2024-12705CVE-2024-12705CVE-2024-12705https://bugzilla.redhat.com/23428792342879https://bugzilla.redhat.com/23428802342880https://errata.almalinux.org/9/ALSA-2025-1670.htmlALSA-2025:1670ALSA-2025:1670
�S�qbind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm�U�qbind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm�R�qbind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm�T�qbind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm�Q�qbind9.18-9.18.29-1.el9_5.1.x86_64.rpm�S�qbind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm�U�qbind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm�R�qbind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm�T�qbind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm�Q�qbind9.18-9.18.29-1.el9_5.1.x86_64.rpm���/�	����CBBBBBBsecurityImportant: mysql security update��O�*dhttps://access.redhat.com/errata/RHSA-2025:1671RHSA-2025:1671RHSA-2025:1671https://access.redhat.com/security/cve/CVE-2024-11053CVE-2024-11053CVE-2024-11053https://access.redhat.com/security/cve/CVE-2024-21193CVE-2024-21193CVE-2024-21193https://access.redhat.com/security/cve/CVE-2024-21194CVE-2024-21194CVE-2024-21194https://access.redhat.com/security/cve/CVE-2024-21196CVE-2024-21196CVE-2024-21196https://access.redhat.com/security/cve/CVE-2024-21197CVE-2024-21197CVE-2024-21197https://access.redhat.com/security/cve/CVE-2024-21198CVE-2024-21198CVE-2024-21198https://access.redhat.com/security/cve/CVE-2024-21199CVE-2024-21199CVE-2024-21199https://access.redhat.com/security/cve/CVE-2024-21201CVE-2024-21201CVE-2024-21201https://access.redhat.com/security/cve/CVE-2024-21203CVE-2024-21203CVE-2024-21203https://access.redhat.com/security/cve/CVE-2024-21212CVE-2024-21212CVE-2024-21212https://access.redhat.com/security/cve/CVE-2024-21213CVE-2024-21213CVE-2024-21213https://access.redhat.com/security/cve/CVE-2024-21218CVE-2024-21218CVE-2024-21218https://access.redhat.com/security/cve/CVE-2024-21219CVE-2024-21219CVE-2024-21219https://access.redhat.com/security/cve/CVE-2024-21230CVE-2024-21230CVE-2024-21230https://access.redhat.com/security/cve/CVE-2024-21231CVE-2024-21231CVE-2024-21231https://access.redhat.com/security/cve/CVE-2024-21236CVE-2024-21236CVE-2024-21236https://access.redhat.com/security/cve/CVE-2024-21237CVE-2024-21237CVE-2024-21237https://access.redhat.com/security/cve/CVE-2024-21238CVE-2024-21238CVE-2024-21238https://access.redhat.com/security/cve/CVE-2024-21239CVE-2024-21239CVE-2024-21239https://access.redhat.com/security/cve/CVE-2024-21241CVE-2024-21241CVE-2024-21241https://access.redhat.com/security/cve/CVE-2024-21247CVE-2024-21247CVE-2024-21247https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://access.redhat.com/security/cve/CVE-2024-7264CVE-2024-7264CVE-2024-7264https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-21491CVE-2025-21491CVE-2025-21491https://access.redhat.com/security/cve/CVE-2025-21494CVE-2025-21494CVE-2025-21494https://access.redhat.com/security/cve/CVE-2025-21497CVE-2025-21497CVE-2025-21497https://access.redhat.com/security/cve/CVE-2025-21500CVE-2025-21500CVE-2025-21500https://access.redhat.com/security/cve/CVE-2025-21501CVE-2025-21501CVE-2025-21501https://access.redhat.com/security/cve/CVE-2025-21503CVE-2025-21503CVE-2025-21503https://access.redhat.com/security/cve/CVE-2025-21504CVE-2025-21504CVE-2025-21504https://access.redhat.com/security/cve/CVE-2025-21505CVE-2025-21505CVE-2025-21505https://access.redhat.com/security/cve/CVE-2025-21518CVE-2025-21518CVE-2025-21518https://access.redhat.com/security/cve/CVE-2025-21519CVE-2025-21519CVE-2025-21519https://access.redhat.com/security/cve/CVE-2025-21520CVE-2025-21520CVE-2025-21520https://access.redhat.com/security/cve/CVE-2025-21521CVE-2025-21521CVE-2025-21521https://access.redhat.com/security/cve/CVE-2025-21522CVE-2025-21522CVE-2025-21522https://access.redhat.com/security/cve/CVE-2025-21523CVE-2025-21523CVE-2025-21523https://access.redhat.com/security/cve/CVE-2025-21525CVE-2025-21525CVE-2025-21525https://access.redhat.com/security/cve/CVE-2025-21529CVE-2025-21529CVE-2025-21529https://access.redhat.com/security/cve/CVE-2025-21531CVE-2025-21531CVE-2025-21531https://access.redhat.com/security/cve/CVE-2025-21534CVE-2025-21534CVE-2025-21534https://access.redhat.com/security/cve/CVE-2025-21536CVE-2025-21536CVE-2025-21536https://access.redhat.com/security/cve/CVE-2025-21540CVE-2025-21540CVE-2025-21540https://access.redhat.com/security/cve/CVE-2025-21543CVE-2025-21543CVE-2025-21543https://access.redhat.com/security/cve/CVE-2025-21546CVE-2025-21546CVE-2025-21546https://access.redhat.com/security/cve/CVE-2025-21555CVE-2025-21555CVE-2025-21555https://access.redhat.com/security/cve/CVE-2025-21559CVE-2025-21559CVE-2025-21559https://bugzilla.redhat.com/22945812294581https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/23018882301888https://bugzilla.redhat.com/23188572318857https://bugzilla.redhat.com/23188582318858https://bugzilla.redhat.com/23188702318870https://bugzilla.redhat.com/23188732318873https://bugzilla.redhat.com/23188742318874https://bugzilla.redhat.com/23188762318876https://bugzilla.redhat.com/23188822318882https://bugzilla.redhat.com/23188832318883https://bugzilla.redhat.com/23188842318884https://bugzilla.redhat.com/23188852318885https://bugzilla.redhat.com/23188862318886https://bugzilla.redhat.com/23188972318897https://bugzilla.redhat.com/23189002318900https://bugzilla.redhat.com/23189052318905https://bugzilla.redhat.com/23189142318914https://bugzilla.redhat.com/23189222318922https://bugzilla.redhat.com/23189232318923https://bugzilla.redhat.com/23189252318925https://bugzilla.redhat.com/23189262318926https://bugzilla.redhat.com/23189272318927https://bugzilla.redhat.com/23311912331191https://bugzilla.redhat.com/23392182339218https://bugzilla.redhat.com/23392202339220https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23392262339226https://bugzilla.redhat.com/23392312339231https://bugzilla.redhat.com/23392362339236https://bugzilla.redhat.com/23392382339238https://bugzilla.redhat.com/23392432339243https://bugzilla.redhat.com/23392472339247https://bugzilla.redhat.com/23392522339252https://bugzilla.redhat.com/23392592339259https://bugzilla.redhat.com/23392662339266https://bugzilla.redhat.com/23392702339270https://bugzilla.redhat.com/23392712339271https://bugzilla.redhat.com/23392752339275https://bugzilla.redhat.com/23392772339277https://bugzilla.redhat.com/23392812339281https://bugzilla.redhat.com/23392842339284https://bugzilla.redhat.com/23392912339291https://bugzilla.redhat.com/23392932339293https://bugzilla.redhat.com/23392952339295https://bugzilla.redhat.com/23392992339299https://bugzilla.redhat.com/23393002339300https://bugzilla.redhat.com/23393042339304https://bugzilla.redhat.com/23393052339305https://errata.almalinux.org/9/ALSA-2025-1671.htmlALSA-2025:1671ALSA-2025:1671
�R�\mysql-server-8.0.41-2.el9_5.x86_64.rpm��\mysql-common-8.0.41-2.el9_5.x86_64.rpm��\mysql-errmsg-8.0.41-2.el9_5.x86_64.rpm�V�\mysql-8.0.41-2.el9_5.x86_64.rpm�R�\mysql-server-8.0.41-2.el9_5.x86_64.rpm��\mysql-common-8.0.41-2.el9_5.x86_64.rpm��\mysql-errmsg-8.0.41-2.el9_5.x86_64.rpm�V�\mysql-8.0.41-2.el9_5.x86_64.rpm��݄d�	����LBBBBBBBBBBBsecurityImportant: bind security update��y�Xhttps://access.redhat.com/errata/RHSA-2025:1681RHSA-2025:1681RHSA-2025:1681https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/23428792342879https://errata.almalinux.org/9/ALSA-2025-1681.htmlALSA-2025:1681ALSA-2025:1681
�\�bind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm�'�python3-bind-9.16.23-24.el9_5.3.noarch.rpm�!�bind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm�"�bind-license-9.16.23-24.el9_5.3.noarch.rpm�]�bind-libs-9.16.23-24.el9_5.3.x86_64.rpm�Z�bind-9.16.23-24.el9_5.3.x86_64.rpm�^�bind-utils-9.16.23-24.el9_5.3.x86_64.rpm�[�bind-chroot-9.16.23-24.el9_5.3.x86_64.rpm�\�bind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm�'�python3-bind-9.16.23-24.el9_5.3.noarch.rpm�!�bind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm�"�bind-license-9.16.23-24.el9_5.3.noarch.rpm�]�bind-libs-9.16.23-24.el9_5.3.x86_64.rpm�Z�bind-9.16.23-24.el9_5.3.x86_64.rpm�^�bind-utils-9.16.23-24.el9_5.3.x86_64.rpm�[�bind-chroot-9.16.23-24.el9_5.3.x86_64.rpm��ܴ�		��-��ZBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��Q�ihttps://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880

'�hperf-5.14.0-570.49.1.el9_6.x86_64.rpm$�hkernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm;�hpython3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm+�hrv-5.14.0-570.49.1.el9_6.x86_64.rpm(�hkernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm%�hkernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm#�hkernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm&�hkernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm�hkernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm)�hrtla-5.14.0-570.49.1.el9_6.x86_64.rpm
'�hperf-5.14.0-570.49.1.el9_6.x86_64.rpm$�hkernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm;�hpython3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm+�hrv-5.14.0-570.49.1.el9_6.x86_64.rpm(�hkernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm%�hkernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm#�hkernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm&�hkernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm�hkernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm)�hrtla-5.14.0-570.49.1.el9_6.x86_64.rpm����-�
	����nBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update��:�ghttps://access.redhat.com/errata/RHSA-2025:17084RHSA-2025:17084RHSA-2025:17084https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-17084.htmlALSA-2025:17084ALSA-2025:17084
�d�ipa-server-4.12.2-14.el9_6.5.x86_64.rpm�g�python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpm�|�ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm�i�python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm�d�ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm�e�ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm�<�ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm�h�python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm�=�ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm�e�ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm�a�ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm�b�ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpm�{�ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm�b�ipa-common-4.12.2-14.el9_6.5.noarch.rpm�c�ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm�a�ipa-client-4.12.2-14.el9_6.5.x86_64.rpm�c�ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm�d�ipa-server-4.12.2-14.el9_6.5.x86_64.rpm�g�python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpm�|�ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm�i�python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm�d�ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm�e�ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm�<�ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm�h�python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm�=�ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm�e�ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm�a�ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm�b�ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpm�{�ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm�b�ipa-common-4.12.2-14.el9_6.5.noarch.rpm�c�ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm�a�ipa-client-4.12.2-14.el9_6.5.x86_64.rpm�c�ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm����	����GBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��!�Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377

�ikernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm&�ikernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm(�ikernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm)�irtla-5.14.0-570.51.1.el9_6.x86_64.rpm%�ikernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm$�ikernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm;�ipython3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm#�ikernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm+�irv-5.14.0-570.51.1.el9_6.x86_64.rpm'�iperf-5.14.0-570.51.1.el9_6.x86_64.rpm
�ikernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm&�ikernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm(�ikernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm)�irtla-5.14.0-570.51.1.el9_6.x86_64.rpm%�ikernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm$�ikernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm;�ipython3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm#�ikernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm+�irv-5.14.0-570.51.1.el9_6.x86_64.rpm'�iperf-5.14.0-570.51.1.el9_6.x86_64.rpm�ǝ�N�	��!��[BBBBsecurityImportant: libpq security update��g�Rhttps://access.redhat.com/errata/RHSA-2025:1738RHSA-2025:1738RHSA-2025:1738https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1738.htmlALSA-2025:1738ALSA-2025:1738
�>�-libpq-devel-13.20-1.el9_5.x86_64.rpm�=�-libpq-13.20-1.el9_5.x86_64.rpm�>�-libpq-devel-13.20-1.el9_5.i686.rpm�=�-libpq-13.20-1.el9_5.i686.rpm�>�-libpq-devel-13.20-1.el9_5.x86_64.rpm�=�-libpq-13.20-1.el9_5.x86_64.rpm�>�-libpq-devel-13.20-1.el9_5.i686.rpm�=�-libpq-13.20-1.el9_5.i686.rpm���;�
	��?�hBBB�|B��|BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update��9�'https://access.redhat.com/errata/RHSA-2025:1741RHSA-2025:1741RHSA-2025:1741https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1741.htmlALSA-2025:1741ALSA-2025:1741
Z�L�Z*�rpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�_rpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�`rpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�rpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�9rpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpm�arpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�^rpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�Y�pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm�]rpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmZrpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�\rpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmZ�L�Z*�rpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�_rpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�`rpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�rpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�9rpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpm�arpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�^rpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�Y�pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm�]rpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmZrpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�\rpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm�rpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm����	����@BBBBBBBBBBBBBBsecurityImportant: postgresql security update��`�'https://access.redhat.com/errata/RHSA-2025:1742RHSA-2025:1742RHSA-2025:1742https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1742.htmlALSA-2025:1742ALSA-2025:1742
��-postgresql-server-13.20-1.el9_5.x86_64.rpm��-postgresql-pltcl-13.20-1.el9_5.x86_64.rpmZ�-postgresql-13.20-1.el9_5.x86_64.rpm��-postgresql-private-libs-13.20-1.el9_5.x86_64.rpm��-postgresql-upgrade-13.20-1.el9_5.x86_64.rpm��-postgresql-plpython3-13.20-1.el9_5.x86_64.rpm��-postgresql-plperl-13.20-1.el9_5.x86_64.rpm��-postgresql-contrib-13.20-1.el9_5.x86_64.rpm��-postgresql-server-13.20-1.el9_5.x86_64.rpm��-postgresql-pltcl-13.20-1.el9_5.x86_64.rpmZ�-postgresql-13.20-1.el9_5.x86_64.rpm��-postgresql-private-libs-13.20-1.el9_5.x86_64.rpm��-postgresql-upgrade-13.20-1.el9_5.x86_64.rpm��-postgresql-plpython3-13.20-1.el9_5.x86_64.rpm��-postgresql-plperl-13.20-1.el9_5.x86_64.rpm��-postgresql-contrib-13.20-1.el9_5.x86_64.rpm���s�	����QBBBBBBBBsecurityImportant: open-vm-tools security update���https://access.redhat.com/errata/RHSA-2025:17428RHSA-2025:17428RHSA-2025:17428https://access.redhat.com/security/cve/CVE-2025-41244CVE-2025-41244CVE-2025-41244https://bugzilla.redhat.com/23977522397752https://errata.almalinux.org/9/ALSA-2025-17428.htmlALSA-2025:17428ALSA-2025:17428
�M�oopen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm��oopen-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm�	�oopen-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm�
�oopen-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm��oopen-vm-tools-12.5.0-1.el9_6.2.x86_64.rpm�M�oopen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm��oopen-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm�	�oopen-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm�
�oopen-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm��oopen-vm-tools-12.5.0-1.el9_6.2.x86_64.rpm�Dz��	��9�lBBB�zBBB��rBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update���'https://access.redhat.com/errata/RHSA-2025:1743RHSA-2025:1743RHSA-2025:1743https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1743.htmlALSA-2025:1743ALSA-2025:1743
Z�_�T*�\~postgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�Y�pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�]~postgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�a~postgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�^~postgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�_~postgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�`~postgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�L�pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm�~postgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmZ~postgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�9~postgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm�~postgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmZ�_�T*�\~postgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�Y�pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm�]~postgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�a~postgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�^~postgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�_~postgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�~postgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�`~postgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�L�pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm�~postgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmZ~postgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm�9~postgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm�~postgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm���W�	��<��zsecurityModerate: iputils security update��2�ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558
�^�aiputils-ninfod-20210202-11.el9_6.3.x86_64.rpm�^�aiputils-ninfod-20210202-11.el9_6.3.x86_64.rpm�Dz�^�	����}BBBBsecurityModerate: vim security update���zhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742
�X�vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm�Z�vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm�Y�vim-common-8.2.2637-22.el9_6.1.x86_64.rpm�X�vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm�Z�vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm�Y�vim-common-8.2.2637-22.el9_6.1.x86_64.rpm�ǹ�	�	����DBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update���d
https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760

)�jrtla-5.14.0-570.52.1.el9_6.x86_64.rpm�jkernel-doc-5.14.0-570.52.1.el9_6.noarch.rpm;�jpython3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm%�jkernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm'�jperf-5.14.0-570.52.1.el9_6.x86_64.rpm#�jkernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm$�jkernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm+�jrv-5.14.0-570.52.1.el9_6.x86_64.rpm&�jkernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm(�jkernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm
)�jrtla-5.14.0-570.52.1.el9_6.x86_64.rpm�jkernel-doc-5.14.0-570.52.1.el9_6.noarch.rpm;�jpython3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm%�jkernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm'�jperf-5.14.0-570.52.1.el9_6.x86_64.rpm#�jkernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm$�jkernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm+�jrv-5.14.0-570.52.1.el9_6.x86_64.rpm&�jkernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm(�jkernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm��¿.�	��$��XBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��w�ahttps://access.redhat.com/errata/RHSA-2025:18097RHSA-2025:18097RHSA-2025:18097https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-18097.htmlALSA-2025:18097ALSA-2025:18097
2�?webkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm2�?webkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm3�?webkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm0�?webkit2gtk3-2.50.1-0.el9_6.x86_64.rpm1�?webkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm3�?webkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm1�?webkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm0�?webkit2gtk3-2.50.1-0.el9_6.i686.rpm2�?webkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm2�?webkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm3�?webkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm0�?webkit2gtk3-2.50.1-0.el9_6.x86_64.rpm1�?webkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm3�?webkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm1�?webkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm0�?webkit2gtk3-2.50.1-0.el9_6.i686.rpm����-�	��;��eBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update��X�Mhttps://access.redhat.com/errata/RHSA-2025:18149RHSA-2025:18149RHSA-2025:18149https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18149.htmlALSA-2025:18149ALSA-2025:18149
�Y�Haspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm�`�Hdotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm�w�Hdotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpm�|�dotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm�v�Haspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm�z�dotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpm�{�Hdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm�u�Haspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpm�x�Hdotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpm�y�Hdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm�Y�Haspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm�`�Hdotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm�w�Hdotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpm�|�dotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm�v�Haspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm�z�dotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpm�{�Hdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm�u�Haspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpm�x�Hdotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpm�y�Hdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm����_�	����|BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update��%�Mhttps://access.redhat.com/errata/RHSA-2025:18151RHSA-2025:18151RHSA-2025:18151https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18151.htmlALSA-2025:18151ALSA-2025:18151
�1�Cdotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm�3�Cdotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm�(�Caspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm�5�|dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm�0�Cdotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm�"�|netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm�4�|dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm�'�Caspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm�8�|dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm�)�Caspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm�7�Cdotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm�6�|dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm�!�Cdotnet-host-9.0.10-1.el9_6.x86_64.rpm�2�Cdotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm�1�Cdotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm�3�Cdotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm�(�Caspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm�5�|dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm�0�Cdotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm�"�|netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm�4�|dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm�'�Caspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm�8�|dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm�)�Caspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm�7�Cdotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm�6�|dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm�!�Cdotnet-host-9.0.10-1.el9_6.x86_64.rpm�2�Cdotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm�ȡ�l�	����YBBsecurityImportant: firefox security update��r�Dhttps://access.redhat.com/errata/RHSA-2025:18155RHSA-2025:18155RHSA-2025:18155https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18155.htmlALSA-2025:18155ALSA-2025:18155
8�firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmP�firefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm8�firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmP�firefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm����.�	��!��^BsecurityModerate: libssh security update��6�https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:18275
��libssh-devel-0.10.4-15.el9_6.i686.rpm��libssh-devel-0.10.4-15.el9_6.x86_64.rpm��libssh-devel-0.10.4-15.el9_6.i686.rpm��libssh-devel-0.10.4-15.el9_6.x86_64.rpm�����	��5��bBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��A�https://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281

)�krtla-5.14.0-570.55.1.el9_6.x86_64.rpm�kkernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm(�kkernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpm;�kpython3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm$�kkernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm&�kkernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm'�kperf-5.14.0-570.55.1.el9_6.x86_64.rpm%�kkernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm#�kkernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm+�krv-5.14.0-570.55.1.el9_6.x86_64.rpm
)�krtla-5.14.0-570.55.1.el9_6.x86_64.rpm�kkernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm(�kkernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpm;�kpython3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm$�kkernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm&�kkernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm'�kperf-5.14.0-570.55.1.el9_6.x86_64.rpm%�kkernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm#�kkernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm+�krv-5.14.0-570.55.1.el9_6.x86_64.rpm����x�	��8��vsecurityImportant: thunderbird security update��V�https://access.redhat.com/errata/RHSA-2025:18321RHSA-2025:18321RHSA-2025:18321https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18321.htmlALSA-2025:18321ALSA-2025:18321
9�thunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpm9�thunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpm�����	����yBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update��i�\https://access.redhat.com/errata/RHSA-2025:18815RHSA-2025:18815RHSA-2025:18815https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18815.htmlALSA-2025:18815ALSA-2025:18815
�8�tjava-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpm�V�tjava-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�T�tjava-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�X�tjava-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�U�tjava-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�W�tjava-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�7�tjava-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpm�8�tjava-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpm�V�tjava-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�T�tjava-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�X�tjava-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�U�tjava-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�W�tjava-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�7�tjava-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpm�ȍ�J�	����FBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update��E�https://access.redhat.com/errata/RHSA-2025:18821RHSA-2025:18821RHSA-2025:18821https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18821.htmlALSA-2025:18821ALSA-2025:18821
	��)java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpm	��)java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpm��)java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpm�Ȍ�h�	��+��YBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update��J�lhttps://access.redhat.com/errata/RHSA-2025:18824RHSA-2025:18824RHSA-2025:18824https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://access.redhat.com/security/cve/CVE-2025-61748CVE-2025-61748CVE-2025-61748https://errata.almalinux.org/9/ALSA-2025-18824.htmlALSA-2025:18824ALSA-2025:18824
	�u�;java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�p�;java-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�n�;java-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�o�;java-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�r�;java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�q�;java-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�s�;java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�m�;java-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�t�;java-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpm	�u�;java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�p�;java-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�n�;java-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�o�;java-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�r�;java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�q�;java-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�s�;java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�m�;java-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�t�;java-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�Ȍ�S�	��2��lBBBBsecurityImportant: libtiff security update��6�<https://access.redhat.com/errata/RHSA-2025:19113RHSA-2025:19113RHSA-2025:19113https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-19113.htmlALSA-2025:19113ALSA-2025:19113
�D�libtiff-devel-4.4.0-13.el9_6.2.i686.rpm�D�libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpm�C�libtiff-4.4.0-13.el9_6.2.x86_64.rpm�C�libtiff-4.4.0-13.el9_6.2.i686.rpm�D�libtiff-devel-4.4.0-13.el9_6.2.i686.rpm�D�libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpm�C�libtiff-4.4.0-13.el9_6.2.x86_64.rpm�C�libtiff-4.4.0-13.el9_6.2.i686.rpm�ȁ�2�	��<��sBBBBBBBsecurityImportant: emacs security update��r�thttps://access.redhat.com/errata/RHSA-2025:1915RHSA-2025:1915RHSA-2025:1915https://access.redhat.com/security/cve/CVE-2025-1244CVE-2025-1244CVE-2025-1244https://bugzilla.redhat.com/23451502345150https://errata.almalinux.org/9/ALSA-2025-1915.htmlALSA-2025:1915ALSA-2025:1915
�`�emacs-nox-27.2-11.el9_5.1.x86_64.rpm�`�emacs-filesystem-27.2-11.el9_5.1.noarch.rpm�]�emacs-27.2-11.el9_5.1.x86_64.rpm�_�emacs-lucid-27.2-11.el9_5.1.x86_64.rpm�^�emacs-common-27.2-11.el9_5.1.x86_64.rpm�`�emacs-nox-27.2-11.el9_5.1.x86_64.rpm�`�emacs-filesystem-27.2-11.el9_5.1.noarch.rpm�]�emacs-27.2-11.el9_5.1.x86_64.rpm�_�emacs-lucid-27.2-11.el9_5.1.x86_64.rpm�^�emacs-common-27.2-11.el9_5.1.x86_64.rpm���0� 	����}BBBBsecurityImportant: redis security update��f�
https://access.redhat.com/errata/RHSA-2025:19237RHSA-2025:19237RHSA-2025:19237https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19237.htmlALSA-2025:19237ALSA-2025:19237
�i�$redis-devel-6.2.20-1.el9_6.i686.rpm�b�$redis-doc-6.2.20-1.el9_6.noarch.rpm�I�$redis-6.2.20-1.el9_6.x86_64.rpm�i�$redis-devel-6.2.20-1.el9_6.x86_64.rpm�i�$redis-devel-6.2.20-1.el9_6.i686.rpm�b�$redis-doc-6.2.20-1.el9_6.noarch.rpm�I�$redis-6.2.20-1.el9_6.x86_64.rpm�i�$redis-devel-6.2.20-1.el9_6.x86_64.rpm�Ȍ�Z�!	���^BBBsecurityImportant: redis:7 security update���
https://access.redhat.com/errata/RHSA-2025:19345RHSA-2025:19345RHSA-2025:19345https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19345.htmlALSA-2025:19345ALSA-2025:19345
�I��b*�i�Hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�I�Hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�b�Hredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm�I��b*�i�Hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�I�Hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�b�Hredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm�ȷ�>�"	����EBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update���https://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409

)�lrtla-5.14.0-570.60.1.el9_6.x86_64.rpm'�lperf-5.14.0-570.60.1.el9_6.x86_64.rpm+�lrv-5.14.0-570.60.1.el9_6.x86_64.rpm$�lkernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm�lkernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm(�lkernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm%�lkernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpm;�lpython3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm#�lkernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm&�lkernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm
)�lrtla-5.14.0-570.60.1.el9_6.x86_64.rpm'�lperf-5.14.0-570.60.1.el9_6.x86_64.rpm+�lrv-5.14.0-570.60.1.el9_6.x86_64.rpm$�lkernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm�lkernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm(�lkernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm%�lkernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpm;�lpython3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm#�lkernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm&�lkernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm�ȷ�D�#	��$��YBBBBBBBBBsecurityImportant: tigervnc security update�� �thttps://access.redhat.com/errata/RHSA-2025:19489RHSA-2025:19489RHSA-2025:19489https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-19489.htmlALSA-2025:19489ALSA-2025:19489
�Z�tigervnc-server-module-1.14.1-9.el9_6.x86_64.rpm�Y�tigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpm�X�tigervnc-server-1.14.1-9.el9_6.x86_64.rpm��tigervnc-icons-1.14.1-9.el9_6.noarch.rpm��tigervnc-license-1.14.1-9.el9_6.noarch.rpm��tigervnc-selinux-1.14.1-9.el9_6.noarch.rpm�W�tigervnc-1.14.1-9.el9_6.x86_64.rpm�Z�tigervnc-server-module-1.14.1-9.el9_6.x86_64.rpm�Y�tigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpm�X�tigervnc-server-1.14.1-9.el9_6.x86_64.rpm��tigervnc-icons-1.14.1-9.el9_6.noarch.rpm��tigervnc-license-1.14.1-9.el9_6.noarch.rpm��tigervnc-selinux-1.14.1-9.el9_6.noarch.rpm�W�tigervnc-1.14.1-9.el9_6.x86_64.rpm�ȷ�G�$	��=��eBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security update���!https://access.redhat.com/errata/RHSA-2025:19584RHSA-2025:19584RHSA-2025:19584https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://errata.almalinux.org/9/ALSA-2025-19584.htmlALSA-2025:19584ALSA-2025:19584
��>mariadb-10.5.29-2.el9_6.x86_64.rpm��>mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm�~�>mariadb-embedded-10.5.29-2.el9_6.x86_64.rpm��>mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpm��>mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpm��>mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpm��>mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpm��>mariadb-pam-10.5.29-2.el9_6.x86_64.rpm��>mariadb-server-10.5.29-2.el9_6.x86_64.rpm�9�ngalera-26.4.22-1.el9_6.x86_64.rpm�|�>mariadb-backup-10.5.29-2.el9_6.x86_64.rpm�}�>mariadb-common-10.5.29-2.el9_6.x86_64.rpm��>mariadb-10.5.29-2.el9_6.x86_64.rpm��>mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm�~�>mariadb-embedded-10.5.29-2.el9_6.x86_64.rpm��>mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpm��>mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpm��>mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpm��>mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpm��>mariadb-pam-10.5.29-2.el9_6.x86_64.rpm��>mariadb-server-10.5.29-2.el9_6.x86_64.rpm�9�ngalera-26.4.22-1.el9_6.x86_64.rpm�|�>mariadb-backup-10.5.29-2.el9_6.x86_64.rpm�}�>mariadb-common-10.5.29-2.el9_6.x86_64.rpm�ȶ� �%	����~securityImportant: runc security update��5�https://access.redhat.com/errata/RHSA-2025:19927RHSA-2025:19927RHSA-2025:19927https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-19927.htmlALSA-2025:19927ALSA-2025:19927
�z�*runc-1.2.5-3.el9_6.x86_64.rpm�z�*runc-1.2.5-3.el9_6.x86_64.rpm����O�&	����ABBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��T�9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930

$�mkernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm�mkernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm%�mkernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm(�mkernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm#�mkernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm'�mperf-5.14.0-570.62.1.el9_6.x86_64.rpm&�mkernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm;�mpython3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm)�mrtla-5.14.0-570.62.1.el9_6.x86_64.rpm+�mrv-5.14.0-570.62.1.el9_6.x86_64.rpm
$�mkernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm�mkernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm%�mkernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm(�mkernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm#�mkernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm'�mperf-5.14.0-570.62.1.el9_6.x86_64.rpm&�mkernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm;�mpython3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm)�mrtla-5.14.0-570.62.1.el9_6.x86_64.rpm+�mrv-5.14.0-570.62.1.el9_6.x86_64.rpm��ѳ�'	����UBBBBBBBBsecurityImportant: bind9.18 security update��
�phttps://access.redhat.com/errata/RHSA-2025:19950RHSA-2025:19950RHSA-2025:19950https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-19950.htmlALSA-2025:19950ALSA-2025:19950
�R�rbind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpm�Q�rbind9.18-9.18.29-4.el9_6.2.x86_64.rpm�S�rbind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpm�U�rbind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpm�T�rbind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpm�R�rbind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpm�Q�rbind9.18-9.18.29-4.el9_6.2.x86_64.rpm�S�rbind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpm�U�rbind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpm�T�rbind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpm���/�(	��,��`BBBBBBBBBBsecurityImportant: webkit2gtk3 security update��}�#https://access.redhat.com/errata/RHSA-2025:2035RHSA-2025:2035RHSA-2025:2035https://access.redhat.com/security/cve/CVE-2024-54543CVE-2024-54543CVE-2024-54543https://access.redhat.com/security/cve/CVE-2025-24143CVE-2025-24143CVE-2025-24143https://access.redhat.com/security/cve/CVE-2025-24150CVE-2025-24150CVE-2025-24150https://access.redhat.com/security/cve/CVE-2025-24158CVE-2025-24158CVE-2025-24158https://access.redhat.com/security/cve/CVE-2025-24162CVE-2025-24162CVE-2025-24162https://bugzilla.redhat.com/23446192344619https://bugzilla.redhat.com/23446212344621https://bugzilla.redhat.com/23446222344622https://bugzilla.redhat.com/23446232344623https://bugzilla.redhat.com/23446242344624https://errata.almalinux.org/9/ALSA-2025-2035.htmlALSA-2025:2035ALSA-2025:2035
0�9webkit2gtk3-2.46.6-1.el9_5.x86_64.rpm1�9webkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm3�9webkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm2�9webkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm2�9webkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm1�9webkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm0�9webkit2gtk3-2.46.6-1.el9_5.i686.rpm3�9webkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm0�9webkit2gtk3-2.46.6-1.el9_5.x86_64.rpm1�9webkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm3�9webkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm2�9webkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm2�9webkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm1�9webkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm0�9webkit2gtk3-2.46.6-1.el9_5.i686.rpm3�9webkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm����)�)	����mBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update�� �X�ahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518
https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396
(�kernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm'�perf-5.14.0-611.5.1.el9_7.x86_64.rpm+�rv-5.14.0-611.5.1.el9_7.x86_64.rpm;�python3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm$�kernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm)�rtla-5.14.0-611.5.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpm
(�kernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm'�perf-5.14.0-611.5.1.el9_7.x86_64.rpm+�rv-5.14.0-611.5.1.el9_7.x86_64.rpm;�python3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm$�kernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm)�rtla-5.14.0-611.5.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpm���A�*	����ABBBsecurityModerate: zziplib security update��x�https://access.redhat.com/errata/RHSA-2025:20838RHSA-2025:20838RHSA-2025:20838https://access.redhat.com/security/cve/CVE-2018-17828CVE-2018-17828CVE-2018-17828https://bugzilla.redhat.com/16358881635888https://errata.almalinux.org/9/ALSA-2025-20838.htmlALSA-2025:20838ALSA-2025:20838
�H�Xzziplib-0.13.71-12.el9.x86_64.rpm�%�Xzziplib-utils-0.13.71-12.el9.x86_64.rpm�H�Xzziplib-0.13.71-12.el9.i686.rpm�H�Xzziplib-0.13.71-12.el9.x86_64.rpm�%�Xzziplib-utils-0.13.71-12.el9.x86_64.rpm�H�Xzziplib-0.13.71-12.el9.i686.rpm���t�+	����GBBBBBBBsecurityImportant: podman security update��
�&https://access.redhat.com/errata/RHSA-2025:20909RHSA-2025:20909RHSA-2025:20909https://access.redhat.com/security/cve/CVE-2025-47907CVE-2025-47907CVE-2025-47907https://access.redhat.com/security/cve/CVE-2025-9566CVE-2025-9566CVE-2025-9566https://bugzilla.redhat.com/23870832387083https://bugzilla.redhat.com/23931522393152https://errata.almalinux.org/9/ALSA-2025-20909.htmlALSA-2025:20909ALSA-2025:20909
h�/podman-docker-5.6.0-6.el9_7.noarch.rpm�1�/podman-5.6.0-6.el9_7.x86_64.rpm�3�/podman-remote-5.6.0-6.el9_7.x86_64.rpm�4�/podman-tests-5.6.0-6.el9_7.x86_64.rpm�2�/podman-plugins-5.6.0-6.el9_7.x86_64.rpmh�/podman-docker-5.6.0-6.el9_7.noarch.rpm�1�/podman-5.6.0-6.el9_7.x86_64.rpm�3�/podman-remote-5.6.0-6.el9_7.x86_64.rpm�4�/podman-tests-5.6.0-6.el9_7.x86_64.rpm�2�/podman-plugins-5.6.0-6.el9_7.x86_64.rpm�ɑ�z�,	����QBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��0�ahttps://access.redhat.com/errata/RHSA-2025:20922RHSA-2025:20922RHSA-2025:20922https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-20922.htmlALSA-2025:20922ALSA-2025:20922
2�@webkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm3�@webkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm1�@webkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm0�@webkit2gtk3-2.50.1-1.el9_7.x86_64.rpm0�@webkit2gtk3-2.50.1-1.el9_7.i686.rpm1�@webkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm2�@webkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm3�@webkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm2�@webkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm3�@webkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm1�@webkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm0�@webkit2gtk3-2.50.1-1.el9_7.x86_64.rpm0�@webkit2gtk3-2.50.1-1.el9_7.i686.rpm1�@webkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm2�@webkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm3�@webkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm���>�-	��$��^BBBBsecurityImportant: redis security update���
https://access.redhat.com/errata/RHSA-2025:20926RHSA-2025:20926RHSA-2025:20926https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20926.htmlALSA-2025:20926ALSA-2025:20926
�i�%redis-devel-6.2.20-2.el9_7.x86_64.rpm�b�%redis-doc-6.2.20-2.el9_7.noarch.rpm�I�%redis-6.2.20-2.el9_7.x86_64.rpm�i�%redis-devel-6.2.20-2.el9_7.i686.rpm�i�%redis-devel-6.2.20-2.el9_7.x86_64.rpm�b�%redis-doc-6.2.20-2.el9_7.noarch.rpm�I�%redis-6.2.20-2.el9_7.x86_64.rpm�i�%redis-devel-6.2.20-2.el9_7.i686.rpm����.	��=��eBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update��,�ghttps://access.redhat.com/errata/RHSA-2025:20928RHSA-2025:20928RHSA-2025:20928https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-20928.htmlALSA-2025:20928ALSA-2025:20928
�g�python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm�b�ipa-common-4.12.2-22.el9_7.1.noarch.rpm�{�ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm�b�ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm�e�ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm�<�ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm�h�python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm�a�ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm�c�ipa-selinux-4.12.2-22.el9_7.1.noarch.rpm�|�ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm�d�ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm�=�ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm�e�ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm�a�ipa-client-4.12.2-22.el9_7.1.x86_64.rpm�i�python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm�d�ipa-server-4.12.2-22.el9_7.1.x86_64.rpm�c�ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpm�g�python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm�b�ipa-common-4.12.2-22.el9_7.1.noarch.rpm�{�ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm�b�ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm�e�ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm�<�ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm�h�python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm�a�ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm�c�ipa-selinux-4.12.2-22.el9_7.1.noarch.rpm�|�ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm�d�ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm�=�ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm�e�ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm�a�ipa-client-4.12.2-22.el9_7.1.x86_64.rpm�i�python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm�d�ipa-server-4.12.2-22.el9_7.1.x86_64.rpm�c�ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpm�ɵ�`�/	����~securityImportant: squid security update���Fhttps://access.redhat.com/errata/RHSA-2025:20935RHSA-2025:20935RHSA-2025:20935https://access.redhat.com/security/cve/CVE-2025-62168CVE-2025-62168CVE-2025-62168https://bugzilla.redhat.com/24047362404736https://errata.almalinux.org/9/ALSA-2025-20935.htmlALSA-2025:20935ALSA-2025:20935
�{�Hsquid-5.5-22.el9_7.1.x86_64.rpm�{�Hsquid-5.5-22.el9_7.1.x86_64.rpm���D�0	����ABBBBsecurityImportant: sqlite security update��Y�	https://access.redhat.com/errata/RHSA-2025:20936RHSA-2025:20936RHSA-2025:20936https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-20936.htmlALSA-2025:20936ALSA-2025:20936
�N�wsqlite-3.34.1-9.el9_7.i686.rpm�N�wsqlite-3.34.1-9.el9_7.x86_64.rpm�O�wsqlite-devel-3.34.1-9.el9_7.i686.rpm�O�wsqlite-devel-3.34.1-9.el9_7.x86_64.rpm�N�wsqlite-3.34.1-9.el9_7.i686.rpm�N�wsqlite-3.34.1-9.el9_7.x86_64.rpm�O�wsqlite-devel-3.34.1-9.el9_7.i686.rpm�O�wsqlite-devel-3.34.1-9.el9_7.x86_64.rpm����1	����HBsecurityModerate: libssh security update��b�https://access.redhat.com/errata/RHSA-2025:20943RHSA-2025:20943RHSA-2025:20943https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-20943.htmlALSA-2025:20943ALSA-2025:20943
��libssh-devel-0.10.4-15.el9_7.i686.rpm��libssh-devel-0.10.4-15.el9_7.x86_64.rpm��libssh-devel-0.10.4-15.el9_7.i686.rpm��libssh-devel-0.10.4-15.el9_7.x86_64.rpm���B�2	����LBBBBsecurityModerate: vim security update��m�zhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945
�Y�vim-common-8.2.2637-23.el9_7.x86_64.rpm�Z�vim-enhanced-8.2.2637-23.el9_7.x86_64.rpm�X�vim-X11-8.2.2637-23.el9_7.x86_64.rpm�Y�vim-common-8.2.2637-23.el9_7.x86_64.rpm�Z�vim-enhanced-8.2.2637-23.el9_7.x86_64.rpm�X�vim-X11-8.2.2637-23.el9_7.x86_64.rpm���S�3	����SsecurityImportant: sssd security update��g�/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954
��_sssd-idp-2.9.7-4.el9_7.1.x86_64.rpm��_sssd-idp-2.9.7-4.el9_7.1.x86_64.rpm�ɵ��4	���^BBBsecurityImportant: redis:7 security update���
https://access.redhat.com/errata/RHSA-2025:20955RHSA-2025:20955RHSA-2025:20955https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20955.htmlALSA-2025:20955ALSA-2025:20955
�I��b*�i�Hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�I�Hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�b�Hredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm�I��b*�i�Hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�I�Hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm�b�Hredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm����5	����WBBBBsecurityImportant: libtiff security update��1�<https://access.redhat.com/errata/RHSA-2025:20956RHSA-2025:20956RHSA-2025:20956https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-20956.htmlALSA-2025:20956ALSA-2025:20956
�C�libtiff-4.4.0-15.el9_7.2.i686.rpm�D�libtiff-devel-4.4.0-15.el9_7.2.i686.rpm�C�libtiff-4.4.0-15.el9_7.2.x86_64.rpm�D�libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpm�C�libtiff-4.4.0-15.el9_7.2.i686.rpm�D�libtiff-devel-4.4.0-15.el9_7.2.i686.rpm�C�libtiff-4.4.0-15.el9_7.2.x86_64.rpm�D�libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpm���0�6	�� ��^securityImportant: runc security update��m�https://access.redhat.com/errata/RHSA-2025:20957RHSA-2025:20957RHSA-2025:20957https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-20957.htmlALSA-2025:20957ALSA-2025:20957
�z�+runc-1.3.0-4.el9_7.x86_64.rpm�z�+runc-1.3.0-4.el9_7.x86_64.rpm���j�7	��,��aBBBBBBBBBsecurityImportant: tigervnc security update���thttps://access.redhat.com/errata/RHSA-2025:20958RHSA-2025:20958RHSA-2025:20958https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20958.htmlALSA-2025:20958ALSA-2025:20958
��tigervnc-icons-1.15.0-6.el9_7.noarch.rpm��tigervnc-license-1.15.0-6.el9_7.noarch.rpm�Y�tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpm�W�tigervnc-1.15.0-6.el9_7.x86_64.rpm�X�tigervnc-server-1.15.0-6.el9_7.x86_64.rpm�Z�tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm��tigervnc-selinux-1.15.0-6.el9_7.noarch.rpm��tigervnc-icons-1.15.0-6.el9_7.noarch.rpm��tigervnc-license-1.15.0-6.el9_7.noarch.rpm�Y�tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpm�W�tigervnc-1.15.0-6.el9_7.x86_64.rpm�X�tigervnc-server-1.15.0-6.el9_7.x86_64.rpm�Z�tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm��tigervnc-selinux-1.15.0-6.el9_7.noarch.rpm�ɵ�z�8	��3��mBBBBsecurityImportant: libsoup security update���_https://access.redhat.com/errata/RHSA-2025:20959RHSA-2025:20959RHSA-2025:20959https://access.redhat.com/security/cve/CVE-2025-11021CVE-2025-11021CVE-2025-11021https://access.redhat.com/security/cve/CVE-2025-4945CVE-2025-4945CVE-2025-4945https://bugzilla.redhat.com/23671752367175https://bugzilla.redhat.com/23996272399627https://errata.almalinux.org/9/ALSA-2025-20959.htmlALSA-2025:20959ALSA-2025:20959
�f�mlibsoup-2.72.0-12.el9_7.1.i686.rpm�g�mlibsoup-devel-2.72.0-12.el9_7.1.i686.rpm�f�mlibsoup-2.72.0-12.el9_7.1.x86_64.rpm�g�mlibsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm�f�mlibsoup-2.72.0-12.el9_7.1.i686.rpm�g�mlibsoup-devel-2.72.0-12.el9_7.1.i686.rpm�f�mlibsoup-2.72.0-12.el9_7.1.x86_64.rpm�g�mlibsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm���+�9	��6��tsecurityModerate: xorg-x11-server-Xwayland security update��_�
https://access.redhat.com/errata/RHSA-2025:20960RHSA-2025:20960RHSA-2025:20960https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20960.htmlALSA-2025:20960ALSA-2025:20960
��ixorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm��ixorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm���1�:	����wBBBBBBBBBBsecurityModerate: xorg-x11-server security update��i�yhttps://access.redhat.com/errata/RHSA-2025:20961RHSA-2025:20961RHSA-2025:20961https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20961.htmlALSA-2025:20961ALSA-2025:20961
��&xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm��&xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm����;	����DBBBBBBsecurityModerate: qt5-qt3d security update��b�Yhttps://access.redhat.com/errata/RHSA-2025:20963RHSA-2025:20963RHSA-2025:20963https://access.redhat.com/security/cve/CVE-2025-11277CVE-2025-11277CVE-2025-11277https://bugzilla.redhat.com/24016222401622https://errata.almalinux.org/9/ALSA-2025-20963.htmlALSA-2025:20963ALSA-2025:20963
�z�rqt5-qt3d-5.15.9-2.el9_7.1.i686.rpm�z�rqt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm�{�rqt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm�B�rqt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm�{�rqt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpm�z�rqt5-qt3d-5.15.9-2.el9_7.1.i686.rpm�z�rqt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm�{�rqt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm�B�rqt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm�{�rqt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpm���S�<	����MBBBBBBBBBBBsecurityImportant: bind security update��;�~https://access.redhat.com/errata/RHSA-2025:21110RHSA-2025:21110RHSA-2025:21110https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://errata.almalinux.org/9/ALSA-2025-21110.htmlALSA-2025:21110ALSA-2025:21110
�!�bind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm�\�bind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm�^�bind-utils-9.16.23-34.el9_7.1.x86_64.rpm�]�bind-libs-9.16.23-34.el9_7.1.x86_64.rpm�"�bind-license-9.16.23-34.el9_7.1.noarch.rpm�[�bind-chroot-9.16.23-34.el9_7.1.x86_64.rpm�Z�bind-9.16.23-34.el9_7.1.x86_64.rpm�'�python3-bind-9.16.23-34.el9_7.1.noarch.rpm�!�bind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm�\�bind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm�^�bind-utils-9.16.23-34.el9_7.1.x86_64.rpm�]�bind-libs-9.16.23-34.el9_7.1.x86_64.rpm�"�bind-license-9.16.23-34.el9_7.1.noarch.rpm�[�bind-chroot-9.16.23-34.el9_7.1.x86_64.rpm�Z�bind-9.16.23-34.el9_7.1.x86_64.rpm�'�python3-bind-9.16.23-34.el9_7.1.noarch.rpm���>�=	��%��[BBBBBBBBsecurityImportant: bind9.18 security update��9�phttps://access.redhat.com/errata/RHSA-2025:21111RHSA-2025:21111RHSA-2025:21111https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-21111.htmlALSA-2025:21111ALSA-2025:21111
�R�sbind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpm�S�sbind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpm�U�sbind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpm�T�sbind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpm�Q�sbind9.18-9.18.29-5.el9_7.2.x86_64.rpm�R�sbind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpm�S�sbind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpm�U�sbind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpm�T�sbind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpm�Q�sbind9.18-9.18.29-5.el9_7.2.x86_64.rpm�ɵ��>	��'��&securityImportant: python-kdcproxy security update��)�https://access.redhat.com/errata/RHSA-2025:21139RHSA-2025:21139RHSA-2025:21139https://access.redhat.com/security/cve/CVE-2025-59088CVE-2025-59088CVE-2025-59088https://access.redhat.com/security/cve/CVE-2025-59089CVE-2025-59089CVE-2025-59089https://bugzilla.redhat.com/23939552393955https://bugzilla.redhat.com/23939582393958https://errata.almalinux.org/9/ALSA-2025-21139.htmlALSA-2025:21139ALSA-2025:21139
�:�python3-kdcproxy-1.0.0-9.el9_7.noarch.rpm�:�python3-kdcproxy-1.0.0-9.el9_7.noarch.rpm���K�?	��-��hBBBsecurityModerate: openssl security update��H�Zhttps://access.redhat.com/errata/RHSA-2025:21255RHSA-2025:21255RHSA-2025:21255https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2025-21255.htmlALSA-2025:21255ALSA-2025:21255
��uopenssl-devel-3.5.1-4.el9_7.i686.rpm��uopenssl-devel-3.5.1-4.el9_7.x86_64.rpm��uopenssl-perl-3.5.1-4.el9_7.x86_64.rpm��uopenssl-devel-3.5.1-4.el9_7.i686.rpm��uopenssl-devel-3.5.1-4.el9_7.x86_64.rpm��uopenssl-perl-3.5.1-4.el9_7.x86_64.rpm�ɵ�s�@	��2��nBBsecurityImportant: firefox security update��"�https://access.redhat.com/errata/RHSA-2025:21280RHSA-2025:21280RHSA-2025:21280https://access.redhat.com/security/cve/CVE-2025-13012CVE-2025-13012CVE-2025-13012https://access.redhat.com/security/cve/CVE-2025-13013CVE-2025-13013CVE-2025-13013https://access.redhat.com/security/cve/CVE-2025-13014CVE-2025-13014CVE-2025-13014https://access.redhat.com/security/cve/CVE-2025-13015CVE-2025-13015CVE-2025-13015https://access.redhat.com/security/cve/CVE-2025-13016CVE-2025-13016CVE-2025-13016https://access.redhat.com/security/cve/CVE-2025-13017CVE-2025-13017CVE-2025-13017https://access.redhat.com/security/cve/CVE-2025-13018CVE-2025-13018CVE-2025-13018https://access.redhat.com/security/cve/CVE-2025-13019CVE-2025-13019CVE-2025-13019https://access.redhat.com/security/cve/CVE-2025-13020CVE-2025-13020CVE-2025-13020https://bugzilla.redhat.com/24140792414079https://bugzilla.redhat.com/24140802414080https://bugzilla.redhat.com/24140832414083https://bugzilla.redhat.com/24140842414084https://bugzilla.redhat.com/24140852414085https://bugzilla.redhat.com/24140862414086https://bugzilla.redhat.com/24140902414090https://bugzilla.redhat.com/24140912414091https://bugzilla.redhat.com/24140922414092https://errata.almalinux.org/9/ALSA-2025-21280.htmlALSA-2025:21280ALSA-2025:21280
8�firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmP�firefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpm8�firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmP�firefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpm�ɑ�>�A	��8��sBBBsecurityCritical: lasso security update�S��=�$https://access.redhat.com/errata/RHSA-2025:21462RHSA-2025:21462RHSA-2025:21462https://access.redhat.com/security/cve/CVE-2025-47151CVE-2025-47151CVE-2025-47151https://bugzilla.redhat.com/24127392412739https://errata.almalinux.org/9/ALSA-2025-21462.htmlALSA-2025:21462ALSA-2025:21462
�M�{lasso-2.7.0-11.el9_7.3.x86_64.rpm�M�{lasso-2.7.0-11.el9_7.3.i686.rpm�:�{python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm�M�{lasso-2.7.0-11.el9_7.3.x86_64.rpm�M�{lasso-2.7.0-11.el9_7.3.i686.rpm�:�{python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm���	�B	��;��ysecurityImportant: haproxy security update��a�$https://access.redhat.com/errata/RHSA-2025:21693RHSA-2025:21693RHSA-2025:21693https://access.redhat.com/security/cve/CVE-2025-11230CVE-2025-11230CVE-2025-11230https://bugzilla.redhat.com/24130032413003https://errata.almalinux.org/9/ALSA-2025-21693.htmlALSA-2025:21693ALSA-2025:21693
�b�]haproxy-2.8.14-1.el9_7.1.x86_64.rpm�b�]haproxy-2.8.14-1.el9_7.1.x86_64.rpm���y�C	����|BBBBBBBsecurityImportant: podman security update���https://access.redhat.com/errata/RHSA-2025:21702RHSA-2025:21702RHSA-2025:21702https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-21702.htmlALSA-2025:21702ALSA-2025:21702
�4�0podman-tests-5.6.0-7.el9_7.x86_64.rpmh�0podman-docker-5.6.0-7.el9_7.noarch.rpm�3�0podman-remote-5.6.0-7.el9_7.x86_64.rpm�1�0podman-5.6.0-7.el9_7.x86_64.rpm�2�0podman-plugins-5.6.0-7.el9_7.x86_64.rpm�4�0podman-tests-5.6.0-7.el9_7.x86_64.rpmh�0podman-docker-5.6.0-7.el9_7.noarch.rpm�3�0podman-remote-5.6.0-7.el9_7.x86_64.rpm�1�0podman-5.6.0-7.el9_7.x86_64.rpm�2�0podman-plugins-5.6.0-7.el9_7.x86_64.rpm���1�D	����FBBBBBBBBBBBBsecurityModerate: delve and golang security update���Phttps://access.redhat.com/errata/RHSA-2025:21815RHSA-2025:21815RHSA-2025:21815https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-21815.htmlALSA-2025:21815ALSA-2025:21815
	�T�"golang-race-1.25.3-1.el9_7.x86_64.rpmn�"golang-misc-1.25.3-1.el9_7.noarch.rpmm�"golang-docs-1.25.3-1.el9_7.noarch.rpmo�"golang-src-1.25.3-1.el9_7.noarch.rpm�q�Vdelve-1.25.2-1.el9_7.x86_64.rpm�G�"golang-1.25.3-1.el9_7.x86_64.rpm�N�"go-toolset-1.25.3-1.el9_7.x86_64.rpmp�"golang-tests-1.25.3-1.el9_7.noarch.rpm�H�"golang-bin-1.25.3-1.el9_7.x86_64.rpm	�T�"golang-race-1.25.3-1.el9_7.x86_64.rpmn�"golang-misc-1.25.3-1.el9_7.noarch.rpmm�"golang-docs-1.25.3-1.el9_7.noarch.rpmo�"golang-src-1.25.3-1.el9_7.noarch.rpm�q�Vdelve-1.25.2-1.el9_7.x86_64.rpm�G�"golang-1.25.3-1.el9_7.x86_64.rpm�N�"go-toolset-1.25.3-1.el9_7.x86_64.rpmp�"golang-tests-1.25.3-1.el9_7.noarch.rpm�H�"golang-bin-1.25.3-1.el9_7.x86_64.rpm���(�E	����UBBsecurityImportant: valkey security update��i�:
https://access.redhat.com/errata/RHSA-2025:21916RHSA-2025:21916RHSA-2025:21916https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-21916.htmlALSA-2025:21916ALSA-2025:21916
��hvalkey-8.0.6-2.el9_7.x86_64.rpm� �hvalkey-devel-8.0.6-2.el9_7.x86_64.rpm��hvalkey-8.0.6-2.el9_7.x86_64.rpm� �hvalkey-devel-8.0.6-2.el9_7.x86_64.rpm�ɵ�(�F	��-��ZBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��#�https://access.redhat.com/errata/RHSA-2025:21926RHSA-2025:21926RHSA-2025:21926https://access.redhat.com/security/cve/CVE-2025-39843CVE-2025-39843CVE-2025-39843https://bugzilla.redhat.com/23969412396941https://errata.almalinux.org/9/ALSA-2025-21926.htmlALSA-2025:21926ALSA-2025:21926

;�python3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm'�perf-5.14.0-611.9.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm+�rv-5.14.0-611.9.1.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm)�rtla-5.14.0-611.9.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpm
;�python3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm'�perf-5.14.0-611.9.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm+�rv-5.14.0-611.9.1.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm)�rtla-5.14.0-611.9.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpm�ɵ�B�G	��3��nBBBsecurityImportant: gimp security update��"�\https://access.redhat.com/errata/RHSA-2025:21968RHSA-2025:21968RHSA-2025:21968https://access.redhat.com/security/cve/CVE-2025-10920CVE-2025-10920CVE-2025-10920https://access.redhat.com/security/cve/CVE-2025-10921CVE-2025-10921CVE-2025-10921https://access.redhat.com/security/cve/CVE-2025-10922CVE-2025-10922CVE-2025-10922https://access.redhat.com/security/cve/CVE-2025-10923CVE-2025-10923CVE-2025-10923https://access.redhat.com/security/cve/CVE-2025-10924CVE-2025-10924CVE-2025-10924https://access.redhat.com/security/cve/CVE-2025-10925CVE-2025-10925CVE-2025-10925https://access.redhat.com/security/cve/CVE-2025-10934CVE-2025-10934CVE-2025-10934https://bugzilla.redhat.com/24071882407188https://bugzilla.redhat.com/24071912407191https://bugzilla.redhat.com/24071922407192https://bugzilla.redhat.com/24071942407194https://bugzilla.redhat.com/24071992407199https://bugzilla.redhat.com/24072002407200https://bugzilla.redhat.com/24072332407233https://errata.almalinux.org/9/ALSA-2025-21968.htmlALSA-2025:21968ALSA-2025:21968
�?�gimp-3.0.4-1.el9_7.1.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.1.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.1.i686.rpm�?�gimp-3.0.4-1.el9_7.1.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.1.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.1.i686.rpm�ɵ��H	��:��tBBBBsecurityModerate: go-rpm-macros security update��~�https://access.redhat.com/errata/RHSA-2025:22005RHSA-2025:22005RHSA-2025:22005https://access.redhat.com/security/cve/CVE-2025-47906CVE-2025-47906CVE-2025-47906https://bugzilla.redhat.com/23965462396546https://errata.almalinux.org/9/ALSA-2025-22005.htmlALSA-2025:22005ALSA-2025:22005
�y�zgo-rpm-macros-3.6.0-12.el9_7.x86_64.rpm�W�zgo-rpm-templates-3.6.0-12.el9_7.noarch.rpm�X�zgo-srpm-macros-3.6.0-12.el9_7.noarch.rpm�x�zgo-filesystem-3.6.0-12.el9_7.x86_64.rpm�y�zgo-rpm-macros-3.6.0-12.el9_7.x86_64.rpm�W�zgo-rpm-templates-3.6.0-12.el9_7.noarch.rpm�X�zgo-srpm-macros-3.6.0-12.el9_7.noarch.rpm�x�zgo-filesystem-3.6.0-12.el9_7.x86_64.rpm�ɖ�&�I	��?��{BBsecurityImportant: buildah security update���https://access.redhat.com/errata/RHSA-2025:22011RHSA-2025:22011RHSA-2025:22011https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24047152404715https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-22011.htmlALSA-2025:22011ALSA-2025:22011
�/�Hbuildah-1.41.6-1.el9_7.x86_64.rpm�0�Hbuildah-tests-1.41.6-1.el9_7.x86_64.rpm�/�Hbuildah-1.41.6-1.el9_7.x86_64.rpm�0�Hbuildah-tests-1.41.6-1.el9_7.x86_64.rpm�ɖ�`�J	����@BsecurityImportant: expat security update���&https://access.redhat.com/errata/RHSA-2025:22175RHSA-2025:22175RHSA-2025:22175https://access.redhat.com/security/cve/CVE-2025-59375CVE-2025-59375CVE-2025-59375https://bugzilla.redhat.com/23951082395108https://errata.almalinux.org/9/ALSA-2025-22175.htmlALSA-2025:22175ALSA-2025:22175
��Xexpat-devel-2.5.0-5.el9_7.1.x86_64.rpm��Xexpat-devel-2.5.0-5.el9_7.1.i686.rpm��Xexpat-devel-2.5.0-5.el9_7.1.x86_64.rpm��Xexpat-devel-2.5.0-5.el9_7.1.i686.rpm����K	����DBsecurityModerate: libxml2 security update��.�,https://access.redhat.com/errata/RHSA-2025:22376RHSA-2025:22376RHSA-2025:22376https://access.redhat.com/security/cve/CVE-2025-9714CVE-2025-9714CVE-2025-9714https://bugzilla.redhat.com/23926052392605https://errata.almalinux.org/9/ALSA-2025-22376.htmlALSA-2025:22376ALSA-2025:22376
�E�dlibxml2-devel-2.9.13-14.el9_7.i686.rpm�E�dlibxml2-devel-2.9.13-14.el9_7.x86_64.rpm�E�dlibxml2-devel-2.9.13-14.el9_7.i686.rpm�E�dlibxml2-devel-2.9.13-14.el9_7.x86_64.rpm����L	����HBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��Z�;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405

(�nkernel-headers-5.14.0-611.11.1.el9_7.x86_64.rpm#�nkernel-debug-devel-5.14.0-611.11.1.el9_7.x86_64.rpm)�nrtla-5.14.0-611.11.1.el9_7.x86_64.rpm%�nkernel-devel-5.14.0-611.11.1.el9_7.x86_64.rpm;�npython3-perf-5.14.0-611.11.1.el9_7.x86_64.rpm&�nkernel-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm'�nperf-5.14.0-611.11.1.el9_7.x86_64.rpm$�nkernel-debug-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm+�nrv-5.14.0-611.11.1.el9_7.x86_64.rpm�nkernel-doc-5.14.0-611.11.1.el9_7.noarch.rpm
(�nkernel-headers-5.14.0-611.11.1.el9_7.x86_64.rpm#�nkernel-debug-devel-5.14.0-611.11.1.el9_7.x86_64.rpm)�nrtla-5.14.0-611.11.1.el9_7.x86_64.rpm%�nkernel-devel-5.14.0-611.11.1.el9_7.x86_64.rpm;�npython3-perf-5.14.0-611.11.1.el9_7.x86_64.rpm&�nkernel-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm'�nperf-5.14.0-611.11.1.el9_7.x86_64.rpm$�nkernel-debug-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm+�nrv-5.14.0-611.11.1.el9_7.x86_64.rpm�nkernel-doc-5.14.0-611.11.1.el9_7.noarch.rpm��ۅi�M	��$��\BBBBBBsecurityModerate: systemd security update���)https://access.redhat.com/errata/RHSA-2025:22660RHSA-2025:22660RHSA-2025:22660https://access.redhat.com/security/cve/CVE-2025-4598CVE-2025-4598CVE-2025-4598https://bugzilla.redhat.com/23692422369242https://errata.almalinux.org/9/ALSA-2025-22660.htmlALSA-2025:22660ALSA-2025:22660
��hsystemd-boot-unsigned-252-55.el9_7.7.alma.1.x86_64.rpm��hsystemd-devel-252-55.el9_7.7.alma.1.x86_64.rpm�T�hsystemd-journal-remote-252-55.el9_7.7.alma.1.x86_64.rpm��hsystemd-devel-252-55.el9_7.7.alma.1.i686.rpm��hsystemd-ukify-252-55.el9_7.7.alma.1.noarch.rpm��hsystemd-boot-unsigned-252-55.el9_7.7.alma.1.x86_64.rpm��hsystemd-devel-252-55.el9_7.7.alma.1.x86_64.rpm�T�hsystemd-journal-remote-252-55.el9_7.7.alma.1.x86_64.rpm��hsystemd-devel-252-55.el9_7.7.alma.1.i686.rpm��hsystemd-ukify-252-55.el9_7.7.alma.1.noarch.rpm��Ɨ@�N	��1��eBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��>�f&https://access.redhat.com/errata/RHSA-2025:22790RHSA-2025:22790RHSA-2025:22790https://access.redhat.com/security/cve/CVE-2023-43000CVE-2023-43000CVE-2023-43000https://access.redhat.com/security/cve/CVE-2025-13502CVE-2025-13502CVE-2025-13502https://access.redhat.com/security/cve/CVE-2025-13947CVE-2025-13947CVE-2025-13947https://access.redhat.com/security/cve/CVE-2025-43392CVE-2025-43392CVE-2025-43392https://access.redhat.com/security/cve/CVE-2025-43419CVE-2025-43419CVE-2025-43419https://access.redhat.com/security/cve/CVE-2025-43421CVE-2025-43421CVE-2025-43421https://access.redhat.com/security/cve/CVE-2025-43425CVE-2025-43425CVE-2025-43425https://access.redhat.com/security/cve/CVE-2025-43427CVE-2025-43427CVE-2025-43427https://access.redhat.com/security/cve/CVE-2025-43429CVE-2025-43429CVE-2025-43429https://access.redhat.com/security/cve/CVE-2025-43430CVE-2025-43430CVE-2025-43430https://access.redhat.com/security/cve/CVE-2025-43431CVE-2025-43431CVE-2025-43431https://access.redhat.com/security/cve/CVE-2025-43432CVE-2025-43432CVE-2025-43432https://access.redhat.com/security/cve/CVE-2025-43434CVE-2025-43434CVE-2025-43434https://access.redhat.com/security/cve/CVE-2025-43440CVE-2025-43440CVE-2025-43440https://access.redhat.com/security/cve/CVE-2025-43443CVE-2025-43443CVE-2025-43443https://access.redhat.com/security/cve/CVE-2025-43458CVE-2025-43458CVE-2025-43458https://access.redhat.com/security/cve/CVE-2025-43480CVE-2025-43480CVE-2025-43480https://access.redhat.com/security/cve/CVE-2025-66287CVE-2025-66287CVE-2025-66287https://bugzilla.redhat.com/24163002416300https://bugzilla.redhat.com/24163242416324https://bugzilla.redhat.com/24163252416325https://bugzilla.redhat.com/24163262416326https://bugzilla.redhat.com/24163272416327https://bugzilla.redhat.com/24163292416329https://bugzilla.redhat.com/24163302416330https://bugzilla.redhat.com/24163312416331https://bugzilla.redhat.com/24163322416332https://bugzilla.redhat.com/24163342416334https://bugzilla.redhat.com/24163352416335https://bugzilla.redhat.com/24163362416336https://bugzilla.redhat.com/24163372416337https://bugzilla.redhat.com/24163382416338https://bugzilla.redhat.com/24163552416355https://bugzilla.redhat.com/24185762418576https://bugzilla.redhat.com/24188552418855https://bugzilla.redhat.com/24188572418857https://errata.almalinux.org/9/ALSA-2025-22790.htmlALSA-2025:22790ALSA-2025:22790
3�Awebkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm1�Awebkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm0�Awebkit2gtk3-2.50.3-1.el9_7.x86_64.rpm2�Awebkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm1�Awebkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm3�Awebkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm2�Awebkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm0�Awebkit2gtk3-2.50.3-1.el9_7.i686.rpm3�Awebkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm1�Awebkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm0�Awebkit2gtk3-2.50.3-1.el9_7.x86_64.rpm2�Awebkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm1�Awebkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm3�Awebkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm2�Awebkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm0�Awebkit2gtk3-2.50.3-1.el9_7.i686.rpm��۴8�O	����rBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��$�Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865

�okernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm)�ortla-5.14.0-611.13.1.el9_7.x86_64.rpm$�okernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm&�okernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm%�okernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm'�operf-5.14.0-611.13.1.el9_7.x86_64.rpm(�okernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpm;�opython3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm+�orv-5.14.0-611.13.1.el9_7.x86_64.rpm#�okernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpm
�okernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm)�ortla-5.14.0-611.13.1.el9_7.x86_64.rpm$�okernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm&�okernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm%�okernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm'�operf-5.14.0-611.13.1.el9_7.x86_64.rpm(�okernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpm;�opython3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm+�orv-5.14.0-611.13.1.el9_7.x86_64.rpm#�okernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpm�ʊ�	�P	��
��FBBsecurityImportant: firefox security update��w�ohttps://access.redhat.com/errata/RHSA-2025:23034RHSA-2025:23034RHSA-2025:23034https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23034.htmlALSA-2025:23034ALSA-2025:23034
P�sfirefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm8�sfirefox-140.6.0-1.el9_7.alma.1.x86_64.rpmP�sfirefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm8�sfirefox-140.6.0-1.el9_7.alma.1.x86_64.rpm�����Q	����KBBBBBBsecurityImportant: tomcat security update��f�	https://access.redhat.com/errata/RHSA-2025:23049RHSA-2025:23049RHSA-2025:23049https://access.redhat.com/security/cve/CVE-2025-31651CVE-2025-31651CVE-2025-31651https://access.redhat.com/security/cve/CVE-2025-55752CVE-2025-55752CVE-2025-55752https://bugzilla.redhat.com/23627822362782https://bugzilla.redhat.com/24065912406591https://errata.almalinux.org/9/ALSA-2025-23049.htmlALSA-2025:23049ALSA-2025:23049
��:tomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-lib-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-lib-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpm��:tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpm�ʊ��R	���zBB�ABB��WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security update��o�`https://access.redhat.com/errata/RHSA-2025:23063RHSA-2025:23063RHSA-2025:23063https://access.redhat.com/security/cve/CVE-2025-24294CVE-2025-24294CVE-2025-24294https://access.redhat.com/security/cve/CVE-2025-58767CVE-2025-58767CVE-2025-58767https://access.redhat.com/security/cve/CVE-2025-61594CVE-2025-61594CVE-2025-61594https://bugzilla.redhat.com/23796842379684https://bugzilla.redhat.com/23961862396186https://errata.almalinux.org/9/ALSA-2025-23063.htmlALSA-2025:23063ALSA-2025:23063
��O�g*&��rubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpm��|ruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm�2�rubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpm�+�*rubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpm�K�\rubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpm��trubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpm�K�zrubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpm�L�rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm�-�Trubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpm�;�|ruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm��trubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpm��rubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpm�K�zrubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpm�j�|ruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm��_rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpm�B�\rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm�.�7rubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpm�,�brubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpm�C�rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm��|ruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm�3�2rubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm��|ruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm��_rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpm�)�wrubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpm�M�;rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpm�M�;rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpm��rubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpm�*�)rubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpm�0�rubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpm�4�2rubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm��|ruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm�;�|ruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm��rubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpm�(�|ruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm�/�rubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpm�1�rubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpm�:�|ruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm�:�|ruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm��O�g*&��rubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpm��|ruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm�2�rubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpm�+�*rubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpm�K�\rubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpm��trubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpm�K�zrubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpm�L�rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm�-�Trubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpm�;�|ruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm��trubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpm��rubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpm�K�zrubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpm�j�|ruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm��_rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpm�B�\rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm�.�7rubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpm�,�brubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpm�C�rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm��|ruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm�3�2rubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm��|ruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm��_rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpm�)�wrubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpm�M�;rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpm�M�;rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpm��rubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpm�*�)rubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpm�0�rubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpm�4�2rubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm��|ruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm�;�|ruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm��rubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpm�(�|ruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm�/�rubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpm�1�rubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpm�:�|ruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm�:�|ruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm����Y�S	����ABBsecurityModerate: grafana security update��O�"https://access.redhat.com/errata/RHSA-2025:23087RHSA-2025:23087RHSA-2025:23087https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23087.htmlALSA-2025:23087ALSA-2025:23087
�I�tgrafana-10.2.6-17.el9_7.x86_64.rpm�U�tgrafana-selinux-10.2.6-17.el9_7.x86_64.rpm�I�tgrafana-10.2.6-17.el9_7.x86_64.rpm�U�tgrafana-selinux-10.2.6-17.el9_7.x86_64.rpm�ʀ��T	����FBBBBBBBBsecurityModerate: mysql security update��q�[https://access.redhat.com/errata/RHSA-2025:23109RHSA-2025:23109RHSA-2025:23109https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23109.htmlALSA-2025:23109ALSA-2025:23109
�L�vmysql-libs-8.0.44-1.el9_7.x86_64.rpm��vmysql-errmsg-8.0.44-1.el9_7.x86_64.rpm�R�vmysql-server-8.0.44-1.el9_7.x86_64.rpm��vmysql-common-8.0.44-1.el9_7.x86_64.rpm�V�vmysql-8.0.44-1.el9_7.x86_64.rpm�L�vmysql-libs-8.0.44-1.el9_7.x86_64.rpm��vmysql-errmsg-8.0.44-1.el9_7.x86_64.rpm�R�vmysql-server-8.0.44-1.el9_7.x86_64.rpm��vmysql-common-8.0.44-1.el9_7.x86_64.rpm�V�vmysql-8.0.44-1.el9_7.x86_64.rpm����E�U	���CBBBBBBBBBB��EBBBBBBBBBBBsecurityModerate: mysql:8.4 security update��L�[https://access.redhat.com/errata/RHSA-2025:23111RHSA-2025:23111RHSA-2025:23111https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23111.htmlALSA-2025:23111ALSA-2025:23111
�V�;�h*�R�mysql-server-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm��rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-test-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm��mysql-errmsg-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm��Pmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��Imecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��Pmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-devel-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm�L�mysql-libs-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm�V�mysql-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm��Imecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��mysql-common-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm�Y�mysql-test-data-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm�|�rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm�V�;�h*�R�mysql-server-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm��rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-test-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm��mysql-errmsg-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm��Pmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��Imecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��Pmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-devel-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm�L�mysql-libs-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm�V�mysql-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm��Imecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��mysql-common-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm�Y�mysql-test-data-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm�|�rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm�ʊ�b�V	��$��_BBBsecurityImportant: wireshark security update��'�&https://access.redhat.com/errata/RHSA-2025:23142RHSA-2025:23142RHSA-2025:23142https://access.redhat.com/security/cve/CVE-2025-13499CVE-2025-13499CVE-2025-13499https://bugzilla.redhat.com/24162932416293https://errata.almalinux.org/9/ALSA-2025-23142.htmlALSA-2025:23142ALSA-2025:23142
�N�twireshark-cli-3.4.10-8.el9_7.1.x86_64.rpm�N�twireshark-cli-3.4.10-8.el9_7.1.i686.rpm��twireshark-3.4.10-8.el9_7.1.x86_64.rpm�N�twireshark-cli-3.4.10-8.el9_7.1.x86_64.rpm�N�twireshark-cli-3.4.10-8.el9_7.1.i686.rpm��twireshark-3.4.10-8.el9_7.1.x86_64.rpm����$�W	��2��eBBBBBBBBBBBsecurityImportant: keylime security update��M�-https://access.redhat.com/errata/RHSA-2025:23210RHSA-2025:23210RHSA-2025:23210https://access.redhat.com/security/cve/CVE-2025-13609CVE-2025-13609CVE-2025-13609https://bugzilla.redhat.com/24167612416761https://errata.almalinux.org/9/ALSA-2025-23210.htmlALSA-2025:23210ALSA-2025:23210
�O�cpython3-keylime-7.12.1-11.el9_7.3.x86_64.rpm�>�ckeylime-7.12.1-11.el9_7.3.x86_64.rpm�@�ckeylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm�?�ckeylime-base-7.12.1-11.el9_7.3.x86_64.rpm�B�ckeylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm�A�ckeylime-tenant-7.12.1-11.el9_7.3.x86_64.rpm�<�ckeylime-selinux-7.12.1-11.el9_7.3.noarch.rpm�O�cpython3-keylime-7.12.1-11.el9_7.3.x86_64.rpm�>�ckeylime-7.12.1-11.el9_7.3.x86_64.rpm�@�ckeylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm�?�ckeylime-base-7.12.1-11.el9_7.3.x86_64.rpm�B�ckeylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm�A�ckeylime-tenant-7.12.1-11.el9_7.3.x86_64.rpm�<�ckeylime-selinux-7.12.1-11.el9_7.3.noarch.rpm�ʊ�!�X	����sBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��z�Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241

#�pkernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm)�prtla-5.14.0-611.16.1.el9_7.x86_64.rpm+�prv-5.14.0-611.16.1.el9_7.x86_64.rpm(�pkernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm'�pperf-5.14.0-611.16.1.el9_7.x86_64.rpm;�ppython3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm&�pkernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm�pkernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm$�pkernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm%�pkernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpm
#�pkernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm)�prtla-5.14.0-611.16.1.el9_7.x86_64.rpm+�prv-5.14.0-611.16.1.el9_7.x86_64.rpm(�pkernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm'�pperf-5.14.0-611.16.1.el9_7.x86_64.rpm;�ppython3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm&�pkernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm�pkernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm$�pkernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm%�pkernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpm����Y	��9�OBBBBBBBBBBBB��mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.3 security update��G�+https://access.redhat.com/errata/RHSA-2025:23309RHSA-2025:23309RHSA-2025:23309https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://errata.almalinux.org/9/ALSA-2025-23309.htmlALSA-2025:23309ALSA-2025:23309
��:�?* �Mphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�W�kphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�	Mphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm�Mphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�U�)php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�
Mphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�V�Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�
Mphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm��aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm��:�?* �Mphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�W�kphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�	Mphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm�Mphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�U�)php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�Mphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�
Mphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�V�Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�
Mphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Mphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm��aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm�ʥ�I�Z	����zBBBBBBBBsecurityModerate: python3.12 security update��r�ghttps://access.redhat.com/errata/RHSA-2025:23323RHSA-2025:23323RHSA-2025:23323https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/24023422402342https://errata.almalinux.org/9/ALSA-2025-23323.htmlALSA-2025:23323ALSA-2025:23323
��2python3.12-tkinter-3.12.12-1.el9_7.x86_64.rpm��2python3.12-libs-3.12.12-1.el9_7.i686.rpm��2python3.12-devel-3.12.12-1.el9_7.i686.rpm��2python3.12-libs-3.12.12-1.el9_7.x86_64.rpm��2python3.12-3.12.12-1.el9_7.x86_64.rpm��2python3.12-devel-3.12.12-1.el9_7.x86_64.rpm��2python3.12-tkinter-3.12.12-1.el9_7.x86_64.rpm��2python3.12-libs-3.12.12-1.el9_7.i686.rpm��2python3.12-devel-3.12.12-1.el9_7.i686.rpm��2python3.12-libs-3.12.12-1.el9_7.x86_64.rpm��2python3.12-3.12.12-1.el9_7.x86_64.rpm��2python3.12-devel-3.12.12-1.el9_7.x86_64.rpm�ʥ��[	����EBBBBBBBsecurityModerate: podman security update��Y�shttps://access.redhat.com/errata/RHSA-2025:23325RHSA-2025:23325RHSA-2025:23325https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23325.htmlALSA-2025:23325ALSA-2025:23325
�3�1podman-remote-5.6.0-9.el9_7.x86_64.rpm�1�1podman-5.6.0-9.el9_7.x86_64.rpm�2�1podman-plugins-5.6.0-9.el9_7.x86_64.rpm�4�1podman-tests-5.6.0-9.el9_7.x86_64.rpmh�1podman-docker-5.6.0-9.el9_7.noarch.rpm�3�1podman-remote-5.6.0-9.el9_7.x86_64.rpm�1�1podman-5.6.0-9.el9_7.x86_64.rpm�2�1podman-plugins-5.6.0-9.el9_7.x86_64.rpm�4�1podman-tests-5.6.0-9.el9_7.x86_64.rpmh�1podman-docker-5.6.0-9.el9_7.noarch.rpm�ʥ��\	����OBBsecurityModerate: skopeo security update��L�Lhttps://access.redhat.com/errata/RHSA-2025:23326RHSA-2025:23326RHSA-2025:23326https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23326.htmlALSA-2025:23326ALSA-2025:23326
�c�:skopeo-1.20.0-2.el9_7.x86_64.rpm�d�:skopeo-tests-1.20.0-2.el9_7.x86_64.rpm�c�:skopeo-1.20.0-2.el9_7.x86_64.rpm�d�:skopeo-tests-1.20.0-2.el9_7.x86_64.rpm�ʥ�O�]	����TBBBBBsecurityModerate: gcc-toolset-13-binutils security update���ehttps://access.redhat.com/errata/RHSA-2025:23336RHSA-2025:23336RHSA-2025:23336https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23336.htmlALSA-2025:23336ALSA-2025:23336
��-gcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpm�0�-gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpm� �-gcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpm�0�-gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpm��-gcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpm�0�-gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpm� �-gcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpm�0�-gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpm�ʥ�o�^	��"��\BBBBsecurityModerate: python3.9 security update��}�x
https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342
Q�python3-devel-3.9.25-2.el9_7.x86_64.rpmf�python-unversioned-command-3.9.25-2.el9_7.noarch.rpmQ�python3-devel-3.9.25-2.el9_7.i686.rpm�+�python3-tkinter-3.9.25-2.el9_7.x86_64.rpmQ�python3-devel-3.9.25-2.el9_7.x86_64.rpmf�python-unversioned-command-3.9.25-2.el9_7.noarch.rpmQ�python3-devel-3.9.25-2.el9_7.i686.rpm�+�python3-tkinter-3.9.25-2.el9_7.x86_64.rpm�ʥ�s�_	��&��cBsecurityModerate: binutils security update��u�https://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343
� �Mbinutils-devel-2.35.2-67.el9_7.1.i686.rpm� �Mbinutils-devel-2.35.2-67.el9_7.1.x86_64.rpm� �Mbinutils-devel-2.35.2-67.el9_7.1.i686.rpm� �Mbinutils-devel-2.35.2-67.el9_7.1.x86_64.rpm�ʥ�j�`	��+��gBBsecurityModerate: openssh security update���whttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480
��4pam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm��Vopenssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpm��4pam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm��Vopenssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpm�ʡ��a	��/��lBsecurityModerate: libssh security update���&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:23483
��libssh-devel-0.10.4-17.el9_7.i686.rpm��libssh-devel-0.10.4-17.el9_7.x86_64.rpm��libssh-devel-0.10.4-17.el9_7.i686.rpm��libssh-devel-0.10.4-17.el9_7.x86_64.rpm�ʡ�
�b	��4��pBBsecurityImportant: firefox security update��-�nhttps://access.redhat.com/errata/RHSA-2025:2359RHSA-2025:2359RHSA-2025:2359https://access.redhat.com/security/cve/CVE-2025-1930CVE-2025-1930CVE-2025-1930https://access.redhat.com/security/cve/CVE-2025-1931CVE-2025-1931CVE-2025-1931https://access.redhat.com/security/cve/CVE-2025-1932CVE-2025-1932CVE-2025-1932https://access.redhat.com/security/cve/CVE-2025-1933CVE-2025-1933CVE-2025-1933https://access.redhat.com/security/cve/CVE-2025-1934CVE-2025-1934CVE-2025-1934https://access.redhat.com/security/cve/CVE-2025-1935CVE-2025-1935CVE-2025-1935https://access.redhat.com/security/cve/CVE-2025-1936CVE-2025-1936CVE-2025-1936https://access.redhat.com/security/cve/CVE-2025-1937CVE-2025-1937CVE-2025-1937https://access.redhat.com/security/cve/CVE-2025-1938CVE-2025-1938CVE-2025-1938https://bugzilla.redhat.com/23497862349786https://bugzilla.redhat.com/23497872349787https://bugzilla.redhat.com/23497902349790https://bugzilla.redhat.com/23497922349792https://bugzilla.redhat.com/23497932349793https://bugzilla.redhat.com/23497942349794https://bugzilla.redhat.com/23497952349795https://bugzilla.redhat.com/23497962349796https://bugzilla.redhat.com/23497972349797https://errata.almalinux.org/9/ALSA-2025-2359.htmlALSA-2025:2359ALSA-2025:2359
P�firefox-x11-128.8.0-1.el9_5.x86_64.rpm8�firefox-128.8.0-1.el9_5.x86_64.rpmP�firefox-x11-128.8.0-1.el9_5.x86_64.rpm8�firefox-128.8.0-1.el9_5.x86_64.rpm����2�c	����uBBBBBBBBBBsecurityImportant: webkit2gtk3 security update���Ihttps://access.redhat.com/errata/RHSA-2025:23700RHSA-2025:23700RHSA-2025:23700https://access.redhat.com/security/cve/CVE-2025-43501CVE-2025-43501CVE-2025-43501https://access.redhat.com/security/cve/CVE-2025-43529CVE-2025-43529CVE-2025-43529https://access.redhat.com/security/cve/CVE-2025-43531CVE-2025-43531CVE-2025-43531https://access.redhat.com/security/cve/CVE-2025-43535CVE-2025-43535CVE-2025-43535https://access.redhat.com/security/cve/CVE-2025-43536CVE-2025-43536CVE-2025-43536https://access.redhat.com/security/cve/CVE-2025-43541CVE-2025-43541CVE-2025-43541https://bugzilla.redhat.com/24231662423166https://bugzilla.redhat.com/24231852423185https://bugzilla.redhat.com/24231872423187https://bugzilla.redhat.com/24231882423188https://bugzilla.redhat.com/24231902423190https://bugzilla.redhat.com/24231912423191https://errata.almalinux.org/9/ALSA-2025-23700.htmlALSA-2025:23700ALSA-2025:23700
2�Bwebkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm3�Bwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm2�Bwebkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm0�Bwebkit2gtk3-2.50.4-1.el9_7.x86_64.rpm1�Bwebkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm0�Bwebkit2gtk3-2.50.4-1.el9_7.i686.rpm1�Bwebkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm3�Bwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpm2�Bwebkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm3�Bwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm2�Bwebkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm0�Bwebkit2gtk3-2.50.4-1.el9_7.x86_64.rpm1�Bwebkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm0�Bwebkit2gtk3-2.50.4-1.el9_7.i686.rpm1�Bwebkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm3�Bwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpm�ʥ�"�d	����BsecurityImportant: opentelemetry-collector security update��d�#https://access.redhat.com/errata/RHSA-2025:23729RHSA-2025:23729RHSA-2025:23729https://access.redhat.com/security/cve/CVE-2025-68156CVE-2025-68156CVE-2025-68156https://bugzilla.redhat.com/24228912422891https://errata.almalinux.org/9/ALSA-2025-23729.htmlALSA-2025:23729ALSA-2025:23729
�I�9opentelemetry-collector-0.135.0-2.el9_7.x86_64.rpm�I�9opentelemetry-collector-0.135.0-2.el9_7.x86_64.rpm�ʪ�!�e	����EsecurityImportant: mod_md security update���Dhttps://access.redhat.com/errata/RHSA-2025:23739RHSA-2025:23739RHSA-2025:23739https://access.redhat.com/security/cve/CVE-2025-55753CVE-2025-55753CVE-2025-55753https://bugzilla.redhat.com/24191402419140https://errata.almalinux.org/9/ALSA-2025-23739.htmlALSA-2025:23739ALSA-2025:23739
��2mod_md-2.4.26-1.el9_7.1.x86_64.rpm��2mod_md-2.4.26-1.el9_7.1.x86_64.rpm�ʥ�~�f	��
��HsecurityImportant: git-lfs security update��K�khttps://access.redhat.com/errata/RHSA-2025:23744RHSA-2025:23744RHSA-2025:23744https://access.redhat.com/security/cve/CVE-2025-26625CVE-2025-26625CVE-2025-26625https://bugzilla.redhat.com/24047202404720https://errata.almalinux.org/9/ALSA-2025-23744.htmlALSA-2025:23744ALSA-2025:23744
�l�git-lfs-3.6.1-4.el9_7.x86_64.rpm�l�git-lfs-3.6.1-4.el9_7.x86_64.rpm�ʤ�0�g	��
��KsecurityImportant: thunderbird security update��6�>https://access.redhat.com/errata/RHSA-2025:23856RHSA-2025:23856RHSA-2025:23856https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23856.htmlALSA-2025:23856ALSA-2025:23856
9�sthunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpm9�sthunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpm�ʫ�
�h	��"��NBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security update��t�\https://access.redhat.com/errata/RHSA-2025:23919RHSA-2025:23919RHSA-2025:23919https://access.redhat.com/security/cve/CVE-2025-58098CVE-2025-58098CVE-2025-58098https://access.redhat.com/security/cve/CVE-2025-65082CVE-2025-65082CVE-2025-65082https://access.redhat.com/security/cve/CVE-2025-66200CVE-2025-66200CVE-2025-66200https://bugzilla.redhat.com/24191392419139https://bugzilla.redhat.com/24192622419262https://bugzilla.redhat.com/24193652419365https://errata.almalinux.org/9/ALSA-2025-23919.htmlALSA-2025:23919ALSA-2025:23919
�}�uhttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm�O�$mod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpm�B�uhttpd-devel-2.4.62-7.el9_7.3.x86_64.rpm�Q�$mod_ssl-2.4.62-7.el9_7.3.x86_64.rpm�@�uhttpd-2.4.62-7.el9_7.3.x86_64.rpm�P�umod_session-2.4.62-7.el9_7.3.x86_64.rpm�A�uhttpd-core-2.4.62-7.el9_7.3.x86_64.rpm�M�umod_ldap-2.4.62-7.el9_7.3.x86_64.rpm�~�uhttpd-manual-2.4.62-7.el9_7.3.noarch.rpm�C�uhttpd-tools-2.4.62-7.el9_7.3.x86_64.rpm�N�umod_lua-2.4.62-7.el9_7.3.x86_64.rpm�}�uhttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm�O�$mod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpm�B�uhttpd-devel-2.4.62-7.el9_7.3.x86_64.rpm�Q�$mod_ssl-2.4.62-7.el9_7.3.x86_64.rpm�@�uhttpd-2.4.62-7.el9_7.3.x86_64.rpm�P�umod_session-2.4.62-7.el9_7.3.x86_64.rpm�A�uhttpd-core-2.4.62-7.el9_7.3.x86_64.rpm�M�umod_ldap-2.4.62-7.el9_7.3.x86_64.rpm�~�uhttpd-manual-2.4.62-7.el9_7.3.noarch.rpm�C�uhttpd-tools-2.4.62-7.el9_7.3.x86_64.rpm�N�umod_lua-2.4.62-7.el9_7.3.x86_64.rpm���+�i	��.��cBBBBBBBBBsecurityImportant: tigervnc security update��P�ohttps://access.redhat.com/errata/RHSA-2025:2500RHSA-2025:2500RHSA-2025:2500https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-2500.htmlALSA-2025:2500ALSA-2025:2500
��
tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm��
tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm�W�
tigervnc-1.14.1-1.el9_5.1.x86_64.rpm�Y�
tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm��
tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm�X�
tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm�Z�
tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm��
tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm��
tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm�W�
tigervnc-1.14.1-1.el9_5.1.x86_64.rpm�Y�
tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm��
tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm�X�
tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm�Z�
tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm����j	����oBBBBBBBBBBBBBBBsecurityImportant: kernel security update��?�9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627
	)�_rtla-5.14.0-503.31.1.el9_5.x86_64.rpm%�_kernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm$�_kernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm�_kernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm'�_perf-5.14.0-503.31.1.el9_5.x86_64.rpm#�_kernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm+�_rv-5.14.0-503.31.1.el9_5.x86_64.rpm&�_kernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm(�_kernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpm	)�_rtla-5.14.0-503.31.1.el9_5.x86_64.rpm%�_kernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm$�_kernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm�_kernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm'�_perf-5.14.0-503.31.1.el9_5.x86_64.rpm#�_kernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm+�_rv-5.14.0-503.31.1.el9_5.x86_64.rpm&�_kernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm(�_kernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpm����I�k	����ABBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security, bug fix, and enhancement update��x�|https://access.redhat.com/errata/RHSA-2025:2668RHSA-2025:2668RHSA-2025:2668https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2668.htmlALSA-2025:2668ALSA-2025:2668
�2�Ddotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm�0�Ddotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm�)�Daspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm�6�ydotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm�(�Daspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm�5�ydotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm�'�Daspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm�3�Ddotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm�"�ynetstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpm�!�Ddotnet-host-9.0.3-1.el9_5.x86_64.rpm�4�ydotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm�8�ydotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm�1�Ddotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm�7�Ddotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm�2�Ddotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm�0�Ddotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm�)�Daspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm�6�ydotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm�(�Daspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm�5�ydotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm�'�Daspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm�3�Ddotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm�"�ynetstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpm�!�Ddotnet-host-9.0.3-1.el9_5.x86_64.rpm�4�ydotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm�8�ydotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm�1�Ddotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm�7�Ddotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm����]�l	��4��^BBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security, bug fix, and enhancement update��t�}https://access.redhat.com/errata/RHSA-2025:2669RHSA-2025:2669RHSA-2025:2669https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2669.htmlALSA-2025:2669ALSA-2025:2669
�a�dotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpm�y�Edotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm�u�Easpnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm�`�Edotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm�Y�Easpnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm�v�Easpnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpm�z�dotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpm�|�dotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpm�x�Edotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpm�w�Edotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpm�{�Edotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpm�y�Edotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm�u�Easpnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm�`�Edotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm�Y�Easpnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm�v�Easpnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpm�z�dotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpm�|�dotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpm�x�Edotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpm�w�Edotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpm�{�Edotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpm����R�m	��8��uBsecurityImportant: libxml2 security update��q�Phttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679
�E�jlibxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm�E�jlibxml2-devel-2.9.13-6.el9_5.2.i686.rpm�E�jlibxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm�E�jlibxml2-devel-2.9.13-6.el9_5.2.i686.rpm��ʏS�n	����yBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��A�qhttps://access.redhat.com/errata/RHSA-2025:2864RHSA-2025:2864RHSA-2025:2864https://access.redhat.com/security/cve/CVE-2025-24201CVE-2025-24201CVE-2025-24201https://bugzilla.redhat.com/23518022351802https://errata.almalinux.org/9/ALSA-2025-2864.htmlALSA-2025:2864ALSA-2025:2864
2�:webkit2gtk3-jsc-2.46.6-2.el9_5.i686.rpm2�:webkit2gtk3-jsc-2.46.6-2.el9_5.x86_64.rpm3�:webkit2gtk3-jsc-devel-2.46.6-2.el9_5.i686.rpm0�:webkit2gtk3-2.46.6-2.el9_5.x86_64.rpm0�:webkit2gtk3-2.46.6-2.el9_5.i686.rpm1�:webkit2gtk3-devel-2.46.6-2.el9_5.i686.rpm3�:webkit2gtk3-jsc-devel-2.46.6-2.el9_5.x86_64.rpm1�:webkit2gtk3-devel-2.46.6-2.el9_5.x86_64.rpm2�:webkit2gtk3-jsc-2.46.6-2.el9_5.i686.rpm2�:webkit2gtk3-jsc-2.46.6-2.el9_5.x86_64.rpm3�:webkit2gtk3-jsc-devel-2.46.6-2.el9_5.i686.rpm0�:webkit2gtk3-2.46.6-2.el9_5.x86_64.rpm0�:webkit2gtk3-2.46.6-2.el9_5.i686.rpm1�:webkit2gtk3-devel-2.46.6-2.el9_5.i686.rpm3�:webkit2gtk3-jsc-devel-2.46.6-2.el9_5.x86_64.rpm1�:webkit2gtk3-devel-2.46.6-2.el9_5.x86_64.rpm�����o	����FsecurityImportant: thunderbird security update��2�Ehttps://access.redhat.com/errata/RHSA-2025:2899RHSA-2025:2899RHSA-2025:2899https://access.redhat.com/security/cve/CVE-2025-1937CVE-2025-1937CVE-2025-1937https://access.redhat.com/security/cve/CVE-2025-1938CVE-2025-1938CVE-2025-1938https://bugzilla.redhat.com/23497932349793https://bugzilla.redhat.com/23497952349795https://errata.almalinux.org/9/ALSA-2025-2899.htmlALSA-2025:2899ALSA-2025:2899
9�thunderbird-128.8.0-2.el9_5.alma.1.x86_64.rpm9�thunderbird-128.8.0-2.el9_5.alma.1.x86_64.rpm����v�p	����IBBBBsecurityImportant: libxslt security update��w�vhttps://access.redhat.com/errata/RHSA-2025:3107RHSA-2025:3107RHSA-2025:3107https://access.redhat.com/security/cve/CVE-2025-24855CVE-2025-24855CVE-2025-24855https://bugzilla.redhat.com/23524832352483https://errata.almalinux.org/9/ALSA-2025-3107.htmlALSA-2025:3107ALSA-2025:3107
�9�Tlibxslt-devel-1.1.34-9.el9_5.1.x86_64.rpm�8�Tlibxslt-1.1.34-9.el9_5.1.i686.rpm�9�Tlibxslt-devel-1.1.34-9.el9_5.1.i686.rpm�8�Tlibxslt-1.1.34-9.el9_5.1.x86_64.rpm�9�Tlibxslt-devel-1.1.34-9.el9_5.1.x86_64.rpm�8�Tlibxslt-1.1.34-9.el9_5.1.i686.rpm�9�Tlibxslt-devel-1.1.34-9.el9_5.1.i686.rpm�8�Tlibxslt-1.1.34-9.el9_5.1.x86_64.rpm����[�q	��"��PBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.22 security update��m�5https://access.redhat.com/errata/RHSA-2025:3261RHSA-2025:3261RHSA-2025:3261https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://errata.almalinux.org/9/ALSA-2025-3261.htmlALSA-2025:3261ALSA-2025:3261
�O�T�[*
��	nginx-mod-http-image-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm��	nginx-mod-devel-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�O�	nginx-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�H�	nginx-filesystem-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm��	nginx-mod-http-perl-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�v�	nginx-mod-stream-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm��	nginx-mod-mail-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�G�	nginx-all-modules-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm��	nginx-mod-http-xslt-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm��	nginx-core-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�O�T�[*
��	nginx-mod-http-image-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm��	nginx-mod-devel-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�O�	nginx-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�H�	nginx-filesystem-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm��	nginx-mod-http-perl-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�v�	nginx-mod-stream-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm��	nginx-mod-mail-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�G�	nginx-all-modules-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm��	nginx-mod-http-xslt-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm��	nginx-core-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm�����r	��5��cBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.24 security update��"�5https://access.redhat.com/errata/RHSA-2025:3262RHSA-2025:3262RHSA-2025:3262https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://errata.almalinux.org/9/ALSA-2025-3262.htmlALSA-2025:3262ALSA-2025:3262
�O��\*
��
nginx-mod-http-perl-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�H�
nginx-filesystem-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpm�O�
nginx-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-core-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-mod-http-image-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-mod-http-xslt-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-mod-devel-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�v�
nginx-mod-stream-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�G�
nginx-all-modules-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpm��
nginx-mod-mail-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�O��\*
��
nginx-mod-http-perl-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�H�
nginx-filesystem-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpm�O�
nginx-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-core-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-mod-http-image-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-mod-http-xslt-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm��
nginx-mod-devel-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�v�
nginx-mod-stream-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�G�
nginx-all-modules-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpm��
nginx-mod-mail-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm�Ĉ�l�s	��:��vBBsecurityImportant: grafana security update��W�,https://access.redhat.com/errata/RHSA-2025:3344RHSA-2025:3344RHSA-2025:3344https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-3344.htmlALSA-2025:3344ALSA-2025:3344
�I�zgrafana-10.2.6-9.el9_5.x86_64.rpm�U�zgrafana-selinux-10.2.6-9.el9_5.x86_64.rpm�I�zgrafana-10.2.6-9.el9_5.x86_64.rpm�U�zgrafana-selinux-10.2.6-9.el9_5.x86_64.rpm����%�t	��<��;securityImportant: python-jinja2 security update���Qhttps://access.redhat.com/errata/RHSA-2025:3406RHSA-2025:3406RHSA-2025:3406https://access.redhat.com/security/cve/CVE-2025-27516CVE-2025-27516CVE-2025-27516https://bugzilla.redhat.com/23501902350190https://errata.almalinux.org/9/ALSA-2025-3406.htmlALSA-2025:3406ALSA-2025:3406
�N�ipython3-jinja2-2.11.3-8.el9_5.noarch.rpm�N�ipython3-jinja2-2.11.3-8.el9_5.noarch.rpm����L�u	����}BsecurityModerate: expat security update��T�lhttps://access.redhat.com/errata/RHSA-2025:3531RHSA-2025:3531RHSA-2025:3531https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-3531.htmlALSA-2025:3531ALSA-2025:3531
��Vexpat-devel-2.5.0-3.el9_5.3.i686.rpm��Vexpat-devel-2.5.0-3.el9_5.3.x86_64.rpm��Vexpat-devel-2.5.0-3.el9_5.3.i686.rpm��Vexpat-devel-2.5.0-3.el9_5.3.x86_64.rpm����K�v	����ABBsecurityImportant: firefox security update��@�https://access.redhat.com/errata/RHSA-2025:3556RHSA-2025:3556RHSA-2025:3556https://access.redhat.com/security/cve/CVE-2025-3028CVE-2025-3028CVE-2025-3028https://access.redhat.com/security/cve/CVE-2025-3029CVE-2025-3029CVE-2025-3029https://access.redhat.com/security/cve/CVE-2025-3030CVE-2025-3030CVE-2025-3030https://bugzilla.redhat.com/23565562356556https://bugzilla.redhat.com/23565622356562https://bugzilla.redhat.com/23565632356563https://errata.almalinux.org/9/ALSA-2025-3556.htmlALSA-2025:3556ALSA-2025:3556
P�firefox-x11-128.9.0-2.el9_5.x86_64.rpm8�firefox-128.9.0-2.el9_5.x86_64.rpmP�firefox-x11-128.9.0-2.el9_5.x86_64.rpm8�firefox-128.9.0-2.el9_5.x86_64.rpm����V�w	����FBBBsecurityImportant: gimp security update��C�,
https://access.redhat.com/errata/RHSA-2025:3617RHSA-2025:3617RHSA-2025:3617https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2025-3617.htmlALSA-2025:3617ALSA-2025:3617
�?�gimp-2.99.8-4.el9_5.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_5.i686.rpm�J�gimp-libs-2.99.8-4.el9_5.x86_64.rpm�?�gimp-2.99.8-4.el9_5.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_5.i686.rpm�J�gimp-libs-2.99.8-4.el9_5.x86_64.rpm��Ϸ�x	����LBBBBBBBBsecurityLow: python3.12 security update�6��o�Xhttps://access.redhat.com/errata/RHSA-2025:3631RHSA-2025:3631RHSA-2025:3631https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3631.htmlALSA-2025:3631ALSA-2025:3631
��:python3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-devel-3.12.5-2.el9_5.3.i686.rpm��:python3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-libs-3.12.5-2.el9_5.3.i686.rpm��:python3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-devel-3.12.5-2.el9_5.3.i686.rpm��:python3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpm��:python3.12-libs-3.12.5-2.el9_5.3.i686.rpm����9�y	��!��WBBBBBBBBsecurityLow: python3.11 security update�6��G�Xhttps://access.redhat.com/errata/RHSA-2025:3634RHSA-2025:3634RHSA-2025:3634https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3634.htmlALSA-2025:3634ALSA-2025:3634
\�/python3.11-libs-3.11.9-7.el9_5.3.i686.rpm�Q�/python3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm[�/python3.11-devel-3.11.9-7.el9_5.3.x86_64.rpm\�/python3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm[�/python3.11-devel-3.11.9-7.el9_5.3.i686.rpm�P�/python3.11-3.11.9-7.el9_5.3.x86_64.rpm\�/python3.11-libs-3.11.9-7.el9_5.3.i686.rpm�Q�/python3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm[�/python3.11-devel-3.11.9-7.el9_5.3.x86_64.rpm\�/python3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm[�/python3.11-devel-3.11.9-7.el9_5.3.i686.rpm�P�/python3.11-3.11.9-7.el9_5.3.x86_64.rpm����C�z	��*��bBBBBBBsecurityModerate: tomcat security update���{https://access.redhat.com/errata/RHSA-2025:3645RHSA-2025:3645RHSA-2025:3645https://access.redhat.com/security/cve/CVE-2024-50379CVE-2024-50379CVE-2024-50379https://access.redhat.com/security/cve/CVE-2025-24813CVE-2025-24813CVE-2025-24813https://bugzilla.redhat.com/23328172332817https://bugzilla.redhat.com/23511292351129https://errata.almalinux.org/9/ALSA-2025-3645.htmlALSA-2025:3645ALSA-2025:3645
��7tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-lib-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-lib-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpm��7tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm��� �{	��7��kBBBBBBBBBBsecurityImportant: webkit2gtk3 security update���
https://access.redhat.com/errata/RHSA-2025:3713RHSA-2025:3713RHSA-2025:3713https://access.redhat.com/security/cve/CVE-2024-44192CVE-2024-44192CVE-2024-44192https://access.redhat.com/security/cve/CVE-2024-54467CVE-2024-54467CVE-2024-54467https://access.redhat.com/security/cve/CVE-2024-54551CVE-2024-54551CVE-2024-54551https://access.redhat.com/security/cve/CVE-2025-24208CVE-2025-24208CVE-2025-24208https://access.redhat.com/security/cve/CVE-2025-24209CVE-2025-24209CVE-2025-24209https://access.redhat.com/security/cve/CVE-2025-24216CVE-2025-24216CVE-2025-24216https://access.redhat.com/security/cve/CVE-2025-30427CVE-2025-30427CVE-2025-30427https://bugzilla.redhat.com/23538712353871https://bugzilla.redhat.com/23538722353872https://bugzilla.redhat.com/23579092357909https://bugzilla.redhat.com/23579102357910https://bugzilla.redhat.com/23579112357911https://bugzilla.redhat.com/23579172357917https://bugzilla.redhat.com/23579192357919https://errata.almalinux.org/9/ALSA-2025-3713.htmlALSA-2025:3713ALSA-2025:3713
1�;webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm0�;webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm0�;webkit2gtk3-2.48.1-1.el9_5.i686.rpm2�;webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm3�;webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm2�;webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm3�;webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm1�;webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm1�;webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm0�;webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm0�;webkit2gtk3-2.48.1-1.el9_5.i686.rpm2�;webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm3�;webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm2�;webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm3�;webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm1�;webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm�����|	����xBBBBBBBBBBBBsecurityImportant: delve and golang security update��$�https://access.redhat.com/errata/RHSA-2025:3773RHSA-2025:3773RHSA-2025:3773https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2025-3773.htmlALSA-2025:3773ALSA-2025:3773
	n�golang-misc-1.23.6-2.el9_5.noarch.rpm�N�go-toolset-1.23.6-2.el9_5.x86_64.rpm�G�golang-1.23.6-2.el9_5.x86_64.rpmp�golang-tests-1.23.6-2.el9_5.noarch.rpmo�golang-src-1.23.6-2.el9_5.noarch.rpmm�golang-docs-1.23.6-2.el9_5.noarch.rpm�q�Udelve-1.24.1-2.el9_5.x86_64.rpm�T�golang-race-1.23.6-2.el9_5.x86_64.rpm�H�golang-bin-1.23.6-2.el9_5.x86_64.rpm	n�golang-misc-1.23.6-2.el9_5.noarch.rpm�N�go-toolset-1.23.6-2.el9_5.x86_64.rpm�G�golang-1.23.6-2.el9_5.x86_64.rpmp�golang-tests-1.23.6-2.el9_5.noarch.rpmo�golang-src-1.23.6-2.el9_5.noarch.rpmm�golang-docs-1.23.6-2.el9_5.noarch.rpm�q�Udelve-1.24.1-2.el9_5.x86_64.rpm�T�golang-race-1.23.6-2.el9_5.x86_64.rpm�H�golang-bin-1.23.6-2.el9_5.x86_64.rpm���5�}	��	��GsecurityImportant: gvisor-tap-vsock security update��:�Yhttps://access.redhat.com/errata/RHSA-2025:3833RHSA-2025:3833RHSA-2025:3833https://access.redhat.com/security/cve/CVE-2025-22869CVE-2025-22869CVE-2025-22869https://bugzilla.redhat.com/23483672348367https://errata.almalinux.org/9/ALSA-2025-3833.htmlALSA-2025:3833ALSA-2025:3833
�;�Agvisor-tap-vsock-0.8.5-1.el9_5.x86_64.rpm�;�Agvisor-tap-vsock-0.8.5-1.el9_5.x86_64.rpm����5�~	����JBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update���https://access.redhat.com/errata/RHSA-2025:3845RHSA-2025:3845RHSA-2025:3845https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3845.htmlALSA-2025:3845ALSA-2025:3845
�U�rjava-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9.x86_64.rpm�T�rjava-1.8.0-openjdk-1.8.0.452.b09-2.el9.x86_64.rpm�7�rjava-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9.noarch.rpm�W�rjava-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9.x86_64.rpm�8�rjava-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9.noarch.rpm�X�rjava-1.8.0-openjdk-src-1.8.0.452.b09-2.el9.x86_64.rpm�V�rjava-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9.x86_64.rpm�U�rjava-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9.x86_64.rpm�T�rjava-1.8.0-openjdk-1.8.0.452.b09-2.el9.x86_64.rpm�7�rjava-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9.noarch.rpm�W�rjava-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9.x86_64.rpm�8�rjava-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9.noarch.rpm�X�rjava-1.8.0-openjdk-src-1.8.0.452.b09-2.el9.x86_64.rpm�V�rjava-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9.x86_64.rpm����W�	��)��WBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update���https://access.redhat.com/errata/RHSA-2025:3852RHSA-2025:3852RHSA-2025:3852https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3852.htmlALSA-2025:3852ALSA-2025:3852
	��'java-17-openjdk-jmods-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-headless-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-demo-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-src-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-javadoc-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-static-libs-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-devel-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-17.0.15.0.6-2.el9.alma.1.x86_64.rpm	��'java-17-openjdk-jmods-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-headless-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-demo-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-src-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-javadoc-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-static-libs-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-devel-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��'java-17-openjdk-17.0.15.0.6-2.el9.alma.1.x86_64.rpm��� �	��<��jBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update���https://access.redhat.com/errata/RHSA-2025:3855RHSA-2025:3855RHSA-2025:3855https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3855.htmlALSA-2025:3855ALSA-2025:3855
	�p�9java-21-openjdk-headless-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�u�9java-21-openjdk-static-libs-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�n�9java-21-openjdk-demo-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�q�9java-21-openjdk-javadoc-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�t�9java-21-openjdk-src-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�r�9java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�o�9java-21-openjdk-devel-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�m�9java-21-openjdk-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�s�9java-21-openjdk-jmods-21.0.7.0.6-1.el9.alma.1.x86_64.rpm	�p�9java-21-openjdk-headless-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�u�9java-21-openjdk-static-libs-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�n�9java-21-openjdk-demo-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�q�9java-21-openjdk-javadoc-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�t�9java-21-openjdk-src-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�r�9java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�o�9java-21-openjdk-devel-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�m�9java-21-openjdk-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�s�9java-21-openjdk-jmods-21.0.7.0.6-1.el9.alma.1.x86_64.rpm����	����}BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update���https://access.redhat.com/errata/RHSA-2025:3937RHSA-2025:3937RHSA-2025:3937https://access.redhat.com/security/cve/CVE-2024-53150CVE-2024-53150CVE-2024-53150https://bugzilla.redhat.com/23339712333971https://errata.almalinux.org/9/ALSA-2025-3937.htmlALSA-2025:3937ALSA-2025:3937

(�Rkernel-headers-5.14.0-503.38.1.el9_5.x86_64.rpm+�Rrv-5.14.0-503.38.1.el9_5.x86_64.rpm�Rkernel-doc-5.14.0-503.38.1.el9_5.noarch.rpm)�Rrtla-5.14.0-503.38.1.el9_5.x86_64.rpm#�Rkernel-debug-devel-5.14.0-503.38.1.el9_5.x86_64.rpm&�Rkernel-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm$�Rkernel-debug-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm;�Rpython3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm%�Rkernel-devel-5.14.0-503.38.1.el9_5.x86_64.rpm'�Rperf-5.14.0-503.38.1.el9_5.x86_64.rpm
(�Rkernel-headers-5.14.0-503.38.1.el9_5.x86_64.rpm+�Rrv-5.14.0-503.38.1.el9_5.x86_64.rpm�Rkernel-doc-5.14.0-503.38.1.el9_5.noarch.rpm)�Rrtla-5.14.0-503.38.1.el9_5.x86_64.rpm#�Rkernel-debug-devel-5.14.0-503.38.1.el9_5.x86_64.rpm&�Rkernel-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm$�Rkernel-debug-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm;�Rpython3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm%�Rkernel-devel-5.14.0-503.38.1.el9_5.x86_64.rpm'�Rperf-5.14.0-503.38.1.el9_5.x86_64.rpm����_�	����QBBBBsecurityImportant: libxslt security update��*�https://access.redhat.com/errata/RHSA-2025:4025RHSA-2025:4025RHSA-2025:4025https://access.redhat.com/security/cve/CVE-2024-55549CVE-2024-55549CVE-2024-55549https://bugzilla.redhat.com/23524842352484https://errata.almalinux.org/9/ALSA-2025-4025.htmlALSA-2025:4025ALSA-2025:4025
�9�Ulibxslt-devel-1.1.34-9.el9_5.2.x86_64.rpm�8�Ulibxslt-1.1.34-9.el9_5.2.i686.rpm�9�Ulibxslt-devel-1.1.34-9.el9_5.2.i686.rpm�8�Ulibxslt-1.1.34-9.el9_5.2.x86_64.rpm�9�Ulibxslt-devel-1.1.34-9.el9_5.2.x86_64.rpm�8�Ulibxslt-1.1.34-9.el9_5.2.i686.rpm�9�Ulibxslt-devel-1.1.34-9.el9_5.2.i686.rpm�8�Ulibxslt-1.1.34-9.el9_5.2.x86_64.rpm�����	����XsecurityImportant: thunderbird security update��/�Rhttps://access.redhat.com/errata/RHSA-2025:4169RHSA-2025:4169RHSA-2025:4169https://access.redhat.com/security/cve/CVE-2025-3028CVE-2025-3028CVE-2025-3028https://access.redhat.com/security/cve/CVE-2025-3029CVE-2025-3029CVE-2025-3029https://access.redhat.com/security/cve/CVE-2025-3030CVE-2025-3030CVE-2025-3030https://bugzilla.redhat.com/23565562356556https://bugzilla.redhat.com/23565622356562https://bugzilla.redhat.com/23565632356563https://errata.almalinux.org/9/ALSA-2025-4169.htmlALSA-2025:4169ALSA-2025:4169
9�thunderbird-128.9.0-2.el9_5.alma.1.x86_64.rpm9�thunderbird-128.9.0-2.el9_5.alma.1.x86_64.rpm�����	����[securityImportant: thunderbird security update��� https://access.redhat.com/errata/RHSA-2025:4229RHSA-2025:4229RHSA-2025:4229https://access.redhat.com/security/cve/CVE-2025-2830CVE-2025-2830CVE-2025-2830https://access.redhat.com/security/cve/CVE-2025-3522CVE-2025-3522CVE-2025-3522https://access.redhat.com/security/cve/CVE-2025-3523CVE-2025-3523CVE-2025-3523https://bugzilla.redhat.com/23597862359786https://bugzilla.redhat.com/23597892359789https://bugzilla.redhat.com/23597932359793https://errata.almalinux.org/9/ALSA-2025-4229.htmlALSA-2025:4229ALSA-2025:4229
9�thunderbird-128.9.2-1.el9_5.alma.1.x86_64.rpm9�thunderbird-128.9.2-1.el9_5.alma.1.x86_64.rpm����b�	��(��^BBBBBBBBsecurityModerate: glibc security update��!�;https://access.redhat.com/errata/RHSA-2025:4244RHSA-2025:4244RHSA-2025:4244https://access.redhat.com/security/cve/CVE-2025-0395CVE-2025-0395CVE-2025-0395https://bugzilla.redhat.com/23394602339460https://errata.almalinux.org/9/ALSA-2025-4244.htmlALSA-2025:4244ALSA-2025:4244
�(�glibc-doc-2.34-125.el9_5.8.alma.1.noarch.rpm�?�glibc-headers-2.34-125.el9_5.8.alma.1.x86_64.rpm�@�glibc-locale-source-2.34-125.el9_5.8.alma.1.x86_64.rpm�A�glibc-utils-2.34-125.el9_5.8.alma.1.x86_64.rpm�h�glibc-devel-2.34-125.el9_5.8.alma.1.i686.rpm�h�glibc-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm�(�glibc-doc-2.34-125.el9_5.8.alma.1.noarch.rpm�?�glibc-headers-2.34-125.el9_5.8.alma.1.x86_64.rpm�@�glibc-locale-source-2.34-125.el9_5.8.alma.1.x86_64.rpm�A�glibc-utils-2.34-125.el9_5.8.alma.1.x86_64.rpm�h�glibc-devel-2.34-125.el9_5.8.alma.1.i686.rpm�h�glibc-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm����?�	���~BBBBBBBB_B��EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update��\�3https://access.redhat.com/errata/RHSA-2025:4263RHSA-2025:4263RHSA-2025:4263https://access.redhat.com/security/cve/CVE-2024-11233CVE-2024-11233CVE-2024-11233https://access.redhat.com/security/cve/CVE-2024-11234CVE-2024-11234CVE-2024-11234https://access.redhat.com/security/cve/CVE-2024-8929CVE-2024-8929CVE-2024-8929https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23279602327960https://bugzilla.redhat.com/23285212328521https://bugzilla.redhat.com/23285232328523https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-4263.htmlALSA-2025:4263ALSA-2025:4263
��j�]*�Hphp-snmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-dba-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-mysqlnd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-embedded-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�U�(php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-ldap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-pgsql-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�	Hphp-cli-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�
Hphp-devel-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-opcache-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�
Hphp-common-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-intl-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-odbc-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-soap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-gd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-xml-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-pdo-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-mbstring-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-bcmath-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-enchant-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-ffi-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-process-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-gmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-dbg-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�Hphp-fpm-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm��j�]*�Hphp-snmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-dba-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-mysqlnd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�W�Jphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-embedded-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�U�(php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-ldap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-pgsql-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�	Hphp-cli-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�
Hphp-devel-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-opcache-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�
Hphp-common-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-intl-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-odbc-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-soap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-gd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-xml-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-pdo-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-mbstring-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�V�Mphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-bcmath-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-enchant-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-ffi-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-process-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�T�php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm�Hphp-gmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�Hphp-dbg-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�
�apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm�Hphp-fpm-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm�S�php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm��(�	�� ��\BBsecurityImportant: firefox security update���ghttps://access.redhat.com/errata/RHSA-2025:4443RHSA-2025:4443RHSA-2025:4443https://access.redhat.com/security/cve/CVE-2025-2817CVE-2025-2817CVE-2025-2817https://access.redhat.com/security/cve/CVE-2025-4083CVE-2025-4083CVE-2025-4083https://access.redhat.com/security/cve/CVE-2025-4087CVE-2025-4087CVE-2025-4087https://access.redhat.com/security/cve/CVE-2025-4091CVE-2025-4091CVE-2025-4091https://access.redhat.com/security/cve/CVE-2025-4093CVE-2025-4093CVE-2025-4093https://bugzilla.redhat.com/23629022362902https://bugzilla.redhat.com/23629042362904https://bugzilla.redhat.com/23629072362907https://bugzilla.redhat.com/23629122362912https://bugzilla.redhat.com/23629152362915https://errata.almalinux.org/9/ALSA-2025-4443.htmlALSA-2025:4443ALSA-2025:4443
8�hfirefox-128.10.0-1.el9_5.alma.1.x86_64.rpmP�hfirefox-x11-128.10.0-1.el9_5.alma.1.x86_64.rpm8�hfirefox-128.10.0-1.el9_5.alma.1.x86_64.rpmP�hfirefox-x11-128.10.0-1.el9_5.alma.1.x86_64.rpm�����	��#��asecurityImportant: thunderbird security update��v�6https://access.redhat.com/errata/RHSA-2025:4460RHSA-2025:4460RHSA-2025:4460https://access.redhat.com/security/cve/CVE-2025-2817CVE-2025-2817CVE-2025-2817https://access.redhat.com/security/cve/CVE-2025-4083CVE-2025-4083CVE-2025-4083https://access.redhat.com/security/cve/CVE-2025-4087CVE-2025-4087CVE-2025-4087https://access.redhat.com/security/cve/CVE-2025-4091CVE-2025-4091CVE-2025-4091https://access.redhat.com/security/cve/CVE-2025-4093CVE-2025-4093CVE-2025-4093https://bugzilla.redhat.com/23629022362902https://bugzilla.redhat.com/23629042362904https://bugzilla.redhat.com/23629072362907https://bugzilla.redhat.com/23629122362912https://bugzilla.redhat.com/23629152362915https://errata.almalinux.org/9/ALSA-2025-4460.htmlALSA-2025:4460ALSA-2025:4460
9�hthunderbird-128.10.0-1.el9_5.alma.1.x86_64.rpm9�hthunderbird-128.10.0-1.el9_5.alma.1.x86_64.rpm�����		��$�KBBBBsecurityModerate: ruby:3.1 security update��,�ghttps://access.redhat.com/errata/RHSA-2025:4488RHSA-2025:4488RHSA-2025:4488https://access.redhat.com/security/cve/CVE-2024-39908CVE-2024-39908CVE-2024-39908https://access.redhat.com/security/cve/CVE-2024-41123CVE-2024-41123CVE-2024-41123https://access.redhat.com/security/cve/CVE-2024-41946CVE-2024-41946CVE-2024-41946https://access.redhat.com/security/cve/CVE-2024-43398CVE-2024-43398CVE-2024-43398https://access.redhat.com/security/cve/CVE-2025-27219CVE-2025-27219CVE-2025-27219https://access.redhat.com/security/cve/CVE-2025-27220CVE-2025-27220CVE-2025-27220https://access.redhat.com/security/cve/CVE-2025-27221CVE-2025-27221CVE-2025-27221https://bugzilla.redhat.com/22982432298243https://bugzilla.redhat.com/23022682302268https://bugzilla.redhat.com/23022722302272https://bugzilla.redhat.com/23072972307297https://bugzilla.redhat.com/23496962349696https://bugzilla.redhat.com/23496992349699https://bugzilla.redhat.com/23497002349700https://errata.almalinux.org/9/ALSA-2025-4488.htmlALSA-2025:4488ALSA-2025:4488
�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�K�	rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm�L�rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm�B�	rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm�C�rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm���`�
	��,��eBBBBBsecurityModerate: 389-ds-base security update���zhttps://access.redhat.com/errata/RHSA-2025:4491RHSA-2025:4491RHSA-2025:4491https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-4491.htmlALSA-2025:4491ALSA-2025:4491
�/�.python3-lib389-2.5.2-9.el9_5.noarch.rpm��.389-ds-base-libs-2.5.2-9.el9_5.x86_64.rpm�S�.389-ds-base-snmp-2.5.2-9.el9_5.x86_64.rpm��.389-ds-base-2.5.2-9.el9_5.x86_64.rpm�/�.python3-lib389-2.5.2-9.el9_5.noarch.rpm��.389-ds-base-libs-2.5.2-9.el9_5.x86_64.rpm�S�.389-ds-base-snmp-2.5.2-9.el9_5.x86_64.rpm��.389-ds-base-2.5.2-9.el9_5.x86_64.rpm���k�	��3��mBBBBsecurityImportant: osbuild-composer security update��
�Lhttps://access.redhat.com/errata/RHSA-2025:4669RHSA-2025:4669RHSA-2025:4669https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-4669.htmlALSA-2025:4669ALSA-2025:4669
�w�gosbuild-composer-118.2-1.el9_5.alma.1.x86_64.rpm�x�gosbuild-composer-core-118.2-1.el9_5.alma.1.x86_64.rpm�y�gosbuild-composer-worker-118.2-1.el9_5.alma.1.x86_64.rpm�w�gosbuild-composer-118.2-1.el9_5.alma.1.x86_64.rpm�x�gosbuild-composer-core-118.2-1.el9_5.alma.1.x86_64.rpm�y�gosbuild-composer-worker-118.2-1.el9_5.alma.1.x86_64.rpm����^�	��=��tBBBBBBBsecurityModerate: emacs security update��Y�`https://access.redhat.com/errata/RHSA-2025:4787RHSA-2025:4787RHSA-2025:4787https://access.redhat.com/security/cve/CVE-2024-53920CVE-2024-53920CVE-2024-53920https://bugzilla.redhat.com/23291612329161https://errata.almalinux.org/9/ALSA-2025-4787.htmlALSA-2025:4787ALSA-2025:4787
�^�emacs-common-27.2-11.el9_5.2.x86_64.rpm�_�emacs-lucid-27.2-11.el9_5.2.x86_64.rpm�`�emacs-nox-27.2-11.el9_5.2.x86_64.rpm�`�emacs-filesystem-27.2-11.el9_5.2.noarch.rpm�]�emacs-27.2-11.el9_5.2.x86_64.rpm�^�emacs-common-27.2-11.el9_5.2.x86_64.rpm�_�emacs-lucid-27.2-11.el9_5.2.x86_64.rpm�`�emacs-nox-27.2-11.el9_5.2.x86_64.rpm�`�emacs-filesystem-27.2-11.el9_5.2.noarch.rpm�]�emacs-27.2-11.el9_5.2.x86_64.rpm����N�
	����~BBBBsecurityModerate: python3.9 security update��9�[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:6977
f�python-unversioned-command-3.9.21-2.el9.noarch.rpm�+�python3-tkinter-3.9.21-2.el9.x86_64.rpmQ�python3-devel-3.9.21-2.el9.x86_64.rpmQ�python3-devel-3.9.21-2.el9.i686.rpmf�python-unversioned-command-3.9.21-2.el9.noarch.rpm�+�python3-tkinter-3.9.21-2.el9.x86_64.rpmQ�python3-devel-3.9.21-2.el9.x86_64.rpmQ�python3-devel-3.9.21-2.el9.i686.rpm��t�	��	��EBBsecurityModerate: openssh security update���https://access.redhat.com/errata/RHSA-2025:6993RHSA-2025:6993RHSA-2025:6993https://access.redhat.com/security/cve/CVE-2025-26465CVE-2025-26465CVE-2025-26465https://bugzilla.redhat.com/23447802344780https://errata.almalinux.org/9/ALSA-2025-6993.htmlALSA-2025:6993ALSA-2025:6993
��Uopenssh-askpass-8.7p1-45.el9.x86_64.rpm��3pam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm��Uopenssh-askpass-8.7p1-45.el9.x86_64.rpm��3pam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm�‡�{�	����JsecurityModerate: python-requests security update���`https://access.redhat.com/errata/RHSA-2025:7049RHSA-2025:7049RHSA-2025:7049https://access.redhat.com/security/cve/CVE-2024-35195CVE-2024-35195CVE-2024-35195https://bugzilla.redhat.com/22821142282114https://errata.almalinux.org/9/ALSA-2025-7049.htmlALSA-2025:7049ALSA-2025:7049
�\�python3-requests+security-2.25.1-9.el9.noarch.rpm�]�python3-requests+socks-2.25.1-9.el9.noarch.rpm�\�python3-requests+security-2.25.1-9.el9.noarch.rpm�]�python3-requests+socks-2.25.1-9.el9.noarch.rpm��#�	����MsecurityModerate: rsync security update��t�`https://access.redhat.com/errata/RHSA-2025:7050RHSA-2025:7050RHSA-2025:7050https://access.redhat.com/security/cve/CVE-2024-12087CVE-2024-12087CVE-2024-12087https://access.redhat.com/security/cve/CVE-2024-12088CVE-2024-12088CVE-2024-12088https://access.redhat.com/security/cve/CVE-2024-12747CVE-2024-12747CVE-2024-12747https://bugzilla.redhat.com/23306722330672https://bugzilla.redhat.com/23306762330676https://bugzilla.redhat.com/23329682332968https://errata.almalinux.org/9/ALSA-2025-7050.htmlALSA-2025:7050ALSA-2025:7050
�S�,rsync-daemon-3.2.5-3.el9.noarch.rpm��,rsync-rrsync-3.2.5-3.el9.noarch.rpm�S�,rsync-daemon-3.2.5-3.el9.noarch.rpm��,rsync-rrsync-3.2.5-3.el9.noarch.rpm��.�	����PBsecurityModerate: krb5 security update��T�{https://access.redhat.com/errata/RHSA-2025:7067RHSA-2025:7067RHSA-2025:7067https://access.redhat.com/security/cve/CVE-2025-24528CVE-2025-24528CVE-2025-24528https://bugzilla.redhat.com/23427962342796https://errata.almalinux.org/9/ALSA-2025-7067.htmlALSA-2025:7067ALSA-2025:7067
�d�/krb5-devel-1.21.1-6.el9.i686.rpm�d�/krb5-devel-1.21.1-6.el9.x86_64.rpm�d�/krb5-devel-1.21.1-6.el9.i686.rpm�d�/krb5-devel-1.21.1-6.el9.x86_64.rpm��i�	����TBBBBBBBBBsecurityModerate: gnutls security update��O�xhttps://access.redhat.com/errata/RHSA-2025:7076RHSA-2025:7076RHSA-2025:7076https://access.redhat.com/security/cve/CVE-2024-12243CVE-2024-12243CVE-2024-12243https://bugzilla.redhat.com/23446152344615https://errata.almalinux.org/9/ALSA-2025-7076.htmlALSA-2025:7076ALSA-2025:7076
�a�gnutls-c++-3.8.3-6.el9.i686.rpm�c�gnutls-devel-3.8.3-6.el9.x86_64.rpm�b�gnutls-dane-3.8.3-6.el9.x86_64.rpm�b�gnutls-dane-3.8.3-6.el9.i686.rpm�a�gnutls-c++-3.8.3-6.el9.x86_64.rpm�)�gnutls-utils-3.8.3-6.el9.x86_64.rpm�c�gnutls-devel-3.8.3-6.el9.i686.rpm�a�gnutls-c++-3.8.3-6.el9.i686.rpm�c�gnutls-devel-3.8.3-6.el9.x86_64.rpm�b�gnutls-dane-3.8.3-6.el9.x86_64.rpm�b�gnutls-dane-3.8.3-6.el9.i686.rpm�a�gnutls-c++-3.8.3-6.el9.x86_64.rpm�)�gnutls-utils-3.8.3-6.el9.x86_64.rpm�c�gnutls-devel-3.8.3-6.el9.i686.rpm��w�	��%��`BBBsecurityModerate: libtasn1 security update��G�4https://access.redhat.com/errata/RHSA-2025:7077RHSA-2025:7077RHSA-2025:7077https://access.redhat.com/security/cve/CVE-2024-12133CVE-2024-12133CVE-2024-12133https://bugzilla.redhat.com/23446112344611https://errata.almalinux.org/9/ALSA-2025-7077.htmlALSA-2025:7077ALSA-2025:7077
�B�libtasn1-devel-4.16.0-9.el9.x86_64.rpm�|�libtasn1-tools-4.16.0-9.el9.x86_64.rpm�B�libtasn1-devel-4.16.0-9.el9.i686.rpm�B�libtasn1-devel-4.16.0-9.el9.x86_64.rpm�|�libtasn1-tools-4.16.0-9.el9.x86_64.rpm�B�libtasn1-devel-4.16.0-9.el9.i686.rpm���	��(��fsecurityModerate: aardvark-dns security update��{�yhttps://access.redhat.com/errata/RHSA-2025:7094RHSA-2025:7094RHSA-2025:7094https://access.redhat.com/security/cve/CVE-2024-8418CVE-2024-8418CVE-2024-8418https://bugzilla.redhat.com/23096832309683https://errata.almalinux.org/9/ALSA-2025-7094.htmlALSA-2025:7094ALSA-2025:7094
�l�oaardvark-dns-1.14.0-1.el9.x86_64.rpm�l�oaardvark-dns-1.14.0-1.el9.x86_64.rpm��+�	��3��iBBBBBBBBsecurityModerate: python3.12 security update��t�[https://access.redhat.com/errata/RHSA-2025:7107RHSA-2025:7107RHSA-2025:7107https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7107.htmlALSA-2025:7107ALSA-2025:7107
��;python3.12-libs-3.12.9-1.el9.i686.rpm��;python3.12-3.12.9-1.el9.x86_64.rpm��;python3.12-tkinter-3.12.9-1.el9.x86_64.rpm��;python3.12-devel-3.12.9-1.el9.x86_64.rpm��;python3.12-libs-3.12.9-1.el9.x86_64.rpm��;python3.12-devel-3.12.9-1.el9.i686.rpm��;python3.12-libs-3.12.9-1.el9.i686.rpm��;python3.12-3.12.9-1.el9.x86_64.rpm��;python3.12-tkinter-3.12.9-1.el9.x86_64.rpm��;python3.12-devel-3.12.9-1.el9.x86_64.rpm��;python3.12-libs-3.12.9-1.el9.x86_64.rpm��;python3.12-devel-3.12.9-1.el9.i686.rpm���	��>��tBBBBBBBBsecurityModerate: python3.11 security update��O�[https://access.redhat.com/errata/RHSA-2025:7109RHSA-2025:7109RHSA-2025:7109https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7109.htmlALSA-2025:7109ALSA-2025:7109
�Q�python3.11-tkinter-3.11.11-2.el9.x86_64.rpm[�python3.11-devel-3.11.11-2.el9.i686.rpm�P�python3.11-3.11.11-2.el9.x86_64.rpm\�python3.11-libs-3.11.11-2.el9.i686.rpm\�python3.11-libs-3.11.11-2.el9.x86_64.rpm[�python3.11-devel-3.11.11-2.el9.x86_64.rpm�Q�python3.11-tkinter-3.11.11-2.el9.x86_64.rpm[�python3.11-devel-3.11.11-2.el9.i686.rpm�P�python3.11-3.11.11-2.el9.x86_64.rpm\�python3.11-libs-3.11.11-2.el9.i686.rpm\�python3.11-libs-3.11.11-2.el9.x86_64.rpm[�python3.11-devel-3.11.11-2.el9.x86_64.rpm��O�	����BBBBBBBBBBBsecurityImportant: osbuild and osbuild-composer security update��*�Bhttps://access.redhat.com/errata/RHSA-2025:7118RHSA-2025:7118RHSA-2025:7118https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2025-7118.htmlALSA-2025:7118ALSA-2025:7118

�Z�[osbuild-luks2-141-1.el9.alma.1.noarch.rpm�=�[python3-osbuild-141-1.el9.alma.1.noarch.rpm�\�[osbuild-ostree-141-1.el9.alma.1.noarch.rpm�w�nosbuild-composer-132-1.el9.alma.1.x86_64.rpm�]�[osbuild-selinux-141-1.el9.alma.1.noarch.rpm�Y�[osbuild-depsolve-dnf-141-1.el9.alma.1.noarch.rpm�y�nosbuild-composer-worker-132-1.el9.alma.1.x86_64.rpm�[�[osbuild-lvm2-141-1.el9.alma.1.noarch.rpm�X�[osbuild-141-1.el9.alma.1.noarch.rpm�x�nosbuild-composer-core-132-1.el9.alma.1.x86_64.rpm
�Z�[osbuild-luks2-141-1.el9.alma.1.noarch.rpm�=�[python3-osbuild-141-1.el9.alma.1.noarch.rpm�\�[osbuild-ostree-141-1.el9.alma.1.noarch.rpm�w�nosbuild-composer-132-1.el9.alma.1.x86_64.rpm�]�[osbuild-selinux-141-1.el9.alma.1.noarch.rpm�Y�[osbuild-depsolve-dnf-141-1.el9.alma.1.noarch.rpm�y�nosbuild-composer-worker-132-1.el9.alma.1.x86_64.rpm�[�[osbuild-lvm2-141-1.el9.alma.1.noarch.rpm�X�[osbuild-141-1.el9.alma.1.noarch.rpm�x�nosbuild-composer-core-132-1.el9.alma.1.x86_64.rpm��\�	����MBBBBBsecurityModerate: protobuf security update��l�:https://access.redhat.com/errata/RHSA-2025:7138RHSA-2025:7138RHSA-2025:7138https://access.redhat.com/security/cve/CVE-2022-1941CVE-2022-1941CVE-2022-1941https://bugzilla.redhat.com/22914702291470https://errata.almalinux.org/9/ALSA-2025-7138.htmlALSA-2025:7138ALSA-2025:7138
�L�Eprotobuf-3.14.0-16.el9.x86_64.rpm�M�Eprotobuf-lite-3.14.0-16.el9.i686.rpm�L�Eprotobuf-3.14.0-16.el9.i686.rpm�[�Epython3-protobuf-3.14.0-16.el9.noarch.rpm�M�Eprotobuf-lite-3.14.0-16.el9.x86_64.rpm�L�Eprotobuf-3.14.0-16.el9.x86_64.rpm�M�Eprotobuf-lite-3.14.0-16.el9.i686.rpm�L�Eprotobuf-3.14.0-16.el9.i686.rpm�[�Epython3-protobuf-3.14.0-16.el9.noarch.rpm�M�Eprotobuf-lite-3.14.0-16.el9.x86_64.rpm��C�	����UBBBsecurityModerate: rpm-ostree security update��&�phttps://access.redhat.com/errata/RHSA-2025:7147RHSA-2025:7147RHSA-2025:7147https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7147.htmlALSA-2025:7147ALSA-2025:7147
�G�}rpm-ostree-libs-2025.5-1.el9.i686.rpm��}rpm-ostree-2025.5-1.el9.x86_64.rpm�G�}rpm-ostree-libs-2025.5-1.el9.x86_64.rpm�G�}rpm-ostree-libs-2025.5-1.el9.i686.rpm��}rpm-ostree-2025.5-1.el9.x86_64.rpm�G�}rpm-ostree-libs-2025.5-1.el9.x86_64.rpm��L�	����[BBsecurityModerate: bootc security update���Zhttps://access.redhat.com/errata/RHSA-2025:7160RHSA-2025:7160RHSA-2025:7160https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7160.htmlALSA-2025:7160ALSA-2025:7160
�S�hsystem-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpm�~�hbootc-1.1.6-3.el9_6.x86_64.rpm�S�hsystem-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpm�~�hbootc-1.1.6-3.el9_6.x86_64.rpm��m�	��,��`BBBBBBBBBBsecurityModerate: xorg-x11-server security update��p�shttps://access.redhat.com/errata/RHSA-2025:7163RHSA-2025:7163RHSA-2025:7163https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7163.htmlALSA-2025:7163ALSA-2025:7163
��$xorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpm��$xorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpm��-�	��/��msecurityModerate: xorg-x11-server-Xwayland security update��c�https://access.redhat.com/errata/RHSA-2025:7165RHSA-2025:7165RHSA-2025:7165https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7165.htmlALSA-2025:7165ALSA-2025:7165
��gxorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpm��gxorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpm���	����pBBBBBBBBBBBBBBBBsecurityModerate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update��g�shttps://access.redhat.com/errata/RHSA-2025:7178RHSA-2025:7178RHSA-2025:7178https://access.redhat.com/security/cve/CVE-2024-0444CVE-2024-0444CVE-2024-0444https://access.redhat.com/security/cve/CVE-2024-4453CVE-2024-4453CVE-2024-4453https://bugzilla.redhat.com/22829992282999https://bugzilla.redhat.com/22923352292335https://errata.almalinux.org/9/ALSA-2025-7178.htmlALSA-2025:7178ALSA-2025:7178
�H�Fgstreamer1-1.22.12-3.el9.x86_64.rpm��Fgstreamer1-plugins-bad-free-1.22.12-3.el9.x86_64.rpm��Fgstreamer1-plugins-bad-free-1.22.12-3.el9.i686.rpm�J�Fgstreamer1-rtsp-server-1.22.12-3.el9.i686.rpm�H�Fgstreamer1-1.22.12-3.el9.i686.rpm�;�Fgstreamer1-plugins-bad-free-libs-1.22.12-3.el9.x86_64.rpm�;�Fgstreamer1-plugins-bad-free-libs-1.22.12-3.el9.i686.rpm�&�Fgstreamer1-plugins-ugly-free-1.22.12-3.el9.i686.rpm�J�Fgstreamer1-rtsp-server-1.22.12-3.el9.x86_64.rpm�I�Fgstreamer1-devel-1.22.12-3.el9.x86_64.rpm�I�Fgstreamer1-devel-1.22.12-3.el9.i686.rpm�&�Fgstreamer1-plugins-ugly-free-1.22.12-3.el9.x86_64.rpm�H�Fgstreamer1-1.22.12-3.el9.x86_64.rpm��Fgstreamer1-plugins-bad-free-1.22.12-3.el9.x86_64.rpm��Fgstreamer1-plugins-bad-free-1.22.12-3.el9.i686.rpm�J�Fgstreamer1-rtsp-server-1.22.12-3.el9.i686.rpm�H�Fgstreamer1-1.22.12-3.el9.i686.rpm�;�Fgstreamer1-plugins-bad-free-libs-1.22.12-3.el9.x86_64.rpm�;�Fgstreamer1-plugins-bad-free-libs-1.22.12-3.el9.i686.rpm�&�Fgstreamer1-plugins-ugly-free-1.22.12-3.el9.i686.rpm�J�Fgstreamer1-rtsp-server-1.22.12-3.el9.x86_64.rpm�I�Fgstreamer1-devel-1.22.12-3.el9.x86_64.rpm�I�Fgstreamer1-devel-1.22.12-3.el9.i686.rpm�&�Fgstreamer1-plugins-ugly-free-1.22.12-3.el9.x86_64.rpm��6�	����CBsecurityModerate: corosync security update��Z�$https://access.redhat.com/errata/RHSA-2025:7201RHSA-2025:7201RHSA-2025:7201https://access.redhat.com/security/cve/CVE-2025-30472CVE-2025-30472CVE-2025-30472https://bugzilla.redhat.com/23542292354229https://errata.almalinux.org/9/ALSA-2025-7201.htmlALSA-2025:7201ALSA-2025:7201
�"�vcorosynclib-3.1.9-2.el9_6.i686.rpm�"�vcorosynclib-3.1.9-2.el9_6.x86_64.rpm�"�vcorosynclib-3.1.9-2.el9_6.i686.rpm�"�vcorosynclib-3.1.9-2.el9_6.x86_64.rpm��:�	��	��GsecurityModerate: rust-bootupd security update��~�Shttps://access.redhat.com/errata/RHSA-2025:7241RHSA-2025:7241RHSA-2025:7241https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7241.htmlALSA-2025:7241ALSA-2025:7241
��@bootupd-0.2.27-3.el9.x86_64.rpm��@bootupd-0.2.27-3.el9.x86_64.rpm��I� 	����JBBBBsecurityModerate: gstreamer1-plugins-good security update��Q�$https://access.redhat.com/errata/RHSA-2025:7242RHSA-2025:7242RHSA-2025:7242https://access.redhat.com/security/cve/CVE-2024-47543CVE-2024-47543CVE-2024-47543https://access.redhat.com/security/cve/CVE-2024-47544CVE-2024-47544CVE-2024-47544https://access.redhat.com/security/cve/CVE-2024-47545CVE-2024-47545CVE-2024-47545https://access.redhat.com/security/cve/CVE-2024-47546CVE-2024-47546CVE-2024-47546https://access.redhat.com/security/cve/CVE-2024-47596CVE-2024-47596CVE-2024-47596https://access.redhat.com/security/cve/CVE-2024-47597CVE-2024-47597CVE-2024-47597https://access.redhat.com/security/cve/CVE-2024-47598CVE-2024-47598CVE-2024-47598https://access.redhat.com/security/cve/CVE-2024-47599CVE-2024-47599CVE-2024-47599https://access.redhat.com/security/cve/CVE-2024-47601CVE-2024-47601CVE-2024-47601https://access.redhat.com/security/cve/CVE-2024-47602CVE-2024-47602CVE-2024-47602https://access.redhat.com/security/cve/CVE-2024-47603CVE-2024-47603CVE-2024-47603https://access.redhat.com/security/cve/CVE-2024-47774CVE-2024-47774CVE-2024-47774https://access.redhat.com/security/cve/CVE-2024-47775CVE-2024-47775CVE-2024-47775https://access.redhat.com/security/cve/CVE-2024-47776CVE-2024-47776CVE-2024-47776https://access.redhat.com/security/cve/CVE-2024-47777CVE-2024-47777CVE-2024-47777https://access.redhat.com/security/cve/CVE-2024-47778CVE-2024-47778CVE-2024-47778https://access.redhat.com/security/cve/CVE-2024-47834CVE-2024-47834CVE-2024-47834https://bugzilla.redhat.com/23317232331723https://bugzilla.redhat.com/23317392331739https://bugzilla.redhat.com/23317412331741https://bugzilla.redhat.com/23317432331743https://bugzilla.redhat.com/23317442331744https://bugzilla.redhat.com/23317472331747https://bugzilla.redhat.com/23317482331748https://bugzilla.redhat.com/23317492331749https://bugzilla.redhat.com/23317502331750https://bugzilla.redhat.com/23317512331751https://bugzilla.redhat.com/23317522331752https://bugzilla.redhat.com/23317552331755https://bugzilla.redhat.com/23317562331756https://bugzilla.redhat.com/23317592331759https://bugzilla.redhat.com/23317612331761https://bugzilla.redhat.com/23317622331762https://bugzilla.redhat.com/23317632331763https://errata.almalinux.org/9/ALSA-2025-7242.htmlALSA-2025:7242ALSA-2025:7242
��7gstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpm�
�7gstreamer1-plugins-good-1.22.12-4.el9.i686.rpm�
�7gstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpm��7gstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpm��7gstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpm�
�7gstreamer1-plugins-good-1.22.12-4.el9.i686.rpm�
�7gstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpm��7gstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpm��q�!	����QBBBBBBsecurityModerate: gstreamer1-plugins-base security update��b�9
https://access.redhat.com/errata/RHSA-2025:7243RHSA-2025:7243RHSA-2025:7243https://access.redhat.com/security/cve/CVE-2024-47541CVE-2024-47541CVE-2024-47541https://access.redhat.com/security/cve/CVE-2024-47542CVE-2024-47542CVE-2024-47542https://access.redhat.com/security/cve/CVE-2024-47600CVE-2024-47600CVE-2024-47600https://access.redhat.com/security/cve/CVE-2024-47835CVE-2024-47835CVE-2024-47835https://bugzilla.redhat.com/23317172331717https://bugzilla.redhat.com/23317242331724https://bugzilla.redhat.com/23317382331738https://bugzilla.redhat.com/23317422331742https://errata.almalinux.org/9/ALSA-2025-7243.htmlALSA-2025:7243ALSA-2025:7243
�4�7gstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpm�3�7gstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpm�3�7gstreamer1-plugins-base-1.22.12-4.el9.i686.rpm�`�7gstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpm�4�7gstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpm�4�7gstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpm�3�7gstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpm�3�7gstreamer1-plugins-base-1.22.12-4.el9.i686.rpm�`�7gstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpm�4�7gstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpm���"	����ZsecurityModerate: git-lfs security update���Ehttps://access.redhat.com/errata/RHSA-2025:7256RHSA-2025:7256RHSA-2025:7256https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22953102295310https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2025-7256.htmlALSA-2025:7256ALSA-2025:7256
�l�git-lfs-3.6.1-1.el9.x86_64.rpm�l�git-lfs-3.6.1-1.el9.x86_64.rpm��"�#	�� ��]BsecurityModerate: openjpeg2 security update��`�Xhttps://access.redhat.com/errata/RHSA-2025:7309RHSA-2025:7309RHSA-2025:7309https://access.redhat.com/security/cve/CVE-2024-56826CVE-2024-56826CVE-2024-56826https://access.redhat.com/security/cve/CVE-2024-56827CVE-2024-56827CVE-2024-56827https://bugzilla.redhat.com/23351722335172https://bugzilla.redhat.com/23351742335174https://errata.almalinux.org/9/ALSA-2025-7309.htmlALSA-2025:7309ALSA-2025:7309
�F�Oopenjpeg2-2.4.0-8.el9.x86_64.rpm�F�Oopenjpeg2-2.4.0-8.el9.i686.rpm�F�Oopenjpeg2-2.4.0-8.el9.x86_64.rpm�F�Oopenjpeg2-2.4.0-8.el9.i686.rpm��:�$	��#��asecurityModerate: keylime-agent-rust security update��8�Whttps://access.redhat.com/errata/RHSA-2025:7313RHSA-2025:7313RHSA-2025:7313https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7313.htmlALSA-2025:7313ALSA-2025:7313
�m�?keylime-agent-rust-0.2.2-2.el9.x86_64.rpm�m�?keylime-agent-rust-0.2.2-2.el9.x86_64.rpm��[�%	��&��dsecurityModerate: python3.12-cryptography security update���Yhttps://access.redhat.com/errata/RHSA-2025:7317RHSA-2025:7317RHSA-2025:7317https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7317.htmlALSA-2025:7317ALSA-2025:7317
�� python3.12-cryptography-41.0.7-2.el9.x86_64.rpm�� python3.12-cryptography-41.0.7-2.el9.x86_64.rpm���&	��3��gBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��h�
https://access.redhat.com/errata/RHSA-2025:7387RHSA-2025:7387RHSA-2025:7387https://access.redhat.com/security/cve/CVE-2024-44192CVE-2024-44192CVE-2024-44192https://access.redhat.com/security/cve/CVE-2024-54467CVE-2024-54467CVE-2024-54467https://access.redhat.com/security/cve/CVE-2024-54551CVE-2024-54551CVE-2024-54551https://access.redhat.com/security/cve/CVE-2025-24208CVE-2025-24208CVE-2025-24208https://access.redhat.com/security/cve/CVE-2025-24209CVE-2025-24209CVE-2025-24209https://access.redhat.com/security/cve/CVE-2025-24216CVE-2025-24216CVE-2025-24216https://access.redhat.com/security/cve/CVE-2025-30427CVE-2025-30427CVE-2025-30427https://bugzilla.redhat.com/23538712353871https://bugzilla.redhat.com/23538722353872https://bugzilla.redhat.com/23579092357909https://bugzilla.redhat.com/23579102357910https://bugzilla.redhat.com/23579112357911https://bugzilla.redhat.com/23579172357917https://bugzilla.redhat.com/23579192357919https://errata.almalinux.org/9/ALSA-2025-7387.htmlALSA-2025:7387ALSA-2025:7387
0�<webkit2gtk3-2.48.1-1.el9_6.i686.rpm2�<webkit2gtk3-jsc-2.48.1-1.el9_6.x86_64.rpm3�<webkit2gtk3-jsc-devel-2.48.1-1.el9_6.i686.rpm2�<webkit2gtk3-jsc-2.48.1-1.el9_6.i686.rpm1�<webkit2gtk3-devel-2.48.1-1.el9_6.i686.rpm0�<webkit2gtk3-2.48.1-1.el9_6.x86_64.rpm3�<webkit2gtk3-jsc-devel-2.48.1-1.el9_6.x86_64.rpm1�<webkit2gtk3-devel-2.48.1-1.el9_6.x86_64.rpm0�<webkit2gtk3-2.48.1-1.el9_6.i686.rpm2�<webkit2gtk3-jsc-2.48.1-1.el9_6.x86_64.rpm3�<webkit2gtk3-jsc-devel-2.48.1-1.el9_6.i686.rpm2�<webkit2gtk3-jsc-2.48.1-1.el9_6.i686.rpm1�<webkit2gtk3-devel-2.48.1-1.el9_6.i686.rpm0�<webkit2gtk3-2.48.1-1.el9_6.x86_64.rpm3�<webkit2gtk3-jsc-devel-2.48.1-1.el9_6.x86_64.rpm1�<webkit2gtk3-devel-2.48.1-1.el9_6.x86_64.rpm����d�'	��8��tBBsecurityModerate: buildah security update��r�~https://access.redhat.com/errata/RHSA-2025:7389RHSA-2025:7389RHSA-2025:7389https://access.redhat.com/security/cve/CVE-2025-27144CVE-2025-27144CVE-2025-27144https://bugzilla.redhat.com/23474232347423https://errata.almalinux.org/9/ALSA-2025-7389.htmlALSA-2025:7389ALSA-2025:7389
�/�Fbuildah-1.39.4-1.el9_6.x86_64.rpm�0�Fbuildah-tests-1.39.4-1.el9_6.x86_64.rpm�/�Fbuildah-1.39.4-1.el9_6.x86_64.rpm�0�Fbuildah-tests-1.39.4-1.el9_6.x86_64.rpm�����(	����yBBBBBsecurityModerate: 389-ds-base security update��p�zhttps://access.redhat.com/errata/RHSA-2025:7395RHSA-2025:7395RHSA-2025:7395https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-7395.htmlALSA-2025:7395ALSA-2025:7395
��/389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpm�/�/python3-lib389-2.6.1-8.el9_6.noarch.rpm�S�/389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm��/389-ds-base-2.6.1-8.el9_6.x86_64.rpm��/389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpm�/�/python3-lib389-2.6.1-8.el9_6.noarch.rpm�S�/389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm��/389-ds-base-2.6.1-8.el9_6.x86_64.rpm����!�)	����ABBsecurityModerate: skopeo security update��j�Ahttps://access.redhat.com/errata/RHSA-2025:7397RHSA-2025:7397RHSA-2025:7397https://access.redhat.com/security/cve/CVE-2025-27144CVE-2025-27144CVE-2025-27144https://bugzilla.redhat.com/23474232347423https://errata.almalinux.org/9/ALSA-2025-7397.htmlALSA-2025:7397ALSA-2025:7397
�d�8skopeo-tests-1.18.1-1.el9_6.x86_64.rpm�c�8skopeo-1.18.1-1.el9_6.x86_64.rpm�d�8skopeo-tests-1.18.1-1.el9_6.x86_64.rpm�c�8skopeo-1.18.1-1.el9_6.x86_64.rpm����\�*	����FBBBBBBBBBBBBBBsecurityModerate: nginx security update��+�Ghttps://access.redhat.com/errata/RHSA-2025:7402RHSA-2025:7402RHSA-2025:7402https://access.redhat.com/security/cve/CVE-2022-41741CVE-2022-41741CVE-2022-41741https://access.redhat.com/security/cve/CVE-2022-41742CVE-2022-41742CVE-2022-41742https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://bugzilla.redhat.com/21414952141495https://bugzilla.redhat.com/21414962141496https://errata.almalinux.org/9/ALSA-2025-7402.htmlALSA-2025:7402ALSA-2025:7402
	��vnginx-mod-http-perl-1.20.1-22.el9_6.2.alma.1.x86_64.rpm�G�vnginx-all-modules-1.20.1-22.el9_6.2.alma.1.noarch.rpm�v�vnginx-mod-stream-1.20.1-22.el9_6.2.alma.1.x86_64.rpm�H�vnginx-filesystem-1.20.1-22.el9_6.2.alma.1.noarch.rpm��vnginx-core-1.20.1-22.el9_6.2.alma.1.x86_64.rpm��vnginx-mod-mail-1.20.1-22.el9_6.2.alma.1.x86_64.rpm��vnginx-mod-http-image-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpm��vnginx-mod-http-xslt-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpm�O�vnginx-1.20.1-22.el9_6.2.alma.1.x86_64.rpm	��vnginx-mod-http-perl-1.20.1-22.el9_6.2.alma.1.x86_64.rpm�G�vnginx-all-modules-1.20.1-22.el9_6.2.alma.1.noarch.rpm�v�vnginx-mod-stream-1.20.1-22.el9_6.2.alma.1.x86_64.rpm�H�vnginx-filesystem-1.20.1-22.el9_6.2.alma.1.noarch.rpm��vnginx-core-1.20.1-22.el9_6.2.alma.1.x86_64.rpm��vnginx-mod-mail-1.20.1-22.el9_6.2.alma.1.x86_64.rpm��vnginx-mod-http-image-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpm��vnginx-mod-http-xslt-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpm�O�vnginx-1.20.1-22.el9_6.2.alma.1.x86_64.rpm����d�+	����WBBsecurityImportant: grafana security update��r�,https://access.redhat.com/errata/RHSA-2025:7404RHSA-2025:7404RHSA-2025:7404https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-7404.htmlALSA-2025:7404ALSA-2025:7404
�I�qgrafana-10.2.6-11.el9_6.x86_64.rpm�U�qgrafana-selinux-10.2.6-11.el9_6.x86_64.rpm�I�qgrafana-10.2.6-11.el9_6.x86_64.rpm�U�qgrafana-selinux-10.2.6-11.el9_6.x86_64.rpm����~�,	��0��\BBBBBBBBBBBBBBBBBBsecurityModerate: git security update���!https://access.redhat.com/errata/RHSA-2025:7409RHSA-2025:7409RHSA-2025:7409https://access.redhat.com/security/cve/CVE-2024-52005CVE-2024-52005CVE-2024-52005https://bugzilla.redhat.com/23382892338289https://errata.almalinux.org/9/ALSA-2025-7409.htmlALSA-2025:7409ALSA-2025:7409
�.�perl-Git-SVN-2.47.1-2.el9_6.noarch.rpm�;�git-core-2.47.1-2.el9_6.x86_64.rpm�#�git-gui-2.47.1-2.el9_6.noarch.rpm�>�git-subtree-2.47.1-2.el9_6.x86_64.rpm�-�perl-Git-2.47.1-2.el9_6.noarch.rpm�=�git-daemon-2.47.1-2.el9_6.x86_64.rpm� �git-all-2.47.1-2.el9_6.noarch.rpm�!�git-core-doc-2.47.1-2.el9_6.noarch.rpm�'�gitweb-2.47.1-2.el9_6.noarch.rpm�&�gitk-2.47.1-2.el9_6.noarch.rpm�:�git-2.47.1-2.el9_6.x86_64.rpm�"�git-email-2.47.1-2.el9_6.noarch.rpm�%�git-svn-2.47.1-2.el9_6.noarch.rpm�$�git-instaweb-2.47.1-2.el9_6.noarch.rpm�<�git-credential-libsecret-2.47.1-2.el9_6.x86_64.rpm�.�perl-Git-SVN-2.47.1-2.el9_6.noarch.rpm�;�git-core-2.47.1-2.el9_6.x86_64.rpm�#�git-gui-2.47.1-2.el9_6.noarch.rpm�>�git-subtree-2.47.1-2.el9_6.x86_64.rpm�-�perl-Git-2.47.1-2.el9_6.noarch.rpm�=�git-daemon-2.47.1-2.el9_6.x86_64.rpm� �git-all-2.47.1-2.el9_6.noarch.rpm�!�git-core-doc-2.47.1-2.el9_6.noarch.rpm�'�gitweb-2.47.1-2.el9_6.noarch.rpm�&�gitk-2.47.1-2.el9_6.noarch.rpm�:�git-2.47.1-2.el9_6.x86_64.rpm�"�git-email-2.47.1-2.el9_6.noarch.rpm�%�git-svn-2.47.1-2.el9_6.noarch.rpm�$�git-instaweb-2.47.1-2.el9_6.noarch.rpm�<�git-credential-libsecret-2.47.1-2.el9_6.x86_64.rpm����>�-	��7��qBBBBsecurityImportant: libxslt security update��?�https://access.redhat.com/errata/RHSA-2025:7410RHSA-2025:7410RHSA-2025:7410https://access.redhat.com/security/cve/CVE-2024-55549CVE-2024-55549CVE-2024-55549https://bugzilla.redhat.com/23524842352484https://errata.almalinux.org/9/ALSA-2025-7410.htmlALSA-2025:7410ALSA-2025:7410
�9�Rlibxslt-devel-1.1.34-13.el9_6.x86_64.rpm�8�Rlibxslt-1.1.34-13.el9_6.i686.rpm�8�Rlibxslt-1.1.34-13.el9_6.x86_64.rpm�9�Rlibxslt-devel-1.1.34-13.el9_6.i686.rpm�9�Rlibxslt-devel-1.1.34-13.el9_6.x86_64.rpm�8�Rlibxslt-1.1.34-13.el9_6.i686.rpm�8�Rlibxslt-1.1.34-13.el9_6.x86_64.rpm�9�Rlibxslt-devel-1.1.34-13.el9_6.i686.rpm����.�.	��<��xBBsecurityImportant: gimp security update��D�,
https://access.redhat.com/errata/RHSA-2025:7417RHSA-2025:7417RHSA-2025:7417https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2025-7417.htmlALSA-2025:7417ALSA-2025:7417
�?�Mgimp-2.99.8-4.el9_6.x86_64.rpm�J�Mgimp-libs-2.99.8-4.el9_6.x86_64.rpm�?�Mgimp-2.99.8-4.el9_6.x86_64.rpm�J�Mgimp-libs-2.99.8-4.el9_6.x86_64.rpm����+�/	��/�OBBBBBBBBBBBB��cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.3 security update��p�ghttps://access.redhat.com/errata/RHSA-2025:7418RHSA-2025:7418RHSA-2025:7418https://access.redhat.com/security/cve/CVE-2024-11235CVE-2024-11235CVE-2024-11235https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://bugzilla.redhat.com/23575312357531https://errata.almalinux.org/9/ALSA-2025-7418.htmlALSA-2025:7418ALSA-2025:7418
��:�?* �Lphp-fpm-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�W�kphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Lphp-dba-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-gd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-odbc-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-process-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�
Lphp-common-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-embedded-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm�Lphp-mysqlnd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-soap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-xml-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-enchant-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-gmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�
Lphp-devel-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-dbg-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-snmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�U�)php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm�Lphp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-bcmath-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-mbstring-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-opcache-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-pgsql-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�	Lphp-cli-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-ffi-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-ldap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-pdo-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�V�Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Lphp-intl-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm��aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm��:�?* �Lphp-fpm-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�W�kphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Lphp-dba-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-gd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-odbc-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-process-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�
Lphp-common-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-embedded-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm�Lphp-mysqlnd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-soap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-xml-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-enchant-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-gmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�
Lphp-devel-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-dbg-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-snmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�U�)php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm�Lphp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-bcmath-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-mbstring-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-opcache-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-pgsql-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�	Lphp-cli-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-ffi-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-ldap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�Lphp-pdo-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm�V�Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Lphp-intl-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm��aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm��k�0	��2��psecurityImportant: mod_auth_openidc security update��W�https://access.redhat.com/errata/RHSA-2025:7419RHSA-2025:7419RHSA-2025:7419https://access.redhat.com/security/cve/CVE-2025-31492CVE-2025-31492CVE-2025-31492https://bugzilla.redhat.com/23577382357738https://errata.almalinux.org/9/ALSA-2025-7419.htmlALSA-2025:7419ALSA-2025:7419
�d�Nmod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpm�d�Nmod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpm����*�1	����sBBBBBBBBBBBBsecurityModerate: ghostscript security update��s�hhttps://access.redhat.com/errata/RHSA-2025:7422RHSA-2025:7422RHSA-2025:7422https://access.redhat.com/security/cve/CVE-2023-46751CVE-2023-46751CVE-2023-46751https://access.redhat.com/security/cve/CVE-2024-46951CVE-2024-46951CVE-2024-46951https://access.redhat.com/security/cve/CVE-2024-46952CVE-2024-46952CVE-2024-46952https://access.redhat.com/security/cve/CVE-2024-46953CVE-2024-46953CVE-2024-46953https://access.redhat.com/security/cve/CVE-2024-46954CVE-2024-46954CVE-2024-46954https://access.redhat.com/security/cve/CVE-2024-46956CVE-2024-46956CVE-2024-46956https://bugzilla.redhat.com/22533652253365https://bugzilla.redhat.com/23250412325041https://bugzilla.redhat.com/23250432325043https://bugzilla.redhat.com/23250442325044https://bugzilla.redhat.com/23250452325045https://bugzilla.redhat.com/23250472325047https://errata.almalinux.org/9/ALSA-2025-7422.htmlALSA-2025:7422ALSA-2025:7422
��sghostscript-tools-fonts-9.54.0-18.el9_6.x86_64.rpm��sghostscript-tools-printing-9.54.0-18.el9_6.x86_64.rpm�e�slibgs-9.54.0-18.el9_6.x86_64.rpm�k�sghostscript-doc-9.54.0-18.el9_6.noarch.rpm��sghostscript-tools-dvipdf-9.54.0-18.el9_6.x86_64.rpm�e�slibgs-9.54.0-18.el9_6.i686.rpm��sghostscript-x11-9.54.0-18.el9_6.x86_64.rpm��sghostscript-9.54.0-18.el9_6.x86_64.rpm��sghostscript-tools-fonts-9.54.0-18.el9_6.x86_64.rpm��sghostscript-tools-printing-9.54.0-18.el9_6.x86_64.rpm�e�slibgs-9.54.0-18.el9_6.x86_64.rpm�k�sghostscript-doc-9.54.0-18.el9_6.noarch.rpm��sghostscript-tools-dvipdf-9.54.0-18.el9_6.x86_64.rpm�e�slibgs-9.54.0-18.el9_6.i686.rpm��sghostscript-x11-9.54.0-18.el9_6.x86_64.rpm��sghostscript-9.54.0-18.el9_6.x86_64.rpm����e�2	����BBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��[�@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423

(�Skernel-headers-5.14.0-570.16.1.el9_6.x86_64.rpm;�Spython3-perf-5.14.0-570.16.1.el9_6.x86_64.rpm#�Skernel-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm+�Srv-5.14.0-570.16.1.el9_6.x86_64.rpm�Skernel-doc-5.14.0-570.16.1.el9_6.noarch.rpm&�Skernel-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm'�Sperf-5.14.0-570.16.1.el9_6.x86_64.rpm)�Srtla-5.14.0-570.16.1.el9_6.x86_64.rpm%�Skernel-devel-5.14.0-570.16.1.el9_6.x86_64.rpm$�Skernel-debug-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm
(�Skernel-headers-5.14.0-570.16.1.el9_6.x86_64.rpm;�Spython3-perf-5.14.0-570.16.1.el9_6.x86_64.rpm#�Skernel-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm+�Srv-5.14.0-570.16.1.el9_6.x86_64.rpm�Skernel-doc-5.14.0-570.16.1.el9_6.noarch.rpm&�Skernel-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm'�Sperf-5.14.0-570.16.1.el9_6.x86_64.rpm)�Srtla-5.14.0-570.16.1.el9_6.x86_64.rpm%�Skernel-devel-5.14.0-570.16.1.el9_6.x86_64.rpm$�Skernel-debug-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm��ɐ,�3	����VBBBBsecurityImportant: osbuild-composer security update���Lhttps://access.redhat.com/errata/RHSA-2025:7425RHSA-2025:7425RHSA-2025:7425https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-7425.htmlALSA-2025:7425ALSA-2025:7425
�y�oosbuild-composer-worker-132.2-1.el9_6.alma.1.x86_64.rpm�x�oosbuild-composer-core-132.2-1.el9_6.alma.1.x86_64.rpm�w�oosbuild-composer-132.2-1.el9_6.alma.1.x86_64.rpm�y�oosbuild-composer-worker-132.2-1.el9_6.alma.1.x86_64.rpm�x�oosbuild-composer-core-132.2-1.el9_6.alma.1.x86_64.rpm�w�oosbuild-composer-132.2-1.el9_6.alma.1.x86_64.rpm�����4	��&�_�NB��qBBBBBBBsecurityModerate: nodejs:20 security update��g�+https://access.redhat.com/errata/RHSA-2025:7426RHSA-2025:7426RHSA-2025:7426https://access.redhat.com/security/cve/CVE-2025-31498CVE-2025-31498CVE-2025-31498https://bugzilla.redhat.com/23582712358271https://errata.almalinux.org/9/ALSA-2025-7426.htmlALSA-2025:7426ALSA-2025:7426
,�Q�_*e�*nodejs-full-i18n-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpml�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm�	�Lnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm>�*nodejs-docs-20.19.1-1.module_el9.6.0+163+d268fe53.noarch.rpm�#�*nodejs-devel-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmd�*npm-10.8.2-1.20.19.1.1.module_el9.6.0+163+d268fe53.x86_64.rpm�
�Lnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm,�*nodejs-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpm,�Q�_*e�*nodejs-full-i18n-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpml�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm�	�Lnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm>�*nodejs-docs-20.19.1-1.module_el9.6.0+163+d268fe53.noarch.rpm�#�*nodejs-devel-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmd�*npm-10.8.2-1.20.19.1.1.module_el9.6.0+163+d268fe53.x86_64.rpm�
�Lnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm,�*nodejs-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpm��@�5	��+��gBBsecurityLow: xterm security update�6���Whttps://access.redhat.com/errata/RHSA-2025:7427RHSA-2025:7427RHSA-2025:7427https://access.redhat.com/security/cve/CVE-2022-45063CVE-2022-45063CVE-2022-45063https://bugzilla.redhat.com/21424742142474https://errata.almalinux.org/9/ALSA-2025-7427.htmlALSA-2025:7427ALSA-2025:7427
�$�Qxterm-resize-366-10.el9_6.x86_64.rpm�#�Qxterm-366-10.el9_6.x86_64.rpm�$�Qxterm-resize-366-10.el9_6.x86_64.rpm�#�Qxterm-366-10.el9_6.x86_64.rpm����n�6	��0��lBBsecurityImportant: firefox security update��i�ghttps://access.redhat.com/errata/RHSA-2025:7428RHSA-2025:7428RHSA-2025:7428https://access.redhat.com/security/cve/CVE-2025-2817CVE-2025-2817CVE-2025-2817https://access.redhat.com/security/cve/CVE-2025-4083CVE-2025-4083CVE-2025-4083https://access.redhat.com/security/cve/CVE-2025-4087CVE-2025-4087CVE-2025-4087https://access.redhat.com/security/cve/CVE-2025-4091CVE-2025-4091CVE-2025-4091https://access.redhat.com/security/cve/CVE-2025-4093CVE-2025-4093CVE-2025-4093https://bugzilla.redhat.com/23629022362902https://bugzilla.redhat.com/23629042362904https://bugzilla.redhat.com/23629072362907https://bugzilla.redhat.com/23629122362912https://bugzilla.redhat.com/23629152362915https://errata.almalinux.org/9/ALSA-2025-7428.htmlALSA-2025:7428ALSA-2025:7428
P�ifirefox-x11-128.10.0-1.el9_6.alma.1.x86_64.rpm8�ifirefox-128.10.0-1.el9_6.alma.1.x86_64.rpmP�ifirefox-x11-128.10.0-1.el9_6.alma.1.x86_64.rpm8�ifirefox-128.10.0-1.el9_6.alma.1.x86_64.rpm����n�7	��6��qBBBsecurityImportant: redis:7 security update��P�'https://access.redhat.com/errata/RHSA-2025:7429RHSA-2025:7429RHSA-2025:7429https://access.redhat.com/security/cve/CVE-2025-21605CVE-2025-21605CVE-2025-21605https://bugzilla.redhat.com/23618832361883https://errata.almalinux.org/9/ALSA-2025-7429.htmlALSA-2025:7429ALSA-2025:7429
�I��a*�i�redis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm�b�redis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm�I�redis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm�I��a*�i�redis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm�b�redis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm�I�redis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm�����8	��<��wBBBsecurityImportant: yelp security update��w�dhttps://access.redhat.com/errata/RHSA-2025:7430RHSA-2025:7430RHSA-2025:7430https://access.redhat.com/security/cve/CVE-2025-3155CVE-2025-3155CVE-2025-3155https://bugzilla.redhat.com/23570912357091https://errata.almalinux.org/9/ALSA-2025-7430.htmlALSA-2025:7430ALSA-2025:7430
��
yelp-libs-40.3-2.el9_6.1.x86_64.rpm��
yelp-libs-40.3-2.el9_6.1.i686.rpm�y�
yelp-40.3-2.el9_6.1.x86_64.rpm��
yelp-libs-40.3-2.el9_6.1.x86_64.rpm��
yelp-libs-40.3-2.el9_6.1.i686.rpm�y�
yelp-40.3-2.el9_6.1.x86_64.rpm����6�9	��/��}BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security update��[�https://access.redhat.com/errata/RHSA-2025:7431RHSA-2025:7431RHSA-2025:7431https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7431.htmlALSA-2025:7431ALSA-2025:7431
�Cphp-dba-8.0.30-3.el9_6.x86_64.rpm�Cphp-odbc-8.0.30-3.el9_6.x86_64.rpm�Cphp-pdo-8.0.30-3.el9_6.x86_64.rpm�Cphp-ldap-8.0.30-3.el9_6.x86_64.rpm�Cphp-process-8.0.30-3.el9_6.x86_64.rpm�Cphp-opcache-8.0.30-3.el9_6.x86_64.rpm�
Cphp-devel-8.0.30-3.el9_6.x86_64.rpm�Cphp-fpm-8.0.30-3.el9_6.x86_64.rpm�Cphp-ffi-8.0.30-3.el9_6.x86_64.rpm�Cphp-bcmath-8.0.30-3.el9_6.x86_64.rpm�
Cphp-common-8.0.30-3.el9_6.x86_64.rpm�Cphp-soap-8.0.30-3.el9_6.x86_64.rpm�Cphp-enchant-8.0.30-3.el9_6.x86_64.rpm�Cphp-embedded-8.0.30-3.el9_6.x86_64.rpm�Cphp-8.0.30-3.el9_6.x86_64.rpm�Cphp-gmp-8.0.30-3.el9_6.x86_64.rpm�Cphp-gd-8.0.30-3.el9_6.x86_64.rpm�Cphp-xml-8.0.30-3.el9_6.x86_64.rpm�Cphp-snmp-8.0.30-3.el9_6.x86_64.rpm�Cphp-mbstring-8.0.30-3.el9_6.x86_64.rpm�Cphp-intl-8.0.30-3.el9_6.x86_64.rpm�Cphp-mysqlnd-8.0.30-3.el9_6.x86_64.rpm�	Cphp-cli-8.0.30-3.el9_6.x86_64.rpm�Cphp-pgsql-8.0.30-3.el9_6.x86_64.rpm�Cphp-dbg-8.0.30-3.el9_6.x86_64.rpm�Cphp-dba-8.0.30-3.el9_6.x86_64.rpm�Cphp-odbc-8.0.30-3.el9_6.x86_64.rpm�Cphp-pdo-8.0.30-3.el9_6.x86_64.rpm�Cphp-ldap-8.0.30-3.el9_6.x86_64.rpm�Cphp-process-8.0.30-3.el9_6.x86_64.rpm�Cphp-opcache-8.0.30-3.el9_6.x86_64.rpm�
Cphp-devel-8.0.30-3.el9_6.x86_64.rpm�Cphp-fpm-8.0.30-3.el9_6.x86_64.rpm�Cphp-ffi-8.0.30-3.el9_6.x86_64.rpm�Cphp-bcmath-8.0.30-3.el9_6.x86_64.rpm�
Cphp-common-8.0.30-3.el9_6.x86_64.rpm�Cphp-soap-8.0.30-3.el9_6.x86_64.rpm�Cphp-enchant-8.0.30-3.el9_6.x86_64.rpm�Cphp-embedded-8.0.30-3.el9_6.x86_64.rpm�Cphp-8.0.30-3.el9_6.x86_64.rpm�Cphp-gmp-8.0.30-3.el9_6.x86_64.rpm�Cphp-gd-8.0.30-3.el9_6.x86_64.rpm�Cphp-xml-8.0.30-3.el9_6.x86_64.rpm�Cphp-snmp-8.0.30-3.el9_6.x86_64.rpm�Cphp-mbstring-8.0.30-3.el9_6.x86_64.rpm�Cphp-intl-8.0.30-3.el9_6.x86_64.rpm�Cphp-mysqlnd-8.0.30-3.el9_6.x86_64.rpm�	Cphp-cli-8.0.30-3.el9_6.x86_64.rpm�Cphp-pgsql-8.0.30-3.el9_6.x86_64.rpm�Cphp-dbg-8.0.30-3.el9_6.x86_64.rpm���� �:	��"�QB^BBBBBBBB��zBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security update��g�3https://access.redhat.com/errata/RHSA-2025:7432RHSA-2025:7432RHSA-2025:7432https://access.redhat.com/security/cve/CVE-2024-11233CVE-2024-11233CVE-2024-11233https://access.redhat.com/security/cve/CVE-2024-11234CVE-2024-11234CVE-2024-11234https://access.redhat.com/security/cve/CVE-2024-8929CVE-2024-8929CVE-2024-8929https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23279602327960https://bugzilla.redhat.com/23285212328521https://bugzilla.redhat.com/23285232328523https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7432.htmlALSA-2025:7432ALSA-2025:7432
��9�<*�Jphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�	Jphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�
Jphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm�Jphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�Jphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�
Jphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�W�jphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm�V�Nphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm�Jphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�Jphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm��9�<*�Jphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�	Jphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�
Jphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm�Jphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�Jphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�
Jphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�W�jphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm�V�Nphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm�Jphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�Jphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm�Jphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm��:�;	��0�N�fB��pBBBBBBBBBBBsecurityImportant: nodejs:22 security update���bhttps://access.redhat.com/errata/RHSA-2025:7433RHSA-2025:7433RHSA-2025:7433https://access.redhat.com/security/cve/CVE-2025-31498CVE-2025-31498CVE-2025-31498https://access.redhat.com/security/cve/CVE-2025-3277CVE-2025-3277CVE-2025-3277https://bugzilla.redhat.com/23582712358271https://bugzilla.redhat.com/23595532359553https://errata.almalinux.org/9/ALSA-2025-7433.htmlALSA-2025:7433ALSA-2025:7433
,�$�`*
d�/npm-10.9.2-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm>�nodejs-docs-22.15.0-1.module_el9.6.0+164+2d89b8ed.noarch.rpm,�nodejs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpml�+nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm�	�{nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpme�nodejs-full-i18n-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm�
�{nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm��nodejs-libs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm�M�v8-12.4-devel-12.4.254.21-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm�#�nodejs-devel-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm,�$�`*
d�/npm-10.9.2-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm>�nodejs-docs-22.15.0-1.module_el9.6.0+164+2d89b8ed.noarch.rpm,�nodejs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpml�+nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm�	�{nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpme�nodejs-full-i18n-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm�
�{nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm��nodejs-libs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm�M�v8-12.4-devel-12.4.254.21-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm�#�nodejs-devel-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm����]�<	��3��qsecurityImportant: thunderbird security update��|� https://access.redhat.com/errata/RHSA-2025:7435RHSA-2025:7435RHSA-2025:7435https://access.redhat.com/security/cve/CVE-2025-2830CVE-2025-2830CVE-2025-2830https://access.redhat.com/security/cve/CVE-2025-3522CVE-2025-3522CVE-2025-3522https://access.redhat.com/security/cve/CVE-2025-3523CVE-2025-3523CVE-2025-3523https://bugzilla.redhat.com/23597862359786https://bugzilla.redhat.com/23597892359789https://bugzilla.redhat.com/23597932359793https://errata.almalinux.org/9/ALSA-2025-7435.htmlALSA-2025:7435ALSA-2025:7435
9�ithunderbird-128.10.0-1.el9_6.alma.1.x86_64.rpm9�ithunderbird-128.10.0-1.el9_6.alma.1.x86_64.rpm����o�=	��:��tBBBBsecurityImportant: libsoup security update���Hhttps://access.redhat.com/errata/RHSA-2025:7436RHSA-2025:7436RHSA-2025:7436https://access.redhat.com/security/cve/CVE-2025-32050CVE-2025-32050CVE-2025-32050https://access.redhat.com/security/cve/CVE-2025-32052CVE-2025-32052CVE-2025-32052https://access.redhat.com/security/cve/CVE-2025-32053CVE-2025-32053CVE-2025-32053https://access.redhat.com/security/cve/CVE-2025-32906CVE-2025-32906CVE-2025-32906https://access.redhat.com/security/cve/CVE-2025-32907CVE-2025-32907CVE-2025-32907https://access.redhat.com/security/cve/CVE-2025-32911CVE-2025-32911CVE-2025-32911https://access.redhat.com/security/cve/CVE-2025-32913CVE-2025-32913CVE-2025-32913https://access.redhat.com/security/cve/CVE-2025-46420CVE-2025-46420CVE-2025-46420https://access.redhat.com/security/cve/CVE-2025-46421CVE-2025-46421CVE-2025-46421https://bugzilla.redhat.com/23570672357067https://bugzilla.redhat.com/23570692357069https://bugzilla.redhat.com/23570702357070https://bugzilla.redhat.com/23593412359341https://bugzilla.redhat.com/23593422359342https://bugzilla.redhat.com/23593552359355https://bugzilla.redhat.com/23593572359357https://bugzilla.redhat.com/23619622361962https://bugzilla.redhat.com/23619632361963https://errata.almalinux.org/9/ALSA-2025-7436.htmlALSA-2025:7436ALSA-2025:7436
�g�klibsoup-devel-2.72.0-10.el9_6.1.i686.rpm�g�klibsoup-devel-2.72.0-10.el9_6.1.x86_64.rpm�f�klibsoup-2.72.0-10.el9_6.1.i686.rpm�f�klibsoup-2.72.0-10.el9_6.1.x86_64.rpm�g�klibsoup-devel-2.72.0-10.el9_6.1.i686.rpm�g�klibsoup-devel-2.72.0-10.el9_6.1.x86_64.rpm�f�klibsoup-2.72.0-10.el9_6.1.i686.rpm�f�klibsoup-2.72.0-10.el9_6.1.x86_64.rpm�����>	����{BBBBBsecurityModerate: avahi security update��d�*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437
�o�avahi-tools-0.8-22.el9_6.x86_64.rpm�4�avahi-glib-0.8-22.el9_6.i686.rpm�y�avahi-autoipd-0.8-22.el9_6.x86_64.rpm�4�avahi-glib-0.8-22.el9_6.x86_64.rpm�o�avahi-tools-0.8-22.el9_6.x86_64.rpm�4�avahi-glib-0.8-22.el9_6.i686.rpm�y�avahi-autoipd-0.8-22.el9_6.x86_64.rpm�4�avahi-glib-0.8-22.el9_6.x86_64.rpm����u�?	��	��CBBBBsecurityImportant: redis security update���'https://access.redhat.com/errata/RHSA-2025:7438RHSA-2025:7438RHSA-2025:7438https://access.redhat.com/security/cve/CVE-2025-21605CVE-2025-21605CVE-2025-21605https://bugzilla.redhat.com/23618832361883https://errata.almalinux.org/9/ALSA-2025-7438.htmlALSA-2025:7438ALSA-2025:7438
�i�#redis-devel-6.2.18-1.el9_6.i686.rpm�b�#redis-doc-6.2.18-1.el9_6.noarch.rpm�i�#redis-devel-6.2.18-1.el9_6.x86_64.rpm�I�#redis-6.2.18-1.el9_6.x86_64.rpm�i�#redis-devel-6.2.18-1.el9_6.i686.rpm�b�#redis-doc-6.2.18-1.el9_6.noarch.rpm�i�#redis-devel-6.2.18-1.el9_6.x86_64.rpm�I�#redis-6.2.18-1.el9_6.x86_64.rpm����Q�@	����JBBBBsecurityLow: vim security update�6��5�phttps://access.redhat.com/errata/RHSA-2025:7440RHSA-2025:7440RHSA-2025:7440https://access.redhat.com/security/cve/CVE-2023-4752CVE-2023-4752CVE-2023-4752https://bugzilla.redhat.com/22373112237311https://errata.almalinux.org/9/ALSA-2025-7440.htmlALSA-2025:7440ALSA-2025:7440
�Z�~vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm�Y�~vim-common-8.2.2637-22.el9_6.x86_64.rpm�X�~vim-X11-8.2.2637-22.el9_6.x86_64.rpm�Z�~vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm�Y�~vim-common-8.2.2637-22.el9_6.x86_64.rpm�X�~vim-X11-8.2.2637-22.el9_6.x86_64.rpm����]�A	����QBsecurityModerate: expat security update��%�lhttps://access.redhat.com/errata/RHSA-2025:7444RHSA-2025:7444RHSA-2025:7444https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-7444.htmlALSA-2025:7444ALSA-2025:7444
��Wexpat-devel-2.5.0-5.el9_6.x86_64.rpm��Wexpat-devel-2.5.0-5.el9_6.i686.rpm��Wexpat-devel-2.5.0-5.el9_6.x86_64.rpm��Wexpat-devel-2.5.0-5.el9_6.i686.rpm����U�B	��#��UBBBBBBBBBBBBsecurityModerate: ghostscript security update���fhttps://access.redhat.com/errata/RHSA-2025:7586RHSA-2025:7586RHSA-2025:7586https://access.redhat.com/security/cve/CVE-2025-27832CVE-2025-27832CVE-2025-27832https://bugzilla.redhat.com/23549492354949https://errata.almalinux.org/9/ALSA-2025-7586.htmlALSA-2025:7586ALSA-2025:7586
��tghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm�k�tghostscript-doc-9.54.0-19.el9_6.noarch.rpm��tghostscript-x11-9.54.0-19.el9_6.x86_64.rpm��tghostscript-9.54.0-19.el9_6.x86_64.rpm�e�tlibgs-9.54.0-19.el9_6.x86_64.rpm��tghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm��tghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm�e�tlibgs-9.54.0-19.el9_6.i686.rpm��tghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm�k�tghostscript-doc-9.54.0-19.el9_6.noarch.rpm��tghostscript-x11-9.54.0-19.el9_6.x86_64.rpm��tghostscript-9.54.0-19.el9_6.x86_64.rpm�e�tlibgs-9.54.0-19.el9_6.x86_64.rpm��tghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm��tghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm�e�tlibgs-9.54.0-19.el9_6.i686.rpm��x�C	��:��dBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update��w�Ghttps://access.redhat.com/errata/RHSA-2025:7598RHSA-2025:7598RHSA-2025:7598https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7598.htmlALSA-2025:7598ALSA-2025:7598
�y�Fdotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm�{�Fdotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm�`�Fdotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm�w�Fdotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpm�|�dotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm�u�Faspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm�Y�Faspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm�z�dotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpm�x�Fdotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm�v�Faspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm�y�Fdotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm�{�Fdotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm�`�Fdotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm�w�Fdotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpm�|�dotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm�u�Faspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm�Y�Faspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm�z�dotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpm�x�Fdotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm�v�Faspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm����M�D	����{BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update��>�Fhttps://access.redhat.com/errata/RHSA-2025:7600RHSA-2025:7600RHSA-2025:7600https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7600.htmlALSA-2025:7600ALSA-2025:7600
�2�Edotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm�8�zdotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm�0�Edotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm�5�zdotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm�!�Edotnet-host-9.0.5-1.el9_6.x86_64.rpm�)�Easpnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm�'�Easpnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm�3�Edotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm�7�Edotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm�(�Easpnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm�6�zdotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm�4�zdotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm�1�Edotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm�"�znetstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpm�2�Edotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm�8�zdotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm�0�Edotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm�5�zdotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm�!�Edotnet-host-9.0.5-1.el9_6.x86_64.rpm�)�Easpnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm�'�Easpnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm�3�Edotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm�7�Edotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm�(�Easpnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm�6�zdotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm�4�zdotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm�1�Edotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm�"�znetstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpm��C�E	����securityModerate: xdg-utils security update���Mhttps://access.redhat.com/errata/RHSA-2025:7672RHSA-2025:7672RHSA-2025:7672https://access.redhat.com/security/cve/CVE-2022-4055CVE-2022-4055CVE-2022-4055https://bugzilla.redhat.com/21437922143792https://errata.almalinux.org/9/ALSA-2025-7672.htmlALSA-2025:7672ALSA-2025:7672
�8�#xdg-utils-1.1.3-13.el9_6.noarch.rpm�8�#xdg-utils-1.1.3-13.el9_6.noarch.rpm��@�F	����ZBBsecurityImportant: grafana security update��Q�8https://access.redhat.com/errata/RHSA-2025:7893RHSA-2025:7893RHSA-2025:7893https://access.redhat.com/security/cve/CVE-2025-4123CVE-2025-4123CVE-2025-4123https://bugzilla.redhat.com/23646322364632https://errata.almalinux.org/9/ALSA-2025-7893.htmlALSA-2025:7893ALSA-2025:7893
�U�rgrafana-selinux-10.2.6-13.el9_6.x86_64.rpm�I�rgrafana-10.2.6-13.el9_6.x86_64.rpm�U�rgrafana-selinux-10.2.6-13.el9_6.x86_64.rpm�I�rgrafana-10.2.6-13.el9_6.x86_64.rpm����F�G	��2��_BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��	�9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903

$�Tkernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm+�Trv-5.14.0-570.17.1.el9_6.x86_64.rpm(�Tkernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm#�Tkernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpm;�Tpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm)�Trtla-5.14.0-570.17.1.el9_6.x86_64.rpm'�Tperf-5.14.0-570.17.1.el9_6.x86_64.rpm�Tkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm&�Tkernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm%�Tkernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm
$�Tkernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm+�Trv-5.14.0-570.17.1.el9_6.x86_64.rpm(�Tkernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm#�Tkernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpm;�Tpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm)�Trtla-5.14.0-570.17.1.el9_6.x86_64.rpm'�Tperf-5.14.0-570.17.1.el9_6.x86_64.rpm�Tkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm&�Tkernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm%�Tkernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm����`�H	��6��sBsecurityImportant: compat-openssl11 security update��B�https://access.redhat.com/errata/RHSA-2025:7937RHSA-2025:7937RHSA-2025:7937https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/21644402164440https://errata.almalinux.org/9/ALSA-2025-7937.htmlALSA-2025:7937ALSA-2025:7937
�!�Bcompat-openssl11-1.1.1k-5.el9_6.1.i686.rpm�!�Bcompat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm�!�Bcompat-openssl11-1.1.1k-5.el9_6.1.i686.rpm�!�Bcompat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm����Y�I	����wBBBBBBBBBBsecurityImportant: webkit2gtk3 security update��G�vhttps://access.redhat.com/errata/RHSA-2025:7995RHSA-2025:7995RHSA-2025:7995https://access.redhat.com/security/cve/CVE-2025-31205CVE-2025-31205CVE-2025-31205https://access.redhat.com/security/cve/CVE-2025-31257CVE-2025-31257CVE-2025-31257https://bugzilla.redhat.com/23665012366501https://bugzilla.redhat.com/23665042366504https://errata.almalinux.org/9/ALSA-2025-7995.htmlALSA-2025:7995ALSA-2025:7995
0�=webkit2gtk3-2.48.2-1.el9_6.i686.rpm3�=webkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm2�=webkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm1�=webkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm3�=webkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm2�=webkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm1�=webkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm0�=webkit2gtk3-2.48.2-1.el9_6.x86_64.rpm0�=webkit2gtk3-2.48.2-1.el9_6.i686.rpm3�=webkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm2�=webkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm1�=webkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm3�=webkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm2�=webkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm1�=webkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm0�=webkit2gtk3-2.48.2-1.el9_6.x86_64.rpm��^�J	����DBBsecurityImportant: firefox security update��=�ghttps://access.redhat.com/errata/RHSA-2025:8049RHSA-2025:8049RHSA-2025:8049https://access.redhat.com/security/cve/CVE-2025-4918CVE-2025-4918CVE-2025-4918https://access.redhat.com/security/cve/CVE-2025-4919CVE-2025-4919CVE-2025-4919https://bugzilla.redhat.com/23670162367016https://bugzilla.redhat.com/23670182367018https://errata.almalinux.org/9/ALSA-2025-8049.htmlALSA-2025:8049ALSA-2025:8049
P�firefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm8�firefox-128.10.1-1.el9_6.alma.1.x86_64.rpmP�firefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm8�firefox-128.10.1-1.el9_6.alma.1.x86_64.rpm����j�K	����IBBBBsecurityImportant: libsoup security update��$�k
https://access.redhat.com/errata/RHSA-2025:8126RHSA-2025:8126RHSA-2025:8126https://access.redhat.com/security/cve/CVE-2025-2784CVE-2025-2784CVE-2025-2784https://access.redhat.com/security/cve/CVE-2025-32049CVE-2025-32049CVE-2025-32049https://access.redhat.com/security/cve/CVE-2025-32914CVE-2025-32914CVE-2025-32914https://access.redhat.com/security/cve/CVE-2025-4948CVE-2025-4948CVE-2025-4948https://bugzilla.redhat.com/23546692354669https://bugzilla.redhat.com/23570662357066https://bugzilla.redhat.com/23593582359358https://bugzilla.redhat.com/23671832367183https://errata.almalinux.org/9/ALSA-2025-8126.htmlALSA-2025:8126ALSA-2025:8126
�g�llibsoup-devel-2.72.0-10.el9_6.2.i686.rpm�g�llibsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm�f�llibsoup-2.72.0-10.el9_6.2.x86_64.rpm�f�llibsoup-2.72.0-10.el9_6.2.i686.rpm�g�llibsoup-devel-2.72.0-10.el9_6.2.i686.rpm�g�llibsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm�f�llibsoup-2.72.0-10.el9_6.2.x86_64.rpm�f�llibsoup-2.72.0-10.el9_6.2.i686.rpm��ҥ&�L	����PsecurityImportant: python-tornado security update���=https://access.redhat.com/errata/RHSA-2025:8136RHSA-2025:8136RHSA-2025:8136https://access.redhat.com/security/cve/CVE-2025-47287CVE-2025-47287CVE-2025-47287https://bugzilla.redhat.com/23667032366703https://errata.almalinux.org/9/ALSA-2025-8136.htmlALSA-2025:8136ALSA-2025:8136
�J�<python3-tornado-6.4.2-2.el9_6.2.x86_64.rpm�J�<python3-tornado-6.4.2-2.el9_6.2.x86_64.rpm����;�M	��&��SBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��L�
https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142

;�Upython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpm�Ukernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm)�Urtla-5.14.0-570.18.1.el9_6.x86_64.rpm+�Urv-5.14.0-570.18.1.el9_6.x86_64.rpm(�Ukernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm&�Ukernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm'�Uperf-5.14.0-570.18.1.el9_6.x86_64.rpm$�Ukernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm#�Ukernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm%�Ukernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpm
;�Upython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpm�Ukernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm)�Urtla-5.14.0-570.18.1.el9_6.x86_64.rpm+�Urv-5.14.0-570.18.1.el9_6.x86_64.rpm(�Ukernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm&�Ukernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm'�Uperf-5.14.0-570.18.1.el9_6.x86_64.rpm$�Ukernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm#�Ukernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm%�Ukernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpm��ܣs�N	��-��gBBBBsecurityImportant: gstreamer1-plugins-bad-free security update��Y�https://access.redhat.com/errata/RHSA-2025:8183RHSA-2025:8183RHSA-2025:8183https://access.redhat.com/security/cve/CVE-2025-3887CVE-2025-3887CVE-2025-3887https://bugzilla.redhat.com/23679192367919https://errata.almalinux.org/9/ALSA-2025-8183.htmlALSA-2025:8183ALSA-2025:8183
�;�Ygstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpm��Ygstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm�;�Ygstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpm��Ygstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm�;�Ygstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpm��Ygstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm�;�Ygstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpm��Ygstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm�����O	��2��nBBsecurityImportant: firefox security update��g�zhttps://access.redhat.com/errata/RHSA-2025:8293RHSA-2025:8293RHSA-2025:8293https://access.redhat.com/security/cve/CVE-2025-5263CVE-2025-5263CVE-2025-5263https://access.redhat.com/security/cve/CVE-2025-5264CVE-2025-5264CVE-2025-5264https://access.redhat.com/security/cve/CVE-2025-5266CVE-2025-5266CVE-2025-5266https://access.redhat.com/security/cve/CVE-2025-5267CVE-2025-5267CVE-2025-5267https://access.redhat.com/security/cve/CVE-2025-5268CVE-2025-5268CVE-2025-5268https://access.redhat.com/security/cve/CVE-2025-5269CVE-2025-5269CVE-2025-5269https://bugzilla.redhat.com/23687502368750https://bugzilla.redhat.com/23687512368751https://bugzilla.redhat.com/23687522368752https://bugzilla.redhat.com/23687552368755https://bugzilla.redhat.com/23687562368756https://bugzilla.redhat.com/23687572368757https://errata.almalinux.org/9/ALSA-2025-8293.htmlALSA-2025:8293ALSA-2025:8293
P�jfirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm8�jfirefox-128.11.0-1.el9_6.alma.1.x86_64.rpmP�jfirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm8�jfirefox-128.11.0-1.el9_6.alma.1.x86_64.rpm���~�P	����sBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��a�Whttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333

)�Vrtla-5.14.0-570.19.1.el9_6.x86_64.rpm$�Vkernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm'�Vperf-5.14.0-570.19.1.el9_6.x86_64.rpm&�Vkernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm#�Vkernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm%�Vkernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm(�Vkernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm+�Vrv-5.14.0-570.19.1.el9_6.x86_64.rpm;�Vpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpm�Vkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpm
)�Vrtla-5.14.0-570.19.1.el9_6.x86_64.rpm$�Vkernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm'�Vperf-5.14.0-570.19.1.el9_6.x86_64.rpm&�Vkernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm#�Vkernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm%�Vkernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm(�Vkernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm+�Vrv-5.14.0-570.19.1.el9_6.x86_64.rpm;�Vpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpm�Vkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpm��X�Q	����GBBBsecurityImportant: varnish security update��8�Zhttps://access.redhat.com/errata/RHSA-2025:8337RHSA-2025:8337RHSA-2025:8337https://access.redhat.com/security/cve/CVE-2025-47905CVE-2025-47905CVE-2025-47905https://bugzilla.redhat.com/23642352364235https://errata.almalinux.org/9/ALSA-2025-8337.htmlALSA-2025:8337ALSA-2025:8337
�P�varnish-6.6.2-6.el9_6.1.i686.rpm�P�varnish-6.6.2-6.el9_6.1.x86_64.rpm�N�varnish-docs-6.6.2-6.el9_6.1.x86_64.rpm�P�varnish-6.6.2-6.el9_6.1.i686.rpm�P�varnish-6.6.2-6.el9_6.1.x86_64.rpm�N�varnish-docs-6.6.2-6.el9_6.1.x86_64.rpm����[�R	���N�fB��ZBBBBBBBBBBBsecurityImportant: nodejs:22 security update���2https://access.redhat.com/errata/RHSA-2025:8467RHSA-2025:8467RHSA-2025:8467https://access.redhat.com/security/cve/CVE-2025-23166CVE-2025-23166CVE-2025-23166https://bugzilla.redhat.com/23671632367163https://errata.almalinux.org/9/ALSA-2025-8467.htmlALSA-2025:8467ALSA-2025:8467
,�$�c*
��nodejs-libs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm�#�nodejs-devel-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm>�nodejs-docs-22.16.0-1.module_el9.6.0+170+f035de78.noarch.rpml�+nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm�	�{nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm�
�{nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmd�0npm-10.9.2-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpm,�nodejs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm�M�v8-12.4-devel-12.4.254.21-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpme�nodejs-full-i18n-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm,�$�c*
��nodejs-libs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm�#�nodejs-devel-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm>�nodejs-docs-22.16.0-1.module_el9.6.0+170+f035de78.noarch.rpml�+nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm�	�{nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm�
�{nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmd�0npm-10.9.2-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpm,�nodejs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm�M�v8-12.4-devel-12.4.254.21-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpme�nodejs-full-i18n-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm�†�+�S	��$�_�NB��oBBBBBBBsecurityImportant: nodejs:20 security update��D�2https://access.redhat.com/errata/RHSA-2025:8468RHSA-2025:8468RHSA-2025:8468https://access.redhat.com/security/cve/CVE-2025-23166CVE-2025-23166CVE-2025-23166https://bugzilla.redhat.com/23671632367163https://errata.almalinux.org/9/ALSA-2025-8468.htmlALSA-2025:8468ALSA-2025:8468
,�Q�b*l�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm�	�Lnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmd�+npm-10.8.2-1.20.19.2.1.module_el9.6.0+169+c9cb05c2.x86_64.rpm>�+nodejs-docs-20.19.2-1.module_el9.6.0+169+c9cb05c2.noarch.rpm,�+nodejs-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm�
�Lnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm�#�+nodejs-devel-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpme�+nodejs-full-i18n-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm,�Q�b*l�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm�	�Lnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmd�+npm-10.8.2-1.20.19.2.1.module_el9.6.0+169+c9cb05c2.x86_64.rpm>�+nodejs-docs-20.19.2-1.module_el9.6.0+169+c9cb05c2.noarch.rpm,�+nodejs-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm�
�Lnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm�#�+nodejs-devel-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpme�+nodejs-full-i18n-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm�†��T	��1��eBBBBBBBBBBsecurityModerate: golang security update��v�
https://access.redhat.com/errata/RHSA-2025:8476RHSA-2025:8476RHSA-2025:8476https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-8476.htmlALSA-2025:8476ALSA-2025:8476
�N�go-toolset-1.23.9-1.el9_6.x86_64.rpm�T�golang-race-1.23.9-1.el9_6.x86_64.rpm�G�golang-1.23.9-1.el9_6.x86_64.rpmn�golang-misc-1.23.9-1.el9_6.noarch.rpm�H�golang-bin-1.23.9-1.el9_6.x86_64.rpmo�golang-src-1.23.9-1.el9_6.noarch.rpmp�golang-tests-1.23.9-1.el9_6.noarch.rpmm�golang-docs-1.23.9-1.el9_6.noarch.rpm�N�go-toolset-1.23.9-1.el9_6.x86_64.rpm�T�golang-race-1.23.9-1.el9_6.x86_64.rpm�G�golang-1.23.9-1.el9_6.x86_64.rpmn�golang-misc-1.23.9-1.el9_6.noarch.rpm�H�golang-bin-1.23.9-1.el9_6.x86_64.rpmo�golang-src-1.23.9-1.el9_6.noarch.rpmp�golang-tests-1.23.9-1.el9_6.noarch.rpmm�golang-docs-1.23.9-1.el9_6.noarch.rpm�†�Y�U	��4��rsecurityImportant: thunderbird security update���https://access.redhat.com/errata/RHSA-2025:8607RHSA-2025:8607RHSA-2025:8607https://bugzilla.redhat.com/23670162367016https://bugzilla.redhat.com/23670182367018https://bugzilla.redhat.com/23687502368750https://bugzilla.redhat.com/23687512368751https://bugzilla.redhat.com/23687522368752https://bugzilla.redhat.com/23687552368755https://bugzilla.redhat.com/23687562368756https://bugzilla.redhat.com/23687572368757https://errata.almalinux.org/9/ALSA-2025-8607.htmlALSA-2025:8607ALSA-2025:8607
https://www.redhat.com/security/data/cve/CVE-2025-4918.htmlCVE-2025-4918CVE-2025-4918https://www.redhat.com/security/data/cve/CVE-2025-4919.htmlCVE-2025-4919CVE-2025-4919https://www.redhat.com/security/data/cve/CVE-2025-5263.htmlCVE-2025-5263CVE-2025-5263https://www.redhat.com/security/data/cve/CVE-2025-5264.htmlCVE-2025-5264CVE-2025-5264https://www.redhat.com/security/data/cve/CVE-2025-5266.htmlCVE-2025-5266CVE-2025-5266https://www.redhat.com/security/data/cve/CVE-2025-5267.htmlCVE-2025-5267CVE-2025-5267https://www.redhat.com/security/data/cve/CVE-2025-5268.htmlCVE-2025-5268CVE-2025-5268https://www.redhat.com/security/data/cve/CVE-2025-5269.htmlCVE-2025-5269CVE-2025-5269https://www.redhat.com/security/data/cve/CVE-2025-5283.htmlCVE-2025-5283CVE-2025-52839�jthunderbird-128.11.0-1.el9_6.alma.1.x86_64.rpm9�jthunderbird-128.11.0-1.el9_6.alma.1.x86_64.rpm��O�V	��7��usecurityImportant: perl-FCGI security update���https://access.redhat.com/errata/RHSA-2025:8635RHSA-2025:8635RHSA-2025:8635https://access.redhat.com/security/cve/CVE-2025-40907CVE-2025-40907CVE-2025-40907https://bugzilla.redhat.com/23668472366847https://errata.almalinux.org/9/ALSA-2025-8635.htmlALSA-2025:8635ALSA-2025:8635
��perl-FCGI-0.79-8.1.el9_6.x86_64.rpm��perl-FCGI-0.79-8.1.el9_6.x86_64.rpm��m�W	����xBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update���https://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643

;�Wpython3-perf-5.14.0-570.21.1.el9_6.x86_64.rpm&�Wkernel-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm�Wkernel-doc-5.14.0-570.21.1.el9_6.noarch.rpm(�Wkernel-headers-5.14.0-570.21.1.el9_6.x86_64.rpm#�Wkernel-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm$�Wkernel-debug-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm%�Wkernel-devel-5.14.0-570.21.1.el9_6.x86_64.rpm)�Wrtla-5.14.0-570.21.1.el9_6.x86_64.rpm+�Wrv-5.14.0-570.21.1.el9_6.x86_64.rpm'�Wperf-5.14.0-570.21.1.el9_6.x86_64.rpm
;�Wpython3-perf-5.14.0-570.21.1.el9_6.x86_64.rpm&�Wkernel-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm�Wkernel-doc-5.14.0-570.21.1.el9_6.noarch.rpm(�Wkernel-headers-5.14.0-570.21.1.el9_6.x86_64.rpm#�Wkernel-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm$�Wkernel-debug-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm%�Wkernel-devel-5.14.0-570.21.1.el9_6.x86_64.rpm)�Wrtla-5.14.0-570.21.1.el9_6.x86_64.rpm+�Wrv-5.14.0-570.21.1.el9_6.x86_64.rpm'�Wperf-5.14.0-570.21.1.el9_6.x86_64.rpm�«�h�X	����LBBBBBBBBsecurityModerate: glibc security update��	�Nhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655
�?�glibc-headers-2.34-168.el9_6.19.x86_64.rpm�h�glibc-devel-2.34-168.el9_6.19.i686.rpm�@�glibc-locale-source-2.34-168.el9_6.19.x86_64.rpm�A�glibc-utils-2.34-168.el9_6.19.x86_64.rpm�h�glibc-devel-2.34-168.el9_6.19.x86_64.rpm�(�glibc-doc-2.34-168.el9_6.19.noarch.rpm�?�glibc-headers-2.34-168.el9_6.19.x86_64.rpm�h�glibc-devel-2.34-168.el9_6.19.i686.rpm�@�glibc-locale-source-2.34-168.el9_6.19.x86_64.rpm�A�glibc-utils-2.34-168.el9_6.19.x86_64.rpm�h�glibc-devel-2.34-168.el9_6.19.x86_64.rpm�(�glibc-doc-2.34-168.el9_6.19.noarch.rpm�Ÿ� �Y	����WBBsecurityModerate: grafana security update��W�7https://access.redhat.com/errata/RHSA-2025:8682RHSA-2025:8682RHSA-2025:8682https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-8682.htmlALSA-2025:8682ALSA-2025:8682
�U�sgrafana-selinux-10.2.6-14.el9_6.x86_64.rpm�I�sgrafana-10.2.6-14.el9_6.x86_64.rpm�U�sgrafana-selinux-10.2.6-14.el9_6.x86_64.rpm�I�sgrafana-10.2.6-14.el9_6.x86_64.rpm��D�Z	��2��\BBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update���8https://access.redhat.com/errata/RHSA-2025:8813RHSA-2025:8813RHSA-2025:8813https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8813.htmlALSA-2025:8813ALSA-2025:8813
�v�Gaspnetcore-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm�Y�Gaspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm�`�Gdotnet-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm�x�Gdotnet-hostfxr-8.0-8.0.17-1.el9_6.x86_64.rpm�{�Gdotnet-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm�z�dotnet-sdk-8.0-8.0.117-1.el9_6.x86_64.rpm�u�Gaspnetcore-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm�|�dotnet-templates-8.0-8.0.117-1.el9_6.x86_64.rpm�w�Gdotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpm�y�Gdotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm�v�Gaspnetcore-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm�Y�Gaspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm�`�Gdotnet-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm�x�Gdotnet-hostfxr-8.0-8.0.17-1.el9_6.x86_64.rpm�{�Gdotnet-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm�z�dotnet-sdk-8.0-8.0.117-1.el9_6.x86_64.rpm�u�Gaspnetcore-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm�|�dotnet-templates-8.0-8.0.117-1.el9_6.x86_64.rpm�w�Gdotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpm�y�Gdotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm�°�t�[	����sBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update��F�7https://access.redhat.com/errata/RHSA-2025:8817RHSA-2025:8817RHSA-2025:8817https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8817.htmlALSA-2025:8817ALSA-2025:8817
�0�Fdotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm�'�Faspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm�6�{dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm�8�{dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm�"�{netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm�!�Fdotnet-host-9.0.6-1.el9_6.x86_64.rpm�1�Fdotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm�3�Fdotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm�(�Faspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm�)�Faspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm�2�Fdotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm�4�{dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm�7�Fdotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm�5�{dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpm�0�Fdotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm�'�Faspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm�6�{dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm�8�{dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm�"�{netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm�!�Fdotnet-host-9.0.6-1.el9_6.x86_64.rpm�1�Fdotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm�3�Fdotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm�(�Faspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm�)�Faspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm�2�Fdotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm�4�{dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm�7�Fdotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm�5�{dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpm�ª�E�\	����PBBsecurityImportant: mod_security security update��}�https://access.redhat.com/errata/RHSA-2025:8837RHSA-2025:8837RHSA-2025:8837https://access.redhat.com/security/cve/CVE-2025-47947CVE-2025-47947CVE-2025-47947https://bugzilla.redhat.com/23679032367903https://errata.almalinux.org/9/ALSA-2025-8837.htmlALSA-2025:8837ALSA-2025:8837
��-mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpm��-mod_security-2.9.6-2.el9_6.x86_64.rpm��-mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpm��-mod_security-2.9.6-2.el9_6.x86_64.rpm�ª��]	����UsecurityModerate: grafana-pcp security update���https://access.redhat.com/errata/RHSA-2025:8916RHSA-2025:8916RHSA-2025:8916https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-8916.htmlALSA-2025:8916ALSA-2025:8916
�~�.grafana-pcp-5.1.1-11.el9_6.x86_64.rpm�~�.grafana-pcp-5.1.1-11.el9_6.x86_64.rpm���^	��+��XBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update���ihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080

$�Xkernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm%�Xkernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm&�Xkernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm;�Xpython3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm(�Xkernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm+�Xrv-5.14.0-570.22.1.el9_6.x86_64.rpm'�Xperf-5.14.0-570.22.1.el9_6.x86_64.rpm#�Xkernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm)�Xrtla-5.14.0-570.22.1.el9_6.x86_64.rpm�Xkernel-doc-5.14.0-570.22.1.el9_6.noarch.rpm
$�Xkernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm%�Xkernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm&�Xkernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm;�Xpython3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm(�Xkernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm+�Xrv-5.14.0-570.22.1.el9_6.x86_64.rpm'�Xperf-5.14.0-570.22.1.el9_6.x86_64.rpm#�Xkernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm)�Xrtla-5.14.0-570.22.1.el9_6.x86_64.rpm�Xkernel-doc-5.14.0-570.22.1.el9_6.noarch.rpm��&�_	��.��lsecurityModerate: git-lfs security update��|�https://access.redhat.com/errata/RHSA-2025:9106RHSA-2025:9106RHSA-2025:9106https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9106.htmlALSA-2025:9106ALSA-2025:9106
�l�git-lfs-3.6.1-2.el9_6.x86_64.rpm�l�git-lfs-3.6.1-2.el9_6.x86_64.rpm��~�`	��2��oBsecurityImportant: libvpx security update���8https://access.redhat.com/errata/RHSA-2025:9118RHSA-2025:9118RHSA-2025:9118https://access.redhat.com/security/cve/CVE-2025-5283CVE-2025-5283CVE-2025-5283https://bugzilla.redhat.com/23687492368749https://errata.almalinux.org/9/ALSA-2025-9118.htmlALSA-2025:9118ALSA-2025:9118
�7�@libvpx-1.9.0-9.el9_6.x86_64.rpm�7�@libvpx-1.9.0-9.el9_6.i686.rpm�7�@libvpx-1.9.0-9.el9_6.x86_64.rpm�7�@libvpx-1.9.0-9.el9_6.i686.rpm��@�a	��5��ssecurityModerate: containernetworking-plugins security update��7�https://access.redhat.com/errata/RHSA-2025:9143RHSA-2025:9143RHSA-2025:9143https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9143.htmlALSA-2025:9143ALSA-2025:9143
�_� containernetworking-plugins-1.6.2-2.el9_6.x86_64.rpm�_� containernetworking-plugins-1.6.2-2.el9_6.x86_64.rpm���n�b	��?��vBBBBBBBsecurityModerate: podman security update��Q�https://access.redhat.com/errata/RHSA-2025:9144RHSA-2025:9144RHSA-2025:9144https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9144.htmlALSA-2025:9144ALSA-2025:9144
�3�*podman-remote-5.4.0-10.el9_6.x86_64.rpm�1�*podman-5.4.0-10.el9_6.x86_64.rpm�2�*podman-plugins-5.4.0-10.el9_6.x86_64.rpm�4�*podman-tests-5.4.0-10.el9_6.x86_64.rpmh�*podman-docker-5.4.0-10.el9_6.noarch.rpm�3�*podman-remote-5.4.0-10.el9_6.x86_64.rpm�1�*podman-5.4.0-10.el9_6.x86_64.rpm�2�*podman-plugins-5.4.0-10.el9_6.x86_64.rpm�4�*podman-tests-5.4.0-10.el9_6.x86_64.rpmh�*podman-docker-5.4.0-10.el9_6.noarch.rpm���9�c	����@BBsecurityModerate: skopeo security update��Y�ahttps://access.redhat.com/errata/RHSA-2025:9145RHSA-2025:9145RHSA-2025:9145https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9145.htmlALSA-2025:9145ALSA-2025:9145
�c�9skopeo-1.18.1-2.el9_6.x86_64.rpm�d�9skopeo-tests-1.18.1-2.el9_6.x86_64.rpm�c�9skopeo-1.18.1-2.el9_6.x86_64.rpm�d�9skopeo-tests-1.18.1-2.el9_6.x86_64.rpm��Ŀu�d	��	��EBBsecurityModerate: buildah security update��:�https://access.redhat.com/errata/RHSA-2025:9147RHSA-2025:9147RHSA-2025:9147https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9147.htmlALSA-2025:9147ALSA-2025:9147
�0�Gbuildah-tests-1.39.4-2.el9_6.x86_64.rpm�/�Gbuildah-1.39.4-2.el9_6.x86_64.rpm�0�Gbuildah-tests-1.39.4-2.el9_6.x86_64.rpm�/�Gbuildah-1.39.4-2.el9_6.x86_64.rpm��ľ^�e	����JBBsecurityModerate: gvisor-tap-vsock security update��X�https://access.redhat.com/errata/RHSA-2025:9150RHSA-2025:9150RHSA-2025:9150https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9150.htmlALSA-2025:9150ALSA-2025:9150
�;�bgvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpm�B�bgvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpm�;�bgvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpm�B�bgvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpm��źu�f	����OBBBsecurityImportant: gimp security update��l�.https://access.redhat.com/errata/RHSA-2025:9162RHSA-2025:9162RHSA-2025:9162https://access.redhat.com/security/cve/CVE-2025-48797CVE-2025-48797CVE-2025-48797https://access.redhat.com/security/cve/CVE-2025-48798CVE-2025-48798CVE-2025-48798https://access.redhat.com/security/cve/CVE-2025-5473CVE-2025-5473CVE-2025-5473https://bugzilla.redhat.com/23685572368557https://bugzilla.redhat.com/23685582368558https://bugzilla.redhat.com/23708672370867https://errata.almalinux.org/9/ALSA-2025-9162.htmlALSA-2025:9162ALSA-2025:9162
�?�gimp-2.99.8-4.el9_6.2.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_6.2.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_6.2.i686.rpm�?�gimp-2.99.8-4.el9_6.2.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_6.2.x86_64.rpm�J�gimp-libs-2.99.8-4.el9_6.2.i686.rpm��h�g	��-��UBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update���ghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184
�<�ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm�g�python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm�e�ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm�i�python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm�d�ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm�b�ipa-common-4.12.2-14.el9_6.1.noarch.rpm�c�ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm�a�ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm�e�ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm�c�ipa-selinux-4.12.2-14.el9_6.1.noarch.rpm�|�ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm�h�python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm�=�ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpm�{�ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm�b�ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm�a�ipa-client-4.12.2-14.el9_6.1.x86_64.rpm�d�ipa-server-4.12.2-14.el9_6.1.x86_64.rpm�<�ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm�g�python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm�e�ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm�i�python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm�d�ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm�b�ipa-common-4.12.2-14.el9_6.1.noarch.rpm�c�ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm�a�ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm�e�ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm�c�ipa-selinux-4.12.2-14.el9_6.1.noarch.rpm�|�ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm�h�python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm�=�ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpm�{�ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm�b�ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm�a�ipa-client-4.12.2-14.el9_6.1.x86_64.rpm�d�ipa-server-4.12.2-14.el9_6.1.x86_64.rpm��_�h	����nBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update���https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302

$�Ykernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm(�Ykernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm%�Ykernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpm;�Ypython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm+�Yrv-5.14.0-570.23.1.el9_6.x86_64.rpm'�Yperf-5.14.0-570.23.1.el9_6.x86_64.rpm&�Ykernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm�Ykernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm#�Ykernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm)�Yrtla-5.14.0-570.23.1.el9_6.x86_64.rpm
$�Ykernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm(�Ykernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm%�Ykernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpm;�Ypython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm+�Yrv-5.14.0-570.23.1.el9_6.x86_64.rpm'�Yperf-5.14.0-570.23.1.el9_6.x86_64.rpm&�Ykernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm�Ykernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm#�Ykernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm)�Yrtla-5.14.0-570.23.1.el9_6.x86_64.rpm��D�i	����BBBBBBBBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security update���zhttps://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303
��hxorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpm��%xorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpm��hxorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpm��%xorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpm��%xorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpm���j	����QBBBBBBBBBsecurityImportant: tigervnc security update���uhttps://access.redhat.com/errata/RHSA-2025:9306RHSA-2025:9306RHSA-2025:9306https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9306.htmlALSA-2025:9306ALSA-2025:9306
��tigervnc-selinux-1.14.1-8.el9_6.noarch.rpm��tigervnc-icons-1.14.1-8.el9_6.noarch.rpm�Y�tigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpm�Z�tigervnc-server-module-1.14.1-8.el9_6.x86_64.rpm�X�tigervnc-server-1.14.1-8.el9_6.x86_64.rpm�W�tigervnc-1.14.1-8.el9_6.x86_64.rpm��tigervnc-license-1.14.1-8.el9_6.noarch.rpm��tigervnc-selinux-1.14.1-8.el9_6.noarch.rpm��tigervnc-icons-1.14.1-8.el9_6.noarch.rpm�Y�tigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpm�Z�tigervnc-server-module-1.14.1-8.el9_6.x86_64.rpm�X�tigervnc-server-1.14.1-8.el9_6.x86_64.rpm�W�tigervnc-1.14.1-8.el9_6.x86_64.rpm��tigervnc-license-1.14.1-8.el9_6.noarch.rpm���k	����]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update��
�(https://access.redhat.com/errata/RHSA-2025:9327RHSA-2025:9327RHSA-2025:9327https://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-9327.htmlALSA-2025:9327ALSA-2025:9327
!�2.libblockdev-fs-2.28-14.el9_6.x86_64.rpm�;.libblockdev-part-2.28-14.el9_6.i686.rpm�3.libblockdev-kbd-2.28-14.el9_6.i686.rpm�w.libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm�4.libblockdev-loop-2.28-14.el9_6.i686.rpm�4.libblockdev-loop-2.28-14.el9_6.x86_64.rpm�/.libblockdev-2.28-14.el9_6.i686.rpm�:.libblockdev-nvme-2.28-14.el9_6.i686.rpm�<.libblockdev-swap-2.28-14.el9_6.i686.rpm�:.libblockdev-nvme-2.28-14.el9_6.x86_64.rpm�.python3-blockdev-2.28-14.el9_6.x86_64.rpm�=.libblockdev-utils-2.28-14.el9_6.i686.rpm�<.libblockdev-swap-2.28-14.el9_6.x86_64.rpm�=.libblockdev-utils-2.28-14.el9_6.x86_64.rpm�1.libblockdev-dm-2.28-14.el9_6.i686.rpm�8.libblockdev-mpath-2.28-14.el9_6.x86_64.rpm�2.libblockdev-fs-2.28-14.el9_6.i686.rpm�0.libblockdev-crypto-2.28-14.el9_6.i686.rpm�8.libblockdev-mpath-2.28-14.el9_6.i686.rpm�5.libblockdev-lvm-2.28-14.el9_6.i686.rpm�5.libblockdev-lvm-2.28-14.el9_6.x86_64.rpm�3.libblockdev-kbd-2.28-14.el9_6.x86_64.rpm�1.libblockdev-dm-2.28-14.el9_6.x86_64.rpm�;.libblockdev-part-2.28-14.el9_6.x86_64.rpm�/.libblockdev-2.28-14.el9_6.x86_64.rpm�0.libblockdev-crypto-2.28-14.el9_6.x86_64.rpm�9.libblockdev-nvdimm-2.28-14.el9_6.i686.rpm�6.libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpm�x.libblockdev-tools-2.28-14.el9_6.x86_64.rpm�9.libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm�7.libblockdev-mdraid-2.28-14.el9_6.i686.rpm�7.libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm�6.libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpm!�2.libblockdev-fs-2.28-14.el9_6.x86_64.rpm�;.libblockdev-part-2.28-14.el9_6.i686.rpm�3.libblockdev-kbd-2.28-14.el9_6.i686.rpm�w.libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm�4.libblockdev-loop-2.28-14.el9_6.i686.rpm�4.libblockdev-loop-2.28-14.el9_6.x86_64.rpm�/.libblockdev-2.28-14.el9_6.i686.rpm�:.libblockdev-nvme-2.28-14.el9_6.i686.rpm�<.libblockdev-swap-2.28-14.el9_6.i686.rpm�:.libblockdev-nvme-2.28-14.el9_6.x86_64.rpm�.python3-blockdev-2.28-14.el9_6.x86_64.rpm�=.libblockdev-utils-2.28-14.el9_6.i686.rpm�<.libblockdev-swap-2.28-14.el9_6.x86_64.rpm�=.libblockdev-utils-2.28-14.el9_6.x86_64.rpm�1.libblockdev-dm-2.28-14.el9_6.i686.rpm�8.libblockdev-mpath-2.28-14.el9_6.x86_64.rpm�2.libblockdev-fs-2.28-14.el9_6.i686.rpm�0.libblockdev-crypto-2.28-14.el9_6.i686.rpm�8.libblockdev-mpath-2.28-14.el9_6.i686.rpm�5.libblockdev-lvm-2.28-14.el9_6.i686.rpm�5.libblockdev-lvm-2.28-14.el9_6.x86_64.rpm�3.libblockdev-kbd-2.28-14.el9_6.x86_64.rpm�1.libblockdev-dm-2.28-14.el9_6.x86_64.rpm�;.libblockdev-part-2.28-14.el9_6.x86_64.rpm�/.libblockdev-2.28-14.el9_6.x86_64.rpm�0.libblockdev-crypto-2.28-14.el9_6.x86_64.rpm�9.libblockdev-nvdimm-2.28-14.el9_6.i686.rpm�6.libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpm�x.libblockdev-tools-2.28-14.el9_6.x86_64.rpm�9.libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm�7.libblockdev-mdraid-2.28-14.el9_6.i686.rpm�7.libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm�6.libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpm��E�l	����QsecurityImportant: mod_auth_openidc security update��2�
https://access.redhat.com/errata/RHSA-2025:9396RHSA-2025:9396RHSA-2025:9396https://access.redhat.com/security/cve/CVE-2025-3891CVE-2025-3891CVE-2025-3891https://bugzilla.redhat.com/23616332361633https://errata.almalinux.org/9/ALSA-2025-9396.htmlALSA-2025:9396ALSA-2025:9396
�d�Omod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpm�d�Omod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpm��b�m	����TBsecurityModerate: krb5 security update��?�https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430
�d�0krb5-devel-1.21.1-8.el9_6.x86_64.rpm�d�0krb5-devel-1.21.1-8.el9_6.i686.rpm�d�0krb5-devel-1.21.1-8.el9_6.x86_64.rpm�d�0krb5-devel-1.21.1-8.el9_6.i686.rpm��K�n	����XBBBsecurityModerate: libarchive security update��W�Rhttps://access.redhat.com/errata/RHSA-2025:9431RHSA-2025:9431RHSA-2025:9431https://access.redhat.com/security/cve/CVE-2025-25724CVE-2025-25724CVE-2025-25724https://bugzilla.redhat.com/23492212349221https://errata.almalinux.org/9/ALSA-2025-9431.htmlALSA-2025:9431ALSA-2025:9431
�f�libarchive-devel-3.5.3-5.el9_6.x86_64.rpm�*�bsdtar-3.5.3-5.el9_6.x86_64.rpm�f�libarchive-devel-3.5.3-5.el9_6.i686.rpm�f�libarchive-devel-3.5.3-5.el9_6.x86_64.rpm�*�bsdtar-3.5.3-5.el9_6.x86_64.rpm�f�libarchive-devel-3.5.3-5.el9_6.i686.rpm��A�o	�� ��^securityModerate: iputils security update��)�https://access.redhat.com/errata/RHSA-2025:9432RHSA-2025:9432RHSA-2025:9432https://access.redhat.com/security/cve/CVE-2025-47268CVE-2025-47268CVE-2025-47268https://bugzilla.redhat.com/23640902364090https://errata.almalinux.org/9/ALSA-2025-9432.htmlALSA-2025:9432ALSA-2025:9432
�^�`iputils-ninfod-20210202-11.el9_6.1.x86_64.rpm�^�`iputils-ninfod-20210202-11.el9_6.1.x86_64.rpm��H�p	��#��asecurityModerate: mod_proxy_cluster security update��;�https://access.redhat.com/errata/RHSA-2025:9434RHSA-2025:9434RHSA-2025:9434https://access.redhat.com/security/cve/CVE-2024-10306CVE-2024-10306CVE-2024-10306https://bugzilla.redhat.com/23213022321302https://errata.almalinux.org/9/ALSA-2025-9434.htmlALSA-2025:9434ALSA-2025:9434
��\mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpm��\mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpm��d�q	��-��dBBBBBBBsecurityModerate: emacs security update��W�`https://access.redhat.com/errata/RHSA-2025:9448RHSA-2025:9448RHSA-2025:9448https://access.redhat.com/security/cve/CVE-2024-53920CVE-2024-53920CVE-2024-53920https://bugzilla.redhat.com/23291612329161https://errata.almalinux.org/9/ALSA-2025-9448.htmlALSA-2025:9448ALSA-2025:9448
�_�emacs-lucid-27.2-14.el9_6.2.x86_64.rpm�`�emacs-filesystem-27.2-14.el9_6.2.noarch.rpm�^�emacs-common-27.2-14.el9_6.2.x86_64.rpm�`�emacs-nox-27.2-14.el9_6.2.x86_64.rpm�]�emacs-27.2-14.el9_6.2.x86_64.rpm�_�emacs-lucid-27.2-14.el9_6.2.x86_64.rpm�`�emacs-filesystem-27.2-14.el9_6.2.noarch.rpm�^�emacs-common-27.2-14.el9_6.2.x86_64.rpm�`�emacs-nox-27.2-14.el9_6.2.x86_64.rpm�]�emacs-27.2-14.el9_6.2.x86_64.rpm���r	����nBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5-qtbase security update��7�.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462
�I�qt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpm�C�qt5-qtbase-5.15.9-11.el9_6.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpm�D�qt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpm�C�qt5-qtbase-5.15.9-11.el9_6.i686.rpm�G�qt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpm�D�qt5-qtbase-devel-5.15.9-11.el9_6.i686.rpm�F�qt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpm�E�qt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpm�F�qt5-qtbase-gui-5.15.9-11.el9_6.i686.rpm�I�qt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpm�E�qt5-qtbase-examples-5.15.9-11.el9_6.i686.rpm�G�qt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpm�R�qt5-qtbase-common-5.15.9-11.el9_6.noarch.rpm�I�qt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpm�C�qt5-qtbase-5.15.9-11.el9_6.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpm�D�qt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpm�J�qt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpm�C�qt5-qtbase-5.15.9-11.el9_6.i686.rpm�G�qt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpm�D�qt5-qtbase-devel-5.15.9-11.el9_6.i686.rpm�F�qt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpm�H�qt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpm�E�qt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpm�F�qt5-qtbase-gui-5.15.9-11.el9_6.i686.rpm�I�qt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpm�E�qt5-qtbase-examples-5.15.9-11.el9_6.i686.rpm�G�qt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpm�R�qt5-qtbase-common-5.15.9-11.el9_6.noarch.rpm���s	��
��HBBBsecurityImportant: pam security update��e�0https://access.redhat.com/errata/RHSA-2025:9526RHSA-2025:9526RHSA-2025:9526https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://bugzilla.redhat.com/23725122372512https://errata.almalinux.org/9/ALSA-2025-9526.htmlALSA-2025:9526ALSA-2025:9526
��fpam-devel-1.5.1-25.el9_6.x86_64.rpm�J�fpam-docs-1.5.1-25.el9_6.x86_64.rpm��fpam-devel-1.5.1-25.el9_6.i686.rpm��fpam-devel-1.5.1-25.el9_6.x86_64.rpm�J�fpam-docs-1.5.1-25.el9_6.x86_64.rpm��fpam-devel-1.5.1-25.el9_6.i686.rpm���'�t	����NBBBBsecurityModerate: osbuild-composer security update���Whttps://access.redhat.com/errata/RHSA-2025:9634RHSA-2025:9634RHSA-2025:9634https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9634.htmlALSA-2025:9634ALSA-2025:9634
�w�posbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpm�y�posbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpm�x�posbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpm�w�posbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpm�y�posbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpm�x�posbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpm��2�u	����UsecurityModerate: weldr-client security update��l�yhttps://access.redhat.com/errata/RHSA-2025:9635RHSA-2025:9635RHSA-2025:9635https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9635.htmlALSA-2025:9635ALSA-2025:9635
��weldr-client-35.12-4.el9_6.x86_64.rpm��weldr-client-35.12-4.el9_6.x86_64.rpm��J�v	��"��XBBBBBBBBsecurityModerate: glibc security update��e�2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877
�A�glibc-utils-2.34-168.el9_6.20.x86_64.rpm�(�glibc-doc-2.34-168.el9_6.20.noarch.rpm�h�glibc-devel-2.34-168.el9_6.20.x86_64.rpm�h�glibc-devel-2.34-168.el9_6.20.i686.rpm�?�glibc-headers-2.34-168.el9_6.20.x86_64.rpm�@�glibc-locale-source-2.34-168.el9_6.20.x86_64.rpm�A�glibc-utils-2.34-168.el9_6.20.x86_64.rpm�(�glibc-doc-2.34-168.el9_6.20.noarch.rpm�h�glibc-devel-2.34-168.el9_6.20.x86_64.rpm�h�glibc-devel-2.34-168.el9_6.20.i686.rpm�?�glibc-headers-2.34-168.el9_6.20.x86_64.rpm�@�glibc-locale-source-2.34-168.el9_6.20.x86_64.rpm��l�w	��6��cBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update���	https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880

(�Zkernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm%�Zkernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpm�Zkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm&�Zkernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm#�Zkernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm+�Zrv-5.14.0-570.24.1.el9_6.x86_64.rpm$�Zkernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm;�Zpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm'�Zperf-5.14.0-570.24.1.el9_6.x86_64.rpm)�Zrtla-5.14.0-570.24.1.el9_6.x86_64.rpm
(�Zkernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm%�Zkernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpm�Zkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm&�Zkernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm#�Zkernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm+�Zrv-5.14.0-570.24.1.el9_6.x86_64.rpm$�Zkernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm;�Zpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm'�Zperf-5.14.0-570.24.1.el9_6.x86_64.rpm)�Zrtla-5.14.0-570.24.1.el9_6.x86_64.rpm�Ó�
�x	��9��wsecurityImportant: sudo security update�� �shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978
�L�hsudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpm�L�hsudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpm��z�y	����zBBBBBBBBsecurityModerate: open-vm-tools security update���xhttps://access.redhat.com/security/cve/CVE-2025-22247CVE-2025-22247CVE-2025-22247https://bugzilla.redhat.com/23642612364261https://errata.almalinux.org/9/ALSA-2025-A002.htmlALSA-2025:A002ALSA-2025:A002
��nopen-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpm��nopen-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpm�	�nopen-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpm�
�nopen-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpm�M�nopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpm��nopen-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpm��nopen-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpm�	�nopen-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpm�
�nopen-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpm�M�nopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpm��Ԩ^�z	��8��EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update���Ihttps://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-A005.htmlALSA-2025:A005ALSA-2025:A005
!�2-libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpm�3-libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpm�1-libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpm�5-libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpm�9-libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpm�:-libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpm�0-libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpm�/-libblockdev-2.28-13.el9_6.alma.1.x86_64.rpm�6-libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpm�1-libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpm�9-libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpm�-python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpm�;-libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpm�3-libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpm�7-libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpm�4-libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpm�=-libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpm�6-libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpm�<-libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpm�2-libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpm�4-libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpm�/-libblockdev-2.28-13.el9_6.alma.1.i686.rpm�w-libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpm�5-libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpm�8-libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpm�:-libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpm�8-libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpm�0-libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpm�x-libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpm�<-libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpm�;-libblockdev-part-2.28-13.el9_6.alma.1.i686.rpm�7-libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpm�=-libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm!�2-libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpm�3-libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpm�1-libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpm�5-libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpm�9-libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpm�:-libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpm�0-libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpm�/-libblockdev-2.28-13.el9_6.alma.1.x86_64.rpm�6-libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpm�1-libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpm�9-libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpm�-python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpm�;-libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpm�3-libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpm�7-libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpm�4-libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpm�=-libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpm�6-libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpm�<-libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpm�2-libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpm�4-libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpm�/-libblockdev-2.28-13.el9_6.alma.1.i686.rpm�w-libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpm�5-libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpm�8-libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpm�:-libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpm�8-libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpm�0-libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpm�x-libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpm�<-libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpm�;-libblockdev-part-2.28-13.el9_6.alma.1.i686.rpm�7-libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpm�=-libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm����&�{	����yBBBBBBBsecurityModerate: gcc-toolset-14-binutils security update��T�ehttps://access.redhat.com/errata/RHSA-2026:0052RHSA-2026:0052RHSA-2026:0052https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-0052.htmlALSA-2026:0052ALSA-2026:0052
�)�gcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpm�+�gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpm�*�gcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm�:�gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm�:�gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpm�)�gcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpm�+�gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpm�*�gcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm�:�gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm�:�gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpm����|	����CBBBBBBBBBBBBsecurityModerate: poppler security update��9�xhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126
	�A�Dpoppler-glib-21.01.0-23.el9_7.x86_64.rpm�?�Dpoppler-21.01.0-23.el9_7.i686.rpm�?�Dpoppler-21.01.0-23.el9_7.x86_64.rpm�A�Dpoppler-glib-21.01.0-23.el9_7.i686.rpm�B�Dpoppler-qt5-21.01.0-23.el9_7.i686.rpm�@�Dpoppler-cpp-21.01.0-23.el9_7.x86_64.rpm�B�Dpoppler-qt5-21.01.0-23.el9_7.x86_64.rpm�H�Dpoppler-utils-21.01.0-23.el9_7.x86_64.rpm�@�Dpoppler-cpp-21.01.0-23.el9_7.i686.rpm	�A�Dpoppler-glib-21.01.0-23.el9_7.x86_64.rpm�?�Dpoppler-21.01.0-23.el9_7.i686.rpm�?�Dpoppler-21.01.0-23.el9_7.x86_64.rpm�A�Dpoppler-glib-21.01.0-23.el9_7.i686.rpm�B�Dpoppler-qt5-21.01.0-23.el9_7.i686.rpm�@�Dpoppler-cpp-21.01.0-23.el9_7.x86_64.rpm�B�Dpoppler-qt5-21.01.0-23.el9_7.x86_64.rpm�H�Dpoppler-utils-21.01.0-23.el9_7.x86_64.rpm�@�Dpoppler-cpp-21.01.0-23.el9_7.i686.rpm���p�}	��(��RBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb security update��1�8https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137
��?mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm��?mariadb-server-10.5.29-3.el9_7.x86_64.rpm��?mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm�|�?mariadb-backup-10.5.29-3.el9_7.x86_64.rpm��?mariadb-pam-10.5.29-3.el9_7.x86_64.rpm��?mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm��?mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm��?mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm�~�?mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm��?mariadb-10.5.29-3.el9_7.x86_64.rpm�}�?mariadb-common-10.5.29-3.el9_7.x86_64.rpm��?mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm��?mariadb-server-10.5.29-3.el9_7.x86_64.rpm��?mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm�|�?mariadb-backup-10.5.29-3.el9_7.x86_64.rpm��?mariadb-pam-10.5.29-3.el9_7.x86_64.rpm��?mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm��?mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm��?mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm�~�?mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm��?mariadb-10.5.29-3.el9_7.x86_64.rpm�}�?mariadb-common-10.5.29-3.el9_7.x86_64.rpm����~	��,��iBsecurityImportant: libpng security update��i�https://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238
�6�klibpng-devel-1.6.37-12.el9_7.1.i686.rpm�6�klibpng-devel-1.6.37-12.el9_7.1.x86_64.rpm�6�klibpng-devel-1.6.37-12.el9_7.1.i686.rpm�6�klibpng-devel-1.6.37-12.el9_7.1.x86_64.rpm���U�	��	�xB��uBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb:10.11 security update���{https://access.redhat.com/errata/RHSA-2026:0247RHSA-2026:0247RHSA-2026:0247https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2023-52971CVE-2023-52971CVE-2023-52971https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509172350917https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0247.htmlALSA-2026:0247ALSA-2026:0247
��l�`*��
mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�}�
mariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�|�
mariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�9�&galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm��
mariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�~�
mariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�~�
mariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��l�`*��
mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�}�
mariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�|�
mariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�9�&galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm��
mariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�~�
mariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�~�
mariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm��
mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm�˓�7�	����JBBBBBBBBBBBBsecurityModerate: cups security update���https://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312
�,�jcups-client-2.3.3op2-34.el9_7.2.x86_64.rpm�-�jcups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpm�f�jcups-devel-2.3.3op2-34.el9_7.2.x86_64.rpm��jcups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpm�+�jcups-2.3.3op2-34.el9_7.2.x86_64.rpm�f�jcups-devel-2.3.3op2-34.el9_7.2.i686.rpm�.�jcups-lpd-2.3.3op2-34.el9_7.2.x86_64.rpm�/�jcups-printerapp-2.3.3op2-34.el9_7.2.x86_64.rpm�,�jcups-client-2.3.3op2-34.el9_7.2.x86_64.rpm�-�jcups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpm�f�jcups-devel-2.3.3op2-34.el9_7.2.x86_64.rpm��jcups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpm�+�jcups-2.3.3op2-34.el9_7.2.x86_64.rpm�f�jcups-devel-2.3.3op2-34.el9_7.2.i686.rpm�.�jcups-lpd-2.3.3op2-34.el9_7.2.x86_64.rpm�/�jcups-printerapp-2.3.3op2-34.el9_7.2.x86_64.rpm�˩�u�	����YBBBBsecurityImportant: libsoup security update���$https://access.redhat.com/errata/RHSA-2026:0422RHSA-2026:0422RHSA-2026:0422https://access.redhat.com/security/cve/CVE-2025-14523CVE-2025-14523CVE-2025-14523https://bugzilla.redhat.com/24213492421349https://errata.almalinux.org/9/ALSA-2026-0422.htmlALSA-2026:0422ALSA-2026:0422
�g�nlibsoup-devel-2.72.0-12.el9_7.3.i686.rpm�f�nlibsoup-2.72.0-12.el9_7.3.i686.rpm�f�nlibsoup-2.72.0-12.el9_7.3.x86_64.rpm�g�nlibsoup-devel-2.72.0-12.el9_7.3.x86_64.rpm�g�nlibsoup-devel-2.72.0-12.el9_7.3.i686.rpm�f�nlibsoup-2.72.0-12.el9_7.3.i686.rpm�f�nlibsoup-2.72.0-12.el9_7.3.x86_64.rpm�g�nlibsoup-devel-2.72.0-12.el9_7.3.x86_64.rpm�˩�l�	��$��`BBsecurityImportant: buildah security update��'�6https://access.redhat.com/errata/RHSA-2026:0437RHSA-2026:0437RHSA-2026:0437https://access.redhat.com/security/cve/CVE-2025-47913CVE-2025-47913CVE-2025-47913https://bugzilla.redhat.com/24149432414943https://errata.almalinux.org/9/ALSA-2026-0437.htmlALSA-2026:0437ALSA-2026:0437
�/�Ibuildah-1.41.8-1.el9_7.x86_64.rpm�0�Ibuildah-tests-1.41.8-1.el9_7.x86_64.rpm�/�Ibuildah-1.41.8-1.el9_7.x86_64.rpm�0�Ibuildah-tests-1.41.8-1.el9_7.x86_64.rpm�˩�v�	��8��eBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��]�0
https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445

;�qpython3-perf-5.14.0-611.20.1.el9_7.x86_64.rpm�qkernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm$�qkernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm%�qkernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)�qrtla-5.14.0-611.20.1.el9_7.x86_64.rpm#�qkernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm+�qrv-5.14.0-611.20.1.el9_7.x86_64.rpm'�qperf-5.14.0-611.20.1.el9_7.x86_64.rpm(�qkernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm&�qkernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm
;�qpython3-perf-5.14.0-611.20.1.el9_7.x86_64.rpm�qkernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm$�qkernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm%�qkernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)�qrtla-5.14.0-611.20.1.el9_7.x86_64.rpm#�qkernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm+�qrv-5.14.0-611.20.1.el9_7.x86_64.rpm'�qperf-5.14.0-611.20.1.el9_7.x86_64.rpm(�qkernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm&�qkernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm�˩�S�	��?��yBBBBsecurityModerate: libpq security update��
�(https://access.redhat.com/errata/RHSA-2026:0458RHSA-2026:0458RHSA-2026:0458https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0458.htmlALSA-2026:0458ALSA-2026:0458
�>�.libpq-devel-13.23-1.el9_7.x86_64.rpm�=�.libpq-13.23-1.el9_7.i686.rpm�=�.libpq-13.23-1.el9_7.x86_64.rpm�>�.libpq-devel-13.23-1.el9_7.i686.rpm�>�.libpq-devel-13.23-1.el9_7.x86_64.rpm�=�.libpq-13.23-1.el9_7.i686.rpm�=�.libpq-13.23-1.el9_7.x86_64.rpm�>�.libpq-devel-13.23-1.el9_7.i686.rpm�˩��	��	��@BBBBBBBsecurityImportant: podman security update��5� https://access.redhat.com/errata/RHSA-2026:0470RHSA-2026:0470RHSA-2026:0470https://access.redhat.com/security/cve/CVE-2025-47913CVE-2025-47913CVE-2025-47913https://bugzilla.redhat.com/24149432414943https://errata.almalinux.org/9/ALSA-2026-0470.htmlALSA-2026:0470ALSA-2026:0470
�4�-podman-tests-5.6.0-11.el9_7.x86_64.rpm�3�-podman-remote-5.6.0-11.el9_7.x86_64.rpm�1�-podman-5.6.0-11.el9_7.x86_64.rpm�2�-podman-plugins-5.6.0-11.el9_7.x86_64.rpmh�-podman-docker-5.6.0-11.el9_7.noarch.rpm�4�-podman-tests-5.6.0-11.el9_7.x86_64.rpm�3�-podman-remote-5.6.0-11.el9_7.x86_64.rpm�1�-podman-5.6.0-11.el9_7.x86_64.rpm�2�-podman-plugins-5.6.0-11.el9_7.x86_64.rpmh�-podman-docker-5.6.0-11.el9_7.noarch.rpm�˩�F�	����JBBBBBBBBBBBBBBsecurityModerate: postgresql security update��U�[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491
Z�.postgresql-13.23-1.el9_7.x86_64.rpm��.postgresql-plpython3-13.23-1.el9_7.x86_64.rpm��.postgresql-pltcl-13.23-1.el9_7.x86_64.rpm��.postgresql-private-libs-13.23-1.el9_7.x86_64.rpm��.postgresql-contrib-13.23-1.el9_7.x86_64.rpm��.postgresql-upgrade-13.23-1.el9_7.x86_64.rpm��.postgresql-plperl-13.23-1.el9_7.x86_64.rpm��.postgresql-server-13.23-1.el9_7.x86_64.rpmZ�.postgresql-13.23-1.el9_7.x86_64.rpm��.postgresql-plpython3-13.23-1.el9_7.x86_64.rpm��.postgresql-pltcl-13.23-1.el9_7.x86_64.rpm��.postgresql-private-libs-13.23-1.el9_7.x86_64.rpm��.postgresql-contrib-13.23-1.el9_7.x86_64.rpm��.postgresql-upgrade-13.23-1.el9_7.x86_64.rpm��.postgresql-plperl-13.23-1.el9_7.x86_64.rpm��.postgresql-server-13.23-1.el9_7.x86_64.rpm�˩�V�	��8�hBBB�WB��ZBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security update��0�[https://access.redhat.com/errata/RHSA-2026:0492RHSA-2026:0492RHSA-2026:0492https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0492.htmlALSA-2026:0492ALSA-2026:0492
Z�L�=*�atpostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmZtpostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�Y�mpg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�`tpostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�9tpostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpm�tpostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�]tpostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�tpostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�^tpostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�_tpostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�\tpostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmZ�L�=*�atpostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmZtpostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�Y�mpg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�`tpostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�9tpostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpm�tpostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�]tpostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�tpostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�^tpostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�_tpostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�\tpostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�tpostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm�˸��	���lBBB�OBBB�BBBBBBBBBB��pBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:16 security update���[https://access.redhat.com/errata/RHSA-2026:0493RHSA-2026:0493RHSA-2026:0493https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0493.htmlALSA-2026:0493ALSA-2026:0493
Z�_�>*��lpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm��lpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�L�fpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm�_{postgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�{postgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�{postgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm��lpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�`{postgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm��lpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�{postgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�{postgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�\{postgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�^{postgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�9{postgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpm�{postgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�a{postgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�{postgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�Y�npg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm�{postgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�]{postgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm��lpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmZ{postgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmZ�_�>*��lpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm��lpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�L�fpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm�_{postgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�{postgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�{postgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm��lpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�`{postgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm��lpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�{postgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�{postgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�\{postgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�^{postgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�9{postgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpm�{postgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�a{postgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�{postgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�Y�npg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm�{postgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�]{postgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm��lpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmZ{postgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm�˷�2�		����WsecurityModerate: vsftpd security update��f�@https://access.redhat.com/errata/RHSA-2026:0605RHSA-2026:0605RHSA-2026:0605https://access.redhat.com/security/cve/CVE-2025-14242CVE-2025-14242CVE-2025-14242https://bugzilla.redhat.com/24198262419826https://errata.almalinux.org/9/ALSA-2026-0605.htmlALSA-2026:0605ALSA-2026:0605
�v�uvsftpd-3.0.5-6.el9_7.2.x86_64.rpm�v�uvsftpd-3.0.5-6.el9_7.2.x86_64.rpm�˩�g�
	����ZBBsecurityImportant: firefox security update��&�yhttps://access.redhat.com/errata/RHSA-2026:0694RHSA-2026:0694RHSA-2026:0694https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0694.htmlALSA-2026:0694ALSA-2026:0694
P�tfirefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm8�tfirefox-140.7.0-1.el9_7.alma.1.x86_64.rpmP�tfirefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm8�tfirefox-140.7.0-1.el9_7.alma.1.x86_64.rpm�˩�^�	��0��_BBBBBBBBBBBBBBBsecurityImportant: net-snmp security update���9https://access.redhat.com/errata/RHSA-2026:0696RHSA-2026:0696RHSA-2026:0696https://access.redhat.com/security/cve/CVE-2025-68615CVE-2025-68615CVE-2025-68615https://bugzilla.redhat.com/24246182424618https://errata.almalinux.org/9/ALSA-2026-0696.htmlALSA-2026:0696ALSA-2026:0696

�
�python3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpm�A�net-snmp-libs-5.9.1-17.el9_7.1.i686.rpm�?�net-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpm�?�net-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpm��net-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpm�A�net-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpm�@�net-snmp-devel-5.9.1-17.el9_7.1.i686.rpm�@�net-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm�	�net-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpm��net-snmp-5.9.1-17.el9_7.1.x86_64.rpm
�
�python3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpm�A�net-snmp-libs-5.9.1-17.el9_7.1.i686.rpm�?�net-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpm�?�net-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpm��net-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpm�A�net-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpm�@�net-snmp-devel-5.9.1-17.el9_7.1.i686.rpm�@�net-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm�	�net-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpm��net-snmp-5.9.1-17.el9_7.1.x86_64.rpm����	��3��qsecurityImportant: gnupg2 security update��X�bhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719
�U�Lgnupg2-smime-2.3.3-5.el9_7.x86_64.rpm�U�Lgnupg2-smime-2.3.3-5.el9_7.x86_64.rpm�˧�i�
	��8��tBBsecurityImportant: gpsd-minimal security update��:�%https://access.redhat.com/errata/RHSA-2026:0771RHSA-2026:0771RHSA-2026:0771https://access.redhat.com/security/cve/CVE-2025-67268CVE-2025-67268CVE-2025-67268https://access.redhat.com/security/cve/CVE-2025-67269CVE-2025-67269CVE-2025-67269https://bugzilla.redhat.com/24268102426810https://bugzilla.redhat.com/24268352426835https://errata.almalinux.org/9/ALSA-2026-0771.htmlALSA-2026:0771ALSA-2026:0771
�=�'gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpm�>�'gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm�=�'gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpm�>�'gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm�˽�]�	����yBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��_�+https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793

$�rkernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm�rkernel-doc-5.14.0-611.24.1.el9_7.noarch.rpm;�rpython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm(�rkernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm'�rperf-5.14.0-611.24.1.el9_7.x86_64.rpm#�rkernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm&�rkernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm%�rkernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm)�rrtla-5.14.0-611.24.1.el9_7.x86_64.rpm+�rrv-5.14.0-611.24.1.el9_7.x86_64.rpm
$�rkernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm�rkernel-doc-5.14.0-611.24.1.el9_7.noarch.rpm;�rpython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm(�rkernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm'�rperf-5.14.0-611.24.1.el9_7.x86_64.rpm#�rkernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm&�rkernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm%�rkernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm)�rrtla-5.14.0-611.24.1.el9_7.x86_64.rpm+�rrv-5.14.0-611.24.1.el9_7.x86_64.rpm�����	����MBBBsecurityImportant: gimp security update��
�n
https://access.redhat.com/errata/RHSA-2026:0914RHSA-2026:0914RHSA-2026:0914https://access.redhat.com/security/cve/CVE-2025-14422CVE-2025-14422CVE-2025-14422https://access.redhat.com/security/cve/CVE-2025-14423CVE-2025-14423CVE-2025-14423https://access.redhat.com/security/cve/CVE-2025-14424CVE-2025-14424CVE-2025-14424https://access.redhat.com/security/cve/CVE-2025-14425CVE-2025-14425CVE-2025-14425https://bugzilla.redhat.com/24247662424766https://bugzilla.redhat.com/24247672424767https://bugzilla.redhat.com/24247742424774https://bugzilla.redhat.com/24247822424782https://errata.almalinux.org/9/ALSA-2026-0914.htmlALSA-2026:0914ALSA-2026:0914
�J�gimp-libs-3.0.4-1.el9_7.2.i686.rpm�J�gimp-libs-3.0.4-1.el9_7.2.x86_64.rpm�?�gimp-3.0.4-1.el9_7.2.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.2.i686.rpm�J�gimp-libs-3.0.4-1.el9_7.2.x86_64.rpm�?�gimp-3.0.4-1.el9_7.2.x86_64.rpm���&�	����SBBBBBBBBBBsecurityImportant: golang security update��x�https://access.redhat.com/errata/RHSA-2026:0923RHSA-2026:0923RHSA-2026:0923https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-0923.htmlALSA-2026:0923ALSA-2026:0923
m�#golang-docs-1.25.5-2.el9_7.noarch.rpm�G�#golang-1.25.5-2.el9_7.x86_64.rpmn�#golang-misc-1.25.5-2.el9_7.noarch.rpmp�#golang-tests-1.25.5-2.el9_7.noarch.rpm�N�#go-toolset-1.25.5-2.el9_7.x86_64.rpm�T�#golang-race-1.25.5-2.el9_7.x86_64.rpmo�#golang-src-1.25.5-2.el9_7.noarch.rpm�H�#golang-bin-1.25.5-2.el9_7.x86_64.rpmm�#golang-docs-1.25.5-2.el9_7.noarch.rpm�G�#golang-1.25.5-2.el9_7.x86_64.rpmn�#golang-misc-1.25.5-2.el9_7.noarch.rpmp�#golang-tests-1.25.5-2.el9_7.noarch.rpm�N�#go-toolset-1.25.5-2.el9_7.x86_64.rpm�T�#golang-race-1.25.5-2.el9_7.x86_64.rpmo�#golang-src-1.25.5-2.el9_7.noarch.rpm�H�#golang-bin-1.25.5-2.el9_7.x86_64.rpm����r�	��"��`securityImportant: thunderbird security update���Hhttps://access.redhat.com/errata/RHSA-2026:0924RHSA-2026:0924RHSA-2026:0924https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0924.htmlALSA-2026:0924ALSA-2026:0924
9�tthunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm9�tthunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm���� �	��5��cBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update��T�dhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927
	��*java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm	��*java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpm��*java-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm����0�	����vBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��8�)https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928
	�s�2java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�q�2java-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�o�2java-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�m�2java-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�t�2java-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�n�2java-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�p�2java-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�u�2java-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�r�2java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpm	�s�2java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�q�2java-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�o�2java-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�m�2java-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�t�2java-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�n�2java-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�p�2java-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�u�2java-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�r�2java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�����	����IBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update��a�whttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932
�U�ujava-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�W�ujava-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�X�ujava-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�T�ujava-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�8�ujava-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpm�V�ujava-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�7�ujava-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpm�U�ujava-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�W�ujava-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�X�ujava-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�T�ujava-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�8�ujava-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpm�V�ujava-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�7�ujava-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpm����	��*��VBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update��X�fhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933

�h�Ljava-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�g�Ljava-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�_�Ljava-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�c�Ljava-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�d�Ljava-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�b�Ljava-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�`�Ljava-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�e�Ljava-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�f�Ljava-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�a�Ljava-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpm
�h�Ljava-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�g�Ljava-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�_�Ljava-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�c�Ljava-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�d�Ljava-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�b�Ljava-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�`�Ljava-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�e�Ljava-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�f�Ljava-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�a�Ljava-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpm����	��1��kBBBBsecurityModerate: glib2 security update��>�https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936
�:�gglib2-tests-2.68.4-18.el9_7.1.x86_64.rpm�:�gglib2-doc-2.68.4-18.el9_7.1.noarch.rpm��gglib2-devel-2.68.4-18.el9_7.1.x86_64.rpm��gglib2-devel-2.68.4-18.el9_7.1.i686.rpm�:�gglib2-tests-2.68.4-18.el9_7.1.x86_64.rpm�:�gglib2-doc-2.68.4-18.el9_7.1.noarch.rpm��gglib2-devel-2.68.4-18.el9_7.1.x86_64.rpm��gglib2-devel-2.68.4-18.el9_7.1.i686.rpm����i�	��6��rBBsecurityImportant: buildah security update��[�Ihttps://access.redhat.com/errata/RHSA-2026:10135RHSA-2026:10135RHSA-2026:10135https://access.redhat.com/security/cve/CVE-2026-34986CVE-2026-34986CVE-2026-34986https://bugzilla.redhat.com/24554702455470https://errata.almalinux.org/9/ALSA-2026-10135.htmlALSA-2026:10135ALSA-2026:10135
�/�Kbuildah-1.41.8-3.el9_7.x86_64.rpm�0�Kbuildah-tests-1.41.8-3.el9_7.x86_64.rpm�/�Kbuildah-1.41.8-3.el9_7.x86_64.rpm�0�Kbuildah-tests-1.41.8-3.el9_7.x86_64.rpm��̉8�	��;��wBBsecurityImportant: grafana security update��$�4https://access.redhat.com/errata/RHSA-2026:10226RHSA-2026:10226RHSA-2026:10226https://access.redhat.com/security/cve/CVE-2026-27877CVE-2026-27877CVE-2026-27877https://bugzilla.redhat.com/24522932452293https://errata.almalinux.org/9/ALSA-2026-10226.htmlALSA-2026:10226ALSA-2026:10226
�I�wgrafana-10.2.6-20.el9_7.x86_64.rpm�U�wgrafana-selinux-10.2.6-20.el9_7.x86_64.rpm�I�wgrafana-10.2.6-20.el9_7.x86_64.rpm�U�wgrafana-selinux-10.2.6-20.el9_7.x86_64.rpm��̊�	����|BBBBBBBsecurityImportant: gdk-pixbuf2 security update��X�https://access.redhat.com/errata/RHSA-2026:10708RHSA-2026:10708RHSA-2026:10708https://access.redhat.com/security/cve/CVE-2026-5201CVE-2026-5201CVE-2026-5201https://bugzilla.redhat.com/24532912453291https://errata.almalinux.org/9/ALSA-2026-10708.htmlALSA-2026:10708ALSA-2026:10708
�8�_gdk-pixbuf2-devel-2.42.6-6.el9_7.1.x86_64.rpm�9�_gdk-pixbuf2-modules-2.42.6-6.el9_7.1.i686.rpm�8�_gdk-pixbuf2-devel-2.42.6-6.el9_7.1.i686.rpm�7�_gdk-pixbuf2-2.42.6-6.el9_7.1.i686.rpm�9�_gdk-pixbuf2-modules-2.42.6-6.el9_7.1.x86_64.rpm�7�_gdk-pixbuf2-2.42.6-6.el9_7.1.x86_64.rpm�8�_gdk-pixbuf2-devel-2.42.6-6.el9_7.1.x86_64.rpm�9�_gdk-pixbuf2-modules-2.42.6-6.el9_7.1.i686.rpm�8�_gdk-pixbuf2-devel-2.42.6-6.el9_7.1.i686.rpm�7�_gdk-pixbuf2-2.42.6-6.el9_7.1.i686.rpm�9�_gdk-pixbuf2-modules-2.42.6-6.el9_7.1.x86_64.rpm�7�_gdk-pixbuf2-2.42.6-6.el9_7.1.x86_64.rpm��̂l�	����FBBBBBBBBBsecurityImportant: tigervnc security update��f�#
https://access.redhat.com/errata/RHSA-2026:10739RHSA-2026:10739RHSA-2026:10739https://access.redhat.com/security/cve/CVE-2026-33999CVE-2026-33999CVE-2026-33999https://access.redhat.com/security/cve/CVE-2026-34001CVE-2026-34001CVE-2026-34001https://access.redhat.com/security/cve/CVE-2026-34003CVE-2026-34003CVE-2026-34003https://access.redhat.com/security/cve/CVE-2026-34352CVE-2026-34352CVE-2026-34352https://bugzilla.redhat.com/24511062451106https://bugzilla.redhat.com/24511092451109https://bugzilla.redhat.com/24511132451113https://bugzilla.redhat.com/24520222452022https://errata.almalinux.org/9/ALSA-2026-10739.htmlALSA-2026:10739ALSA-2026:10739
��tigervnc-license-1.15.0-6.el9_7.1.noarch.rpm�Y�tigervnc-server-minimal-1.15.0-6.el9_7.1.x86_64.rpm�W�tigervnc-1.15.0-6.el9_7.1.x86_64.rpm��tigervnc-selinux-1.15.0-6.el9_7.1.noarch.rpm��tigervnc-icons-1.15.0-6.el9_7.1.noarch.rpm�X�tigervnc-server-1.15.0-6.el9_7.1.x86_64.rpm�Z�tigervnc-server-module-1.15.0-6.el9_7.1.x86_64.rpm��tigervnc-license-1.15.0-6.el9_7.1.noarch.rpm�Y�tigervnc-server-minimal-1.15.0-6.el9_7.1.x86_64.rpm�W�tigervnc-1.15.0-6.el9_7.1.x86_64.rpm��tigervnc-selinux-1.15.0-6.el9_7.1.noarch.rpm��tigervnc-icons-1.15.0-6.el9_7.1.noarch.rpm�X�tigervnc-server-1.15.0-6.el9_7.1.x86_64.rpm�Z�tigervnc-server-module-1.15.0-6.el9_7.1.x86_64.rpm����6�	����RBBBBBBBBsecurityImportant: python3.12 security update��	�ihttps://access.redhat.com/errata/RHSA-2026:10745RHSA-2026:10745RHSA-2026:10745https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10745.htmlALSA-2026:10745ALSA-2026:10745
��6python3.12-libs-3.12.12-4.el9_7.3.x86_64.rpm��6python3.12-3.12.12-4.el9_7.3.x86_64.rpm��6python3.12-devel-3.12.12-4.el9_7.3.i686.rpm��6python3.12-libs-3.12.12-4.el9_7.3.i686.rpm��6python3.12-devel-3.12.12-4.el9_7.3.x86_64.rpm��6python3.12-tkinter-3.12.12-4.el9_7.3.x86_64.rpm��6python3.12-libs-3.12.12-4.el9_7.3.x86_64.rpm��6python3.12-3.12.12-4.el9_7.3.x86_64.rpm��6python3.12-devel-3.12.12-4.el9_7.3.i686.rpm��6python3.12-libs-3.12.12-4.el9_7.3.i686.rpm��6python3.12-devel-3.12.12-4.el9_7.3.x86_64.rpm��6python3.12-tkinter-3.12.12-4.el9_7.3.x86_64.rpm����a�	��!��]BBsecurityImportant: firefox security update��r�?4https://access.redhat.com/errata/RHSA-2026:10757RHSA-2026:10757RHSA-2026:10757https://access.redhat.com/security/cve/CVE-2026-6746CVE-2026-6746CVE-2026-6746https://access.redhat.com/security/cve/CVE-2026-6747CVE-2026-6747CVE-2026-6747https://access.redhat.com/security/cve/CVE-2026-6748CVE-2026-6748CVE-2026-6748https://access.redhat.com/security/cve/CVE-2026-6749CVE-2026-6749CVE-2026-6749https://access.redhat.com/security/cve/CVE-2026-6750CVE-2026-6750CVE-2026-6750https://access.redhat.com/security/cve/CVE-2026-6751CVE-2026-6751CVE-2026-6751https://access.redhat.com/security/cve/CVE-2026-6752CVE-2026-6752CVE-2026-6752https://access.redhat.com/security/cve/CVE-2026-6753CVE-2026-6753CVE-2026-6753https://access.redhat.com/security/cve/CVE-2026-6754CVE-2026-6754CVE-2026-6754https://access.redhat.com/security/cve/CVE-2026-6757CVE-2026-6757CVE-2026-6757https://access.redhat.com/security/cve/CVE-2026-6759CVE-2026-6759CVE-2026-6759https://access.redhat.com/security/cve/CVE-2026-6761CVE-2026-6761CVE-2026-6761https://access.redhat.com/security/cve/CVE-2026-6762CVE-2026-6762CVE-2026-6762https://access.redhat.com/security/cve/CVE-2026-6763CVE-2026-6763CVE-2026-6763https://access.redhat.com/security/cve/CVE-2026-6764CVE-2026-6764CVE-2026-6764https://access.redhat.com/security/cve/CVE-2026-6765CVE-2026-6765CVE-2026-6765https://access.redhat.com/security/cve/CVE-2026-6766CVE-2026-6766CVE-2026-6766https://access.redhat.com/security/cve/CVE-2026-6767CVE-2026-6767CVE-2026-6767https://access.redhat.com/security/cve/CVE-2026-6769CVE-2026-6769CVE-2026-6769https://access.redhat.com/security/cve/CVE-2026-6770CVE-2026-6770CVE-2026-6770https://access.redhat.com/security/cve/CVE-2026-6771CVE-2026-6771CVE-2026-6771https://access.redhat.com/security/cve/CVE-2026-6772CVE-2026-6772CVE-2026-6772https://access.redhat.com/security/cve/CVE-2026-6776CVE-2026-6776CVE-2026-6776https://access.redhat.com/security/cve/CVE-2026-6785CVE-2026-6785CVE-2026-6785https://access.redhat.com/security/cve/CVE-2026-6786CVE-2026-6786CVE-2026-6786https://bugzilla.redhat.com/24600742460074https://bugzilla.redhat.com/24600752460075https://bugzilla.redhat.com/24600762460076https://bugzilla.redhat.com/24600782460078https://bugzilla.redhat.com/24600792460079https://bugzilla.redhat.com/24600852460085https://bugzilla.redhat.com/24600862460086https://bugzilla.redhat.com/24600882460088https://bugzilla.redhat.com/24600922460092https://bugzilla.redhat.com/24600942460094https://bugzilla.redhat.com/24600952460095https://bugzilla.redhat.com/24600962460096https://bugzilla.redhat.com/24600972460097https://bugzilla.redhat.com/24600992460099https://bugzilla.redhat.com/24601012460101https://bugzilla.redhat.com/24601022460102https://bugzilla.redhat.com/24601032460103https://bugzilla.redhat.com/24601042460104https://bugzilla.redhat.com/24601052460105https://bugzilla.redhat.com/24601062460106https://bugzilla.redhat.com/24601072460107https://bugzilla.redhat.com/24601082460108https://bugzilla.redhat.com/24601092460109https://bugzilla.redhat.com/24601102460110https://bugzilla.redhat.com/24601122460112https://errata.almalinux.org/9/ALSA-2026-10757.htmlALSA-2026:10757ALSA-2026:10757
P�qfirefox-x11-140.10.0-1.el9_7.alma.1.x86_64.rpm8�qfirefox-140.10.0-1.el9_7.alma.1.x86_64.rpmP�qfirefox-x11-140.10.0-1.el9_7.alma.1.x86_64.rpm8�qfirefox-140.10.0-1.el9_7.alma.1.x86_64.rpm��ǐ1�	��,��bBBBBBBBBsecurityImportant: python3.11 security update��1�ihttps://access.redhat.com/errata/RHSA-2026:10774RHSA-2026:10774RHSA-2026:10774https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10774.htmlALSA-2026:10774ALSA-2026:10774
\�"python3.11-libs-3.11.13-5.3.el9_7.x86_64.rpm\�"python3.11-libs-3.11.13-5.3.el9_7.i686.rpm[�"python3.11-devel-3.11.13-5.3.el9_7.x86_64.rpm�Q�"python3.11-tkinter-3.11.13-5.3.el9_7.x86_64.rpm�P�"python3.11-3.11.13-5.3.el9_7.x86_64.rpm[�"python3.11-devel-3.11.13-5.3.el9_7.i686.rpm\�"python3.11-libs-3.11.13-5.3.el9_7.x86_64.rpm\�"python3.11-libs-3.11.13-5.3.el9_7.i686.rpm[�"python3.11-devel-3.11.13-5.3.el9_7.x86_64.rpm�Q�"python3.11-tkinter-3.11.13-5.3.el9_7.x86_64.rpm�P�"python3.11-3.11.13-5.3.el9_7.x86_64.rpm[�"python3.11-devel-3.11.13-5.3.el9_7.i686.rpm����9�	��.��-securityImportant: python3.12-urllib3 security update���7https://access.redhat.com/errata/RHSA-2026:1088RHSA-2026:1088RHSA-2026:1088https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1088.htmlALSA-2026:1088ALSA-2026:1088
��8python3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpm��8python3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpm�����	��0��/securityImportant: python3.11-urllib3 security update��Q�7https://access.redhat.com/errata/RHSA-2026:1089RHSA-2026:1089RHSA-2026:1089https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1089.htmlALSA-2026:1089ALSA-2026:1089
�Q�6python3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm�Q�6python3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm����� 	��7��qBBBBsecurityImportant: python3.9 security update���ihttps://access.redhat.com/errata/RHSA-2026:10949RHSA-2026:10949RHSA-2026:10949https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10949.htmlALSA-2026:10949ALSA-2026:10949
Q�python3-devel-3.9.25-3.el9_7.3.i686.rpmQ�python3-devel-3.9.25-3.el9_7.3.x86_64.rpmf�python-unversioned-command-3.9.25-3.el9_7.3.noarch.rpm�+�python3-tkinter-3.9.25-3.el9_7.3.x86_64.rpmQ�python3-devel-3.9.25-3.el9_7.3.i686.rpmQ�python3-devel-3.9.25-3.el9_7.3.x86_64.rpmf�python-unversioned-command-3.9.25-3.el9_7.3.noarch.rpm�+�python3-tkinter-3.9.25-3.el9_7.3.x86_64.rpm����@�!	��;��xBsecurityImportant: LibRaw security update��q�'https://access.redhat.com/errata/RHSA-2026:11360RHSA-2026:11360RHSA-2026:11360https://access.redhat.com/security/cve/CVE-2026-21413CVE-2026-21413CVE-2026-21413https://access.redhat.com/security/cve/CVE-2026-24450CVE-2026-24450CVE-2026-24450https://bugzilla.redhat.com/24559252455925https://bugzilla.redhat.com/24559292455929https://errata.almalinux.org/9/ALSA-2026-11360.htmlALSA-2026:11360ALSA-2026:11360
�3�LibRaw-0.21.1-2.el9_7.i686.rpm�3�LibRaw-0.21.1-2.el9_7.x86_64.rpm�3�LibRaw-0.21.1-2.el9_7.i686.rpm�3�LibRaw-0.21.1-2.el9_7.x86_64.rpm��Nj)�"	��>��|securityImportant: xorg-x11-server-Xwayland security update���https://access.redhat.com/errata/RHSA-2026:11369RHSA-2026:11369RHSA-2026:11369https://access.redhat.com/security/cve/CVE-2026-33999CVE-2026-33999CVE-2026-33999https://access.redhat.com/security/cve/CVE-2026-34001CVE-2026-34001CVE-2026-34001https://access.redhat.com/security/cve/CVE-2026-34003CVE-2026-34003CVE-2026-34003https://bugzilla.redhat.com/24511062451106https://bugzilla.redhat.com/24511092451109https://bugzilla.redhat.com/24511132451113https://errata.almalinux.org/9/ALSA-2026-11369.htmlALSA-2026:11369ALSA-2026:11369
��jxorg-x11-server-Xwayland-23.2.7-6.el9_7.x86_64.rpm��jxorg-x11-server-Xwayland-23.2.7-6.el9_7.x86_64.rpm��NJG�#	����BBBBBBBBBBsecurityImportant: xorg-x11-server security update��4�https://access.redhat.com/errata/RHSA-2026:11388RHSA-2026:11388RHSA-2026:11388https://access.redhat.com/security/cve/CVE-2026-33999CVE-2026-33999CVE-2026-33999https://access.redhat.com/security/cve/CVE-2026-34001CVE-2026-34001CVE-2026-34001https://access.redhat.com/security/cve/CVE-2026-34003CVE-2026-34003CVE-2026-34003https://bugzilla.redhat.com/24511062451106https://bugzilla.redhat.com/24511092451109https://bugzilla.redhat.com/24511132451113https://errata.almalinux.org/9/ALSA-2026-11388.htmlALSA-2026:11388ALSA-2026:11388
��'xorg-x11-server-Xdmx-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xvfb-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xephyr-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xorg-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xnest-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-common-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xdmx-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xvfb-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xephyr-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xorg-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-Xnest-1.20.11-33.el9_7.x86_64.rpm��'xorg-x11-server-common-1.20.11-33.el9_7.x86_64.rpm��ljM�$	����LBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��?�https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143

$�skernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm&�skernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm+�srv-5.14.0-611.26.1.el9_7.x86_64.rpm'�sperf-5.14.0-611.26.1.el9_7.x86_64.rpm�skernel-doc-5.14.0-611.26.1.el9_7.noarch.rpm;�spython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm%�skernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm)�srtla-5.14.0-611.26.1.el9_7.x86_64.rpm#�skernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm(�skernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm
$�skernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm&�skernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm+�srv-5.14.0-611.26.1.el9_7.x86_64.rpm'�sperf-5.14.0-611.26.1.el9_7.x86_64.rpm�skernel-doc-5.14.0-611.26.1.el9_7.noarch.rpm;�spython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm%�skernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm)�srtla-5.14.0-611.26.1.el9_7.x86_64.rpm#�skernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm(�skernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm���8�%	��+��`BBBBBBBBBsecurityImportant: PackageKit security update��\�bhttps://access.redhat.com/errata/RHSA-2026:11504RHSA-2026:11504RHSA-2026:11504https://access.redhat.com/security/cve/CVE-2026-41651CVE-2026-41651CVE-2026-41651https://bugzilla.redhat.com/24606042460604https://errata.almalinux.org/9/ALSA-2026-11504.htmlALSA-2026:11504ALSA-2026:11504
�k�|PackageKit-gtk3-module-1.2.6-2.el9_7.x86_64.rpm�i�|PackageKit-command-not-found-1.2.6-2.el9_7.x86_64.rpm�j�|PackageKit-gstreamer-plugin-1.2.6-2.el9_7.x86_64.rpm��|PackageKit-glib-1.2.6-2.el9_7.x86_64.rpm��|PackageKit-glib-1.2.6-2.el9_7.i686.rpm�h�|PackageKit-1.2.6-2.el9_7.x86_64.rpm�k�|PackageKit-gtk3-module-1.2.6-2.el9_7.x86_64.rpm�i�|PackageKit-command-not-found-1.2.6-2.el9_7.x86_64.rpm�j�|PackageKit-gstreamer-plugin-1.2.6-2.el9_7.x86_64.rpm��|PackageKit-glib-1.2.6-2.el9_7.x86_64.rpm��|PackageKit-glib-1.2.6-2.el9_7.i686.rpm�h�|PackageKit-1.2.6-2.el9_7.x86_64.rpm��̱H�&	��2��lBBBBsecurityImportant: vim security update��>�qhttps://access.redhat.com/errata/RHSA-2026:11510RHSA-2026:11510RHSA-2026:11510https://access.redhat.com/security/cve/CVE-2026-34982CVE-2026-34982CVE-2026-34982https://bugzilla.redhat.com/24554002455400https://errata.almalinux.org/9/ALSA-2026-11510.htmlALSA-2026:11510ALSA-2026:11510
�Z�vim-enhanced-8.2.2637-23.el9_7.3.x86_64.rpm�Y�vim-common-8.2.2637-23.el9_7.3.x86_64.rpm�X�vim-X11-8.2.2637-23.el9_7.3.x86_64.rpm�Z�vim-enhanced-8.2.2637-23.el9_7.3.x86_64.rpm�Y�vim-common-8.2.2637-23.el9_7.3.x86_64.rpm�X�vim-X11-8.2.2637-23.el9_7.3.x86_64.rpm��ǯ9�'	��9��sBBBBsecurityImportant: libtiff security update��/�Lhttps://access.redhat.com/errata/RHSA-2026:12271RHSA-2026:12271RHSA-2026:12271https://access.redhat.com/security/cve/CVE-2026-4775CVE-2026-4775CVE-2026-4775https://bugzilla.redhat.com/24507682450768https://errata.almalinux.org/9/ALSA-2026-12271.htmlALSA-2026:12271ALSA-2026:12271
�C�libtiff-4.4.0-15.el9_7.3.i686.rpm�D�libtiff-devel-4.4.0-15.el9_7.3.x86_64.rpm�D�libtiff-devel-4.4.0-15.el9_7.3.i686.rpm�C�libtiff-4.4.0-15.el9_7.3.x86_64.rpm�C�libtiff-4.4.0-15.el9_7.3.i686.rpm�D�libtiff-devel-4.4.0-15.el9_7.3.x86_64.rpm�D�libtiff-devel-4.4.0-15.el9_7.3.i686.rpm�C�libtiff-4.4.0-15.el9_7.3.x86_64.rpm��њ�(	��<��zsecurityImportant: sudo security update��{�!https://access.redhat.com/errata/RHSA-2026:12310RHSA-2026:12310RHSA-2026:12310https://access.redhat.com/security/cve/CVE-2026-35535CVE-2026-35535CVE-2026-35535https://bugzilla.redhat.com/24547142454714https://errata.almalinux.org/9/ALSA-2026-12310.htmlALSA-2026:12310ALSA-2026:12310
�L�isudo-python-plugin-1.9.5p2-15.el9_7.x86_64.rpm�L�isudo-python-plugin-1.9.5p2-15.el9_7.x86_64.rpm��єc�)	����}BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update���qhttps://access.redhat.com/errata/RHSA-2026:1239RHSA-2026:1239RHSA-2026:1239https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1239.htmlALSA-2026:1239ALSA-2026:1239
7�& fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpm�0 fence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpm�' fence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm�% fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-apc-4.10.0-98.el9_7.4.noarch.rpm�* fence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpm�, fence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpm�Y fence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpm�  fence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpm�g fence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpm�% fence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpm�] fence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpm�a ha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpm�V fence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm�3 fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpm�i fence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpm�/ fence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpm�! fence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpm�7 fence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm�4 fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpm�V fence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpm�. fence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpm�1 fence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpm�W fence-agents-all-4.10.0-98.el9_7.4.x86_64.rpm�( fence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpm�$ fence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpm�X fence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpm�c fence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpm�" fence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm�5 fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpm�\ fence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpm�h fence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm�$ fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpm�# fence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpm�j fence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpm�e fence-virtd-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpm�) fence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm�2 fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpm�b fence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpm�+ fence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpm�[ fence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpm�f fence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpm�d fence-virt-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpm�- fence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpm�Z fence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpm�& fence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm�# fence-agents-common-4.10.0-98.el9_7.4.noarch.rpm�6 fence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm7�& fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpm�0 fence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpm�' fence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm�% fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-apc-4.10.0-98.el9_7.4.noarch.rpm�* fence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpm�, fence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpm�Y fence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpm�  fence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpm�g fence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpm�% fence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpm�] fence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpm�a ha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpm�V fence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm�3 fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpm�i fence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpm�/ fence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpm�! fence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpm�7 fence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm�4 fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpm�V fence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpm�. fence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpm�1 fence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpm�W fence-agents-all-4.10.0-98.el9_7.4.x86_64.rpm�( fence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpm�$ fence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpm�X fence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpm�c fence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpm�" fence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm�5 fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpm�\ fence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpm�h fence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm�$ fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpm�# fence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpm�j fence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpm�e fence-virtd-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpm�) fence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm�2 fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpm� fence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpm�b fence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpm�+ fence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpm�[ fence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpm�f fence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpm�d fence-virt-4.10.0-98.el9_7.4.x86_64.rpm� fence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpm�- fence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpm�Z fence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpm�& fence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm�# fence-agents-common-4.10.0-98.el9_7.4.noarch.rpm�6 fence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm�̂�s�*	��
��GBsecurityImportant: libcap security update��
�https://access.redhat.com/errata/RHSA-2026:12441RHSA-2026:12441RHSA-2026:12441https://access.redhat.com/security/cve/CVE-2026-4878CVE-2026-4878CVE-2026-4878https://bugzilla.redhat.com/24516152451615https://errata.almalinux.org/9/ALSA-2026-12441.htmlALSA-2026:12441ALSA-2026:12441
�>�Qlibcap-devel-2.48-10.el9_7.1.x86_64.rpm�>�Qlibcap-devel-2.48-10.el9_7.1.i686.rpm�>�Qlibcap-devel-2.48-10.el9_7.1.x86_64.rpm�>�Qlibcap-devel-2.48-10.el9_7.1.i686.rpm��ї@�+	����KBBsecurityImportant: openssh security update��)�6https://access.redhat.com/errata/RHSA-2026:13381RHSA-2026:13381RHSA-2026:13381https://access.redhat.com/security/cve/CVE-2026-35385CVE-2026-35385CVE-2026-35385https://access.redhat.com/security/cve/CVE-2026-35386CVE-2026-35386CVE-2026-35386https://access.redhat.com/security/cve/CVE-2026-35387CVE-2026-35387CVE-2026-35387https://access.redhat.com/security/cve/CVE-2026-35388CVE-2026-35388CVE-2026-35388https://access.redhat.com/security/cve/CVE-2026-35414CVE-2026-35414CVE-2026-35414https://bugzilla.redhat.com/24544692454469https://bugzilla.redhat.com/24544902454490https://bugzilla.redhat.com/24544942454494https://bugzilla.redhat.com/24545002454500https://bugzilla.redhat.com/24545062454506https://errata.almalinux.org/9/ALSA-2026-13381.htmlALSA-2026:13381ALSA-2026:13381
��Xopenssh-askpass-8.7p1-49.el9_7.alma.1.x86_64.rpm��6pam_ssh_agent_auth-0.10.4-5.49.el9_7.alma.1.x86_64.rpm��Xopenssh-askpass-8.7p1-49.el9_7.alma.1.x86_64.rpm��6pam_ssh_agent_auth-0.10.4-5.49.el9_7.alma.1.x86_64.rpm���?�,	����PBsecurityModerate: curl security update��_�Ahttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350
��libcurl-devel-7.76.1-35.el9_7.3.i686.rpm��libcurl-devel-7.76.1-35.el9_7.3.x86_64.rpm��libcurl-devel-7.76.1-35.el9_7.3.i686.rpm��libcurl-devel-7.76.1-35.el9_7.3.x86_64.rpm����-	��'��TBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update�� �S
https://access.redhat.com/errata/RHSA-2026:13565RHSA-2026:13565RHSA-2026:13565https://access.redhat.com/security/cve/CVE-2026-23136CVE-2026-23136CVE-2026-23136https://access.redhat.com/security/cve/CVE-2026-23270CVE-2026-23270CVE-2026-23270https://access.redhat.com/security/cve/CVE-2026-31402CVE-2026-31402CVE-2026-31402https://access.redhat.com/security/cve/CVE-2026-31431CVE-2026-31431CVE-2026-31431https://bugzilla.redhat.com/24398522439852https://bugzilla.redhat.com/24487452448745https://bugzilla.redhat.com/24548442454844https://bugzilla.redhat.com/24605382460538https://errata.almalinux.org/9/ALSA-2026-13565.htmlALSA-2026:13565ALSA-2026:13565

$�kernel-debug-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm;�python3-perf-5.14.0-611.54.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.54.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.54.1.el9_7.x86_64.rpm)�rtla-5.14.0-611.54.1.el9_7.x86_64.rpm+�rv-5.14.0-611.54.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.54.1.el9_7.noarch.rpm(�kernel-headers-5.14.0-611.54.1.el9_7.x86_64.rpm'�perf-5.14.0-611.54.1.el9_7.x86_64.rpm
$�kernel-debug-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm;�python3-perf-5.14.0-611.54.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.54.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.54.1.el9_7.x86_64.rpm)�rtla-5.14.0-611.54.1.el9_7.x86_64.rpm+�rv-5.14.0-611.54.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.54.1.el9_7.noarch.rpm(�kernel-headers-5.14.0-611.54.1.el9_7.x86_64.rpm'�perf-5.14.0-611.54.1.el9_7.x86_64.rpm���p�.	��1��hBBBBBBBsecurityModerate: gcc-toolset-15-binutils security update��s�ehttps://access.redhat.com/errata/RHSA-2026:1359RHSA-2026:1359RHSA-2026:1359https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-1359.htmlALSA-2026:1359ALSA-2026:1359
�5�gcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpm�6�gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpm�4�gcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm�D�gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm�D�gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpm�5�gcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpm�6�gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpm�4�gcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm�D�gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm�D�gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpm�̂�>�/	��4��rsecurityModerate: python-tornado security update��X�;https://access.redhat.com/errata/RHSA-2026:13670RHSA-2026:13670RHSA-2026:13670https://access.redhat.com/security/cve/CVE-2026-31958CVE-2026-31958CVE-2026-31958https://access.redhat.com/security/cve/CVE-2026-35536CVE-2026-35536CVE-2026-35536https://bugzilla.redhat.com/24467652446765https://bugzilla.redhat.com/24547162454716https://errata.almalinux.org/9/ALSA-2026-13670.htmlALSA-2026:13670ALSA-2026:13670
�J�=python3-tornado-6.5.5-1.el9_7.1.x86_64.rpm�J�=python3-tornado-6.5.5-1.el9_7.1.x86_64.rpm���Z�0	��7��usecurityImportant: image-builder security update��� https://access.redhat.com/errata/RHSA-2026:13671RHSA-2026:13671RHSA-2026:13671https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-13671.htmlALSA-2026:13671ALSA-2026:13671
�z�image-builder-31-4.el9_7.x86_64.rpm�z�image-builder-31-4.el9_7.x86_64.rpm����+�1	��;��xBsecurityModerate: corosync security update��3�https://access.redhat.com/errata/RHSA-2026:13673RHSA-2026:13673RHSA-2026:13673https://access.redhat.com/security/cve/CVE-2026-35091CVE-2026-35091CVE-2026-35091https://access.redhat.com/security/cve/CVE-2026-35092CVE-2026-35092CVE-2026-35092https://bugzilla.redhat.com/24538132453813https://bugzilla.redhat.com/24538142453814https://errata.almalinux.org/9/ALSA-2026-13673.htmlALSA-2026:13673ALSA-2026:13673
�"�wcorosynclib-3.1.9-2.el9_7.1.x86_64.rpm�"�wcorosynclib-3.1.9-2.el9_7.1.i686.rpm�"�wcorosynclib-3.1.9-2.el9_7.1.x86_64.rpm�"�wcorosynclib-3.1.9-2.el9_7.1.i686.rpm���4�2	����|BBBBBBsecurityModerate: systemd security update��H�https://access.redhat.com/errata/RHSA-2026:13677RHSA-2026:13677RHSA-2026:13677https://access.redhat.com/security/cve/CVE-2026-29111CVE-2026-29111CVE-2026-29111https://bugzilla.redhat.com/24505052450505https://errata.almalinux.org/9/ALSA-2026-13677.htmlALSA-2026:13677ALSA-2026:13677
��isystemd-devel-252-55.el9_7.9.alma.1.i686.rpm�T�isystemd-journal-remote-252-55.el9_7.9.alma.1.x86_64.rpm��isystemd-devel-252-55.el9_7.9.alma.1.x86_64.rpm��isystemd-ukify-252-55.el9_7.9.alma.1.noarch.rpm��isystemd-boot-unsigned-252-55.el9_7.9.alma.1.x86_64.rpm��isystemd-devel-252-55.el9_7.9.alma.1.i686.rpm�T�isystemd-journal-remote-252-55.el9_7.9.alma.1.x86_64.rpm��isystemd-devel-252-55.el9_7.9.alma.1.x86_64.rpm��isystemd-ukify-252-55.el9_7.9.alma.1.noarch.rpm��isystemd-boot-unsigned-252-55.el9_7.9.alma.1.x86_64.rpm����3	����EsecurityModerate: image-builder security update��K�*https://access.redhat.com/errata/RHSA-2026:1377RHSA-2026:1377RHSA-2026:1377https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1377.htmlALSA-2026:1377ALSA-2026:1377
�z�	image-builder-31-2.el9_7.x86_64.rpm�z�	image-builder-31-2.el9_7.x86_64.rpm�̶��4	����HBBBBsecurityModerate: osbuild-composer security update��u�Bhttps://access.redhat.com/errata/RHSA-2026:1381RHSA-2026:1381RHSA-2026:1381https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1381.htmlALSA-2026:1381ALSA-2026:1381
�y�wosbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpm�w�wosbuild-composer-149-3.el9_7.alma.3.x86_64.rpm�x�wosbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpm�y�wosbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpm�w�wosbuild-composer-149-3.el9_7.alma.3.x86_64.rpm�x�wosbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpm�̂�[�5	����OBBBBBBsecurityImportant: dovecot security update��7�https://access.redhat.com/errata/RHSA-2026:13857RHSA-2026:13857RHSA-2026:13857https://access.redhat.com/security/cve/CVE-2025-59032CVE-2025-59032CVE-2025-59032https://access.redhat.com/security/cve/CVE-2026-27857CVE-2026-27857CVE-2026-27857https://access.redhat.com/security/cve/CVE-2026-27858CVE-2026-27858CVE-2026-27858https://bugzilla.redhat.com/24521722452172https://bugzilla.redhat.com/24521752452175https://bugzilla.redhat.com/24521792452179https://errata.almalinux.org/9/ALSA-2026-13857.htmlALSA-2026:13857ALSA-2026:13857
�t�Ndovecot-2.3.16-15.el9_7.1.x86_64.rpm�w�Ndovecot-pigeonhole-2.3.16-15.el9_7.1.x86_64.rpm�u�Ndovecot-mysql-2.3.16-15.el9_7.1.x86_64.rpm�v�Ndovecot-pgsql-2.3.16-15.el9_7.1.x86_64.rpm�t�Ndovecot-2.3.16-15.el9_7.1.x86_64.rpm�w�Ndovecot-pigeonhole-2.3.16-15.el9_7.1.x86_64.rpm�u�Ndovecot-mysql-2.3.16-15.el9_7.1.x86_64.rpm�v�Ndovecot-pgsql-2.3.16-15.el9_7.1.x86_64.rpm����D�6	��!��XBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update��G�https://access.redhat.com/errata/RHSA-2026:13917RHSA-2026:13917RHSA-2026:13917https://access.redhat.com/security/cve/CVE-2026-30922CVE-2026-30922CVE-2026-30922https://bugzilla.redhat.com/24485532448553https://errata.almalinux.org/9/ALSA-2026-13917.htmlALSA-2026:13917ALSA-2026:13917
7�.fence-agents-lpar-4.10.0-98.el9_7.13.noarch.rpm�3fence-agents-sbd-4.10.0-98.el9_7.13.noarch.rpm�!fence-agents-emerson-4.10.0-98.el9_7.13.noarch.rpm�%fence-agents-ibmblade-4.10.0-98.el9_7.13.noarch.rpm�(fence-agents-ilo-mp-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-apc-snmp-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-brocade-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-apc-4.10.0-98.el9_7.13.noarch.rpm�bfence-agents-compute-4.10.0-98.el9_7.13.x86_64.rpm�Wfence-agents-all-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-drac5-4.10.0-98.el9_7.13.noarch.rpm�jfence-virtd-tcp-4.10.0-98.el9_7.13.x86_64.rpm�Vfence-agents-aliyun-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-cisco-ucs-4.10.0-98.el9_7.13.noarch.rpm�Xfence-agents-aws-4.10.0-98.el9_7.13.x86_64.rpm�%fence-agents-ibm-vpc-4.10.0-98.el9_7.13.noarch.rpm�Zfence-agents-gce-4.10.0-98.el9_7.13.x86_64.rpm� fence-agents-eaton-snmp-4.10.0-98.el9_7.13.noarch.rpm�5fence-agents-vmware-rest-4.10.0-98.el9_7.13.noarch.rpm�$fence-agents-ibm-powervs-4.10.0-98.el9_7.13.noarch.rpm�gfence-virtd-libvirt-4.10.0-98.el9_7.13.x86_64.rpm�-fence-agents-ipmilan-4.10.0-98.el9_7.13.noarch.rpm�)fence-agents-ilo-ssh-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-cisco-mds-4.10.0-98.el9_7.13.noarch.rpm�aha-cloud-support-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-bladecenter-4.10.0-98.el9_7.13.noarch.rpm�dfence-virt-4.10.0-98.el9_7.13.x86_64.rpm�Yfence-agents-azure-arm-4.10.0-98.el9_7.13.x86_64.rpm�0fence-agents-rhevm-4.10.0-98.el9_7.13.noarch.rpm�/fence-agents-mpath-4.10.0-98.el9_7.13.noarch.rpm�ffence-virtd-cpg-4.10.0-98.el9_7.13.x86_64.rpm�&fence-agents-virsh-4.10.0-98.el9_7.13.noarch.rpm�efence-virtd-4.10.0-98.el9_7.13.x86_64.rpm�1fence-agents-rsa-4.10.0-98.el9_7.13.noarch.rpm�cfence-agents-kubevirt-4.10.0-98.el9_7.13.x86_64.rpm�]fence-agents-redfish-4.10.0-98.el9_7.13.x86_64.rpm�2fence-agents-rsb-4.10.0-98.el9_7.13.noarch.rpm�7fence-agents-wti-4.10.0-98.el9_7.13.noarch.rpm�+fence-agents-intelmodular-4.10.0-98.el9_7.13.noarch.rpm�4fence-agents-scsi-4.10.0-98.el9_7.13.noarch.rpm�[fence-agents-kdump-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-amt-ws-4.10.0-98.el9_7.13.noarch.rpm�&fence-agents-ifmib-4.10.0-98.el9_7.13.noarch.rpm�#fence-agents-common-4.10.0-98.el9_7.13.noarch.rpm�*fence-agents-ilo2-4.10.0-98.el9_7.13.noarch.rpm�#fence-agents-heuristics-ping-4.10.0-98.el9_7.13.noarch.rpm�ifence-virtd-serial-4.10.0-98.el9_7.13.x86_64.rpm�6fence-agents-vmware-soap-4.10.0-98.el9_7.13.noarch.rpm�\fence-agents-openstack-4.10.0-98.el9_7.13.x86_64.rpm�'fence-agents-ilo-moonshot-4.10.0-98.el9_7.13.noarch.rpm�"fence-agents-eps-4.10.0-98.el9_7.13.noarch.rpm�$fence-agents-hpblade-4.10.0-98.el9_7.13.noarch.rpm�Vfence-agents-nutanix-ahv-4.10.0-98.el9_7.13.noarch.rpm�hfence-virtd-multicast-4.10.0-98.el9_7.13.x86_64.rpm�,fence-agents-ipdu-4.10.0-98.el9_7.13.noarch.rpm7�.fence-agents-lpar-4.10.0-98.el9_7.13.noarch.rpm�3fence-agents-sbd-4.10.0-98.el9_7.13.noarch.rpm�!fence-agents-emerson-4.10.0-98.el9_7.13.noarch.rpm�%fence-agents-ibmblade-4.10.0-98.el9_7.13.noarch.rpm�(fence-agents-ilo-mp-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-apc-snmp-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-brocade-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-apc-4.10.0-98.el9_7.13.noarch.rpm�bfence-agents-compute-4.10.0-98.el9_7.13.x86_64.rpm�Wfence-agents-all-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-drac5-4.10.0-98.el9_7.13.noarch.rpm�jfence-virtd-tcp-4.10.0-98.el9_7.13.x86_64.rpm�Vfence-agents-aliyun-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-cisco-ucs-4.10.0-98.el9_7.13.noarch.rpm�Xfence-agents-aws-4.10.0-98.el9_7.13.x86_64.rpm�%fence-agents-ibm-vpc-4.10.0-98.el9_7.13.noarch.rpm�Zfence-agents-gce-4.10.0-98.el9_7.13.x86_64.rpm� fence-agents-eaton-snmp-4.10.0-98.el9_7.13.noarch.rpm�5fence-agents-vmware-rest-4.10.0-98.el9_7.13.noarch.rpm�$fence-agents-ibm-powervs-4.10.0-98.el9_7.13.noarch.rpm�gfence-virtd-libvirt-4.10.0-98.el9_7.13.x86_64.rpm�-fence-agents-ipmilan-4.10.0-98.el9_7.13.noarch.rpm�)fence-agents-ilo-ssh-4.10.0-98.el9_7.13.noarch.rpm�fence-agents-cisco-mds-4.10.0-98.el9_7.13.noarch.rpm�aha-cloud-support-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-bladecenter-4.10.0-98.el9_7.13.noarch.rpm�dfence-virt-4.10.0-98.el9_7.13.x86_64.rpm�Yfence-agents-azure-arm-4.10.0-98.el9_7.13.x86_64.rpm�0fence-agents-rhevm-4.10.0-98.el9_7.13.noarch.rpm�/fence-agents-mpath-4.10.0-98.el9_7.13.noarch.rpm�ffence-virtd-cpg-4.10.0-98.el9_7.13.x86_64.rpm�&fence-agents-virsh-4.10.0-98.el9_7.13.noarch.rpm�efence-virtd-4.10.0-98.el9_7.13.x86_64.rpm�1fence-agents-rsa-4.10.0-98.el9_7.13.noarch.rpm�cfence-agents-kubevirt-4.10.0-98.el9_7.13.x86_64.rpm�]fence-agents-redfish-4.10.0-98.el9_7.13.x86_64.rpm�2fence-agents-rsb-4.10.0-98.el9_7.13.noarch.rpm�7fence-agents-wti-4.10.0-98.el9_7.13.noarch.rpm�+fence-agents-intelmodular-4.10.0-98.el9_7.13.noarch.rpm�4fence-agents-scsi-4.10.0-98.el9_7.13.noarch.rpm�[fence-agents-kdump-4.10.0-98.el9_7.13.x86_64.rpm�fence-agents-amt-ws-4.10.0-98.el9_7.13.noarch.rpm�&fence-agents-ifmib-4.10.0-98.el9_7.13.noarch.rpm�#fence-agents-common-4.10.0-98.el9_7.13.noarch.rpm�*fence-agents-ilo2-4.10.0-98.el9_7.13.noarch.rpm�#fence-agents-heuristics-ping-4.10.0-98.el9_7.13.noarch.rpm�ifence-virtd-serial-4.10.0-98.el9_7.13.x86_64.rpm�6fence-agents-vmware-soap-4.10.0-98.el9_7.13.noarch.rpm�\fence-agents-openstack-4.10.0-98.el9_7.13.x86_64.rpm�'fence-agents-ilo-moonshot-4.10.0-98.el9_7.13.noarch.rpm�"fence-agents-eps-4.10.0-98.el9_7.13.noarch.rpm�$fence-agents-hpblade-4.10.0-98.el9_7.13.noarch.rpm�Vfence-agents-nutanix-ahv-4.10.0-98.el9_7.13.noarch.rpm�hfence-virtd-multicast-4.10.0-98.el9_7.13.x86_64.rpm�,fence-agents-ipdu-4.10.0-98.el9_7.13.noarch.rpm�����7	��(��bBBBBsecurityModerate: libsoup security update��N�'https://access.redhat.com/errata/RHSA-2026:13978RHSA-2026:13978RHSA-2026:13978https://access.redhat.com/security/cve/CVE-2026-5119CVE-2026-5119CVE-2026-5119https://bugzilla.redhat.com/24529322452932https://errata.almalinux.org/9/ALSA-2026-13978.htmlALSA-2026:13978ALSA-2026:13978
�g�plibsoup-devel-2.72.0-12.el9_7.6.i686.rpm�g�plibsoup-devel-2.72.0-12.el9_7.6.x86_64.rpm�f�plibsoup-2.72.0-12.el9_7.6.i686.rpm�f�plibsoup-2.72.0-12.el9_7.6.x86_64.rpm�g�plibsoup-devel-2.72.0-12.el9_7.6.i686.rpm�g�plibsoup-devel-2.72.0-12.el9_7.6.x86_64.rpm�f�plibsoup-2.72.0-12.el9_7.6.i686.rpm�f�plibsoup-2.72.0-12.el9_7.6.x86_64.rpm����D�8	��3��iBBBBBBBBsecurityModerate: python3.12 security update��u�,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408
��3python3.12-libs-3.12.12-4.el9_7.x86_64.rpm��3python3.12-tkinter-3.12.12-4.el9_7.x86_64.rpm��3python3.12-libs-3.12.12-4.el9_7.i686.rpm��3python3.12-devel-3.12.12-4.el9_7.x86_64.rpm��3python3.12-3.12.12-4.el9_7.x86_64.rpm��3python3.12-devel-3.12.12-4.el9_7.i686.rpm��3python3.12-libs-3.12.12-4.el9_7.x86_64.rpm��3python3.12-tkinter-3.12.12-4.el9_7.x86_64.rpm��3python3.12-libs-3.12.12-4.el9_7.i686.rpm��3python3.12-devel-3.12.12-4.el9_7.x86_64.rpm��3python3.12-3.12.12-4.el9_7.x86_64.rpm��3python3.12-devel-3.12.12-4.el9_7.i686.rpm����9	��&�QB^BBBBBBBB��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.2 security update��!�Xhttps://access.redhat.com/errata/RHSA-2026:1409RHSA-2026:1409RHSA-2026:1409https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1409.htmlALSA-2026:1409ALSA-2026:1409
��9�<*�Kphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�	Kphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm�Kphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�Kphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�W�jphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm�V�Nphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm�Kphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�
Kphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�
Kphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�Kphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm��9�<*�Kphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�	Kphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm�Kphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�U�Kphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm�Kphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�W�jphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm�V�Nphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm�Kphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�
Kphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�
Kphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm�Kphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�Kphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm�̂�u�:	��1��gBBBBBBBBsecurityModerate: python3.11 security update��y�,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410
�Q�#python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm[�#python3.11-devel-3.11.13-5.el9_7.i686.rpm\�#python3.11-libs-3.11.13-5.el9_7.i686.rpm�P�#python3.11-3.11.13-5.el9_7.x86_64.rpm[�#python3.11-devel-3.11.13-5.el9_7.x86_64.rpm\�#python3.11-libs-3.11.13-5.el9_7.x86_64.rpm�Q�#python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm[�#python3.11-devel-3.11.13-5.el9_7.i686.rpm\�#python3.11-libs-3.11.13-5.el9_7.i686.rpm�P�#python3.11-3.11.13-5.el9_7.x86_64.rpm[�#python3.11-devel-3.11.13-5.el9_7.x86_64.rpm\�#python3.11-libs-3.11.13-5.el9_7.x86_64.rpm���I�;	��4��rsecurityImportant: git-lfs security update��%�ahttps://access.redhat.com/errata/RHSA-2026:14200RHSA-2026:14200RHSA-2026:14200https://access.redhat.com/security/cve/CVE-2026-32280CVE-2026-32280CVE-2026-32280https://access.redhat.com/security/cve/CVE-2026-32282CVE-2026-32282CVE-2026-32282https://access.redhat.com/security/cve/CVE-2026-32283CVE-2026-32283CVE-2026-32283https://bugzilla.redhat.com/24563362456336https://bugzilla.redhat.com/24563382456338https://bugzilla.redhat.com/24563392456339https://errata.almalinux.org/9/ALSA-2026-14200.htmlALSA-2026:14200ALSA-2026:14200
�l�git-lfs-3.6.1-8.el9_7.1.x86_64.rpm�l�git-lfs-3.6.1-8.el9_7.1.x86_64.rpm����B�<	��'�OBBBBBBBBBBBB��[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.3 security update���[https://access.redhat.com/errata/RHSA-2026:1429RHSA-2026:1429RHSA-2026:1429https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1429.htmlALSA-2026:1429ALSA-2026:1429
��:�?* �Nphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�W�kphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�
Nphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm�Nphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�U�)php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�V�Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�
Nphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�	Nphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm��aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm��:�?* �Nphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�W�kphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�
Nphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�
�apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm�Nphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�S�php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�U�)php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�V�Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm�Nphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�
Nphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�T�php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm�	Nphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm�Nphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm��aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm���=�=	��-��hBBBsecurityImportant: openssl security update��a�Lhttps://access.redhat.com/errata/RHSA-2026:1473RHSA-2026:1473RHSA-2026:1473https://access.redhat.com/security/cve/CVE-2025-11187CVE-2025-11187CVE-2025-11187https://access.redhat.com/security/cve/CVE-2025-15467CVE-2025-15467CVE-2025-15467https://access.redhat.com/security/cve/CVE-2025-15468CVE-2025-15468CVE-2025-15468https://access.redhat.com/security/cve/CVE-2025-15469CVE-2025-15469CVE-2025-15469https://access.redhat.com/security/cve/CVE-2025-66199CVE-2025-66199CVE-2025-66199https://access.redhat.com/security/cve/CVE-2025-68160CVE-2025-68160CVE-2025-68160https://access.redhat.com/security/cve/CVE-2025-69418CVE-2025-69418CVE-2025-69418https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://access.redhat.com/security/cve/CVE-2025-69420CVE-2025-69420CVE-2025-69420https://access.redhat.com/security/cve/CVE-2025-69421CVE-2025-69421CVE-2025-69421https://access.redhat.com/security/cve/CVE-2026-22795CVE-2026-22795CVE-2026-22795https://access.redhat.com/security/cve/CVE-2026-22796CVE-2026-22796CVE-2026-22796https://bugzilla.redhat.com/24303752430375https://bugzilla.redhat.com/24303762430376https://bugzilla.redhat.com/24303772430377https://bugzilla.redhat.com/24303782430378https://bugzilla.redhat.com/24303792430379https://bugzilla.redhat.com/24303802430380https://bugzilla.redhat.com/24303812430381https://bugzilla.redhat.com/24303862430386https://bugzilla.redhat.com/24303872430387https://bugzilla.redhat.com/24303882430388https://bugzilla.redhat.com/24303892430389https://bugzilla.redhat.com/24303902430390https://errata.almalinux.org/9/ALSA-2026-1473.htmlALSA-2026:1473ALSA-2026:1473
��vopenssl-devel-3.5.1-7.el9_7.i686.rpm��vopenssl-perl-3.5.1-7.el9_7.x86_64.rpm��vopenssl-devel-3.5.1-7.el9_7.x86_64.rpm��vopenssl-devel-3.5.1-7.el9_7.i686.rpm��vopenssl-perl-3.5.1-7.el9_7.x86_64.rpm��vopenssl-devel-3.5.1-7.el9_7.x86_64.rpm�̂��>	��4��nBBBBsecurityModerate: python3.9 security update��-�bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478
Q�python3-devel-3.9.25-3.el9_7.x86_64.rpmf�python-unversioned-command-3.9.25-3.el9_7.noarch.rpm�+�python3-tkinter-3.9.25-3.el9_7.x86_64.rpmQ�python3-devel-3.9.25-3.el9_7.i686.rpmQ�python3-devel-3.9.25-3.el9_7.x86_64.rpmf�python-unversioned-command-3.9.25-3.el9_7.noarch.rpm�+�python3-tkinter-3.9.25-3.el9_7.x86_64.rpmQ�python3-devel-3.9.25-3.el9_7.i686.rpm����t�?	��8��uBsecurityModerate: libpng security update���fhttps://access.redhat.com/errata/RHSA-2026:14791RHSA-2026:14791RHSA-2026:14791https://access.redhat.com/security/cve/CVE-2026-33636CVE-2026-33636CVE-2026-33636https://bugzilla.redhat.com/24518192451819https://errata.almalinux.org/9/ALSA-2026-14791.htmlALSA-2026:14791ALSA-2026:14791
�6�mlibpng-devel-1.6.37-12.el9_7.3.i686.rpm�6�mlibpng-devel-1.6.37-12.el9_7.3.x86_64.rpm�6�mlibpng-devel-1.6.37-12.el9_7.3.i686.rpm�6�mlibpng-devel-1.6.37-12.el9_7.3.x86_64.rpm�А��@	����yBBBBBBBsecurityModerate: freeipmi security update��u�Khttps://access.redhat.com/errata/RHSA-2026:14819RHSA-2026:14819RHSA-2026:14819https://access.redhat.com/security/cve/CVE-2026-33554CVE-2026-33554CVE-2026-33554https://bugzilla.redhat.com/24507782450778https://errata.almalinux.org/9/ALSA-2026-14819.htmlALSA-2026:14819ALSA-2026:14819
�,�freeipmi-1.6.17-1.el9_7.x86_64.rpm��freeipmi-ipmidetectd-1.6.17-1.el9_7.x86_64.rpm��freeipmi-bmc-watchdog-1.6.17-1.el9_7.x86_64.rpm��freeipmi-ipmiseld-1.6.17-1.el9_7.x86_64.rpm�,�freeipmi-1.6.17-1.el9_7.i686.rpm�,�freeipmi-1.6.17-1.el9_7.x86_64.rpm��freeipmi-ipmidetectd-1.6.17-1.el9_7.x86_64.rpm��freeipmi-bmc-watchdog-1.6.17-1.el9_7.x86_64.rpm��freeipmi-ipmiseld-1.6.17-1.el9_7.x86_64.rpm�,�freeipmi-1.6.17-1.el9_7.i686.rpm���P�A	����CBBBsecurityImportant: openexr security update��@�ahttps://access.redhat.com/errata/RHSA-2026:15887RHSA-2026:15887RHSA-2026:15887https://access.redhat.com/security/cve/CVE-2026-34588CVE-2026-34588CVE-2026-34588https://bugzilla.redhat.com/24554082455408https://errata.almalinux.org/9/ALSA-2026-15887.htmlALSA-2026:15887ALSA-2026:15887
�:�openexr-libs-3.1.1-3.el9_7.2.x86_64.rpm�e�openexr-3.1.1-3.el9_7.2.x86_64.rpm�:�openexr-libs-3.1.1-3.el9_7.2.i686.rpm�:�openexr-libs-3.1.1-3.el9_7.2.x86_64.rpm�e�openexr-3.1.1-3.el9_7.2.x86_64.rpm�:�openexr-libs-3.1.1-3.el9_7.2.i686.rpm�А�/�B	����IsecurityImportant: thunderbird security update��!�4https://access.redhat.com/errata/RHSA-2026:15892RHSA-2026:15892RHSA-2026:15892https://access.redhat.com/security/cve/CVE-2026-6746CVE-2026-6746CVE-2026-6746https://access.redhat.com/security/cve/CVE-2026-6747CVE-2026-6747CVE-2026-6747https://access.redhat.com/security/cve/CVE-2026-6748CVE-2026-6748CVE-2026-6748https://access.redhat.com/security/cve/CVE-2026-6749CVE-2026-6749CVE-2026-6749https://access.redhat.com/security/cve/CVE-2026-6750CVE-2026-6750CVE-2026-6750https://access.redhat.com/security/cve/CVE-2026-6751CVE-2026-6751CVE-2026-6751https://access.redhat.com/security/cve/CVE-2026-6752CVE-2026-6752CVE-2026-6752https://access.redhat.com/security/cve/CVE-2026-6753CVE-2026-6753CVE-2026-6753https://access.redhat.com/security/cve/CVE-2026-6754CVE-2026-6754CVE-2026-6754https://access.redhat.com/security/cve/CVE-2026-6757CVE-2026-6757CVE-2026-6757https://access.redhat.com/security/cve/CVE-2026-6759CVE-2026-6759CVE-2026-6759https://access.redhat.com/security/cve/CVE-2026-6761CVE-2026-6761CVE-2026-6761https://access.redhat.com/security/cve/CVE-2026-6762CVE-2026-6762CVE-2026-6762https://access.redhat.com/security/cve/CVE-2026-6763CVE-2026-6763CVE-2026-6763https://access.redhat.com/security/cve/CVE-2026-6764CVE-2026-6764CVE-2026-6764https://access.redhat.com/security/cve/CVE-2026-6765CVE-2026-6765CVE-2026-6765https://access.redhat.com/security/cve/CVE-2026-6766CVE-2026-6766CVE-2026-6766https://access.redhat.com/security/cve/CVE-2026-6767CVE-2026-6767CVE-2026-6767https://access.redhat.com/security/cve/CVE-2026-6769CVE-2026-6769CVE-2026-6769https://access.redhat.com/security/cve/CVE-2026-6770CVE-2026-6770CVE-2026-6770https://access.redhat.com/security/cve/CVE-2026-6771CVE-2026-6771CVE-2026-6771https://access.redhat.com/security/cve/CVE-2026-6772CVE-2026-6772CVE-2026-6772https://access.redhat.com/security/cve/CVE-2026-6776CVE-2026-6776CVE-2026-6776https://access.redhat.com/security/cve/CVE-2026-6785CVE-2026-6785CVE-2026-6785https://access.redhat.com/security/cve/CVE-2026-6786CVE-2026-6786CVE-2026-6786https://bugzilla.redhat.com/24600742460074https://bugzilla.redhat.com/24600752460075https://bugzilla.redhat.com/24600762460076https://bugzilla.redhat.com/24600782460078https://bugzilla.redhat.com/24600792460079https://bugzilla.redhat.com/24600852460085https://bugzilla.redhat.com/24600862460086https://bugzilla.redhat.com/24600882460088https://bugzilla.redhat.com/24600922460092https://bugzilla.redhat.com/24600942460094https://bugzilla.redhat.com/24600952460095https://bugzilla.redhat.com/24600962460096https://bugzilla.redhat.com/24600972460097https://bugzilla.redhat.com/24600992460099https://bugzilla.redhat.com/24601012460101https://bugzilla.redhat.com/24601022460102https://bugzilla.redhat.com/24601032460103https://bugzilla.redhat.com/24601042460104https://bugzilla.redhat.com/24601052460105https://bugzilla.redhat.com/24601062460106https://bugzilla.redhat.com/24601072460107https://bugzilla.redhat.com/24601082460108https://bugzilla.redhat.com/24601092460109https://bugzilla.redhat.com/24601102460110https://bugzilla.redhat.com/24601122460112https://errata.almalinux.org/9/ALSA-2026-15892.htmlALSA-2026:15892ALSA-2026:15892
9�qthunderbird-140.10.0-1.el9_7.alma.1.x86_64.rpm9�qthunderbird-140.10.0-1.el9_7.alma.1.x86_64.rpm�А�3�C	����LBsecurityModerate: iperf3 security update��/�8https://access.redhat.com/errata/RHSA-2026:1595RHSA-2026:1595RHSA-2026:1595https://access.redhat.com/security/cve/CVE-2025-54349CVE-2025-54349CVE-2025-54349https://bugzilla.redhat.com/23861512386151https://errata.almalinux.org/9/ALSA-2026-1595.htmlALSA-2026:1595ALSA-2026:1595
�5�iperf3-3.9-14.el9_7.1.i686.rpm�5�iperf3-3.9-14.el9_7.1.x86_64.rpm�5�iperf3-3.9-14.el9_7.1.i686.rpm�5�iperf3-3.9-14.el9_7.1.x86_64.rpm�́��D	����PBBBBsecurityModerate: glib2 security update��g�https://access.redhat.com/errata/RHSA-2026:15971RHSA-2026:15971RHSA-2026:15971https://access.redhat.com/security/cve/CVE-2025-14087CVE-2025-14087CVE-2025-14087https://access.redhat.com/security/cve/CVE-2025-14512CVE-2025-14512CVE-2025-14512https://bugzilla.redhat.com/24190932419093https://bugzilla.redhat.com/24213392421339https://errata.almalinux.org/9/ALSA-2026-15971.htmlALSA-2026:15971ALSA-2026:15971
�:�hglib2-tests-2.68.4-18.el9_7.2.x86_64.rpm�:�hglib2-doc-2.68.4-18.el9_7.2.noarch.rpm��hglib2-devel-2.68.4-18.el9_7.2.i686.rpm��hglib2-devel-2.68.4-18.el9_7.2.x86_64.rpm�:�hglib2-tests-2.68.4-18.el9_7.2.x86_64.rpm�:�hglib2-doc-2.68.4-18.el9_7.2.noarch.rpm��hglib2-devel-2.68.4-18.el9_7.2.i686.rpm��hglib2-devel-2.68.4-18.el9_7.2.x86_64.rpm�Ј�%�E	��*��WBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update���Dhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617

%�tkernel-devel-5.14.0-611.27.1.el9_7.x86_64.rpm;�tpython3-perf-5.14.0-611.27.1.el9_7.x86_64.rpm)�trtla-5.14.0-611.27.1.el9_7.x86_64.rpm�tkernel-doc-5.14.0-611.27.1.el9_7.noarch.rpm$�tkernel-debug-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm'�tperf-5.14.0-611.27.1.el9_7.x86_64.rpm#�tkernel-debug-devel-5.14.0-611.27.1.el9_7.x86_64.rpm(�tkernel-headers-5.14.0-611.27.1.el9_7.x86_64.rpm+�trv-5.14.0-611.27.1.el9_7.x86_64.rpm&�tkernel-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm
%�tkernel-devel-5.14.0-611.27.1.el9_7.x86_64.rpm;�tpython3-perf-5.14.0-611.27.1.el9_7.x86_64.rpm)�trtla-5.14.0-611.27.1.el9_7.x86_64.rpm�tkernel-doc-5.14.0-611.27.1.el9_7.noarch.rpm$�tkernel-debug-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm'�tperf-5.14.0-611.27.1.el9_7.x86_64.rpm#�tkernel-debug-devel-5.14.0-611.27.1.el9_7.x86_64.rpm(�tkernel-headers-5.14.0-611.27.1.el9_7.x86_64.rpm+�trv-5.14.0-611.27.1.el9_7.x86_64.rpm&�tkernel-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm�̖�A�F	��>��kBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��E�.https://access.redhat.com/errata/RHSA-2026:16206RHSA-2026:16206RHSA-2026:16206https://access.redhat.com/security/cve/CVE-2026-43284CVE-2026-43284CVE-2026-43284https://bugzilla.redhat.com/24677712467771https://errata.almalinux.org/9/ALSA-2026-16206.htmlALSA-2026:16206ALSA-2026:16206

)�rtla-5.14.0-611.55.1.el9_7.x86_64.rpm;�python3-perf-5.14.0-611.55.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.55.1.el9_7.x86_64.rpm'�perf-5.14.0-611.55.1.el9_7.x86_64.rpm+�rv-5.14.0-611.55.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.55.1.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.55.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.55.1.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.55.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.55.1.el9_7.noarch.rpm
)�rtla-5.14.0-611.55.1.el9_7.x86_64.rpm;�python3-perf-5.14.0-611.55.1.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.55.1.el9_7.x86_64.rpm'�perf-5.14.0-611.55.1.el9_7.x86_64.rpm+�rv-5.14.0-611.55.1.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.55.1.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.55.1.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.55.1.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.55.1.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.55.1.el9_7.noarch.rpm�д�e�G	����BBBBBBsecurityModerate: freerdp security update��s�ehttps://access.redhat.com/errata/RHSA-2026:16482RHSA-2026:16482RHSA-2026:16482https://access.redhat.com/security/cve/CVE-2026-25952CVE-2026-25952CVE-2026-25952https://access.redhat.com/security/cve/CVE-2026-26986CVE-2026-26986CVE-2026-26986https://access.redhat.com/security/cve/CVE-2026-27951CVE-2026-27951CVE-2026-27951https://access.redhat.com/security/cve/CVE-2026-29775CVE-2026-29775CVE-2026-29775https://access.redhat.com/security/cve/CVE-2026-31883CVE-2026-31883CVE-2026-31883https://access.redhat.com/security/cve/CVE-2026-31884CVE-2026-31884CVE-2026-31884https://access.redhat.com/security/cve/CVE-2026-31885CVE-2026-31885CVE-2026-31885https://access.redhat.com/security/cve/CVE-2026-33985CVE-2026-33985CVE-2026-33985https://bugzilla.redhat.com/24427682442768https://bugzilla.redhat.com/24427822442782https://bugzilla.redhat.com/24427832442783https://bugzilla.redhat.com/24473792447379https://bugzilla.redhat.com/24473832447383https://bugzilla.redhat.com/24473852447385https://bugzilla.redhat.com/24473862447386https://bugzilla.redhat.com/24532172453217https://errata.almalinux.org/9/ALSA-2026-16482.htmlALSA-2026:16482ALSA-2026:16482
��pfreerdp-2.11.7-1.el9_7.7.x86_64.rpm�h�plibwinpr-2.11.7-1.el9_7.7.x86_64.rpm�h�plibwinpr-2.11.7-1.el9_7.7.i686.rpm�`�pfreerdp-libs-2.11.7-1.el9_7.7.i686.rpm�`�pfreerdp-libs-2.11.7-1.el9_7.7.x86_64.rpm��pfreerdp-2.11.7-1.el9_7.7.x86_64.rpm�h�plibwinpr-2.11.7-1.el9_7.7.x86_64.rpm�h�plibwinpr-2.11.7-1.el9_7.7.i686.rpm�`�pfreerdp-libs-2.11.7-1.el9_7.7.i686.rpm�`�pfreerdp-libs-2.11.7-1.el9_7.7.x86_64.rpm��E�H	��
��HBBBsecurityImportant: gimp security update��X�{https://access.redhat.com/errata/RHSA-2026:16484RHSA-2026:16484RHSA-2026:16484https://access.redhat.com/security/cve/CVE-2026-4150CVE-2026-4150CVE-2026-4150https://access.redhat.com/security/cve/CVE-2026-4151CVE-2026-4151CVE-2026-4151https://access.redhat.com/security/cve/CVE-2026-4152CVE-2026-4152CVE-2026-4152https://access.redhat.com/security/cve/CVE-2026-4153CVE-2026-4153CVE-2026-4153https://access.redhat.com/security/cve/CVE-2026-4154CVE-2026-4154CVE-2026-4154https://access.redhat.com/security/cve/CVE-2026-4887CVE-2026-4887CVE-2026-4887https://bugzilla.redhat.com/24516692451669https://bugzilla.redhat.com/24575302457530https://bugzilla.redhat.com/24575322457532https://bugzilla.redhat.com/24575332457533https://bugzilla.redhat.com/24575352457535https://bugzilla.redhat.com/24575362457536https://errata.almalinux.org/9/ALSA-2026-16484.htmlALSA-2026:16484ALSA-2026:16484
�J�	gimp-libs-3.0.4-1.el9_7.5.i686.rpm�?�	gimp-3.0.4-1.el9_7.5.x86_64.rpm�J�	gimp-libs-3.0.4-1.el9_7.5.x86_64.rpm�J�	gimp-libs-3.0.4-1.el9_7.5.i686.rpm�?�	gimp-3.0.4-1.el9_7.5.x86_64.rpm�J�	gimp-libs-3.0.4-1.el9_7.5.x86_64.rpm��i�I	����NBsecurityModerate: libpng security update��S�?https://access.redhat.com/errata/RHSA-2026:18028RHSA-2026:18028RHSA-2026:18028https://access.redhat.com/security/cve/CVE-2026-33416CVE-2026-33416CVE-2026-33416https://bugzilla.redhat.com/24518052451805https://errata.almalinux.org/9/ALSA-2026-18028.htmlALSA-2026:18028ALSA-2026:18028
�6�nlibpng-devel-1.6.37-12.el9_7.4.x86_64.rpm�6�nlibpng-devel-1.6.37-12.el9_7.4.i686.rpm�6�nlibpng-devel-1.6.37-12.el9_7.4.x86_64.rpm�6�nlibpng-devel-1.6.37-12.el9_7.4.i686.rpm���J	�� ��RBBBBBBBBBBBBsecurityCritical: nginx security update�S���-https://access.redhat.com/errata/RHSA-2026:18029RHSA-2026:18029RHSA-2026:18029https://access.redhat.com/security/cve/CVE-2026-42945CVE-2026-42945CVE-2026-42945https://bugzilla.redhat.com/24771162477116https://errata.almalinux.org/9/ALSA-2026-18029.htmlALSA-2026:18029ALSA-2026:18029
��knginx-mod-http-image-filter-1.20.1-24.el9_7.3.alma.1.x86_64.rpm�G�knginx-all-modules-1.20.1-24.el9_7.3.alma.1.noarch.rpm��knginx-mod-http-xslt-filter-1.20.1-24.el9_7.3.alma.1.x86_64.rpm�H�knginx-filesystem-1.20.1-24.el9_7.3.alma.1.noarch.rpm��knginx-core-1.20.1-24.el9_7.3.alma.1.x86_64.rpm��knginx-mod-mail-1.20.1-24.el9_7.3.alma.1.x86_64.rpm�O�knginx-1.20.1-24.el9_7.3.alma.1.x86_64.rpm��knginx-mod-http-perl-1.20.1-24.el9_7.3.alma.1.x86_64.rpm��knginx-mod-http-image-filter-1.20.1-24.el9_7.3.alma.1.x86_64.rpm�G�knginx-all-modules-1.20.1-24.el9_7.3.alma.1.noarch.rpm��knginx-mod-http-xslt-filter-1.20.1-24.el9_7.3.alma.1.x86_64.rpm�H�knginx-filesystem-1.20.1-24.el9_7.3.alma.1.noarch.rpm��knginx-core-1.20.1-24.el9_7.3.alma.1.x86_64.rpm��knginx-mod-mail-1.20.1-24.el9_7.3.alma.1.x86_64.rpm�O�knginx-1.20.1-24.el9_7.3.alma.1.x86_64.rpm��knginx-mod-http-perl-1.20.1-24.el9_7.3.alma.1.x86_64.rpm��R�K	���|BB��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby:3.3 security update��?�Bhttps://access.redhat.com/errata/RHSA-2026:18030RHSA-2026:18030RHSA-2026:18030https://access.redhat.com/security/cve/CVE-2026-41316CVE-2026-41316CVE-2026-41316https://bugzilla.redhat.com/24613692461369https://errata.almalinux.org/9/ALSA-2026-18030.htmlALSA-2026:18030ALSA-2026:18030
��O�f*&�C�8rubygem-pg-1.5.4-2.module_el9.7.0+245+447713a2.x86_64.rpm��}ruby-bundled-gems-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm�K�\rubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpm�-�Urubygem-rake-13.1.0-6.module_el9.7.0+245+447713a2.noarch.rpm�)�xrubygem-bundler-2.5.22-6.module_el9.7.0+245+447713a2.noarch.rpm�,�crubygem-power_assert-2.0.3-6.module_el9.7.0+245+447713a2.noarch.rpm�*�*rubygem-irb-1.13.1-6.module_el9.7.0+245+447713a2.noarch.rpm��rubygem-io-console-0.7.1-6.module_el9.7.0+245+447713a2.x86_64.rpm��}ruby-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm��rubygem-io-console-0.7.1-6.module_el9.7.0+245+447713a2.i686.rpm�(�}ruby-default-gems-3.3.10-6.module_el9.7.0+245+447713a2.noarch.rpm��rubygem-psych-5.1.2-6.module_el9.7.0+245+447713a2.i686.rpm�;�}ruby-libs-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm�:�}ruby-devel-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm�B�\rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm�4�3rubygems-devel-3.5.22-6.module_el9.7.0+245+447713a2.noarch.rpm�3�3rubygems-3.5.22-6.module_el9.7.0+245+447713a2.noarch.rpm�2�rubygem-typeprof-0.21.9-6.module_el9.7.0+245+447713a2.noarch.rpm�K�{rubygem-rbs-3.4.0-6.module_el9.7.0+245+447713a2.i686.rpm�/�rubygem-rexml-3.4.4-6.module_el9.7.0+245+447713a2.noarch.rpm�j�}ruby-doc-3.3.10-6.module_el9.7.0+245+447713a2.noarch.rpm�+�+rubygem-minitest-5.20.0-6.module_el9.7.0+245+447713a2.noarch.rpm�1�rubygem-test-unit-3.6.1-6.module_el9.7.0+245+447713a2.noarch.rpm��rubygem-psych-5.1.2-6.module_el9.7.0+245+447713a2.x86_64.rpm�M�<rubygem-racc-1.7.3-6.module_el9.7.0+245+447713a2.i686.rpm�K�{rubygem-rbs-3.4.0-6.module_el9.7.0+245+447713a2.x86_64.rpm�:�}ruby-devel-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm�;�}ruby-libs-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm��`rubygem-json-2.7.2-6.module_el9.7.0+245+447713a2.i686.rpm�M�<rubygem-racc-1.7.3-6.module_el9.7.0+245+447713a2.x86_64.rpm��urubygem-bigdecimal-3.1.5-6.module_el9.7.0+245+447713a2.x86_64.rpm�L�8rubygem-pg-doc-1.5.4-2.module_el9.7.0+245+447713a2.noarch.rpm��}ruby-bundled-gems-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm��`rubygem-json-2.7.2-6.module_el9.7.0+245+447713a2.x86_64.rpm��urubygem-bigdecimal-3.1.5-6.module_el9.7.0+245+447713a2.i686.rpm��}ruby-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm�.�8rubygem-rdoc-6.6.3.1-6.module_el9.7.0+245+447713a2.noarch.rpm�0�rubygem-rss-0.3.1-6.module_el9.7.0+245+447713a2.noarch.rpm��O�f*&�C�8rubygem-pg-1.5.4-2.module_el9.7.0+245+447713a2.x86_64.rpm��}ruby-bundled-gems-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm�K�\rubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpm�-�Urubygem-rake-13.1.0-6.module_el9.7.0+245+447713a2.noarch.rpm�)�xrubygem-bundler-2.5.22-6.module_el9.7.0+245+447713a2.noarch.rpm�,�crubygem-power_assert-2.0.3-6.module_el9.7.0+245+447713a2.noarch.rpm�*�*rubygem-irb-1.13.1-6.module_el9.7.0+245+447713a2.noarch.rpm��rubygem-io-console-0.7.1-6.module_el9.7.0+245+447713a2.x86_64.rpm��}ruby-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm��rubygem-io-console-0.7.1-6.module_el9.7.0+245+447713a2.i686.rpm�(�}ruby-default-gems-3.3.10-6.module_el9.7.0+245+447713a2.noarch.rpm��rubygem-psych-5.1.2-6.module_el9.7.0+245+447713a2.i686.rpm�;�}ruby-libs-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm�:�}ruby-devel-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm�B�\rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm�4�3rubygems-devel-3.5.22-6.module_el9.7.0+245+447713a2.noarch.rpm�3�3rubygems-3.5.22-6.module_el9.7.0+245+447713a2.noarch.rpm�2�rubygem-typeprof-0.21.9-6.module_el9.7.0+245+447713a2.noarch.rpm�K�{rubygem-rbs-3.4.0-6.module_el9.7.0+245+447713a2.i686.rpm�/�rubygem-rexml-3.4.4-6.module_el9.7.0+245+447713a2.noarch.rpm�j�}ruby-doc-3.3.10-6.module_el9.7.0+245+447713a2.noarch.rpm�+�+rubygem-minitest-5.20.0-6.module_el9.7.0+245+447713a2.noarch.rpm�1�rubygem-test-unit-3.6.1-6.module_el9.7.0+245+447713a2.noarch.rpm��rubygem-psych-5.1.2-6.module_el9.7.0+245+447713a2.x86_64.rpm�M�<rubygem-racc-1.7.3-6.module_el9.7.0+245+447713a2.i686.rpm�K�{rubygem-rbs-3.4.0-6.module_el9.7.0+245+447713a2.x86_64.rpm�:�}ruby-devel-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm�;�}ruby-libs-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm��`rubygem-json-2.7.2-6.module_el9.7.0+245+447713a2.i686.rpm�M�<rubygem-racc-1.7.3-6.module_el9.7.0+245+447713a2.x86_64.rpm��urubygem-bigdecimal-3.1.5-6.module_el9.7.0+245+447713a2.x86_64.rpm�L�8rubygem-pg-doc-1.5.4-2.module_el9.7.0+245+447713a2.noarch.rpm��}ruby-bundled-gems-3.3.10-6.module_el9.7.0+245+447713a2.i686.rpm��`rubygem-json-2.7.2-6.module_el9.7.0+245+447713a2.x86_64.rpm��urubygem-bigdecimal-3.1.5-6.module_el9.7.0+245+447713a2.i686.rpm��}ruby-3.3.10-6.module_el9.7.0+245+447713a2.x86_64.rpm�.�8rubygem-rdoc-6.6.3.1-6.module_el9.7.0+245+447713a2.noarch.rpm�0�rubygem-rss-0.3.1-6.module_el9.7.0+245+447713a2.noarch.rpm�б�'�L	��0��QBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby security update���Bhttps://access.redhat.com/errata/RHSA-2026:18039RHSA-2026:18039RHSA-2026:18039https://access.redhat.com/security/cve/CVE-2026-41316CVE-2026-41316CVE-2026-41316https://bugzilla.redhat.com/24613692461369https://errata.almalinux.org/9/ALSA-2026-18039.htmlALSA-2026:18039ALSA-2026:18039
��Yrubygem-json-2.5.1-166.el9_7.x86_64.rpm�)�orubygem-bundler-2.2.33-166.el9_7.noarch.rpm�2�rubygem-typeprof-0.15.2-166.el9_7.noarch.rpm�0�
rubygem-rss-0.2.9-166.el9_7.noarch.rpm�:�?ruby-devel-3.0.7-166.el9_7.i686.rpm�/�
rubygem-rexml-3.2.5-166.el9_7.noarch.rpm�+�$rubygem-minitest-5.14.2-166.el9_7.noarch.rpm�3�+rubygems-3.2.33-166.el9_7.noarch.rpm�K�Arubygem-rbs-1.4.0-166.el9_7.noarch.rpm�,�/rubygem-power_assert-1.2.1-166.el9_7.noarch.rpm�;�?ruby-libs-3.0.7-166.el9_7.i686.rpm�*�<rubygem-irb-1.3.5-166.el9_7.noarch.rpm�;�?ruby-libs-3.0.7-166.el9_7.x86_64.rpm�1�rubygem-test-unit-3.3.7-166.el9_7.noarch.rpm��trubygem-bigdecimal-3.0.0-166.el9_7.x86_64.rpm��?ruby-3.0.7-166.el9_7.i686.rpm�(�?ruby-default-gems-3.0.7-166.el9_7.noarch.rpm��Frubygem-io-console-0.5.7-166.el9_7.x86_64.rpm�.�0rubygem-rdoc-6.3.4.1-166.el9_7.noarch.rpm��?ruby-3.0.7-166.el9_7.x86_64.rpm�:�?ruby-devel-3.0.7-166.el9_7.x86_64.rpm�4�+rubygems-devel-3.2.33-166.el9_7.noarch.rpm�-�Nrubygem-rake-13.0.3-166.el9_7.noarch.rpm��~rubygem-psych-3.3.2-166.el9_7.x86_64.rpm��Yrubygem-json-2.5.1-166.el9_7.x86_64.rpm�)�orubygem-bundler-2.2.33-166.el9_7.noarch.rpm�2�rubygem-typeprof-0.15.2-166.el9_7.noarch.rpm�0�
rubygem-rss-0.2.9-166.el9_7.noarch.rpm�:�?ruby-devel-3.0.7-166.el9_7.i686.rpm�/�
rubygem-rexml-3.2.5-166.el9_7.noarch.rpm�+�$rubygem-minitest-5.14.2-166.el9_7.noarch.rpm�3�+rubygems-3.2.33-166.el9_7.noarch.rpm�K�Arubygem-rbs-1.4.0-166.el9_7.noarch.rpm�,�/rubygem-power_assert-1.2.1-166.el9_7.noarch.rpm�;�?ruby-libs-3.0.7-166.el9_7.i686.rpm�*�<rubygem-irb-1.3.5-166.el9_7.noarch.rpm�;�?ruby-libs-3.0.7-166.el9_7.x86_64.rpm�1�rubygem-test-unit-3.3.7-166.el9_7.noarch.rpm��trubygem-bigdecimal-3.0.0-166.el9_7.x86_64.rpm��?ruby-3.0.7-166.el9_7.i686.rpm�(�?ruby-default-gems-3.0.7-166.el9_7.noarch.rpm��Frubygem-io-console-0.5.7-166.el9_7.x86_64.rpm�.�0rubygem-rdoc-6.3.4.1-166.el9_7.noarch.rpm��?ruby-3.0.7-166.el9_7.x86_64.rpm�:�?ruby-devel-3.0.7-166.el9_7.x86_64.rpm�4�+rubygems-devel-3.2.33-166.el9_7.noarch.rpm�-�Nrubygem-rake-13.0.3-166.el9_7.noarch.rpm��~rubygem-psych-3.3.2-166.el9_7.x86_64.rpm�г�I�M	��:��qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update��C�https://access.redhat.com/errata/RHSA-2026:1903RHSA-2026:1903RHSA-2026:1903https://access.redhat.com/security/cve/CVE-2026-23490CVE-2026-23490CVE-2026-23490https://bugzilla.redhat.com/24304722430472https://errata.almalinux.org/9/ALSA-2026-1903.htmlALSA-2026:1903ALSA-2026:1903
7�a!ha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpm� !fence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm�&!fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpm�Y!fence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpm�-!fence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpm�Z!fence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpm�,!fence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-apc-4.10.0-98.el9_7.5.noarch.rpm�"!fence-agents-eps-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpm�&!fence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpm�W!fence-agents-all-4.10.0-98.el9_7.5.x86_64.rpm�!!fence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpm�b!fence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpm�d!fence-virt-4.10.0-98.el9_7.5.x86_64.rpm�+!fence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpm�X!fence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm�2!fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpm�1!fence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpm�.!fence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpm�$!fence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpm�#!fence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpm�g!fence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm�5!fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpm�h!fence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpm�(!fence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpm�*!fence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpm�V!fence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpm�\!fence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpm�!fence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpm�f!fence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpm�'!fence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpm�/!fence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpm�c!fence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpm�!fence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpm�6!fence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpm�j!fence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpm�[!fence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm�3!fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm�#!fence-agents-common-4.10.0-98.el9_7.5.noarch.rpm�i!fence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpm�V!fence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm�4!fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm�%!fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpm�7!fence-agents-wti-4.10.0-98.el9_7.5.noarch.rpm�0!fence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpm�e!fence-virtd-4.10.0-98.el9_7.5.x86_64.rpm�%!fence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpm�]!fence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpm�)!fence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm�$!fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm7�a!ha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpm� !fence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm�&!fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpm�Y!fence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpm�-!fence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpm�Z!fence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpm�,!fence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-apc-4.10.0-98.el9_7.5.noarch.rpm�"!fence-agents-eps-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpm�&!fence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpm�W!fence-agents-all-4.10.0-98.el9_7.5.x86_64.rpm�!!fence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpm�b!fence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpm�d!fence-virt-4.10.0-98.el9_7.5.x86_64.rpm�+!fence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpm�X!fence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm�2!fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpm�1!fence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpm�.!fence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpm�$!fence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpm�#!fence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpm�g!fence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm�5!fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpm�h!fence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpm�(!fence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpm�*!fence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpm�V!fence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpm�\!fence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpm�!fence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpm�f!fence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpm�'!fence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpm�/!fence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpm�c!fence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpm�!fence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpm�6!fence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpm�j!fence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpm�[!fence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm�3!fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm�#!fence-agents-common-4.10.0-98.el9_7.5.noarch.rpm�i!fence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpm�V!fence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpm�!fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm�4!fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm�%!fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpm�7!fence-agents-wti-4.10.0-98.el9_7.5.noarch.rpm�0!fence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpm�e!fence-virtd-4.10.0-98.el9_7.5.x86_64.rpm�%!fence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpm�]!fence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpm�)!fence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm�$!fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm�̫�L�N	��=��{securityImportant: opentelemetry-collector security update��Z�!https://access.redhat.com/errata/RHSA-2026:1908RHSA-2026:1908RHSA-2026:1908https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-1908.htmlALSA-2026:1908ALSA-2026:1908
�I�:opentelemetry-collector-0.135.0-3.el9_7.x86_64.rpm�I�:opentelemetry-collector-0.135.0-3.el9_7.x86_64.rpm�̫�/�O	����~BBBBBBBBBBBsecurityModerate: util-linux security update��{�https://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913
�O�
libblkid-devel-2.37.4-21.el9_7.x86_64.rpm�t�
uuidd-2.37.4-21.el9_7.x86_64.rpm�\�
libmount-devel-2.37.4-21.el9_7.x86_64.rpm�g�
libuuid-devel-2.37.4-21.el9_7.i686.rpm�O�
libblkid-devel-2.37.4-21.el9_7.i686.rpm�\�
libmount-devel-2.37.4-21.el9_7.i686.rpm�<�
python3-libmount-2.37.4-21.el9_7.x86_64.rpm�g�
libuuid-devel-2.37.4-21.el9_7.x86_64.rpm�O�
libblkid-devel-2.37.4-21.el9_7.x86_64.rpm�t�
uuidd-2.37.4-21.el9_7.x86_64.rpm�\�
libmount-devel-2.37.4-21.el9_7.x86_64.rpm�g�
libuuid-devel-2.37.4-21.el9_7.i686.rpm�O�
libblkid-devel-2.37.4-21.el9_7.i686.rpm�\�
libmount-devel-2.37.4-21.el9_7.i686.rpm�<�
python3-libmount-2.37.4-21.el9_7.x86_64.rpm�g�
libuuid-devel-2.37.4-21.el9_7.x86_64.rpm�̫�G�P	��
��securityImportant: python3.12-wheel security update���hhttps://access.redhat.com/errata/RHSA-2026:1939RHSA-2026:1939RHSA-2026:1939https://access.redhat.com/security/cve/CVE-2026-24049CVE-2026-24049CVE-2026-24049https://bugzilla.redhat.com/24319592431959https://errata.almalinux.org/9/ALSA-2026-1939.htmlALSA-2026:1939ALSA-2026:1939
�H�python3.12-wheel-0.41.2-3.el9_7.1.noarch.rpm�H�python3.12-wheel-0.41.2-3.el9_7.1.noarch.rpm�̫� �Q	����NBBBBBBsecurityImportant: brotli security update���https://access.redhat.com/errata/RHSA-2026:2042RHSA-2026:2042RHSA-2026:2042https://access.redhat.com/security/cve/CVE-2025-6176CVE-2025-6176CVE-2025-6176https://bugzilla.redhat.com/24087622408762https://errata.almalinux.org/9/ALSA-2026-2042.htmlALSA-2026:2042ALSA-2026:2042
�$�Rbrotli-devel-1.0.9-9.el9_7.i686.rpm�9�Rpython3-brotli-1.0.9-9.el9_7.x86_64.rpm�$�Rbrotli-devel-1.0.9-9.el9_7.x86_64.rpm�#�Rbrotli-1.0.9-9.el9_7.x86_64.rpm�#�Rbrotli-1.0.9-9.el9_7.i686.rpm�$�Rbrotli-devel-1.0.9-9.el9_7.i686.rpm�9�Rpython3-brotli-1.0.9-9.el9_7.x86_64.rpm�$�Rbrotli-devel-1.0.9-9.el9_7.x86_64.rpm�#�Rbrotli-1.0.9-9.el9_7.x86_64.rpm�#�Rbrotli-1.0.9-9.el9_7.i686.rpm�̒�7�R	����WBBBBBBsecurityImportant: freerdp security update���https://access.redhat.com/errata/RHSA-2026:2048RHSA-2026:2048RHSA-2026:2048https://access.redhat.com/security/cve/CVE-2026-23530CVE-2026-23530CVE-2026-23530https://access.redhat.com/security/cve/CVE-2026-23531CVE-2026-23531CVE-2026-23531https://access.redhat.com/security/cve/CVE-2026-23532CVE-2026-23532CVE-2026-23532https://access.redhat.com/security/cve/CVE-2026-23533CVE-2026-23533CVE-2026-23533https://access.redhat.com/security/cve/CVE-2026-23534CVE-2026-23534CVE-2026-23534https://access.redhat.com/security/cve/CVE-2026-23883CVE-2026-23883CVE-2026-23883https://access.redhat.com/security/cve/CVE-2026-23884CVE-2026-23884CVE-2026-23884https://bugzilla.redhat.com/24308772430877https://bugzilla.redhat.com/24308802430880https://bugzilla.redhat.com/24308852430885https://bugzilla.redhat.com/24308862430886https://bugzilla.redhat.com/24308872430887https://bugzilla.redhat.com/24308882430888https://bugzilla.redhat.com/24308912430891https://errata.almalinux.org/9/ALSA-2026-2048.htmlALSA-2026:2048ALSA-2026:2048
�`�kfreerdp-libs-2.11.7-1.el9_7.1.i686.rpm��kfreerdp-2.11.7-1.el9_7.1.x86_64.rpm�h�klibwinpr-2.11.7-1.el9_7.1.i686.rpm�`�kfreerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm�h�klibwinpr-2.11.7-1.el9_7.1.x86_64.rpm�`�kfreerdp-libs-2.11.7-1.el9_7.1.i686.rpm��kfreerdp-2.11.7-1.el9_7.1.x86_64.rpm�h�klibwinpr-2.11.7-1.el9_7.1.i686.rpm�`�kfreerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm�h�klibwinpr-2.11.7-1.el9_7.1.x86_64.rpm�̫�w�S	��3��`BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��<�u"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212

)�urtla-5.14.0-611.30.1.el9_7.x86_64.rpm;�upython3-perf-5.14.0-611.30.1.el9_7.x86_64.rpm+�urv-5.14.0-611.30.1.el9_7.x86_64.rpm%�ukernel-devel-5.14.0-611.30.1.el9_7.x86_64.rpm#�ukernel-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpm�ukernel-doc-5.14.0-611.30.1.el9_7.noarch.rpm'�uperf-5.14.0-611.30.1.el9_7.x86_64.rpm(�ukernel-headers-5.14.0-611.30.1.el9_7.x86_64.rpm&�ukernel-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm$�ukernel-debug-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm
)�urtla-5.14.0-611.30.1.el9_7.x86_64.rpm;�upython3-perf-5.14.0-611.30.1.el9_7.x86_64.rpm+�urv-5.14.0-611.30.1.el9_7.x86_64.rpm%�ukernel-devel-5.14.0-611.30.1.el9_7.x86_64.rpm#�ukernel-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpm�ukernel-doc-5.14.0-611.30.1.el9_7.noarch.rpm'�uperf-5.14.0-611.30.1.el9_7.x86_64.rpm(�ukernel-headers-5.14.0-611.30.1.el9_7.x86_64.rpm&�ukernel-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm$�ukernel-debug-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm�̶�+�T	��:��tBBBBsecurityImportant: libsoup security update��1�https://access.redhat.com/errata/RHSA-2026:2216RHSA-2026:2216RHSA-2026:2216https://access.redhat.com/security/cve/CVE-2026-0719CVE-2026-0719CVE-2026-0719https://access.redhat.com/security/cve/CVE-2026-1761CVE-2026-1761CVE-2026-1761https://bugzilla.redhat.com/24279062427906https://bugzilla.redhat.com/24359612435961https://errata.almalinux.org/9/ALSA-2026-2216.htmlALSA-2026:2216ALSA-2026:2216
�f�olibsoup-2.72.0-12.el9_7.5.x86_64.rpm�f�olibsoup-2.72.0-12.el9_7.5.i686.rpm�g�olibsoup-devel-2.72.0-12.el9_7.5.i686.rpm�g�olibsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm�f�olibsoup-2.72.0-12.el9_7.5.x86_64.rpm�f�olibsoup-2.72.0-12.el9_7.5.i686.rpm�g�olibsoup-devel-2.72.0-12.el9_7.5.i686.rpm�g�olibsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm�̬�w�U	����{BBBBBBBBBBBsecurityCritical: keylime security update�S��P�[https://access.redhat.com/errata/RHSA-2026:2224RHSA-2026:2224RHSA-2026:2224https://access.redhat.com/security/cve/CVE-2026-1709CVE-2026-1709CVE-2026-1709https://bugzilla.redhat.com/24355142435514https://errata.almalinux.org/9/ALSA-2026-2224.htmlALSA-2026:2224ALSA-2026:2224
�A�dkeylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm�@�dkeylime-registrar-7.12.1-11.el9_7.4.x86_64.rpm�O�dpython3-keylime-7.12.1-11.el9_7.4.x86_64.rpm�<�dkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm�B�dkeylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm�>�dkeylime-7.12.1-11.el9_7.4.x86_64.rpm�?�dkeylime-base-7.12.1-11.el9_7.4.x86_64.rpm�A�dkeylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm�@�dkeylime-registrar-7.12.1-11.el9_7.4.x86_64.rpm�O�dpython3-keylime-7.12.1-11.el9_7.4.x86_64.rpm�<�dkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm�B�dkeylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm�>�dkeylime-7.12.1-11.el9_7.4.x86_64.rpm�?�dkeylime-base-7.12.1-11.el9_7.4.x86_64.rpm�̲�H�V	����IBBBsecurityImportant: gimp security update��+�9https://access.redhat.com/errata/RHSA-2026:2707RHSA-2026:2707RHSA-2026:2707https://access.redhat.com/security/cve/CVE-2025-15059CVE-2025-15059CVE-2025-15059https://bugzilla.redhat.com/24322962432296https://errata.almalinux.org/9/ALSA-2026-2707.htmlALSA-2026:2707ALSA-2026:2707
�?�gimp-3.0.4-1.el9_7.3.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.3.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.3.i686.rpm�?�gimp-3.0.4-1.el9_7.3.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.3.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.3.i686.rpm��ц&�W	����OBBBBBBBBBBsecurityImportant: golang security update��d�
https://access.redhat.com/errata/RHSA-2026:2709RHSA-2026:2709RHSA-2026:2709https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61732CVE-2025-61732CVE-2025-61732https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24370162437016https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-2709.htmlALSA-2026:2709ALSA-2026:2709
�T�$golang-race-1.25.7-1.el9_7.x86_64.rpmm�$golang-docs-1.25.7-1.el9_7.noarch.rpmp�$golang-tests-1.25.7-1.el9_7.noarch.rpm�N�$go-toolset-1.25.7-1.el9_7.x86_64.rpmo�$golang-src-1.25.7-1.el9_7.noarch.rpm�G�$golang-1.25.7-1.el9_7.x86_64.rpmn�$golang-misc-1.25.7-1.el9_7.noarch.rpm�H�$golang-bin-1.25.7-1.el9_7.x86_64.rpm�T�$golang-race-1.25.7-1.el9_7.x86_64.rpmm�$golang-docs-1.25.7-1.el9_7.noarch.rpmp�$golang-tests-1.25.7-1.el9_7.noarch.rpm�N�$go-toolset-1.25.7-1.el9_7.x86_64.rpmo�$golang-src-1.25.7-1.el9_7.noarch.rpm�G�$golang-1.25.7-1.el9_7.x86_64.rpmn�$golang-misc-1.25.7-1.el9_7.noarch.rpm�H�$golang-bin-1.25.7-1.el9_7.x86_64.rpm��х-�X	��/��\BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��k�https://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722

'�vperf-5.14.0-611.34.1.el9_7.x86_64.rpm;�vpython3-perf-5.14.0-611.34.1.el9_7.x86_64.rpm(�vkernel-headers-5.14.0-611.34.1.el9_7.x86_64.rpm+�vrv-5.14.0-611.34.1.el9_7.x86_64.rpm&�vkernel-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm$�vkernel-debug-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm#�vkernel-debug-devel-5.14.0-611.34.1.el9_7.x86_64.rpm%�vkernel-devel-5.14.0-611.34.1.el9_7.x86_64.rpm�vkernel-doc-5.14.0-611.34.1.el9_7.noarch.rpm)�vrtla-5.14.0-611.34.1.el9_7.x86_64.rpm
'�vperf-5.14.0-611.34.1.el9_7.x86_64.rpm;�vpython3-perf-5.14.0-611.34.1.el9_7.x86_64.rpm(�vkernel-headers-5.14.0-611.34.1.el9_7.x86_64.rpm+�vrv-5.14.0-611.34.1.el9_7.x86_64.rpm&�vkernel-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm$�vkernel-debug-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm#�vkernel-debug-devel-5.14.0-611.34.1.el9_7.x86_64.rpm%�vkernel-devel-5.14.0-611.34.1.el9_7.x86_64.rpm�vkernel-doc-5.14.0-611.34.1.el9_7.noarch.rpm)�vrtla-5.14.0-611.34.1.el9_7.x86_64.rpm���6�Y	��2��psecurityModerate: edk2 security update���Ghttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776
�g�#edk2-ovmf-20241117-4.el9_7.3.noarch.rpm��#edk2-aarch64-20241117-4.el9_7.3.noarch.rpm�g�#edk2-ovmf-20241117-4.el9_7.3.noarch.rpm��#edk2-aarch64-20241117-4.el9_7.3.noarch.rpm��׆;�Z	��?�YBD��WBBBBBBBBBBsecurityImportant: nodejs:24 security update��I�Bhttps://access.redhat.com/errata/RHSA-2026:2781RHSA-2026:2781RHSA-2026:2781https://access.redhat.com/security/cve/CVE-2025-55130CVE-2025-55130CVE-2025-55130https://access.redhat.com/security/cve/CVE-2025-55131CVE-2025-55131CVE-2025-55131https://access.redhat.com/security/cve/CVE-2025-55132CVE-2025-55132CVE-2025-55132https://access.redhat.com/security/cve/CVE-2025-59465CVE-2025-59465CVE-2025-59465https://access.redhat.com/security/cve/CVE-2025-59466CVE-2025-59466CVE-2025-59466https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://bugzilla.redhat.com/24313382431338https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24313432431343https://bugzilla.redhat.com/24313492431349https://bugzilla.redhat.com/24313502431350https://bugzilla.redhat.com/24313522431352https://errata.almalinux.org/9/ALSA-2026-2781.htmlALSA-2026:2781ALSA-2026:2781
,�k�c*
�#�nodejs-devel-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpml�,nodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpmd�Ynpm-11.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e.noarch.rpm�
�(nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpme�nodejs-full-i18n-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm,�nodejs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm��v8-13.6-devel-13.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e.x86_64.rpm�	�)nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm��nodejs-libs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm>�nodejs-docs-24.13.0-1.module_el9.7.0+209+ecf6523e.noarch.rpm,�k�c*
�#�nodejs-devel-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpml�,nodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpmd�Ynpm-11.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e.noarch.rpm�
�(nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpme�nodejs-full-i18n-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm,�nodejs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm��v8-13.6-devel-13.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e.x86_64.rpm�	�)nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm��nodejs-libs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm>�nodejs-docs-24.13.0-1.module_el9.7.0+209+ecf6523e.noarch.rpm��ׇg�[	����@BBBBBBBBBBBBBBsecurityImportant: nodejs:22 security update���Bhttps://access.redhat.com/errata/RHSA-2026:2782RHSA-2026:2782RHSA-2026:2782https://access.redhat.com/security/cve/CVE-2025-55130CVE-2025-55130CVE-2025-55130https://access.redhat.com/security/cve/CVE-2025-55131CVE-2025-55131CVE-2025-55131https://access.redhat.com/security/cve/CVE-2025-55132CVE-2025-55132CVE-2025-55132https://access.redhat.com/security/cve/CVE-2025-59465CVE-2025-59465CVE-2025-59465https://access.redhat.com/security/cve/CVE-2025-59466CVE-2025-59466CVE-2025-59466https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://bugzilla.redhat.com/24313382431338https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24313432431343https://bugzilla.redhat.com/24313492431349https://bugzilla.redhat.com/24313502431350https://bugzilla.redhat.com/24313522431352https://errata.almalinux.org/9/ALSA-2026-2782.htmlALSA-2026:2782ALSA-2026:2782
,�$�j*
�	�|nodejs-packaging-2021.06-5.module_el9.7.0+208+fb06c0ab.noarch.rpm�M�v8-12.4-devel-12.4.254.21-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpm,�nodejs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm�
�{nodejs-packaging-bundler-2021.06-5.module_el9.7.0+196+ac40ca3b.noarch.rpml�nodejs-nodemon-3.0.1-1.module_el9.6.0+172+f0ba00ec.noarch.rpm�#�nodejs-devel-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm>�nodejs-docs-22.22.0-1.module_el9.7.0+208+fb06c0ab.noarch.rpm��nodejs-libs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpmd�1npm-10.9.4-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpme�nodejs-full-i18n-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm,�$�j*
�	�|nodejs-packaging-2021.06-5.module_el9.7.0+208+fb06c0ab.noarch.rpm�M�v8-12.4-devel-12.4.254.21-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpm,�nodejs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm�
�{nodejs-packaging-bundler-2021.06-5.module_el9.7.0+196+ac40ca3b.noarch.rpml�nodejs-nodemon-3.0.1-1.module_el9.6.0+172+f0ba00ec.noarch.rpm�#�nodejs-devel-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm>�nodejs-docs-22.22.0-1.module_el9.7.0+208+fb06c0ab.noarch.rpm��nodejs-libs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpmd�1npm-10.9.4-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpme�nodejs-full-i18n-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm���w�\	���_��sBBBBBBBBBsecurityImportant: nodejs:20 security update��M�Bhttps://access.redhat.com/errata/RHSA-2026:2783RHSA-2026:2783RHSA-2026:2783https://access.redhat.com/security/cve/CVE-2025-55130CVE-2025-55130CVE-2025-55130https://access.redhat.com/security/cve/CVE-2025-55131CVE-2025-55131CVE-2025-55131https://access.redhat.com/security/cve/CVE-2025-55132CVE-2025-55132CVE-2025-55132https://access.redhat.com/security/cve/CVE-2025-59465CVE-2025-59465CVE-2025-59465https://access.redhat.com/security/cve/CVE-2025-59466CVE-2025-59466CVE-2025-59466https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://bugzilla.redhat.com/24313382431338https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24313432431343https://bugzilla.redhat.com/24313492431349https://bugzilla.redhat.com/24313502431350https://bugzilla.redhat.com/24313522431352https://errata.almalinux.org/9/ALSA-2026-2783.htmlALSA-2026:2783ALSA-2026:2783
,�Q�i*�	�nodejs-packaging-2021.06-5.module_el9.7.0+207+84573810.noarch.rpm�#�,nodejs-devel-20.20.0-1.module_el9.7.0+207+84573810.x86_64.rpme�,nodejs-full-i18n-20.20.0-1.module_el9.7.0+207+84573810.x86_64.rpml�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm,�,nodejs-20.20.0-1.module_el9.7.0+207+84573810.x86_64.rpm�
�nodejs-packaging-bundler-2021.06-5.module_el9.7.0+207+84573810.noarch.rpmd�,npm-10.8.2-1.20.20.0.1.module_el9.7.0+207+84573810.x86_64.rpm>�,nodejs-docs-20.20.0-1.module_el9.7.0+207+84573810.noarch.rpm,�Q�i*�	�nodejs-packaging-2021.06-5.module_el9.7.0+207+84573810.noarch.rpm�#�,nodejs-devel-20.20.0-1.module_el9.7.0+207+84573810.x86_64.rpme�,nodejs-full-i18n-20.20.0-1.module_el9.7.0+207+84573810.x86_64.rpml�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm,�,nodejs-20.20.0-1.module_el9.7.0+207+84573810.x86_64.rpm�
�nodejs-packaging-bundler-2021.06-5.module_el9.7.0+207+84573810.noarch.rpmd�,npm-10.8.2-1.20.20.0.1.module_el9.7.0+207+84573810.x86_64.rpm>�,nodejs-docs-20.20.0-1.module_el9.7.0+207+84573810.noarch.rpm����]	��'��]BBBBBBBBsecurityModerate: glibc security update���|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786
�h�glibc-devel-2.34-231.el9_7.10.i686.rpm�h�glibc-devel-2.34-231.el9_7.10.x86_64.rpm�?�glibc-headers-2.34-231.el9_7.10.x86_64.rpm�@�glibc-locale-source-2.34-231.el9_7.10.x86_64.rpm�(�glibc-doc-2.34-231.el9_7.10.noarch.rpm�A�glibc-utils-2.34-231.el9_7.10.x86_64.rpm�h�glibc-devel-2.34-231.el9_7.10.i686.rpm�h�glibc-devel-2.34-231.el9_7.10.x86_64.rpm�?�glibc-headers-2.34-231.el9_7.10.x86_64.rpm�@�glibc-locale-source-2.34-231.el9_7.10.x86_64.rpm�(�glibc-doc-2.34-231.el9_7.10.noarch.rpm�A�glibc-utils-2.34-231.el9_7.10.x86_64.rpm��ׄ	�^	����hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security update���fhttps://access.redhat.com/errata/RHSA-2026:2799RHSA-2026:2799RHSA-2026:2799https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://errata.almalinux.org/9/ALSA-2026-2799.htmlALSA-2026:2799ALSA-2026:2799
�Dphp-opcache-8.0.30-5.el9_7.x86_64.rpm�Dphp-mbstring-8.0.30-5.el9_7.x86_64.rpm�Dphp-snmp-8.0.30-5.el9_7.x86_64.rpm�Dphp-bcmath-8.0.30-5.el9_7.x86_64.rpm�Dphp-mysqlnd-8.0.30-5.el9_7.x86_64.rpm�Dphp-xml-8.0.30-5.el9_7.x86_64.rpm�Dphp-gd-8.0.30-5.el9_7.x86_64.rpm�Dphp-soap-8.0.30-5.el9_7.x86_64.rpm�Dphp-pgsql-8.0.30-5.el9_7.x86_64.rpm�Dphp-ldap-8.0.30-5.el9_7.x86_64.rpm�Dphp-pdo-8.0.30-5.el9_7.x86_64.rpm�Dphp-embedded-8.0.30-5.el9_7.x86_64.rpm�
Dphp-common-8.0.30-5.el9_7.x86_64.rpm�Dphp-enchant-8.0.30-5.el9_7.x86_64.rpm�Dphp-dba-8.0.30-5.el9_7.x86_64.rpm�
Dphp-devel-8.0.30-5.el9_7.x86_64.rpm�Dphp-process-8.0.30-5.el9_7.x86_64.rpm�Dphp-fpm-8.0.30-5.el9_7.x86_64.rpm�Dphp-8.0.30-5.el9_7.x86_64.rpm�	Dphp-cli-8.0.30-5.el9_7.x86_64.rpm�Dphp-odbc-8.0.30-5.el9_7.x86_64.rpm�Dphp-ffi-8.0.30-5.el9_7.x86_64.rpm�Dphp-dbg-8.0.30-5.el9_7.x86_64.rpm�Dphp-intl-8.0.30-5.el9_7.x86_64.rpm�Dphp-gmp-8.0.30-5.el9_7.x86_64.rpm�Dphp-opcache-8.0.30-5.el9_7.x86_64.rpm�Dphp-mbstring-8.0.30-5.el9_7.x86_64.rpm�Dphp-snmp-8.0.30-5.el9_7.x86_64.rpm�Dphp-bcmath-8.0.30-5.el9_7.x86_64.rpm�Dphp-mysqlnd-8.0.30-5.el9_7.x86_64.rpm�Dphp-xml-8.0.30-5.el9_7.x86_64.rpm�Dphp-gd-8.0.30-5.el9_7.x86_64.rpm�Dphp-soap-8.0.30-5.el9_7.x86_64.rpm�Dphp-pgsql-8.0.30-5.el9_7.x86_64.rpm�Dphp-ldap-8.0.30-5.el9_7.x86_64.rpm�Dphp-pdo-8.0.30-5.el9_7.x86_64.rpm�Dphp-embedded-8.0.30-5.el9_7.x86_64.rpm�
Dphp-common-8.0.30-5.el9_7.x86_64.rpm�Dphp-enchant-8.0.30-5.el9_7.x86_64.rpm�Dphp-dba-8.0.30-5.el9_7.x86_64.rpm�
Dphp-devel-8.0.30-5.el9_7.x86_64.rpm�Dphp-process-8.0.30-5.el9_7.x86_64.rpm�Dphp-fpm-8.0.30-5.el9_7.x86_64.rpm�Dphp-8.0.30-5.el9_7.x86_64.rpm�	Dphp-cli-8.0.30-5.el9_7.x86_64.rpm�Dphp-odbc-8.0.30-5.el9_7.x86_64.rpm�Dphp-ffi-8.0.30-5.el9_7.x86_64.rpm�Dphp-dbg-8.0.30-5.el9_7.x86_64.rpm�Dphp-intl-8.0.30-5.el9_7.x86_64.rpm�Dphp-gmp-8.0.30-5.el9_7.x86_64.rpm����_	����[BBsecurityImportant: grafana security update��q�qhttps://access.redhat.com/errata/RHSA-2026:2920RHSA-2026:2920RHSA-2026:2920https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://access.redhat.com/security/cve/CVE-2026-21721CVE-2026-21721CVE-2026-21721https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24332422433242https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-2920.htmlALSA-2026:2920ALSA-2026:2920
�U�ugrafana-selinux-10.2.6-18.el9_7.x86_64.rpm�I�ugrafana-10.2.6-18.el9_7.x86_64.rpm�U�ugrafana-selinux-10.2.6-18.el9_7.x86_64.rpm�I�ugrafana-10.2.6-18.el9_7.x86_64.rpm����K�`	��#��`BsecurityImportant: libpng15 security update��b�https://access.redhat.com/errata/RHSA-2026:3031RHSA-2026:3031RHSA-2026:3031https://access.redhat.com/security/cve/CVE-2026-25646CVE-2026-25646CVE-2026-25646https://bugzilla.redhat.com/24385422438542https://errata.almalinux.org/9/ALSA-2026-3031.htmlALSA-2026:3031ALSA-2026:3031
�]�7libpng15-1.5.30-14.el9_7.1.i686.rpm�]�7libpng15-1.5.30-14.el9_7.1.x86_64.rpm�]�7libpng15-1.5.30-14.el9_7.1.i686.rpm�]�7libpng15-1.5.30-14.el9_7.1.x86_64.rpm�̀�j�a	��)��dBBBsecurityImportant: munge security update��}�}https://access.redhat.com/errata/RHSA-2026:3034RHSA-2026:3034RHSA-2026:3034https://access.redhat.com/security/cve/CVE-2026-25506CVE-2026-25506CVE-2026-25506https://bugzilla.redhat.com/24387152438715https://errata.almalinux.org/9/ALSA-2026-3034.htmlALSA-2026:3034ALSA-2026:3034
��Zmunge-0.5.13-14.el9_7.x86_64.rpm�n�Zmunge-libs-0.5.13-14.el9_7.i686.rpm�n�Zmunge-libs-0.5.13-14.el9_7.x86_64.rpm��Zmunge-0.5.13-14.el9_7.x86_64.rpm�n�Zmunge-libs-0.5.13-14.el9_7.i686.rpm�n�Zmunge-libs-0.5.13-14.el9_7.x86_64.rpm�̀�;�b	��,��jsecurityImportant: grafana-pcp security update��z�Hhttps://access.redhat.com/errata/RHSA-2026:3040RHSA-2026:3040RHSA-2026:3040https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3040.htmlALSA-2026:3040ALSA-2026:3040
�~�/grafana-pcp-5.1.1-12.el9_7.x86_64.rpm�~�/grafana-pcp-5.1.1-12.el9_7.x86_64.rpm����c	����mBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��B�whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066

;�wpython3-perf-5.14.0-611.35.1.el9_7.x86_64.rpm&�wkernel-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm#�wkernel-debug-devel-5.14.0-611.35.1.el9_7.x86_64.rpm)�wrtla-5.14.0-611.35.1.el9_7.x86_64.rpm%�wkernel-devel-5.14.0-611.35.1.el9_7.x86_64.rpm'�wperf-5.14.0-611.35.1.el9_7.x86_64.rpm(�wkernel-headers-5.14.0-611.35.1.el9_7.x86_64.rpm�wkernel-doc-5.14.0-611.35.1.el9_7.noarch.rpm+�wrv-5.14.0-611.35.1.el9_7.x86_64.rpm$�wkernel-debug-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm
;�wpython3-perf-5.14.0-611.35.1.el9_7.x86_64.rpm&�wkernel-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm#�wkernel-debug-devel-5.14.0-611.35.1.el9_7.x86_64.rpm)�wrtla-5.14.0-611.35.1.el9_7.x86_64.rpm%�wkernel-devel-5.14.0-611.35.1.el9_7.x86_64.rpm'�wperf-5.14.0-611.35.1.el9_7.x86_64.rpm(�wkernel-headers-5.14.0-611.35.1.el9_7.x86_64.rpm�wkernel-doc-5.14.0-611.35.1.el9_7.noarch.rpm+�wrv-5.14.0-611.35.1.el9_7.x86_64.rpm$�wkernel-debug-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm�̀�#�d	��	��ABBBBBBsecurityImportant: freerdp security update��9�^https://access.redhat.com/errata/RHSA-2026:3067RHSA-2026:3067RHSA-2026:3067https://access.redhat.com/security/cve/CVE-2026-22855CVE-2026-22855CVE-2026-22855https://access.redhat.com/security/cve/CVE-2026-22858CVE-2026-22858CVE-2026-22858https://access.redhat.com/security/cve/CVE-2026-22859CVE-2026-22859CVE-2026-22859https://bugzilla.redhat.com/24296452429645https://bugzilla.redhat.com/24296492429649https://bugzilla.redhat.com/24296532429653https://errata.almalinux.org/9/ALSA-2026-3067.htmlALSA-2026:3067ALSA-2026:3067
�h�llibwinpr-2.11.7-1.el9_7.2.x86_64.rpm��lfreerdp-2.11.7-1.el9_7.2.x86_64.rpm�h�llibwinpr-2.11.7-1.el9_7.2.i686.rpm�`�lfreerdp-libs-2.11.7-1.el9_7.2.i686.rpm�`�lfreerdp-libs-2.11.7-1.el9_7.2.x86_64.rpm�h�llibwinpr-2.11.7-1.el9_7.2.x86_64.rpm��lfreerdp-2.11.7-1.el9_7.2.x86_64.rpm�h�llibwinpr-2.11.7-1.el9_7.2.i686.rpm�`�lfreerdp-libs-2.11.7-1.el9_7.2.i686.rpm�`�lfreerdp-libs-2.11.7-1.el9_7.2.x86_64.rpm�̀��e	����JBBBBBsecurityImportant: protobuf security update���9https://access.redhat.com/errata/RHSA-2026:3095RHSA-2026:3095RHSA-2026:3095https://access.redhat.com/security/cve/CVE-2026-0994CVE-2026-0994CVE-2026-0994https://bugzilla.redhat.com/24323982432398https://errata.almalinux.org/9/ALSA-2026-3095.htmlALSA-2026:3095ALSA-2026:3095
�L�Fprotobuf-3.14.0-17.el9_7.x86_64.rpm�[�Fpython3-protobuf-3.14.0-17.el9_7.noarch.rpm�M�Fprotobuf-lite-3.14.0-17.el9_7.x86_64.rpm�L�Fprotobuf-3.14.0-17.el9_7.i686.rpm�M�Fprotobuf-lite-3.14.0-17.el9_7.i686.rpm�L�Fprotobuf-3.14.0-17.el9_7.x86_64.rpm�[�Fpython3-protobuf-3.14.0-17.el9_7.noarch.rpm�M�Fprotobuf-lite-3.14.0-17.el9_7.x86_64.rpm�L�Fprotobuf-3.14.0-17.el9_7.i686.rpm�M�Fprotobuf-lite-3.14.0-17.el9_7.i686.rpm����.�f	����RBBBBBsecurityModerate: 389-ds-base security update��P�https://access.redhat.com/errata/RHSA-2026:3189RHSA-2026:3189RHSA-2026:3189https://access.redhat.com/security/cve/CVE-2025-14905CVE-2025-14905CVE-2025-14905https://bugzilla.redhat.com/24236242423624https://errata.almalinux.org/9/ALSA-2026-3189.htmlALSA-2026:3189ALSA-2026:3189
��0389-ds-base-2.7.0-10.el9_7.x86_64.rpm��0389-ds-base-libs-2.7.0-10.el9_7.x86_64.rpm�S�0389-ds-base-snmp-2.7.0-10.el9_7.x86_64.rpm�/�0python3-lib389-2.7.0-10.el9_7.noarch.rpm��0389-ds-base-2.7.0-10.el9_7.x86_64.rpm��0389-ds-base-libs-2.7.0-10.el9_7.x86_64.rpm�S�0389-ds-base-snmp-2.7.0-10.el9_7.x86_64.rpm�/�0python3-lib389-2.7.0-10.el9_7.noarch.rpm�̀��g	����ZsecurityImportant: runc security update��i�yhttps://access.redhat.com/errata/RHSA-2026:3291RHSA-2026:3291RHSA-2026:3291https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3291.htmlALSA-2026:3291ALSA-2026:3291
�z�,runc-1.4.0-2.el9_7.x86_64.rpm�z�,runc-1.4.0-2.el9_7.x86_64.rpm�̀�,�h	��!��]BBsecurityImportant: buildah security update��b�Shttps://access.redhat.com/errata/RHSA-2026:3298RHSA-2026:3298RHSA-2026:3298https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3298.htmlALSA-2026:3298ALSA-2026:3298
�/�Jbuildah-1.41.8-2.el9_7.x86_64.rpm�0�Jbuildah-tests-1.41.8-2.el9_7.x86_64.rpm�/�Jbuildah-1.41.8-2.el9_7.x86_64.rpm�0�Jbuildah-tests-1.41.8-2.el9_7.x86_64.rpm�̀��i	��+��bBBBBBBBsecurityImportant: podman security update��5�,
https://access.redhat.com/errata/RHSA-2026:3337RHSA-2026:3337RHSA-2026:3337https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3337.htmlALSA-2026:3337ALSA-2026:3337
�1�.podman-5.6.0-14.el9_7.x86_64.rpm�2�.podman-plugins-5.6.0-14.el9_7.x86_64.rpm�4�.podman-tests-5.6.0-14.el9_7.x86_64.rpmh�.podman-docker-5.6.0-14.el9_7.noarch.rpm�3�.podman-remote-5.6.0-14.el9_7.x86_64.rpm�1�.podman-5.6.0-14.el9_7.x86_64.rpm�2�.podman-plugins-5.6.0-14.el9_7.x86_64.rpm�4�.podman-tests-5.6.0-14.el9_7.x86_64.rpmh�.podman-docker-5.6.0-14.el9_7.noarch.rpm�3�.podman-remote-5.6.0-14.el9_7.x86_64.rpm�̀�1�j	��0��lBBsecurityImportant: firefox security update��a�2Nhttps://access.redhat.com/errata/RHSA-2026:3339RHSA-2026:3339RHSA-2026:3339https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://access.redhat.com/security/cve/CVE-2026-2757CVE-2026-2757CVE-2026-2757https://access.redhat.com/security/cve/CVE-2026-2758CVE-2026-2758CVE-2026-2758https://access.redhat.com/security/cve/CVE-2026-2759CVE-2026-2759CVE-2026-2759https://access.redhat.com/security/cve/CVE-2026-2760CVE-2026-2760CVE-2026-2760https://access.redhat.com/security/cve/CVE-2026-2761CVE-2026-2761CVE-2026-2761https://access.redhat.com/security/cve/CVE-2026-2762CVE-2026-2762CVE-2026-2762https://access.redhat.com/security/cve/CVE-2026-2763CVE-2026-2763CVE-2026-2763https://access.redhat.com/security/cve/CVE-2026-2764CVE-2026-2764CVE-2026-2764https://access.redhat.com/security/cve/CVE-2026-2765CVE-2026-2765CVE-2026-2765https://access.redhat.com/security/cve/CVE-2026-2766CVE-2026-2766CVE-2026-2766https://access.redhat.com/security/cve/CVE-2026-2767CVE-2026-2767CVE-2026-2767https://access.redhat.com/security/cve/CVE-2026-2768CVE-2026-2768CVE-2026-2768https://access.redhat.com/security/cve/CVE-2026-2769CVE-2026-2769CVE-2026-2769https://access.redhat.com/security/cve/CVE-2026-2770CVE-2026-2770CVE-2026-2770https://access.redhat.com/security/cve/CVE-2026-2771CVE-2026-2771CVE-2026-2771https://access.redhat.com/security/cve/CVE-2026-2772CVE-2026-2772CVE-2026-2772https://access.redhat.com/security/cve/CVE-2026-2773CVE-2026-2773CVE-2026-2773https://access.redhat.com/security/cve/CVE-2026-2774CVE-2026-2774CVE-2026-2774https://access.redhat.com/security/cve/CVE-2026-2775CVE-2026-2775CVE-2026-2775https://access.redhat.com/security/cve/CVE-2026-2776CVE-2026-2776CVE-2026-2776https://access.redhat.com/security/cve/CVE-2026-2777CVE-2026-2777CVE-2026-2777https://access.redhat.com/security/cve/CVE-2026-2778CVE-2026-2778CVE-2026-2778https://access.redhat.com/security/cve/CVE-2026-2779CVE-2026-2779CVE-2026-2779https://access.redhat.com/security/cve/CVE-2026-2780CVE-2026-2780CVE-2026-2780https://access.redhat.com/security/cve/CVE-2026-2781CVE-2026-2781CVE-2026-2781https://access.redhat.com/security/cve/CVE-2026-2782CVE-2026-2782CVE-2026-2782https://access.redhat.com/security/cve/CVE-2026-2783CVE-2026-2783CVE-2026-2783https://access.redhat.com/security/cve/CVE-2026-2784CVE-2026-2784CVE-2026-2784https://access.redhat.com/security/cve/CVE-2026-2785CVE-2026-2785CVE-2026-2785https://access.redhat.com/security/cve/CVE-2026-2786CVE-2026-2786CVE-2026-2786https://access.redhat.com/security/cve/CVE-2026-2787CVE-2026-2787CVE-2026-2787https://access.redhat.com/security/cve/CVE-2026-2788CVE-2026-2788CVE-2026-2788https://access.redhat.com/security/cve/CVE-2026-2789CVE-2026-2789CVE-2026-2789https://access.redhat.com/security/cve/CVE-2026-2790CVE-2026-2790CVE-2026-2790https://access.redhat.com/security/cve/CVE-2026-2791CVE-2026-2791CVE-2026-2791https://access.redhat.com/security/cve/CVE-2026-2792CVE-2026-2792CVE-2026-2792https://access.redhat.com/security/cve/CVE-2026-2793CVE-2026-2793CVE-2026-2793https://bugzilla.redhat.com/24402192440219https://bugzilla.redhat.com/24422842442284https://bugzilla.redhat.com/24422872442287https://bugzilla.redhat.com/24422882442288https://bugzilla.redhat.com/24422902442290https://bugzilla.redhat.com/24422912442291https://bugzilla.redhat.com/24422922442292https://bugzilla.redhat.com/24422942442294https://bugzilla.redhat.com/24422952442295https://bugzilla.redhat.com/24422972442297https://bugzilla.redhat.com/24422982442298https://bugzilla.redhat.com/24423002442300https://bugzilla.redhat.com/24423022442302https://bugzilla.redhat.com/24423042442304https://bugzilla.redhat.com/24423072442307https://bugzilla.redhat.com/24423082442308https://bugzilla.redhat.com/24423092442309https://bugzilla.redhat.com/24423122442312https://bugzilla.redhat.com/24423132442313https://bugzilla.redhat.com/24423142442314https://bugzilla.redhat.com/24423162442316https://bugzilla.redhat.com/24423182442318https://bugzilla.redhat.com/24423192442319https://bugzilla.redhat.com/24423202442320https://bugzilla.redhat.com/24423222442322https://bugzilla.redhat.com/24423242442324https://bugzilla.redhat.com/24423252442325https://bugzilla.redhat.com/24423262442326https://bugzilla.redhat.com/24423272442327https://bugzilla.redhat.com/24423282442328https://bugzilla.redhat.com/24423292442329https://bugzilla.redhat.com/24423312442331https://bugzilla.redhat.com/24423332442333https://bugzilla.redhat.com/24423342442334https://bugzilla.redhat.com/24423352442335https://bugzilla.redhat.com/24423372442337https://bugzilla.redhat.com/24423422442342https://bugzilla.redhat.com/24423432442343https://errata.almalinux.org/9/ALSA-2026-3339.htmlALSA-2026:3339ALSA-2026:3339
P�firefox-x11-140.8.0-2.el9_7.alma.1.x86_64.rpm8�firefox-140.8.0-2.el9_7.alma.1.x86_64.rpmP�firefox-x11-140.8.0-2.el9_7.alma.1.x86_64.rpm8�firefox-140.8.0-2.el9_7.alma.1.x86_64.rpm�̀�@�k	��5��qBBsecurityImportant: skopeo security update���https://access.redhat.com/errata/RHSA-2026:3340RHSA-2026:3340RHSA-2026:3340https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3340.htmlALSA-2026:3340ALSA-2026:3340
�c�;skopeo-1.20.0-3.el9_7.x86_64.rpm�d�;skopeo-tests-1.20.0-3.el9_7.x86_64.rpm�c�;skopeo-1.20.0-3.el9_7.x86_64.rpm�d�;skopeo-tests-1.20.0-3.el9_7.x86_64.rpm�͖�I�l	��8��vsecurityImportant: containernetworking-plugins security update��)�Ohttps://access.redhat.com/errata/RHSA-2026:3341RHSA-2026:3341RHSA-2026:3341https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3341.htmlALSA-2026:3341ALSA-2026:3341
�_�!containernetworking-plugins-1.7.1-3.el9_7.x86_64.rpm�_�!containernetworking-plugins-1.7.1-3.el9_7.x86_64.rpm�͖�I�m	��;��ysecurityImportant: python-pyasn1 security update��x�]https://access.redhat.com/errata/RHSA-2026:3359RHSA-2026:3359RHSA-2026:3359https://access.redhat.com/security/cve/CVE-2026-23490CVE-2026-23490CVE-2026-23490https://bugzilla.redhat.com/24304722430472https://errata.almalinux.org/9/ALSA-2026-3359.htmlALSA-2026:3359ALSA-2026:3359
�A�
python3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpm�@�
python3-pyasn1-0.4.8-7.el9_7.noarch.rpm�A�
python3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpm�@�
python3-pyasn1-0.4.8-7.el9_7.noarch.rpm�̀�H�n	��?��|BsecurityImportant: libpng security update��U�6https://access.redhat.com/errata/RHSA-2026:3405RHSA-2026:3405RHSA-2026:3405https://access.redhat.com/security/cve/CVE-2026-22695CVE-2026-22695CVE-2026-22695https://access.redhat.com/security/cve/CVE-2026-22801CVE-2026-22801CVE-2026-22801https://access.redhat.com/security/cve/CVE-2026-25646CVE-2026-25646CVE-2026-25646https://bugzilla.redhat.com/24288242428824https://bugzilla.redhat.com/24288252428825https://bugzilla.redhat.com/24385422438542https://errata.almalinux.org/9/ALSA-2026-3405.htmlALSA-2026:3405ALSA-2026:3405
�6�llibpng-devel-1.6.37-12.el9_7.2.x86_64.rpm�6�llibpng-devel-1.6.37-12.el9_7.2.i686.rpm�6�llibpng-devel-1.6.37-12.el9_7.2.x86_64.rpm�6�llibpng-devel-1.6.37-12.el9_7.2.i686.rpm�͖��o	����@BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update���Zhttps://access.redhat.com/errata/RHSA-2026:3488RHSA-2026:3488RHSA-2026:3488https://access.redhat.com/security/cve/CVE-2025-40168CVE-2025-40168CVE-2025-40168https://access.redhat.com/security/cve/CVE-2025-71085CVE-2025-71085CVE-2025-71085https://access.redhat.com/security/cve/CVE-2026-23097CVE-2026-23097CVE-2026-23097https://bugzilla.redhat.com/24144822414482https://bugzilla.redhat.com/24290262429026https://bugzilla.redhat.com/24368022436802https://errata.almalinux.org/9/ALSA-2026-3488.htmlALSA-2026:3488ALSA-2026:3488

+�xrv-5.14.0-611.36.1.el9_7.x86_64.rpm%�xkernel-devel-5.14.0-611.36.1.el9_7.x86_64.rpm#�xkernel-debug-devel-5.14.0-611.36.1.el9_7.x86_64.rpm'�xperf-5.14.0-611.36.1.el9_7.x86_64.rpm$�xkernel-debug-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpm(�xkernel-headers-5.14.0-611.36.1.el9_7.x86_64.rpm;�xpython3-perf-5.14.0-611.36.1.el9_7.x86_64.rpm&�xkernel-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpm�xkernel-doc-5.14.0-611.36.1.el9_7.noarch.rpm)�xrtla-5.14.0-611.36.1.el9_7.x86_64.rpm
+�xrv-5.14.0-611.36.1.el9_7.x86_64.rpm%�xkernel-devel-5.14.0-611.36.1.el9_7.x86_64.rpm#�xkernel-debug-devel-5.14.0-611.36.1.el9_7.x86_64.rpm'�xperf-5.14.0-611.36.1.el9_7.x86_64.rpm$�xkernel-debug-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpm(�xkernel-headers-5.14.0-611.36.1.el9_7.x86_64.rpm;�xpython3-perf-5.14.0-611.36.1.el9_7.x86_64.rpm&�xkernel-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpm�xkernel-doc-5.14.0-611.36.1.el9_7.noarch.rpm)�xrtla-5.14.0-611.36.1.el9_7.x86_64.rpm�͠�V�p	����TBBsecurityImportant: valkey security update��e�https://access.redhat.com/errata/RHSA-2026:3507RHSA-2026:3507RHSA-2026:3507https://access.redhat.com/security/cve/CVE-2025-67733CVE-2025-67733CVE-2025-67733https://access.redhat.com/security/cve/CVE-2026-21863CVE-2026-21863CVE-2026-21863https://bugzilla.redhat.com/24420252442025https://bugzilla.redhat.com/24420262442026https://errata.almalinux.org/9/ALSA-2026-3507.htmlALSA-2026:3507ALSA-2026:3507
��ivalkey-8.0.7-1.el9_7.x86_64.rpm� �ivalkey-devel-8.0.7-1.el9_7.x86_64.rpm��ivalkey-8.0.7-1.el9_7.x86_64.rpm� �ivalkey-devel-8.0.7-1.el9_7.x86_64.rpm�͠�U�q	����YsecurityImportant: thunderbird security update���Nhttps://access.redhat.com/errata/RHSA-2026:3516RHSA-2026:3516RHSA-2026:3516https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://access.redhat.com/security/cve/CVE-2026-2757CVE-2026-2757CVE-2026-2757https://access.redhat.com/security/cve/CVE-2026-2758CVE-2026-2758CVE-2026-2758https://access.redhat.com/security/cve/CVE-2026-2759CVE-2026-2759CVE-2026-2759https://access.redhat.com/security/cve/CVE-2026-2760CVE-2026-2760CVE-2026-2760https://access.redhat.com/security/cve/CVE-2026-2761CVE-2026-2761CVE-2026-2761https://access.redhat.com/security/cve/CVE-2026-2762CVE-2026-2762CVE-2026-2762https://access.redhat.com/security/cve/CVE-2026-2763CVE-2026-2763CVE-2026-2763https://access.redhat.com/security/cve/CVE-2026-2764CVE-2026-2764CVE-2026-2764https://access.redhat.com/security/cve/CVE-2026-2765CVE-2026-2765CVE-2026-2765https://access.redhat.com/security/cve/CVE-2026-2766CVE-2026-2766CVE-2026-2766https://access.redhat.com/security/cve/CVE-2026-2767CVE-2026-2767CVE-2026-2767https://access.redhat.com/security/cve/CVE-2026-2768CVE-2026-2768CVE-2026-2768https://access.redhat.com/security/cve/CVE-2026-2769CVE-2026-2769CVE-2026-2769https://access.redhat.com/security/cve/CVE-2026-2770CVE-2026-2770CVE-2026-2770https://access.redhat.com/security/cve/CVE-2026-2771CVE-2026-2771CVE-2026-2771https://access.redhat.com/security/cve/CVE-2026-2772CVE-2026-2772CVE-2026-2772https://access.redhat.com/security/cve/CVE-2026-2773CVE-2026-2773CVE-2026-2773https://access.redhat.com/security/cve/CVE-2026-2774CVE-2026-2774CVE-2026-2774https://access.redhat.com/security/cve/CVE-2026-2775CVE-2026-2775CVE-2026-2775https://access.redhat.com/security/cve/CVE-2026-2776CVE-2026-2776CVE-2026-2776https://access.redhat.com/security/cve/CVE-2026-2777CVE-2026-2777CVE-2026-2777https://access.redhat.com/security/cve/CVE-2026-2778CVE-2026-2778CVE-2026-2778https://access.redhat.com/security/cve/CVE-2026-2779CVE-2026-2779CVE-2026-2779https://access.redhat.com/security/cve/CVE-2026-2780CVE-2026-2780CVE-2026-2780https://access.redhat.com/security/cve/CVE-2026-2781CVE-2026-2781CVE-2026-2781https://access.redhat.com/security/cve/CVE-2026-2782CVE-2026-2782CVE-2026-2782https://access.redhat.com/security/cve/CVE-2026-2783CVE-2026-2783CVE-2026-2783https://access.redhat.com/security/cve/CVE-2026-2784CVE-2026-2784CVE-2026-2784https://access.redhat.com/security/cve/CVE-2026-2785CVE-2026-2785CVE-2026-2785https://access.redhat.com/security/cve/CVE-2026-2786CVE-2026-2786CVE-2026-2786https://access.redhat.com/security/cve/CVE-2026-2787CVE-2026-2787CVE-2026-2787https://access.redhat.com/security/cve/CVE-2026-2788CVE-2026-2788CVE-2026-2788https://access.redhat.com/security/cve/CVE-2026-2789CVE-2026-2789CVE-2026-2789https://access.redhat.com/security/cve/CVE-2026-2790CVE-2026-2790CVE-2026-2790https://access.redhat.com/security/cve/CVE-2026-2791CVE-2026-2791CVE-2026-2791https://access.redhat.com/security/cve/CVE-2026-2792CVE-2026-2792CVE-2026-2792https://access.redhat.com/security/cve/CVE-2026-2793CVE-2026-2793CVE-2026-2793https://bugzilla.redhat.com/24402192440219https://bugzilla.redhat.com/24422842442284https://bugzilla.redhat.com/24422872442287https://bugzilla.redhat.com/24422882442288https://bugzilla.redhat.com/24422902442290https://bugzilla.redhat.com/24422912442291https://bugzilla.redhat.com/24422922442292https://bugzilla.redhat.com/24422942442294https://bugzilla.redhat.com/24422952442295https://bugzilla.redhat.com/24422972442297https://bugzilla.redhat.com/24422982442298https://bugzilla.redhat.com/24423002442300https://bugzilla.redhat.com/24423022442302https://bugzilla.redhat.com/24423042442304https://bugzilla.redhat.com/24423072442307https://bugzilla.redhat.com/24423082442308https://bugzilla.redhat.com/24423092442309https://bugzilla.redhat.com/24423122442312https://bugzilla.redhat.com/24423132442313https://bugzilla.redhat.com/24423142442314https://bugzilla.redhat.com/24423162442316https://bugzilla.redhat.com/24423182442318https://bugzilla.redhat.com/24423192442319https://bugzilla.redhat.com/24423202442320https://bugzilla.redhat.com/24423222442322https://bugzilla.redhat.com/24423242442324https://bugzilla.redhat.com/24423252442325https://bugzilla.redhat.com/24423262442326https://bugzilla.redhat.com/24423272442327https://bugzilla.redhat.com/24423282442328https://bugzilla.redhat.com/24423292442329https://bugzilla.redhat.com/24423312442331https://bugzilla.redhat.com/24423332442333https://bugzilla.redhat.com/24423342442334https://bugzilla.redhat.com/24423352442335https://bugzilla.redhat.com/24423372442337https://bugzilla.redhat.com/24423422442342https://bugzilla.redhat.com/24423432442343https://errata.almalinux.org/9/ALSA-2026-3516.htmlALSA-2026:3516ALSA-2026:3516
9�thunderbird-140.8.0-1.el9_7.alma.1.x86_64.rpm9�thunderbird-140.8.0-1.el9_7.alma.1.x86_64.rpm�͠�4�r	��.��\BBBBBBBBBBBBBBBBsecurityModerate: nginx:1.24 security update���Lhttps://access.redhat.com/errata/RHSA-2026:3638RHSA-2026:3638RHSA-2026:3638https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-3638.htmlALSA-2026:3638ALSA-2026:3638
�O��k*
��nginx-mod-http-xslt-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-http-perl-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-mail-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-devel-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm�H�nginx-filesystem-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpm�G�nginx-all-modules-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpm�v�nginx-mod-stream-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-core-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-http-image-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm�O�nginx-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm�O��k*
��nginx-mod-http-xslt-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-http-perl-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-mail-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-devel-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm�H�nginx-filesystem-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpm�G�nginx-all-modules-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpm�v�nginx-mod-stream-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-core-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm��nginx-mod-http-image-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm�O�nginx-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm�͠��s	��5��oBBBBsecurityImportant: go-rpm-macros security update��L�https://access.redhat.com/errata/RHSA-2026:3668RHSA-2026:3668RHSA-2026:3668https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://bugzilla.redhat.com/24344322434432https://errata.almalinux.org/9/ALSA-2026-3668.htmlALSA-2026:3668ALSA-2026:3668
�x�{go-filesystem-3.6.0-13.el9_7.x86_64.rpm�X�{go-srpm-macros-3.6.0-13.el9_7.noarch.rpm�y�{go-rpm-macros-3.6.0-13.el9_7.x86_64.rpm�W�{go-rpm-templates-3.6.0-13.el9_7.noarch.rpm�x�{go-filesystem-3.6.0-13.el9_7.x86_64.rpm�X�{go-srpm-macros-3.6.0-13.el9_7.noarch.rpm�y�{go-rpm-macros-3.6.0-13.el9_7.x86_64.rpm�W�{go-rpm-templates-3.6.0-13.el9_7.noarch.rpm�͠��t	����vBBBBBBBBBBBBBBsecurityImportant: postgresql security update��^�https://access.redhat.com/errata/RHSA-2026:3730RHSA-2026:3730RHSA-2026:3730https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-3730.htmlALSA-2026:3730ALSA-2026:3730
��?postgresql-pltcl-13.23-2.el9_7.x86_64.rpm��?postgresql-server-13.23-2.el9_7.x86_64.rpm��?postgresql-plpython3-13.23-2.el9_7.x86_64.rpm��?postgresql-plperl-13.23-2.el9_7.x86_64.rpmZ�?postgresql-13.23-2.el9_7.x86_64.rpm��?postgresql-private-libs-13.23-2.el9_7.x86_64.rpm��?postgresql-contrib-13.23-2.el9_7.x86_64.rpm��?postgresql-upgrade-13.23-2.el9_7.x86_64.rpm��?postgresql-pltcl-13.23-2.el9_7.x86_64.rpm��?postgresql-server-13.23-2.el9_7.x86_64.rpm��?postgresql-plpython3-13.23-2.el9_7.x86_64.rpm��?postgresql-plperl-13.23-2.el9_7.x86_64.rpmZ�?postgresql-13.23-2.el9_7.x86_64.rpm��?postgresql-private-libs-13.23-2.el9_7.x86_64.rpm��?postgresql-contrib-13.23-2.el9_7.x86_64.rpm��?postgresql-upgrade-13.23-2.el9_7.x86_64.rpm���c�u	��
��GBBBBsecurityImportant: osbuild-composer security update��c�{
https://access.redhat.com/errata/RHSA-2026:3753RHSA-2026:3753RHSA-2026:3753https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3753.htmlALSA-2026:3753ALSA-2026:3753
�y�xosbuild-composer-worker-149-4.el9_7.alma.3.x86_64.rpm�w�xosbuild-composer-149-4.el9_7.alma.3.x86_64.rpm�x�xosbuild-composer-core-149-4.el9_7.alma.3.x86_64.rpm�y�xosbuild-composer-worker-149-4.el9_7.alma.3.x86_64.rpm�w�xosbuild-composer-149-4.el9_7.alma.3.x86_64.rpm�x�xosbuild-composer-core-149-4.el9_7.alma.3.x86_64.rpm���<�v	����NsecurityImportant: image-builder security update��^�thttps://access.redhat.com/errata/RHSA-2026:3839RHSA-2026:3839RHSA-2026:3839https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3839.htmlALSA-2026:3839ALSA-2026:3839
�z�
image-builder-31-3.el9_7.x86_64.rpm�z�
image-builder-31-3.el9_7.x86_64.rpm���N�w	����QsecurityModerate: delve security update��R�ohttps://access.redhat.com/errata/RHSA-2026:3842RHSA-2026:3842RHSA-2026:3842https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3842.htmlALSA-2026:3842ALSA-2026:3842
�q�Wdelve-1.25.2-2.el9_7.x86_64.rpm�q�Wdelve-1.25.2-2.el9_7.x86_64.rpm��ϱ-�x	��1�hBBB�WB��SBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update��A�https://access.redhat.com/errata/RHSA-2026:3896RHSA-2026:3896RHSA-2026:3896https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-3896.htmlALSA-2026:3896ALSA-2026:3896
Z�L�=*�Y�mpg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm�upostgresql-pltcl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�upostgresql-private-libs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�\upostgresql-docs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�upostgresql-plpython3-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�upostgresql-upgrade-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�]upostgresql-private-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�^upostgresql-server-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�9upostgresql-test-rpm-macros-15.17-1.module_el9.7.0+214+91f631df.noarch.rpm�upostgresql-contrib-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�upostgresql-server-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�_upostgresql-static-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmZupostgresql-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�`upostgresql-test-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�upostgresql-plperl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�aupostgresql-upgrade-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmZ�L�=*�Y�mpg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm�upostgresql-pltcl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�Z�[pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm�upostgresql-private-libs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�\upostgresql-docs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�[�]postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm�upostgresql-plpython3-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�upostgresql-upgrade-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�]upostgresql-private-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�^upostgresql-server-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�9upostgresql-test-rpm-macros-15.17-1.module_el9.7.0+214+91f631df.noarch.rpm�upostgresql-contrib-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�upostgresql-server-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�_upostgresql-static-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmZupostgresql-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�`upostgresql-test-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�upostgresql-plperl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm�aupostgresql-upgrade-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm���e�y	��4��rsecurityImportant: git-lfs security update��F�8https://access.redhat.com/errata/RHSA-2026:3928RHSA-2026:3928RHSA-2026:3928https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3928.htmlALSA-2026:3928ALSA-2026:3928
�l�git-lfs-3.6.1-7.el9_7.x86_64.rpm�l�git-lfs-3.6.1-7.el9_7.x86_64.rpm�ͫ�%�z	��9��uBBsecurityModerate: nfs-utils security update��~�@https://access.redhat.com/errata/RHSA-2026:3940RHSA-2026:3940RHSA-2026:3940https://access.redhat.com/security/cve/CVE-2025-12801CVE-2025-12801CVE-2025-12801https://bugzilla.redhat.com/24130812413081https://errata.almalinux.org/9/ALSA-2026-3940.htmlALSA-2026:3940ALSA-2026:3940
��%nfs-utils-coreos-2.5.4-38.el9_7.3.x86_64.rpm�	�%nfsv4-client-utils-2.5.4-38.el9_7.3.x86_64.rpm��%nfs-utils-coreos-2.5.4-38.el9_7.3.x86_64.rpm�	�%nfsv4-client-utils-2.5.4-38.el9_7.3.x86_64.rpm��ϲ �{	��
��zBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��>�https://access.redhat.com/errata/RHSA-2026:3966RHSA-2026:3966RHSA-2026:3966https://access.redhat.com/security/cve/CVE-2025-38106CVE-2025-38106CVE-2025-38106https://access.redhat.com/security/cve/CVE-2026-23001CVE-2026-23001CVE-2026-23001https://bugzilla.redhat.com/23760772376077https://bugzilla.redhat.com/24326642432664https://errata.almalinux.org/9/ALSA-2026-3966.htmlALSA-2026:3966ALSA-2026:3966

(�ykernel-headers-5.14.0-611.38.1.el9_7.x86_64.rpm#�ykernel-debug-devel-5.14.0-611.38.1.el9_7.x86_64.rpm%�ykernel-devel-5.14.0-611.38.1.el9_7.x86_64.rpm&�ykernel-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm+�yrv-5.14.0-611.38.1.el9_7.x86_64.rpm)�yrtla-5.14.0-611.38.1.el9_7.x86_64.rpm'�yperf-5.14.0-611.38.1.el9_7.x86_64.rpm;�ypython3-perf-5.14.0-611.38.1.el9_7.x86_64.rpm$�ykernel-debug-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm�ykernel-doc-5.14.0-611.38.1.el9_7.noarch.rpm
(�ykernel-headers-5.14.0-611.38.1.el9_7.x86_64.rpm#�ykernel-debug-devel-5.14.0-611.38.1.el9_7.x86_64.rpm%�ykernel-devel-5.14.0-611.38.1.el9_7.x86_64.rpm&�ykernel-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm+�yrv-5.14.0-611.38.1.el9_7.x86_64.rpm)�yrtla-5.14.0-611.38.1.el9_7.x86_64.rpm'�yperf-5.14.0-611.38.1.el9_7.x86_64.rpm;�ypython3-perf-5.14.0-611.38.1.el9_7.x86_64.rpm$�ykernel-debug-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm�ykernel-doc-5.14.0-611.38.1.el9_7.noarch.rpm����|	��+�lBBB�OBBB�BBBBBBBBBB��EBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update��O�	https://access.redhat.com/errata/RHSA-2026:4110RHSA-2026:4110RHSA-2026:4110https://access.redhat.com/security/cve/CVE-2026-2003CVE-2026-2003CVE-2026-2003https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-4110.htmlALSA-2026:4110ALSA-2026:4110
Z�_�>*��lpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�|postgresql-server-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm��lpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�L�fpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm�9|postgresql-test-rpm-macros-16.13-1.module_el9.7.0+213+65e1da69.noarch.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�|postgresql-contrib-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�`|postgresql-test-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm��lpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm��lpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�|postgresql-upgrade-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�^|postgresql-server-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�|postgresql-pltcl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�|postgresql-plpython3-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�a|postgresql-upgrade-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�]|postgresql-private-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�Y�npg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmZ|postgresql-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�\|postgresql-docs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�_|postgresql-static-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm��lpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�|postgresql-plperl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�|postgresql-private-libs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmZ�_�>*��lpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�|postgresql-server-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm��lpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�L�fpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm�9|postgresql-test-rpm-macros-16.13-1.module_el9.7.0+213+65e1da69.noarch.rpm�[�cpostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm�|postgresql-contrib-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�Z�`pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm�`|postgresql-test-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm��lpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm��lpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�|postgresql-upgrade-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�^|postgresql-server-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�|postgresql-pltcl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�|postgresql-plpython3-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�a|postgresql-upgrade-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�]|postgresql-private-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�Y�npg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmZ|postgresql-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�\|postgresql-docs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�_|postgresql-static-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm��lpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm�|postgresql-plperl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm�|postgresql-private-libs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm���I�}	��6��lBBBBBBBBsecurityModerate: python3.12 security update��T�`https://access.redhat.com/errata/RHSA-2026:4165RHSA-2026:4165RHSA-2026:4165https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4165.htmlALSA-2026:4165ALSA-2026:4165
��4python3.12-devel-3.12.12-4.el9_7.1.i686.rpm��4python3.12-tkinter-3.12.12-4.el9_7.1.x86_64.rpm��4python3.12-libs-3.12.12-4.el9_7.1.i686.rpm��4python3.12-libs-3.12.12-4.el9_7.1.x86_64.rpm��4python3.12-devel-3.12.12-4.el9_7.1.x86_64.rpm��4python3.12-3.12.12-4.el9_7.1.x86_64.rpm��4python3.12-devel-3.12.12-4.el9_7.1.i686.rpm��4python3.12-tkinter-3.12.12-4.el9_7.1.x86_64.rpm��4python3.12-libs-3.12.12-4.el9_7.1.i686.rpm��4python3.12-libs-3.12.12-4.el9_7.1.x86_64.rpm��4python3.12-devel-3.12.12-4.el9_7.1.x86_64.rpm��4python3.12-3.12.12-4.el9_7.1.x86_64.rpm���Z�~	��=��wBBBBsecurityModerate: python3.9 security update��4�`	https://access.redhat.com/errata/RHSA-2026:4168RHSA-2026:4168RHSA-2026:4168https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4168.htmlALSA-2026:4168ALSA-2026:4168
https://www.redhat.com/security/data/cve/CVE-2025-15366.htmlCVE-2025-15366CVE-2025-15366https://www.redhat.com/security/data/cve/CVE-2025-15367.htmlCVE-2025-15367CVE-2025-15367https://www.redhat.com/security/data/cve/CVE-2026-0865.htmlCVE-2026-0865CVE-2026-0865https://www.redhat.com/security/data/cve/CVE-2026-1299.htmlCVE-2026-1299CVE-2026-1299Q�python3-devel-3.9.25-3.el9_7.1.i686.rpm�+�python3-tkinter-3.9.25-3.el9_7.1.x86_64.rpmQ�python3-devel-3.9.25-3.el9_7.1.x86_64.rpmf�python-unversioned-command-3.9.25-3.el9_7.1.noarch.rpmQ�python3-devel-3.9.25-3.el9_7.1.i686.rpm�+�python3-tkinter-3.9.25-3.el9_7.1.x86_64.rpmQ�python3-devel-3.9.25-3.el9_7.1.x86_64.rpmf�python-unversioned-command-3.9.25-3.el9_7.1.noarch.rpm��ϰ(�	����~BBBsecurityImportant: gimp security update���Ehttps://access.redhat.com/errata/RHSA-2026:4173RHSA-2026:4173RHSA-2026:4173https://access.redhat.com/security/cve/CVE-2026-0797CVE-2026-0797CVE-2026-0797https://access.redhat.com/security/cve/CVE-2026-2044CVE-2026-2044CVE-2026-2044https://access.redhat.com/security/cve/CVE-2026-2045CVE-2026-2045CVE-2026-2045https://access.redhat.com/security/cve/CVE-2026-2047CVE-2026-2047CVE-2026-2047https://access.redhat.com/security/cve/CVE-2026-2048CVE-2026-2048CVE-2026-2048https://bugzilla.redhat.com/24415172441517https://bugzilla.redhat.com/24415212441521https://bugzilla.redhat.com/24415222441522https://bugzilla.redhat.com/24415242441524https://bugzilla.redhat.com/24415272441527https://errata.almalinux.org/9/ALSA-2026-4173.htmlALSA-2026:4173ALSA-2026:4173
�J�gimp-libs-3.0.4-1.el9_7.4.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.4.i686.rpm�?�gimp-3.0.4-1.el9_7.4.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.4.x86_64.rpm�J�gimp-libs-3.0.4-1.el9_7.4.i686.rpm�?�gimp-3.0.4-1.el9_7.4.x86_64.rpm���+�	����DsecurityImportant: opentelemetry-collector security update��Y�Rhttps://access.redhat.com/errata/RHSA-2026:4177RHSA-2026:4177RHSA-2026:4177https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-4177.htmlALSA-2026:4177ALSA-2026:4177
�I�;opentelemetry-collector-0.144.0-1.el9_7.x86_64.rpm�I�;opentelemetry-collector-0.144.0-1.el9_7.x86_64.rpm��ϯ�	����GBBBBBBBBBsecurityModerate: gnutls security update��+�Thttps://access.redhat.com/errata/RHSA-2026:4188RHSA-2026:4188RHSA-2026:4188https://access.redhat.com/security/cve/CVE-2025-14831CVE-2025-14831CVE-2025-14831https://access.redhat.com/security/cve/CVE-2025-9820CVE-2025-9820CVE-2025-9820https://bugzilla.redhat.com/23925282392528https://bugzilla.redhat.com/24231772423177https://errata.almalinux.org/9/ALSA-2026-4188.htmlALSA-2026:4188ALSA-2026:4188
�a�gnutls-c++-3.8.3-10.el9_7.x86_64.rpm�)�gnutls-utils-3.8.3-10.el9_7.x86_64.rpm�a�gnutls-c++-3.8.3-10.el9_7.i686.rpm�c�gnutls-devel-3.8.3-10.el9_7.i686.rpm�b�gnutls-dane-3.8.3-10.el9_7.i686.rpm�b�gnutls-dane-3.8.3-10.el9_7.x86_64.rpm�c�gnutls-devel-3.8.3-10.el9_7.x86_64.rpm�a�gnutls-c++-3.8.3-10.el9_7.x86_64.rpm�)�gnutls-utils-3.8.3-10.el9_7.x86_64.rpm�a�gnutls-c++-3.8.3-10.el9_7.i686.rpm�c�gnutls-devel-3.8.3-10.el9_7.i686.rpm�b�gnutls-dane-3.8.3-10.el9_7.i686.rpm�b�gnutls-dane-3.8.3-10.el9_7.x86_64.rpm�c�gnutls-devel-3.8.3-10.el9_7.x86_64.rpm��Ϯ7�	����SBBBBBBBBsecurityModerate: python3.11 security update���`https://access.redhat.com/errata/RHSA-2026:4216RHSA-2026:4216RHSA-2026:4216https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4216.htmlALSA-2026:4216ALSA-2026:4216
\� python3.11-libs-3.11.13-5.1.el9_7.x86_64.rpm�Q� python3.11-tkinter-3.11.13-5.1.el9_7.x86_64.rpm�P� python3.11-3.11.13-5.1.el9_7.x86_64.rpm[� python3.11-devel-3.11.13-5.1.el9_7.i686.rpm\� python3.11-libs-3.11.13-5.1.el9_7.i686.rpm[� python3.11-devel-3.11.13-5.1.el9_7.x86_64.rpm\� python3.11-libs-3.11.13-5.1.el9_7.x86_64.rpm�Q� python3.11-tkinter-3.11.13-5.1.el9_7.x86_64.rpm�P� python3.11-3.11.13-5.1.el9_7.x86_64.rpm[� python3.11-devel-3.11.13-5.1.el9_7.i686.rpm\� python3.11-libs-3.11.13-5.1.el9_7.i686.rpm[� python3.11-devel-3.11.13-5.1.el9_7.x86_64.rpm��ϭ;�	��0��^BBBBBBBBBBBBBBBBsecurityModerate: nginx:1.26 security update��_�Lhttps://access.redhat.com/errata/RHSA-2026:4235RHSA-2026:4235RHSA-2026:4235https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-4235.htmlALSA-2026:4235ALSA-2026:4235
�O�X�l*
�v�nginx-mod-stream-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-mail-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-devel-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-http-image-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm�G�nginx-all-modules-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpm�H�nginx-filesystem-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpm��nginx-core-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-http-perl-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-http-xslt-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm�O�nginx-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm�O�X�l*
�v�nginx-mod-stream-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-mail-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-devel-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-http-image-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm�G�nginx-all-modules-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpm�H�nginx-filesystem-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpm��nginx-core-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-http-perl-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��nginx-mod-http-xslt-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm�O�nginx-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm��ŜG�	����qBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 10.0 security update��+�*https://access.redhat.com/errata/RHSA-2026:4445RHSA-2026:4445RHSA-2026:4445https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4445.htmlALSA-2026:4445ALSA-2026:4445

��Jdotnet-sdk-aot-10.0-10.0.104-1.el9_7.x86_64.rpm��Jdotnet-sdk-dbg-10.0-10.0.104-1.el9_7.x86_64.rpm��dotnet-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm��Jdotnet-sdk-10.0-10.0.104-1.el9_7.x86_64.rpm�x�aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm�w�aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm�
�dotnet-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm�!�dotnet-host-10.0.4-1.el9_7.x86_64.rpm��dotnet-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm��Jdotnet-templates-10.0-10.0.104-1.el9_7.x86_64.rpm��dotnet-hostfxr-10.0-10.0.4-1.el9_7.x86_64.rpm�v�aspnetcore-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm��dotnet-apphost-pack-10.0-10.0.4-1.el9_7.x86_64.rpm
��Jdotnet-sdk-aot-10.0-10.0.104-1.el9_7.x86_64.rpm��Jdotnet-sdk-dbg-10.0-10.0.104-1.el9_7.x86_64.rpm��dotnet-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm��Jdotnet-sdk-10.0-10.0.104-1.el9_7.x86_64.rpm�x�aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm�w�aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm�
�dotnet-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm�!�dotnet-host-10.0.4-1.el9_7.x86_64.rpm��dotnet-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm��Jdotnet-templates-10.0-10.0.104-1.el9_7.x86_64.rpm��dotnet-hostfxr-10.0-10.0.4-1.el9_7.x86_64.rpm�v�aspnetcore-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm��dotnet-apphost-pack-10.0-10.0.4-1.el9_7.x86_64.rpm����@�	����LBsecurityImportant: libvpx security update��U�9https://access.redhat.com/errata/RHSA-2026:4447RHSA-2026:4447RHSA-2026:4447https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://bugzilla.redhat.com/24402192440219https://errata.almalinux.org/9/ALSA-2026-4447.htmlALSA-2026:4447ALSA-2026:4447
�7�=libvpx-1.9.0-10.el9_7.i686.rpm�7�=libvpx-1.9.0-10.el9_7.x86_64.rpm�7�=libvpx-1.9.0-10.el9_7.i686.rpm�7�=libvpx-1.9.0-10.el9_7.x86_64.rpm����H�	��&��PBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update���_https://access.redhat.com/errata/RHSA-2026:4454RHSA-2026:4454RHSA-2026:4454https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4454.htmlALSA-2026:4454ALSA-2026:4454
�`�Idotnet-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.125-1.el9_7.x86_64.rpm�|�dotnet-templates-8.0-8.0.125-1.el9_7.x86_64.rpm�u�Iaspnetcore-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm�w�Idotnet-apphost-pack-8.0-8.0.25-1.el9_7.x86_64.rpm�v�Iaspnetcore-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm�z�dotnet-sdk-8.0-8.0.125-1.el9_7.x86_64.rpm�{�Idotnet-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm�x�Idotnet-hostfxr-8.0-8.0.25-1.el9_7.x86_64.rpm�Y�Iaspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm�y�Idotnet-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm�`�Idotnet-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.125-1.el9_7.x86_64.rpm�|�dotnet-templates-8.0-8.0.125-1.el9_7.x86_64.rpm�u�Iaspnetcore-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm�w�Idotnet-apphost-pack-8.0-8.0.25-1.el9_7.x86_64.rpm�v�Iaspnetcore-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm�z�dotnet-sdk-8.0-8.0.125-1.el9_7.x86_64.rpm�{�Idotnet-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm�x�Idotnet-hostfxr-8.0-8.0.25-1.el9_7.x86_64.rpm�Y�Iaspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm�y�Idotnet-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm��Ϭ'�	����gBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update��m�)https://access.redhat.com/errata/RHSA-2026:4456RHSA-2026:4456RHSA-2026:4456https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4456.htmlALSA-2026:4456ALSA-2026:4456

�(�Kaspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm�0�Kdotnet-apphost-pack-9.0-9.0.14-1.el9_7.x86_64.rpm�5�}dotnet-sdk-aot-9.0-9.0.115-1.el9_7.x86_64.rpm�6�}dotnet-sdk-dbg-9.0-9.0.115-1.el9_7.x86_64.rpm�)�Kaspnetcore-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm�2�Kdotnet-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm�8�}dotnet-templates-9.0-9.0.115-1.el9_7.x86_64.rpm�'�Kaspnetcore-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm�7�Kdotnet-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm�"�}netstandard-targeting-pack-2.1-9.0.115-1.el9_7.x86_64.rpm�3�Kdotnet-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm�4�}dotnet-sdk-9.0-9.0.115-1.el9_7.x86_64.rpm�1�Kdotnet-hostfxr-9.0-9.0.14-1.el9_7.x86_64.rpm
�(�Kaspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm�0�Kdotnet-apphost-pack-9.0-9.0.14-1.el9_7.x86_64.rpm�5�}dotnet-sdk-aot-9.0-9.0.115-1.el9_7.x86_64.rpm�6�}dotnet-sdk-dbg-9.0-9.0.115-1.el9_7.x86_64.rpm�)�Kaspnetcore-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm�2�Kdotnet-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm�8�}dotnet-templates-9.0-9.0.115-1.el9_7.x86_64.rpm�'�Kaspnetcore-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm�7�Kdotnet-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm�"�}netstandard-targeting-pack-2.1-9.0.115-1.el9_7.x86_64.rpm�3�Kdotnet-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm�4�}dotnet-sdk-9.0-9.0.115-1.el9_7.x86_64.rpm�1�Kdotnet-hostfxr-9.0-9.0.14-1.el9_7.x86_64.rpm����$�	����BBsecurityModerate: compat-openssl11 security update���'https://access.redhat.com/errata/RHSA-2026:4472RHSA-2026:4472RHSA-2026:4472https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://bugzilla.redhat.com/24303862430386https://errata.almalinux.org/9/ALSA-2026-4472.htmlALSA-2026:4472ALSA-2026:4472
�!�Ccompat-openssl11-1.1.1k-5.el9_7.1.i686.rpm�!�Ccompat-openssl11-1.1.1k-5.el9_7.1.x86_64.rpm�!�Ccompat-openssl11-1.1.1k-5.el9_7.1.i686.rpm�!�Ccompat-openssl11-1.1.1k-5.el9_7.1.x86_64.rpm���� �		����FBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��=�https://access.redhat.com/errata/RHSA-2026:4759RHSA-2026:4759RHSA-2026:4759https://access.redhat.com/security/cve/CVE-2025-39818CVE-2025-39818CVE-2025-39818https://access.redhat.com/security/cve/CVE-2025-68800CVE-2025-68800CVE-2025-68800https://bugzilla.redhat.com/23957972395797https://bugzilla.redhat.com/24290652429065https://errata.almalinux.org/9/ALSA-2026-4759.htmlALSA-2026:4759ALSA-2026:4759

�zkernel-doc-5.14.0-611.41.1.el9_7.noarch.rpm%�zkernel-devel-5.14.0-611.41.1.el9_7.x86_64.rpm$�zkernel-debug-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpm'�zperf-5.14.0-611.41.1.el9_7.x86_64.rpm+�zrv-5.14.0-611.41.1.el9_7.x86_64.rpm;�zpython3-perf-5.14.0-611.41.1.el9_7.x86_64.rpm(�zkernel-headers-5.14.0-611.41.1.el9_7.x86_64.rpm)�zrtla-5.14.0-611.41.1.el9_7.x86_64.rpm#�zkernel-debug-devel-5.14.0-611.41.1.el9_7.x86_64.rpm&�zkernel-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpm
�zkernel-doc-5.14.0-611.41.1.el9_7.noarch.rpm%�zkernel-devel-5.14.0-611.41.1.el9_7.x86_64.rpm$�zkernel-debug-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpm'�zperf-5.14.0-611.41.1.el9_7.x86_64.rpm+�zrv-5.14.0-611.41.1.el9_7.x86_64.rpm;�zpython3-perf-5.14.0-611.41.1.el9_7.x86_64.rpm(�zkernel-headers-5.14.0-611.41.1.el9_7.x86_64.rpm)�zrtla-5.14.0-611.41.1.el9_7.x86_64.rpm#�zkernel-debug-devel-5.14.0-611.41.1.el9_7.x86_64.rpm&�zkernel-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpm����o�
	��$��ZBBBBBBBBsecurityModerate: mysql security update��A�Ahttps://access.redhat.com/errata/RHSA-2026:4828RHSA-2026:4828RHSA-2026:4828https://access.redhat.com/security/cve/CVE-2026-21936CVE-2026-21936CVE-2026-21936https://access.redhat.com/security/cve/CVE-2026-21937CVE-2026-21937CVE-2026-21937https://access.redhat.com/security/cve/CVE-2026-21941CVE-2026-21941CVE-2026-21941https://access.redhat.com/security/cve/CVE-2026-21948CVE-2026-21948CVE-2026-21948https://access.redhat.com/security/cve/CVE-2026-21964CVE-2026-21964CVE-2026-21964https://access.redhat.com/security/cve/CVE-2026-21968CVE-2026-21968CVE-2026-21968https://bugzilla.redhat.com/24313842431384https://bugzilla.redhat.com/24313852431385https://bugzilla.redhat.com/24314022431402https://bugzilla.redhat.com/24314092431409https://bugzilla.redhat.com/24314132431413https://bugzilla.redhat.com/24314312431431https://errata.almalinux.org/9/ALSA-2026-4828.htmlALSA-2026:4828ALSA-2026:4828
�R�wmysql-server-8.0.45-1.el9_7.x86_64.rpm��wmysql-errmsg-8.0.45-1.el9_7.x86_64.rpm�L�wmysql-libs-8.0.45-1.el9_7.x86_64.rpm��wmysql-common-8.0.45-1.el9_7.x86_64.rpm�V�wmysql-8.0.45-1.el9_7.x86_64.rpm�R�wmysql-server-8.0.45-1.el9_7.x86_64.rpm��wmysql-errmsg-8.0.45-1.el9_7.x86_64.rpm�L�wmysql-libs-8.0.45-1.el9_7.x86_64.rpm��wmysql-common-8.0.45-1.el9_7.x86_64.rpm�V�wmysql-8.0.45-1.el9_7.x86_64.rpm���?�	��(��eBsecurityImportant: capstone security update���Thttps://access.redhat.com/errata/RHSA-2026:4898RHSA-2026:4898RHSA-2026:4898https://access.redhat.com/security/cve/CVE-2025-67873CVE-2025-67873CVE-2025-67873https://access.redhat.com/security/cve/CVE-2025-68114CVE-2025-68114CVE-2025-68114https://bugzilla.redhat.com/24234162423416https://bugzilla.redhat.com/24234192423419https://errata.almalinux.org/9/ALSA-2026-4898.htmlALSA-2026:4898ALSA-2026:4898
�&�capstone-4.0.2-11.el9_7.i686.rpm�&�capstone-4.0.2-11.el9_7.x86_64.rpm�&�capstone-4.0.2-11.el9_7.i686.rpm�&�capstone-4.0.2-11.el9_7.x86_64.rpm���S�	��.��iBBBsecurityImportant: libarchive security update��V�https://access.redhat.com/errata/RHSA-2026:5080RHSA-2026:5080RHSA-2026:5080https://access.redhat.com/security/cve/CVE-2026-4111CVE-2026-4111CVE-2026-4111https://bugzilla.redhat.com/24464532446453https://errata.almalinux.org/9/ALSA-2026-5080.htmlALSA-2026:5080ALSA-2026:5080
�f�libarchive-devel-3.5.3-7.el9_7.i686.rpm�*�bsdtar-3.5.3-7.el9_7.x86_64.rpm�f�libarchive-devel-3.5.3-7.el9_7.x86_64.rpm�f�libarchive-devel-3.5.3-7.el9_7.i686.rpm�*�bsdtar-3.5.3-7.el9_7.x86_64.rpm�f�libarchive-devel-3.5.3-7.el9_7.x86_64.rpm�����
	��?��oBBBBBBBBBBBBBBsecurityModerate: nginx security update��W�Lhttps://access.redhat.com/errata/RHSA-2026:5599RHSA-2026:5599RHSA-2026:5599https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-5599.htmlALSA-2026:5599ALSA-2026:5599
	��wnginx-mod-http-image-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�O�wnginx-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�v�wnginx-mod-stream-1.20.1-24.el9_7.1.alma.1.x86_64.rpm��wnginx-mod-http-xslt-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�H�wnginx-filesystem-1.20.1-24.el9_7.1.alma.1.noarch.rpm��wnginx-mod-http-perl-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�G�wnginx-all-modules-1.20.1-24.el9_7.1.alma.1.noarch.rpm��wnginx-core-1.20.1-24.el9_7.1.alma.1.x86_64.rpm��wnginx-mod-mail-1.20.1-24.el9_7.1.alma.1.x86_64.rpm	��wnginx-mod-http-image-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�O�wnginx-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�v�wnginx-mod-stream-1.20.1-24.el9_7.1.alma.1.x86_64.rpm��wnginx-mod-http-xslt-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�H�wnginx-filesystem-1.20.1-24.el9_7.1.alma.1.noarch.rpm��wnginx-mod-http-perl-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�G�wnginx-all-modules-1.20.1-24.el9_7.1.alma.1.noarch.rpm��wnginx-core-1.20.1-24.el9_7.1.alma.1.x86_64.rpm��wnginx-mod-mail-1.20.1-24.el9_7.1.alma.1.x86_64.rpm��0�	����@BBBBsecurityModerate: vim security update��#�xhttps://access.redhat.com/errata/RHSA-2026:5602RHSA-2026:5602RHSA-2026:5602https://access.redhat.com/security/cve/CVE-2026-25749CVE-2026-25749CVE-2026-25749https://bugzilla.redhat.com/24378432437843https://errata.almalinux.org/9/ALSA-2026-5602.htmlALSA-2026:5602ALSA-2026:5602
�Z�vim-enhanced-8.2.2637-23.el9_7.1.x86_64.rpm�Y�vim-common-8.2.2637-23.el9_7.1.x86_64.rpm�X�vim-X11-8.2.2637-23.el9_7.1.x86_64.rpm�Z�vim-enhanced-8.2.2637-23.el9_7.1.x86_64.rpm�Y�vim-common-8.2.2637-23.el9_7.1.x86_64.rpm�X�vim-X11-8.2.2637-23.el9_7.1.x86_64.rpm��`�	���CBBBBBBBBBB��{BBBBBBBBBBBsecurityModerate: mysql:8.4 security update���Ahttps://access.redhat.com/errata/RHSA-2026:5640RHSA-2026:5640RHSA-2026:5640https://access.redhat.com/security/cve/CVE-2026-21936CVE-2026-21936CVE-2026-21936https://access.redhat.com/security/cve/CVE-2026-21937CVE-2026-21937CVE-2026-21937https://access.redhat.com/security/cve/CVE-2026-21941CVE-2026-21941CVE-2026-21941https://access.redhat.com/security/cve/CVE-2026-21948CVE-2026-21948CVE-2026-21948https://access.redhat.com/security/cve/CVE-2026-21964CVE-2026-21964CVE-2026-21964https://access.redhat.com/security/cve/CVE-2026-21968CVE-2026-21968CVE-2026-21968https://bugzilla.redhat.com/24313842431384https://bugzilla.redhat.com/24313852431385https://bugzilla.redhat.com/24314022431402https://bugzilla.redhat.com/24314092431409https://bugzilla.redhat.com/24314132431413https://bugzilla.redhat.com/24314312431431https://errata.almalinux.org/9/ALSA-2026-5640.htmlALSA-2026:5640ALSA-2026:5640
�V�;�^*��rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-test-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm�L�mysql-libs-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm��mysql-errmsg-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpm��Pmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��Imecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��Pmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm�V�mysql-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm�Y�mysql-test-data-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpm��mysql-common-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpm��mysql-devel-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm�R�mysql-server-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm��Imecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm�|�rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm�V�;�^*��rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm��mysql-test-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm�L�mysql-libs-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm��mysql-errmsg-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpm��Pmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm��Imecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm��Pmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm�V�mysql-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm�Y�mysql-test-data-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpm��mysql-common-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpm��mysql-devel-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm�R�mysql-server-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm��Imecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm�|�rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm��W�	����UBBsecurityImportant: firefox security update��\�jLhttps://access.redhat.com/errata/RHSA-2026:5930RHSA-2026:5930RHSA-2026:5930https://access.redhat.com/security/cve/CVE-2026-4684CVE-2026-4684CVE-2026-4684https://access.redhat.com/security/cve/CVE-2026-4685CVE-2026-4685CVE-2026-4685https://access.redhat.com/security/cve/CVE-2026-4686CVE-2026-4686CVE-2026-4686https://access.redhat.com/security/cve/CVE-2026-4687CVE-2026-4687CVE-2026-4687https://access.redhat.com/security/cve/CVE-2026-4688CVE-2026-4688CVE-2026-4688https://access.redhat.com/security/cve/CVE-2026-4689CVE-2026-4689CVE-2026-4689https://access.redhat.com/security/cve/CVE-2026-4690CVE-2026-4690CVE-2026-4690https://access.redhat.com/security/cve/CVE-2026-4691CVE-2026-4691CVE-2026-4691https://access.redhat.com/security/cve/CVE-2026-4692CVE-2026-4692CVE-2026-4692https://access.redhat.com/security/cve/CVE-2026-4693CVE-2026-4693CVE-2026-4693https://access.redhat.com/security/cve/CVE-2026-4694CVE-2026-4694CVE-2026-4694https://access.redhat.com/security/cve/CVE-2026-4695CVE-2026-4695CVE-2026-4695https://access.redhat.com/security/cve/CVE-2026-4696CVE-2026-4696CVE-2026-4696https://access.redhat.com/security/cve/CVE-2026-4697CVE-2026-4697CVE-2026-4697https://access.redhat.com/security/cve/CVE-2026-4698CVE-2026-4698CVE-2026-4698https://access.redhat.com/security/cve/CVE-2026-4699CVE-2026-4699CVE-2026-4699https://access.redhat.com/security/cve/CVE-2026-4700CVE-2026-4700CVE-2026-4700https://access.redhat.com/security/cve/CVE-2026-4701CVE-2026-4701CVE-2026-4701https://access.redhat.com/security/cve/CVE-2026-4702CVE-2026-4702CVE-2026-4702https://access.redhat.com/security/cve/CVE-2026-4704CVE-2026-4704CVE-2026-4704https://access.redhat.com/security/cve/CVE-2026-4705CVE-2026-4705CVE-2026-4705https://access.redhat.com/security/cve/CVE-2026-4706CVE-2026-4706CVE-2026-4706https://access.redhat.com/security/cve/CVE-2026-4707CVE-2026-4707CVE-2026-4707https://access.redhat.com/security/cve/CVE-2026-4708CVE-2026-4708CVE-2026-4708https://access.redhat.com/security/cve/CVE-2026-4709CVE-2026-4709CVE-2026-4709https://access.redhat.com/security/cve/CVE-2026-4710CVE-2026-4710CVE-2026-4710https://access.redhat.com/security/cve/CVE-2026-4711CVE-2026-4711CVE-2026-4711https://access.redhat.com/security/cve/CVE-2026-4712CVE-2026-4712CVE-2026-4712https://access.redhat.com/security/cve/CVE-2026-4713CVE-2026-4713CVE-2026-4713https://access.redhat.com/security/cve/CVE-2026-4714CVE-2026-4714CVE-2026-4714https://access.redhat.com/security/cve/CVE-2026-4715CVE-2026-4715CVE-2026-4715https://access.redhat.com/security/cve/CVE-2026-4716CVE-2026-4716CVE-2026-4716https://access.redhat.com/security/cve/CVE-2026-4717CVE-2026-4717CVE-2026-4717https://access.redhat.com/security/cve/CVE-2026-4718CVE-2026-4718CVE-2026-4718https://access.redhat.com/security/cve/CVE-2026-4719CVE-2026-4719CVE-2026-4719https://access.redhat.com/security/cve/CVE-2026-4720CVE-2026-4720CVE-2026-4720https://access.redhat.com/security/cve/CVE-2026-4721CVE-2026-4721CVE-2026-4721https://bugzilla.redhat.com/24507102450710https://bugzilla.redhat.com/24507112450711https://bugzilla.redhat.com/24507122450712https://bugzilla.redhat.com/24507132450713https://bugzilla.redhat.com/24507142450714https://bugzilla.redhat.com/24507152450715https://bugzilla.redhat.com/24507182450718https://bugzilla.redhat.com/24507192450719https://bugzilla.redhat.com/24507202450720https://bugzilla.redhat.com/24507212450721https://bugzilla.redhat.com/24507222450722https://bugzilla.redhat.com/24507232450723https://bugzilla.redhat.com/24507242450724https://bugzilla.redhat.com/24507252450725https://bugzilla.redhat.com/24507262450726https://bugzilla.redhat.com/24507272450727https://bugzilla.redhat.com/24507282450728https://bugzilla.redhat.com/24507292450729https://bugzilla.redhat.com/24507302450730https://bugzilla.redhat.com/24507322450732https://bugzilla.redhat.com/24507332450733https://bugzilla.redhat.com/24507342450734https://bugzilla.redhat.com/24507352450735https://bugzilla.redhat.com/24507382450738https://bugzilla.redhat.com/24507392450739https://bugzilla.redhat.com/24507402450740https://bugzilla.redhat.com/24507412450741https://bugzilla.redhat.com/24507422450742https://bugzilla.redhat.com/24507442450744https://bugzilla.redhat.com/24507462450746https://bugzilla.redhat.com/24507472450747https://bugzilla.redhat.com/24507482450748https://bugzilla.redhat.com/24507512450751https://bugzilla.redhat.com/24507522450752https://bugzilla.redhat.com/24507552450755https://bugzilla.redhat.com/24507562450756https://bugzilla.redhat.com/24507572450757https://errata.almalinux.org/9/ALSA-2026-5930.htmlALSA-2026:5930ALSA-2026:5930
P�ufirefox-x11-140.9.0-1.el9_7.alma.1.x86_64.rpm8�ufirefox-140.9.0-1.el9_7.alma.1.x86_64.rpmP�ufirefox-x11-140.9.0-1.el9_7.alma.1.x86_64.rpm8�ufirefox-140.9.0-1.el9_7.alma.1.x86_64.rpm��`�	��&��ZBBBBBBBBBBsecurityImportant: golang security update��F�Hhttps://access.redhat.com/errata/RHSA-2026:5942RHSA-2026:5942RHSA-2026:5942https://access.redhat.com/security/cve/CVE-2025-61731CVE-2025-61731CVE-2025-61731https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24344332434433https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-5942.htmlALSA-2026:5942ALSA-2026:5942
o�%golang-src-1.25.8-1.el9_7.noarch.rpmn�%golang-misc-1.25.8-1.el9_7.noarch.rpm�H�%golang-bin-1.25.8-1.el9_7.x86_64.rpmp�%golang-tests-1.25.8-1.el9_7.noarch.rpm�T�%golang-race-1.25.8-1.el9_7.x86_64.rpm�G�%golang-1.25.8-1.el9_7.x86_64.rpmm�%golang-docs-1.25.8-1.el9_7.noarch.rpm�N�%go-toolset-1.25.8-1.el9_7.x86_64.rpmo�%golang-src-1.25.8-1.el9_7.noarch.rpmn�%golang-misc-1.25.8-1.el9_7.noarch.rpm�H�%golang-bin-1.25.8-1.el9_7.x86_64.rpmp�%golang-tests-1.25.8-1.el9_7.noarch.rpm�T�%golang-race-1.25.8-1.el9_7.x86_64.rpm�G�%golang-1.25.8-1.el9_7.x86_64.rpmm�%golang-docs-1.25.8-1.el9_7.noarch.rpm�N�%go-toolset-1.25.8-1.el9_7.x86_64.rpm��H�	��/��gBBBBBBsecurityImportant: freerdp security update���https://access.redhat.com/errata/RHSA-2026:6004RHSA-2026:6004RHSA-2026:6004https://access.redhat.com/security/cve/CVE-2026-26955CVE-2026-26955CVE-2026-26955https://access.redhat.com/security/cve/CVE-2026-26965CVE-2026-26965CVE-2026-26965https://bugzilla.redhat.com/24429592442959https://bugzilla.redhat.com/24431322443132https://errata.almalinux.org/9/ALSA-2026-6004.htmlALSA-2026:6004ALSA-2026:6004
��mfreerdp-2.11.7-1.el9_7.3.x86_64.rpm�`�mfreerdp-libs-2.11.7-1.el9_7.3.i686.rpm�h�mlibwinpr-2.11.7-1.el9_7.3.x86_64.rpm�h�mlibwinpr-2.11.7-1.el9_7.3.i686.rpm�`�mfreerdp-libs-2.11.7-1.el9_7.3.x86_64.rpm��mfreerdp-2.11.7-1.el9_7.3.x86_64.rpm�`�mfreerdp-libs-2.11.7-1.el9_7.3.i686.rpm�h�mlibwinpr-2.11.7-1.el9_7.3.x86_64.rpm�h�mlibwinpr-2.11.7-1.el9_7.3.i686.rpm�`�mfreerdp-libs-2.11.7-1.el9_7.3.x86_64.rpm��'�	����pBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��!�<https://access.redhat.com/errata/RHSA-2026:6153RHSA-2026:6153RHSA-2026:6153https://access.redhat.com/security/cve/CVE-2025-38180CVE-2025-38180CVE-2025-38180https://access.redhat.com/security/cve/CVE-2025-40096CVE-2025-40096CVE-2025-40096https://access.redhat.com/security/cve/CVE-2026-23144CVE-2026-23144CVE-2026-23144https://access.redhat.com/security/cve/CVE-2026-23171CVE-2026-23171CVE-2026-23171https://access.redhat.com/security/cve/CVE-2026-23191CVE-2026-23191CVE-2026-23191https://access.redhat.com/security/cve/CVE-2026-23193CVE-2026-23193CVE-2026-23193https://access.redhat.com/security/cve/CVE-2026-23204CVE-2026-23204CVE-2026-23204https://access.redhat.com/security/cve/CVE-2026-23209CVE-2026-23209CVE-2026-23209https://bugzilla.redhat.com/23763762376376https://bugzilla.redhat.com/24073332407333https://bugzilla.redhat.com/24398722439872https://bugzilla.redhat.com/24398862439886https://bugzilla.redhat.com/24398872439887https://bugzilla.redhat.com/24399002439900https://bugzilla.redhat.com/24399312439931https://bugzilla.redhat.com/24399472439947https://errata.almalinux.org/9/ALSA-2026-6153.htmlALSA-2026:6153ALSA-2026:6153

&�{kernel-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm#�{kernel-debug-devel-5.14.0-611.45.1.el9_7.x86_64.rpm;�{python3-perf-5.14.0-611.45.1.el9_7.x86_64.rpm$�{kernel-debug-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm�{kernel-doc-5.14.0-611.45.1.el9_7.noarch.rpm'�{perf-5.14.0-611.45.1.el9_7.x86_64.rpm+�{rv-5.14.0-611.45.1.el9_7.x86_64.rpm)�{rtla-5.14.0-611.45.1.el9_7.x86_64.rpm%�{kernel-devel-5.14.0-611.45.1.el9_7.x86_64.rpm(�{kernel-headers-5.14.0-611.45.1.el9_7.x86_64.rpm
&�{kernel-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm#�{kernel-debug-devel-5.14.0-611.45.1.el9_7.x86_64.rpm;�{python3-perf-5.14.0-611.45.1.el9_7.x86_64.rpm$�{kernel-debug-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm�{kernel-doc-5.14.0-611.45.1.el9_7.noarch.rpm'�{perf-5.14.0-611.45.1.el9_7.x86_64.rpm+�{rv-5.14.0-611.45.1.el9_7.x86_64.rpm)�{rtla-5.14.0-611.45.1.el9_7.x86_64.rpm%�{kernel-devel-5.14.0-611.45.1.el9_7.x86_64.rpm(�{kernel-headers-5.14.0-611.45.1.el9_7.x86_64.rpm��	����DsecurityImportant: thunderbird security update��]�<Phttps://access.redhat.com/errata/RHSA-2026:6188RHSA-2026:6188RHSA-2026:6188https://access.redhat.com/security/cve/CVE-2026-3889CVE-2026-3889CVE-2026-3889https://access.redhat.com/security/cve/CVE-2026-4371CVE-2026-4371CVE-2026-4371https://access.redhat.com/security/cve/CVE-2026-4684CVE-2026-4684CVE-2026-4684https://access.redhat.com/security/cve/CVE-2026-4685CVE-2026-4685CVE-2026-4685https://access.redhat.com/security/cve/CVE-2026-4686CVE-2026-4686CVE-2026-4686https://access.redhat.com/security/cve/CVE-2026-4687CVE-2026-4687CVE-2026-4687https://access.redhat.com/security/cve/CVE-2026-4688CVE-2026-4688CVE-2026-4688https://access.redhat.com/security/cve/CVE-2026-4689CVE-2026-4689CVE-2026-4689https://access.redhat.com/security/cve/CVE-2026-4690CVE-2026-4690CVE-2026-4690https://access.redhat.com/security/cve/CVE-2026-4691CVE-2026-4691CVE-2026-4691https://access.redhat.com/security/cve/CVE-2026-4692CVE-2026-4692CVE-2026-4692https://access.redhat.com/security/cve/CVE-2026-4693CVE-2026-4693CVE-2026-4693https://access.redhat.com/security/cve/CVE-2026-4694CVE-2026-4694CVE-2026-4694https://access.redhat.com/security/cve/CVE-2026-4695CVE-2026-4695CVE-2026-4695https://access.redhat.com/security/cve/CVE-2026-4696CVE-2026-4696CVE-2026-4696https://access.redhat.com/security/cve/CVE-2026-4697CVE-2026-4697CVE-2026-4697https://access.redhat.com/security/cve/CVE-2026-4698CVE-2026-4698CVE-2026-4698https://access.redhat.com/security/cve/CVE-2026-4699CVE-2026-4699CVE-2026-4699https://access.redhat.com/security/cve/CVE-2026-4700CVE-2026-4700CVE-2026-4700https://access.redhat.com/security/cve/CVE-2026-4701CVE-2026-4701CVE-2026-4701https://access.redhat.com/security/cve/CVE-2026-4702CVE-2026-4702CVE-2026-4702https://access.redhat.com/security/cve/CVE-2026-4704CVE-2026-4704CVE-2026-4704https://access.redhat.com/security/cve/CVE-2026-4705CVE-2026-4705CVE-2026-4705https://access.redhat.com/security/cve/CVE-2026-4706CVE-2026-4706CVE-2026-4706https://access.redhat.com/security/cve/CVE-2026-4707CVE-2026-4707CVE-2026-4707https://access.redhat.com/security/cve/CVE-2026-4708CVE-2026-4708CVE-2026-4708https://access.redhat.com/security/cve/CVE-2026-4709CVE-2026-4709CVE-2026-4709https://access.redhat.com/security/cve/CVE-2026-4710CVE-2026-4710CVE-2026-4710https://access.redhat.com/security/cve/CVE-2026-4711CVE-2026-4711CVE-2026-4711https://access.redhat.com/security/cve/CVE-2026-4712CVE-2026-4712CVE-2026-4712https://access.redhat.com/security/cve/CVE-2026-4713CVE-2026-4713CVE-2026-4713https://access.redhat.com/security/cve/CVE-2026-4714CVE-2026-4714CVE-2026-4714https://access.redhat.com/security/cve/CVE-2026-4715CVE-2026-4715CVE-2026-4715https://access.redhat.com/security/cve/CVE-2026-4716CVE-2026-4716CVE-2026-4716https://access.redhat.com/security/cve/CVE-2026-4717CVE-2026-4717CVE-2026-4717https://access.redhat.com/security/cve/CVE-2026-4718CVE-2026-4718CVE-2026-4718https://access.redhat.com/security/cve/CVE-2026-4719CVE-2026-4719CVE-2026-4719https://access.redhat.com/security/cve/CVE-2026-4720CVE-2026-4720CVE-2026-4720https://access.redhat.com/security/cve/CVE-2026-4721CVE-2026-4721CVE-2026-4721https://bugzilla.redhat.com/24507102450710https://bugzilla.redhat.com/24507112450711https://bugzilla.redhat.com/24507122450712https://bugzilla.redhat.com/24507132450713https://bugzilla.redhat.com/24507142450714https://bugzilla.redhat.com/24507152450715https://bugzilla.redhat.com/24507182450718https://bugzilla.redhat.com/24507192450719https://bugzilla.redhat.com/24507202450720https://bugzilla.redhat.com/24507212450721https://bugzilla.redhat.com/24507222450722https://bugzilla.redhat.com/24507232450723https://bugzilla.redhat.com/24507242450724https://bugzilla.redhat.com/24507252450725https://bugzilla.redhat.com/24507262450726https://bugzilla.redhat.com/24507272450727https://bugzilla.redhat.com/24507282450728https://bugzilla.redhat.com/24507292450729https://bugzilla.redhat.com/24507302450730https://bugzilla.redhat.com/24507322450732https://bugzilla.redhat.com/24507332450733https://bugzilla.redhat.com/24507342450734https://bugzilla.redhat.com/24507352450735https://bugzilla.redhat.com/24507382450738https://bugzilla.redhat.com/24507392450739https://bugzilla.redhat.com/24507402450740https://bugzilla.redhat.com/24507412450741https://bugzilla.redhat.com/24507422450742https://bugzilla.redhat.com/24507442450744https://bugzilla.redhat.com/24507462450746https://bugzilla.redhat.com/24507472450747https://bugzilla.redhat.com/24507482450748https://bugzilla.redhat.com/24507512450751https://bugzilla.redhat.com/24507522450752https://bugzilla.redhat.com/24507552450755https://bugzilla.redhat.com/24507562450756https://bugzilla.redhat.com/24507572450757https://bugzilla.redhat.com/24510012451001https://bugzilla.redhat.com/24510062451006https://errata.almalinux.org/9/ALSA-2026-6188.htmlALSA-2026:6188ALSA-2026:6188
9�uthunderbird-140.9.0-1.el9_7.alma.1.x86_64.rpm9�uthunderbird-140.9.0-1.el9_7.alma.1.x86_64.rpm�θ�j�	��
��GBBBBsecurityModerate: libxslt security update���https://access.redhat.com/errata/RHSA-2026:6266RHSA-2026:6266RHSA-2026:6266https://access.redhat.com/security/cve/CVE-2023-40403CVE-2023-40403CVE-2023-40403https://bugzilla.redhat.com/23497662349766https://errata.almalinux.org/9/ALSA-2026-6266.htmlALSA-2026:6266ALSA-2026:6266
�9�Slibxslt-devel-1.1.34-14.el9_7.1.x86_64.rpm�9�Slibxslt-devel-1.1.34-14.el9_7.1.i686.rpm�8�Slibxslt-1.1.34-14.el9_7.1.x86_64.rpm�8�Slibxslt-1.1.34-14.el9_7.1.i686.rpm�9�Slibxslt-devel-1.1.34-14.el9_7.1.x86_64.rpm�9�Slibxslt-devel-1.1.34-14.el9_7.1.i686.rpm�8�Slibxslt-1.1.34-14.el9_7.1.x86_64.rpm�8�Slibxslt-1.1.34-14.el9_7.1.i686.rpm�γ��	����NBBBBBBBBsecurityImportant: python3.12 security update��%�Yhttps://access.redhat.com/errata/RHSA-2026:6285RHSA-2026:6285RHSA-2026:6285https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6285.htmlALSA-2026:6285ALSA-2026:6285
��5python3.12-libs-3.12.12-4.el9_7.2.i686.rpm��5python3.12-devel-3.12.12-4.el9_7.2.x86_64.rpm��5python3.12-tkinter-3.12.12-4.el9_7.2.x86_64.rpm��5python3.12-devel-3.12.12-4.el9_7.2.i686.rpm��5python3.12-3.12.12-4.el9_7.2.x86_64.rpm��5python3.12-libs-3.12.12-4.el9_7.2.x86_64.rpm��5python3.12-libs-3.12.12-4.el9_7.2.i686.rpm��5python3.12-devel-3.12.12-4.el9_7.2.x86_64.rpm��5python3.12-tkinter-3.12.12-4.el9_7.2.x86_64.rpm��5python3.12-devel-3.12.12-4.el9_7.2.i686.rpm��5python3.12-3.12.12-4.el9_7.2.x86_64.rpm��5python3.12-libs-3.12.12-4.el9_7.2.x86_64.rpm��	��#��YBBBBBBBBsecurityImportant: python3.11 security update��~�Yhttps://access.redhat.com/errata/RHSA-2026:6286RHSA-2026:6286RHSA-2026:6286https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6286.htmlALSA-2026:6286ALSA-2026:6286
[�!python3.11-devel-3.11.13-5.2.el9_7.i686.rpm�Q�!python3.11-tkinter-3.11.13-5.2.el9_7.x86_64.rpm�P�!python3.11-3.11.13-5.2.el9_7.x86_64.rpm[�!python3.11-devel-3.11.13-5.2.el9_7.x86_64.rpm\�!python3.11-libs-3.11.13-5.2.el9_7.x86_64.rpm\�!python3.11-libs-3.11.13-5.2.el9_7.i686.rpm[�!python3.11-devel-3.11.13-5.2.el9_7.i686.rpm�Q�!python3.11-tkinter-3.11.13-5.2.el9_7.x86_64.rpm�P�!python3.11-3.11.13-5.2.el9_7.x86_64.rpm[�!python3.11-devel-3.11.13-5.2.el9_7.x86_64.rpm\�!python3.11-libs-3.11.13-5.2.el9_7.x86_64.rpm\�!python3.11-libs-3.11.13-5.2.el9_7.i686.rpm�γ�%�	��;��dBBBBBBBBBBBBBBBBBBBBBsecurityImportant: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update��W�https://access.redhat.com/errata/RHSA-2026:6300RHSA-2026:6300RHSA-2026:6300https://access.redhat.com/security/cve/CVE-2026-2920CVE-2026-2920CVE-2026-2920https://access.redhat.com/security/cve/CVE-2026-2921CVE-2026-2921CVE-2026-2921https://access.redhat.com/security/cve/CVE-2026-2922CVE-2026-2922CVE-2026-2922https://access.redhat.com/security/cve/CVE-2026-2923CVE-2026-2923CVE-2026-2923https://access.redhat.com/security/cve/CVE-2026-3082CVE-2026-3082CVE-2026-3082https://access.redhat.com/security/cve/CVE-2026-3083CVE-2026-3083CVE-2026-3083https://access.redhat.com/security/cve/CVE-2026-3085CVE-2026-3085CVE-2026-3085https://bugzilla.redhat.com/24474902447490https://bugzilla.redhat.com/24474922447492https://bugzilla.redhat.com/24474952447495https://bugzilla.redhat.com/24474962447496https://bugzilla.redhat.com/24474982447498https://bugzilla.redhat.com/24475002447500https://bugzilla.redhat.com/24475032447503https://errata.almalinux.org/9/ALSA-2026-6300.htmlALSA-2026:6300ALSA-2026:6300
�4�,gstreamer1-plugins-base-devel-1.22.12-5.el9_7.x86_64.rpm�;�,gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.x86_64.rpm��,gstreamer1-plugins-bad-free-1.22.12-5.el9_7.x86_64.rpm�`�,gstreamer1-plugins-base-tools-1.22.12-5.el9_7.x86_64.rpm�
�,gstreamer1-plugins-good-1.22.12-5.el9_7.x86_64.rpm�3�,gstreamer1-plugins-base-1.22.12-5.el9_7.x86_64.rpm��,gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.x86_64.rpm�
�,gstreamer1-plugins-good-1.22.12-5.el9_7.i686.rpm��,gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.i686.rpm�4�,gstreamer1-plugins-base-devel-1.22.12-5.el9_7.i686.rpm��,gstreamer1-plugins-bad-free-1.22.12-5.el9_7.i686.rpm�&�3gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.i686.rpm�&�3gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.x86_64.rpm�3�,gstreamer1-plugins-base-1.22.12-5.el9_7.i686.rpm�;�,gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.i686.rpm�4�,gstreamer1-plugins-base-devel-1.22.12-5.el9_7.x86_64.rpm�;�,gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.x86_64.rpm��,gstreamer1-plugins-bad-free-1.22.12-5.el9_7.x86_64.rpm�`�,gstreamer1-plugins-base-tools-1.22.12-5.el9_7.x86_64.rpm�
�,gstreamer1-plugins-good-1.22.12-5.el9_7.x86_64.rpm�3�,gstreamer1-plugins-base-1.22.12-5.el9_7.x86_64.rpm��,gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.x86_64.rpm�
�,gstreamer1-plugins-good-1.22.12-5.el9_7.i686.rpm��,gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.i686.rpm�4�,gstreamer1-plugins-base-devel-1.22.12-5.el9_7.i686.rpm��,gstreamer1-plugins-bad-free-1.22.12-5.el9_7.i686.rpm�&�3gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.i686.rpm�&�3gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.x86_64.rpm�3�,gstreamer1-plugins-base-1.22.12-5.el9_7.i686.rpm�;�,gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.i686.rpm�ο�B�	��>��|securityImportant: squid security update��b�yhttps://access.redhat.com/errata/RHSA-2026:6301RHSA-2026:6301RHSA-2026:6301https://access.redhat.com/security/cve/CVE-2026-32748CVE-2026-32748CVE-2026-32748https://access.redhat.com/security/cve/CVE-2026-33526CVE-2026-33526CVE-2026-33526https://bugzilla.redhat.com/24515742451574https://bugzilla.redhat.com/24515772451577https://errata.almalinux.org/9/ALSA-2026-6301.htmlALSA-2026:6301ALSA-2026:6301
�{�Isquid-5.5-22.el9_7.4.x86_64.rpm�{�Isquid-5.5-22.el9_7.4.x86_64.rpm��	����BBBBBBsecurityImportant: freerdp security update��[�https://access.redhat.com/errata/RHSA-2026:6340RHSA-2026:6340RHSA-2026:6340https://access.redhat.com/security/cve/CVE-2026-22852CVE-2026-22852CVE-2026-22852https://access.redhat.com/security/cve/CVE-2026-22854CVE-2026-22854CVE-2026-22854https://access.redhat.com/security/cve/CVE-2026-22856CVE-2026-22856CVE-2026-22856https://access.redhat.com/security/cve/CVE-2026-23732CVE-2026-23732CVE-2026-23732https://access.redhat.com/security/cve/CVE-2026-23948CVE-2026-23948CVE-2026-23948https://access.redhat.com/security/cve/CVE-2026-24491CVE-2026-24491CVE-2026-24491https://access.redhat.com/security/cve/CVE-2026-24675CVE-2026-24675CVE-2026-24675https://access.redhat.com/security/cve/CVE-2026-24676CVE-2026-24676CVE-2026-24676https://access.redhat.com/security/cve/CVE-2026-24679CVE-2026-24679CVE-2026-24679https://access.redhat.com/security/cve/CVE-2026-24681CVE-2026-24681CVE-2026-24681https://access.redhat.com/security/cve/CVE-2026-24683CVE-2026-24683CVE-2026-24683https://access.redhat.com/security/cve/CVE-2026-24684CVE-2026-24684CVE-2026-24684https://access.redhat.com/security/cve/CVE-2026-31806CVE-2026-31806CVE-2026-31806https://bugzilla.redhat.com/24296502429650https://bugzilla.redhat.com/24296522429652https://bugzilla.redhat.com/24296542429654https://bugzilla.redhat.com/24308812430881https://bugzilla.redhat.com/24382012438201https://bugzilla.redhat.com/24382022438202https://bugzilla.redhat.com/24382072438207https://bugzilla.redhat.com/24382082438208https://bugzilla.redhat.com/24382102438210https://bugzilla.redhat.com/24382162438216https://bugzilla.redhat.com/24382172438217https://bugzilla.redhat.com/24382212438221https://bugzilla.redhat.com/24473762447376https://errata.almalinux.org/9/ALSA-2026-6340.htmlALSA-2026:6340ALSA-2026:6340
�`�nfreerdp-libs-2.11.7-1.el9_7.5.x86_64.rpm�h�nlibwinpr-2.11.7-1.el9_7.5.i686.rpm�`�nfreerdp-libs-2.11.7-1.el9_7.5.i686.rpm��nfreerdp-2.11.7-1.el9_7.5.x86_64.rpm�h�nlibwinpr-2.11.7-1.el9_7.5.x86_64.rpm�`�nfreerdp-libs-2.11.7-1.el9_7.5.x86_64.rpm�h�nlibwinpr-2.11.7-1.el9_7.5.i686.rpm�`�nfreerdp-libs-2.11.7-1.el9_7.5.i686.rpm��nfreerdp-2.11.7-1.el9_7.5.x86_64.rpm�h�nlibwinpr-2.11.7-1.el9_7.5.x86_64.rpm�θ�9�	����HBBsecurityImportant: grafana security update��]�https://access.redhat.com/errata/RHSA-2026:6382RHSA-2026:6382RHSA-2026:6382https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-6382.htmlALSA-2026:6382ALSA-2026:6382
�U�vgrafana-selinux-10.2.6-19.el9_7.x86_64.rpm�I�vgrafana-10.2.6-19.el9_7.x86_64.rpm�U�vgrafana-selinux-10.2.6-19.el9_7.x86_64.rpm�I�vgrafana-10.2.6-19.el9_7.x86_64.rpm��	����MsecurityImportant: grafana-pcp security update��u�thttps://access.redhat.com/errata/RHSA-2026:6383RHSA-2026:6383RHSA-2026:6383https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-6383.htmlALSA-2026:6383ALSA-2026:6383
�~�0grafana-pcp-5.1.1-13.el9_7.x86_64.rpm�~�0grafana-pcp-5.1.1-13.el9_7.x86_64.rpm�θ�B�	����PsecurityModerate: rsync security update��i�Bhttps://access.redhat.com/errata/RHSA-2026:6390RHSA-2026:6390RHSA-2026:6390https://access.redhat.com/security/cve/CVE-2025-10158CVE-2025-10158CVE-2025-10158https://bugzilla.redhat.com/24156372415637https://errata.almalinux.org/9/ALSA-2026-6390.htmlALSA-2026:6390ALSA-2026:6390
��-rsync-rrsync-3.2.5-3.el9_7.2.noarch.rpm�S�-rsync-daemon-3.2.5-3.el9_7.2.noarch.rpm��-rsync-rrsync-3.2.5-3.el9_7.2.noarch.rpm�S�-rsync-daemon-3.2.5-3.el9_7.2.noarch.rpm��	����SBBsecurityImportant: openssh security update��+�https://access.redhat.com/errata/RHSA-2026:6462RHSA-2026:6462RHSA-2026:6462https://access.redhat.com/security/cve/CVE-2026-3497CVE-2026-3497CVE-2026-3497https://bugzilla.redhat.com/24470852447085https://errata.almalinux.org/9/ALSA-2026-6462.htmlALSA-2026:6462ALSA-2026:6462
��Wopenssh-askpass-8.7p1-48.el9_7.alma.1.x86_64.rpm��5pam_ssh_agent_auth-0.10.4-5.48.el9_7.alma.1.x86_64.rpm��Wopenssh-askpass-8.7p1-48.el9_7.alma.1.x86_64.rpm��5pam_ssh_agent_auth-0.10.4-5.48.el9_7.alma.1.x86_64.rpm�����	��+��XBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update��7�
https://access.redhat.com/errata/RHSA-2026:6570RHSA-2026:6570RHSA-2026:6570https://access.redhat.com/security/cve/CVE-2025-38109CVE-2025-38109CVE-2025-38109https://access.redhat.com/security/cve/CVE-2026-23111CVE-2026-23111CVE-2026-23111https://access.redhat.com/security/cve/CVE-2026-23210CVE-2026-23210CVE-2026-23210https://access.redhat.com/security/cve/CVE-2026-23231CVE-2026-23231CVE-2026-23231https://bugzilla.redhat.com/23761012376101https://bugzilla.redhat.com/24396872439687https://bugzilla.redhat.com/24398952439895https://bugzilla.redhat.com/24443762444376https://errata.almalinux.org/9/ALSA-2026-6570.htmlALSA-2026:6570ALSA-2026:6570

(�|kernel-headers-5.14.0-611.47.1.el9_7.x86_64.rpm;�|python3-perf-5.14.0-611.47.1.el9_7.x86_64.rpm$�|kernel-debug-devel-matched-5.14.0-611.47.1.el9_7.x86_64.rpm#�|kernel-debug-devel-5.14.0-611.47.1.el9_7.x86_64.rpm�|kernel-doc-5.14.0-611.47.1.el9_7.noarch.rpm&�|kernel-devel-matched-5.14.0-611.47.1.el9_7.x86_64.rpm)�|rtla-5.14.0-611.47.1.el9_7.x86_64.rpm'�|perf-5.14.0-611.47.1.el9_7.x86_64.rpm%�|kernel-devel-5.14.0-611.47.1.el9_7.x86_64.rpm+�|rv-5.14.0-611.47.1.el9_7.x86_64.rpm
(�|kernel-headers-5.14.0-611.47.1.el9_7.x86_64.rpm;�|python3-perf-5.14.0-611.47.1.el9_7.x86_64.rpm$�|kernel-debug-devel-matched-5.14.0-611.47.1.el9_7.x86_64.rpm#�|kernel-debug-devel-5.14.0-611.47.1.el9_7.x86_64.rpm�|kernel-doc-5.14.0-611.47.1.el9_7.noarch.rpm&�|kernel-devel-matched-5.14.0-611.47.1.el9_7.x86_64.rpm)�|rtla-5.14.0-611.47.1.el9_7.x86_64.rpm'�|perf-5.14.0-611.47.1.el9_7.x86_64.rpm%�|kernel-devel-5.14.0-611.47.1.el9_7.x86_64.rpm+�|rv-5.14.0-611.47.1.el9_7.x86_64.rpm���� 	��.��lsecurityModerate: crun security update��I�Thttps://access.redhat.com/errata/RHSA-2026:6621RHSA-2026:6621RHSA-2026:6621https://access.redhat.com/security/cve/CVE-2026-30892CVE-2026-30892CVE-2026-30892https://bugzilla.redhat.com/24515762451576https://errata.almalinux.org/9/ALSA-2026-6621.htmlALSA-2026:6621ALSA-2026:6621
��Ycrun-1.27-1.el9_7.x86_64.rpm��Ycrun-1.27-1.el9_7.x86_64.rpm�����!	��5��oBBBBsecurityImportant: python3.9 security update���Yhttps://access.redhat.com/errata/RHSA-2026:6766RHSA-2026:6766RHSA-2026:6766https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6766.htmlALSA-2026:6766ALSA-2026:6766
f�python-unversioned-command-3.9.25-3.el9_7.2.noarch.rpmQ�python3-devel-3.9.25-3.el9_7.2.i686.rpmQ�python3-devel-3.9.25-3.el9_7.2.x86_64.rpm�+�python3-tkinter-3.9.25-3.el9_7.2.x86_64.rpmf�python-unversioned-command-3.9.25-3.el9_7.2.noarch.rpmQ�python3-devel-3.9.25-3.el9_7.2.i686.rpmQ�python3-devel-3.9.25-3.el9_7.2.x86_64.rpm�+�python3-tkinter-3.9.25-3.el9_7.2.x86_64.rpm���"�"	����vBBBBBBBBBBBBBBBBsecurityImportant: nginx:1.24 security update��v�
https://access.redhat.com/errata/RHSA-2026:6923RHSA-2026:6923RHSA-2026:6923https://access.redhat.com/security/cve/CVE-2026-27651CVE-2026-27651CVE-2026-27651https://access.redhat.com/security/cve/CVE-2026-27654CVE-2026-27654CVE-2026-27654https://access.redhat.com/security/cve/CVE-2026-27784CVE-2026-27784CVE-2026-27784https://access.redhat.com/security/cve/CVE-2026-32647CVE-2026-32647CVE-2026-32647https://bugzilla.redhat.com/24495982449598https://bugzilla.redhat.com/24507762450776https://bugzilla.redhat.com/24507852450785https://bugzilla.redhat.com/24507912450791https://errata.almalinux.org/9/ALSA-2026-6923.htmlALSA-2026:6923ALSA-2026:6923
�O��m*
�O�nginx-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-mail-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-http-image-filter-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm�v�nginx-mod-stream-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-core-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm�G�nginx-all-modules-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.noarch.rpm�H�nginx-filesystem-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.noarch.rpm��nginx-mod-devel-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-http-xslt-filter-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-http-perl-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm�O��m*
�O�nginx-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-mail-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-http-image-filter-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm�v�nginx-mod-stream-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-core-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm�G�nginx-all-modules-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.noarch.rpm�H�nginx-filesystem-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.noarch.rpm��nginx-mod-devel-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-http-xslt-filter-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm��nginx-mod-http-perl-1.24.0-5.module_el9.7.0+220+47ec8b91.2.alma.1.x86_64.rpm���9�#	����IBBBBBBBBBBBBBBsecurityImportant: nginx security update���
https://access.redhat.com/errata/RHSA-2026:7002RHSA-2026:7002RHSA-2026:7002https://access.redhat.com/security/cve/CVE-2026-27651CVE-2026-27651CVE-2026-27651https://access.redhat.com/security/cve/CVE-2026-27654CVE-2026-27654CVE-2026-27654https://access.redhat.com/security/cve/CVE-2026-27784CVE-2026-27784CVE-2026-27784https://access.redhat.com/security/cve/CVE-2026-32647CVE-2026-32647CVE-2026-32647https://bugzilla.redhat.com/24495982449598https://bugzilla.redhat.com/24507762450776https://bugzilla.redhat.com/24507852450785https://bugzilla.redhat.com/24507912450791https://errata.almalinux.org/9/ALSA-2026-7002.htmlALSA-2026:7002ALSA-2026:7002
	�H�xnginx-filesystem-1.20.1-24.el9_7.2.alma.1.noarch.rpm�O�xnginx-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-mod-http-xslt-filter-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-core-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-mod-http-image-filter-1.20.1-24.el9_7.2.alma.1.x86_64.rpm�v�xnginx-mod-stream-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-mod-http-perl-1.20.1-24.el9_7.2.alma.1.x86_64.rpm�G�xnginx-all-modules-1.20.1-24.el9_7.2.alma.1.noarch.rpm��xnginx-mod-mail-1.20.1-24.el9_7.2.alma.1.x86_64.rpm	�H�xnginx-filesystem-1.20.1-24.el9_7.2.alma.1.noarch.rpm�O�xnginx-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-mod-http-xslt-filter-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-core-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-mod-http-image-filter-1.20.1-24.el9_7.2.alma.1.x86_64.rpm�v�xnginx-mod-stream-1.20.1-24.el9_7.2.alma.1.x86_64.rpm��xnginx-mod-http-perl-1.20.1-24.el9_7.2.alma.1.x86_64.rpm�G�xnginx-all-modules-1.20.1-24.el9_7.2.alma.1.noarch.rpm��xnginx-mod-mail-1.20.1-24.el9_7.2.alma.1.x86_64.rpm����$	����ZsecurityImportant: git-lfs security update��*�dhttps://access.redhat.com/errata/RHSA-2026:7259RHSA-2026:7259RHSA-2026:7259https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-7259.htmlALSA-2026:7259ALSA-2026:7259
�l�git-lfs-3.6.1-8.el9_7.x86_64.rpm�l�git-lfs-3.6.1-8.el9_7.x86_64.rpm����%	��/��]BBBBBBBBBBBBBBBBsecurityImportant: nginx:1.26 security update���
https://access.redhat.com/errata/RHSA-2026:7343RHSA-2026:7343RHSA-2026:7343https://access.redhat.com/security/cve/CVE-2026-27651CVE-2026-27651CVE-2026-27651https://access.redhat.com/security/cve/CVE-2026-27654CVE-2026-27654CVE-2026-27654https://access.redhat.com/security/cve/CVE-2026-27784CVE-2026-27784CVE-2026-27784https://access.redhat.com/security/cve/CVE-2026-32647CVE-2026-32647CVE-2026-32647https://bugzilla.redhat.com/24495982449598https://bugzilla.redhat.com/24507762450776https://bugzilla.redhat.com/24507852450785https://bugzilla.redhat.com/24507912450791https://errata.almalinux.org/9/ALSA-2026-7343.htmlALSA-2026:7343ALSA-2026:7343
�O�X�n*
�O�nginx-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-http-image-filter-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm�v�nginx-mod-stream-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-http-perl-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm�G�nginx-all-modules-1.26.3-2.module_el9.7.0+223+9cd7031b.1.noarch.rpm��nginx-mod-devel-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-mail-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-core-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-http-xslt-filter-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm�H�nginx-filesystem-1.26.3-2.module_el9.7.0+223+9cd7031b.1.noarch.rpm�O�X�n*
�O�nginx-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-http-image-filter-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm�v�nginx-mod-stream-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-http-perl-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm�G�nginx-all-modules-1.26.3-2.module_el9.7.0+223+9cd7031b.1.noarch.rpm��nginx-mod-devel-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-mail-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-core-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm��nginx-mod-http-xslt-filter-1.26.3-2.module_el9.7.0+223+9cd7031b.1.x86_64.rpm�H�nginx-filesystem-1.26.3-2.module_el9.7.0+223+9cd7031b.1.noarch.rpm���]�&	��<�YBD��TBBBBBBBBBBsecurityImportant: nodejs:24 security update��(�1&https://access.redhat.com/errata/RHSA-2026:7350RHSA-2026:7350RHSA-2026:7350https://access.redhat.com/security/cve/CVE-2026-1525CVE-2026-1525CVE-2026-1525https://access.redhat.com/security/cve/CVE-2026-1526CVE-2026-1526CVE-2026-1526https://access.redhat.com/security/cve/CVE-2026-1527CVE-2026-1527CVE-2026-1527https://access.redhat.com/security/cve/CVE-2026-1528CVE-2026-1528CVE-2026-1528https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://access.redhat.com/security/cve/CVE-2026-21710CVE-2026-21710CVE-2026-21710https://access.redhat.com/security/cve/CVE-2026-21711CVE-2026-21711CVE-2026-21711https://access.redhat.com/security/cve/CVE-2026-21712CVE-2026-21712CVE-2026-21712https://access.redhat.com/security/cve/CVE-2026-21713CVE-2026-21713CVE-2026-21713https://access.redhat.com/security/cve/CVE-2026-21714CVE-2026-21714CVE-2026-21714https://access.redhat.com/security/cve/CVE-2026-21715CVE-2026-21715CVE-2026-21715https://access.redhat.com/security/cve/CVE-2026-21716CVE-2026-21716CVE-2026-21716https://access.redhat.com/security/cve/CVE-2026-21717CVE-2026-21717CVE-2026-21717https://access.redhat.com/security/cve/CVE-2026-2229CVE-2026-2229CVE-2026-2229https://access.redhat.com/security/cve/CVE-2026-25547CVE-2026-25547CVE-2026-25547https://access.redhat.com/security/cve/CVE-2026-2581CVE-2026-2581CVE-2026-2581https://access.redhat.com/security/cve/CVE-2026-26996CVE-2026-26996CVE-2026-26996https://access.redhat.com/security/cve/CVE-2026-27135CVE-2026-27135CVE-2026-27135https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24369422436942https://bugzilla.redhat.com/24412682441268https://bugzilla.redhat.com/24471402447140https://bugzilla.redhat.com/24471412447141https://bugzilla.redhat.com/24471422447142https://bugzilla.redhat.com/24471432447143https://bugzilla.redhat.com/24471442447144https://bugzilla.redhat.com/24471452447145https://bugzilla.redhat.com/24487542448754https://bugzilla.redhat.com/24530372453037https://bugzilla.redhat.com/24531512453151https://bugzilla.redhat.com/24531522453152https://bugzilla.redhat.com/24531572453157https://bugzilla.redhat.com/24531582453158https://bugzilla.redhat.com/24531602453160https://bugzilla.redhat.com/24531612453161https://bugzilla.redhat.com/24531622453162https://errata.almalinux.org/9/ALSA-2026-7350.htmlALSA-2026:7350ALSA-2026:7350
,�k�c*
>�nodejs-docs-24.14.1-2.module_el9.7.0+222+ef1c61e1.noarch.rpm,�nodejs-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpml�,nodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpme�nodejs-full-i18n-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpm�
�(nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpm��nodejs-libs-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpm�#�nodejs-devel-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpm��v8-13.6-devel-13.6.233.17-1.24.14.1.2.module_el9.7.0+222+ef1c61e1.x86_64.rpmd�Xnpm-11.11.0-1.24.14.1.2.module_el9.7.0+222+ef1c61e1.noarch.rpm�	�)nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm,�k�c*
>�nodejs-docs-24.14.1-2.module_el9.7.0+222+ef1c61e1.noarch.rpm,�nodejs-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpml�,nodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpme�nodejs-full-i18n-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpm�
�(nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpm��nodejs-libs-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpm�#�nodejs-devel-24.14.1-2.module_el9.7.0+222+ef1c61e1.x86_64.rpm��v8-13.6-devel-13.6.233.17-1.24.14.1.2.module_el9.7.0+222+ef1c61e1.x86_64.rpmd�Xnpm-11.11.0-1.24.14.1.2.module_el9.7.0+222+ef1c61e1.noarch.rpm�	�)nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm���9�'	��?��}securityCritical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection�S��Y�https://access.redhat.com/errata/RHSA-2026:7384RHSA-2026:7384RHSA-2026:7384https://access.redhat.com/security/cve/CVE-2026-4631CVE-2026-4631CVE-2026-4631https://errata.almalinux.org/9/ALSA-2026-7384.htmlALSA-2026:7384ALSA-2026:7384
�U�5cockpit-storaged-344-2.el9_7.noarch.rpm�T�5cockpit-packagekit-344-2.el9_7.noarch.rpm�U�5cockpit-storaged-344-2.el9_7.noarch.rpm�T�5cockpit-packagekit-344-2.el9_7.noarch.rpm���w�(	����@BBsecurityImportant: firefox security update��`�{https://access.redhat.com/errata/RHSA-2026:7671RHSA-2026:7671RHSA-2026:7671https://access.redhat.com/security/cve/CVE-2026-33416CVE-2026-33416CVE-2026-33416https://access.redhat.com/security/cve/CVE-2026-33636CVE-2026-33636CVE-2026-33636https://access.redhat.com/security/cve/CVE-2026-5731CVE-2026-5731CVE-2026-5731https://access.redhat.com/security/cve/CVE-2026-5732CVE-2026-5732CVE-2026-5732https://access.redhat.com/security/cve/CVE-2026-5734CVE-2026-5734CVE-2026-5734https://bugzilla.redhat.com/24518052451805https://bugzilla.redhat.com/24518192451819https://bugzilla.redhat.com/24558972455897https://bugzilla.redhat.com/24559012455901https://bugzilla.redhat.com/24559082455908https://errata.almalinux.org/9/ALSA-2026-7671.htmlALSA-2026:7671ALSA-2026:7671
8�vfirefox-140.9.1-1.el9_7.alma.1.x86_64.rpmP�vfirefox-x11-140.9.1-1.el9_7.alma.1.x86_64.rpm8�vfirefox-140.9.1-1.el9_7.alma.1.x86_64.rpmP�vfirefox-x11-140.9.1-1.el9_7.alma.1.x86_64.rpm���r�)	����EsecurityImportant: perl-XML-Parser security update��[�ehttps://access.redhat.com/errata/RHSA-2026:7679RHSA-2026:7679RHSA-2026:7679https://access.redhat.com/security/cve/CVE-2006-10002CVE-2006-10002CVE-2006-10002https://access.redhat.com/security/cve/CVE-2006-10003CVE-2006-10003CVE-2006-10003https://bugzilla.redhat.com/24489992448999https://bugzilla.redhat.com/24490012449001https://errata.almalinux.org/9/ALSA-2026-7679.htmlALSA-2026:7679ALSA-2026:7679
�&�Uperl-XML-Parser-2.46-9.1.el9_7.x86_64.rpm�&�Uperl-XML-Parser-2.46-9.1.el9_7.x86_64.rpm����*	���_��jBBBBBBBBBsecurityImportant: nodejs:20 security update��@�
https://access.redhat.com/errata/RHSA-2026:7896RHSA-2026:7896RHSA-2026:7896https://access.redhat.com/security/cve/CVE-2026-21710CVE-2026-21710CVE-2026-21710https://access.redhat.com/security/cve/CVE-2026-26996CVE-2026-26996CVE-2026-26996https://access.redhat.com/security/cve/CVE-2026-27135CVE-2026-27135CVE-2026-27135https://access.redhat.com/security/cve/CVE-2026-27904CVE-2026-27904CVE-2026-27904https://bugzilla.redhat.com/24412682441268https://bugzilla.redhat.com/24429222442922https://bugzilla.redhat.com/24487542448754https://bugzilla.redhat.com/24531512453151https://errata.almalinux.org/9/ALSA-2026-7896.htmlALSA-2026:7896ALSA-2026:7896
,�Q�S*>�Fnodejs-docs-20.20.2-1.module_el9.7.0+224+0af7cc6b.noarch.rpml�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm,�&nodejs-20.20.2-1.module_el9.7.0+226+88d36870.x86_64.rpm�#�Fnodejs-devel-20.20.2-1.module_el9.7.0+224+0af7cc6b.x86_64.rpm�	�nodejs-packaging-2021.06-6.module_el9.7.0+226+88d36870.noarch.rpm�
�nodejs-packaging-bundler-2021.06-6.module_el9.7.0+226+88d36870.noarch.rpme�&nodejs-full-i18n-20.20.2-1.module_el9.7.0+226+88d36870.x86_64.rpmd�-npm-10.8.2-1.20.20.2.1.module_el9.7.0+224+0af7cc6b.x86_64.rpm,�Q�S*>�Fnodejs-docs-20.20.2-1.module_el9.7.0+224+0af7cc6b.noarch.rpml�Pnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm,�&nodejs-20.20.2-1.module_el9.7.0+226+88d36870.x86_64.rpm�#�Fnodejs-devel-20.20.2-1.module_el9.7.0+224+0af7cc6b.x86_64.rpm�	�nodejs-packaging-2021.06-6.module_el9.7.0+226+88d36870.noarch.rpm�
�nodejs-packaging-bundler-2021.06-6.module_el9.7.0+226+88d36870.noarch.rpme�&nodejs-full-i18n-20.20.2-1.module_el9.7.0+226+88d36870.x86_64.rpmd�-npm-10.8.2-1.20.20.2.1.module_el9.7.0+224+0af7cc6b.x86_64.rpm���
�+	����TBBBBBBBBsecurityImportant: bind9.18 security update��?�https://access.redhat.com/errata/RHSA-2026:7915RHSA-2026:7915RHSA-2026:7915https://access.redhat.com/security/cve/CVE-2026-1519CVE-2026-1519CVE-2026-1519https://bugzilla.redhat.com/24513052451305https://errata.almalinux.org/9/ALSA-2026-7915.htmlALSA-2026:7915ALSA-2026:7915
�R�tbind9.18-chroot-9.18.29-5.el9_7.4.x86_64.rpm�S�tbind9.18-dnssec-utils-9.18.29-5.el9_7.4.x86_64.rpm�Q�tbind9.18-9.18.29-5.el9_7.4.x86_64.rpm�T�tbind9.18-libs-9.18.29-5.el9_7.4.x86_64.rpm�U�tbind9.18-utils-9.18.29-5.el9_7.4.x86_64.rpm�R�tbind9.18-chroot-9.18.29-5.el9_7.4.x86_64.rpm�S�tbind9.18-dnssec-utils-9.18.29-5.el9_7.4.x86_64.rpm�Q�tbind9.18-9.18.29-5.el9_7.4.x86_64.rpm�T�tbind9.18-libs-9.18.29-5.el9_7.4.x86_64.rpm�U�tbind9.18-utils-9.18.29-5.el9_7.4.x86_64.rpm���-�,	��,��_BBBBBBBBBBBsecurityImportant: bind security update��?�Zhttps://access.redhat.com/errata/RHSA-2026:8075RHSA-2026:8075RHSA-2026:8075https://access.redhat.com/security/cve/CVE-2026-1519CVE-2026-1519CVE-2026-1519https://bugzilla.redhat.com/24513052451305https://errata.almalinux.org/9/ALSA-2026-8075.htmlALSA-2026:8075ALSA-2026:8075
�!�bind-dnssec-doc-9.16.23-34.el9_7.2.noarch.rpm�'�python3-bind-9.16.23-34.el9_7.2.noarch.rpm�\�bind-dnssec-utils-9.16.23-34.el9_7.2.x86_64.rpm�"�bind-license-9.16.23-34.el9_7.2.noarch.rpm�Z�bind-9.16.23-34.el9_7.2.x86_64.rpm�[�bind-chroot-9.16.23-34.el9_7.2.x86_64.rpm�^�bind-utils-9.16.23-34.el9_7.2.x86_64.rpm�]�bind-libs-9.16.23-34.el9_7.2.x86_64.rpm�!�bind-dnssec-doc-9.16.23-34.el9_7.2.noarch.rpm�'�python3-bind-9.16.23-34.el9_7.2.noarch.rpm�\�bind-dnssec-utils-9.16.23-34.el9_7.2.x86_64.rpm�"�bind-license-9.16.23-34.el9_7.2.noarch.rpm�Z�bind-9.16.23-34.el9_7.2.x86_64.rpm�[�bind-chroot-9.16.23-34.el9_7.2.x86_64.rpm�^�bind-utils-9.16.23-34.el9_7.2.x86_64.rpm�]�bind-libs-9.16.23-34.el9_7.2.x86_64.rpm���T�-	��3��mBBBBsecurityImportant: vim security update���Ghttps://access.redhat.com/errata/RHSA-2026:8259RHSA-2026:8259RHSA-2026:8259https://access.redhat.com/security/cve/CVE-2026-28417CVE-2026-28417CVE-2026-28417https://access.redhat.com/security/cve/CVE-2026-28421CVE-2026-28421CVE-2026-28421https://access.redhat.com/security/cve/CVE-2026-33412CVE-2026-33412CVE-2026-33412https://bugzilla.redhat.com/24434552443455https://bugzilla.redhat.com/24434742443474https://bugzilla.redhat.com/24509072450907https://errata.almalinux.org/9/ALSA-2026-8259.htmlALSA-2026:8259ALSA-2026:8259
�X�vim-X11-8.2.2637-23.el9_7.2.x86_64.rpm�Z�vim-enhanced-8.2.2637-23.el9_7.2.x86_64.rpm�Y�vim-common-8.2.2637-23.el9_7.2.x86_64.rpm�X�vim-X11-8.2.2637-23.el9_7.2.x86_64.rpm�Z�vim-enhanced-8.2.2637-23.el9_7.2.x86_64.rpm�Y�vim-common-8.2.2637-23.el9_7.2.x86_64.rpm���v�.	��<��tBBBBBBsecurityImportant: freerdp security update��`�https://access.redhat.com/errata/RHSA-2026:8457RHSA-2026:8457RHSA-2026:8457https://access.redhat.com/security/cve/CVE-2026-33983CVE-2026-33983CVE-2026-33983https://access.redhat.com/security/cve/CVE-2026-33984CVE-2026-33984CVE-2026-33984https://bugzilla.redhat.com/24532192453219https://bugzilla.redhat.com/24532202453220https://errata.almalinux.org/9/ALSA-2026-8457.htmlALSA-2026:8457ALSA-2026:8457
�`�ofreerdp-libs-2.11.7-1.el9_7.6.x86_64.rpm�h�olibwinpr-2.11.7-1.el9_7.6.x86_64.rpm�`�ofreerdp-libs-2.11.7-1.el9_7.6.i686.rpm�h�olibwinpr-2.11.7-1.el9_7.6.i686.rpm��ofreerdp-2.11.7-1.el9_7.6.x86_64.rpm�`�ofreerdp-libs-2.11.7-1.el9_7.6.x86_64.rpm�h�olibwinpr-2.11.7-1.el9_7.6.x86_64.rpm�`�ofreerdp-libs-2.11.7-1.el9_7.6.i686.rpm�h�olibwinpr-2.11.7-1.el9_7.6.i686.rpm��ofreerdp-2.11.7-1.el9_7.6.x86_64.rpm�ψ�E�/	��?��}securityImportant: thunderbird security update��n�Jhttps://access.redhat.com/errata/RHSA-2026:8459RHSA-2026:8459RHSA-2026:8459https://access.redhat.com/security/cve/CVE-2026-33416CVE-2026-33416CVE-2026-33416https://access.redhat.com/security/cve/CVE-2026-33636CVE-2026-33636CVE-2026-33636https://access.redhat.com/security/cve/CVE-2026-5731CVE-2026-5731CVE-2026-5731https://access.redhat.com/security/cve/CVE-2026-5732CVE-2026-5732CVE-2026-5732https://access.redhat.com/security/cve/CVE-2026-5734CVE-2026-5734CVE-2026-5734https://bugzilla.redhat.com/24518052451805https://bugzilla.redhat.com/24518192451819https://bugzilla.redhat.com/24558972455897https://bugzilla.redhat.com/24559012455901https://bugzilla.redhat.com/24559082455908https://errata.almalinux.org/9/ALSA-2026-8459.htmlALSA-2026:8459ALSA-2026:8459
9�vthunderbird-140.9.1-1.el9_7.alma.1.x86_64.rpm9�vthunderbird-140.9.1-1.el9_7.alma.1.x86_64.rpm�ψ�W�0	����@BBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update��8�o
https://access.redhat.com/errata/RHSA-2026:8469RHSA-2026:8469RHSA-2026:8469https://access.redhat.com/security/cve/CVE-2026-26171CVE-2026-26171CVE-2026-26171https://access.redhat.com/security/cve/CVE-2026-32178CVE-2026-32178CVE-2026-32178https://access.redhat.com/security/cve/CVE-2026-32203CVE-2026-32203CVE-2026-32203https://access.redhat.com/security/cve/CVE-2026-33116CVE-2026-33116CVE-2026-33116https://bugzilla.redhat.com/24577392457739https://bugzilla.redhat.com/24577402457740https://bugzilla.redhat.com/24577412457741https://bugzilla.redhat.com/24577812457781https://errata.almalinux.org/9/ALSA-2026-8469.htmlALSA-2026:8469ALSA-2026:8469
�y�Jdotnet-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm�z�dotnet-sdk-8.0-8.0.126-1.el9_7.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.126-1.el9_7.x86_64.rpm�`�Jdotnet-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm�Y�Jaspnetcore-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm�u�Jaspnetcore-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm�w�Jdotnet-apphost-pack-8.0-8.0.26-1.el9_7.x86_64.rpm�x�Jdotnet-hostfxr-8.0-8.0.26-1.el9_7.x86_64.rpm�v�Jaspnetcore-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm�{�Jdotnet-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm�|�dotnet-templates-8.0-8.0.126-1.el9_7.x86_64.rpm�y�Jdotnet-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm�z�dotnet-sdk-8.0-8.0.126-1.el9_7.x86_64.rpm�a�dotnet-sdk-dbg-8.0-8.0.126-1.el9_7.x86_64.rpm�`�Jdotnet-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm�Y�Jaspnetcore-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm�u�Jaspnetcore-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm�w�Jdotnet-apphost-pack-8.0-8.0.26-1.el9_7.x86_64.rpm�x�Jdotnet-hostfxr-8.0-8.0.26-1.el9_7.x86_64.rpm�v�Jaspnetcore-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm�{�Jdotnet-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm�|�dotnet-templates-8.0-8.0.126-1.el9_7.x86_64.rpm�ψ��1	����WBBBsecurityImportant: libarchive security update��'�thttps://access.redhat.com/errata/RHSA-2026:8510RHSA-2026:8510RHSA-2026:8510https://access.redhat.com/security/cve/CVE-2026-4424CVE-2026-4424CVE-2026-4424https://access.redhat.com/security/cve/CVE-2026-5121CVE-2026-5121CVE-2026-5121https://bugzilla.redhat.com/24490062449006https://bugzilla.redhat.com/24529452452945https://errata.almalinux.org/9/ALSA-2026-8510.htmlALSA-2026:8510ALSA-2026:8510
�*�bsdtar-3.5.3-9.el9_7.x86_64.rpm�f�libarchive-devel-3.5.3-9.el9_7.i686.rpm�f�libarchive-devel-3.5.3-9.el9_7.x86_64.rpm�*�bsdtar-3.5.3-9.el9_7.x86_64.rpm�f�libarchive-devel-3.5.3-9.el9_7.i686.rpm�f�libarchive-devel-3.5.3-9.el9_7.x86_64.rpm�ψ��2	��#��]BBBBsecurityImportant: go-rpm-macros security update���https://access.redhat.com/errata/RHSA-2026:8841RHSA-2026:8841RHSA-2026:8841https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-8841.htmlALSA-2026:8841ALSA-2026:8841
�X�|go-srpm-macros-3.6.0-14.el9_7.noarch.rpm�y�|go-rpm-macros-3.6.0-14.el9_7.x86_64.rpm�x�|go-filesystem-3.6.0-14.el9_7.x86_64.rpm�W�|go-rpm-templates-3.6.0-14.el9_7.noarch.rpm�X�|go-srpm-macros-3.6.0-14.el9_7.noarch.rpm�y�|go-rpm-macros-3.6.0-14.el9_7.x86_64.rpm�x�|go-filesystem-3.6.0-14.el9_7.x86_64.rpm�W�|go-rpm-templates-3.6.0-14.el9_7.noarch.rpm�ϗ�N�3	��'��dBsecurityImportant: giflib security update�� �lhttps://access.redhat.com/errata/RHSA-2026:8859RHSA-2026:8859RHSA-2026:8859https://access.redhat.com/security/cve/CVE-2026-23868CVE-2026-23868CVE-2026-23868https://bugzilla.redhat.com/24462072446207https://errata.almalinux.org/9/ALSA-2026-8859.htmlALSA-2026:8859ALSA-2026:8859
�E�giflib-5.2.1-9.el9_7.1.x86_64.rpm�E�giflib-5.2.1-9.el9_7.1.i686.rpm�E�giflib-5.2.1-9.el9_7.1.x86_64.rpm�E�giflib-5.2.1-9.el9_7.1.i686.rpm��̌
�4	��-��hBBBsecurityImportant: openexr security update���]https://access.redhat.com/errata/RHSA-2026:8888RHSA-2026:8888RHSA-2026:8888https://access.redhat.com/security/cve/CVE-2026-27622CVE-2026-27622CVE-2026-27622https://bugzilla.redhat.com/24442512444251https://errata.almalinux.org/9/ALSA-2026-8888.htmlALSA-2026:8888ALSA-2026:8888
�e�
openexr-3.1.1-3.el9_7.1.x86_64.rpm�:�
openexr-libs-3.1.1-3.el9_7.1.i686.rpm�:�
openexr-libs-3.1.1-3.el9_7.1.x86_64.rpm�e�
openexr-3.1.1-3.el9_7.1.x86_64.rpm�:�
openexr-libs-3.1.1-3.el9_7.1.i686.rpm�:�
openexr-libs-3.1.1-3.el9_7.1.x86_64.rpm�ϗ��5	����nBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��i�ahttps://access.redhat.com/errata/RHSA-2026:8921RHSA-2026:8921RHSA-2026:8921https://access.redhat.com/security/cve/CVE-2025-39766CVE-2025-39766CVE-2025-39766https://access.redhat.com/security/cve/CVE-2025-68741CVE-2025-68741CVE-2025-68741https://bugzilla.redhat.com/23946482394648https://bugzilla.redhat.com/24250462425046https://errata.almalinux.org/9/ALSA-2026-8921.htmlALSA-2026:8921ALSA-2026:8921

$�}kernel-debug-devel-matched-5.14.0-611.49.1.el9_7.x86_64.rpm&�}kernel-devel-matched-5.14.0-611.49.1.el9_7.x86_64.rpm;�}python3-perf-5.14.0-611.49.1.el9_7.x86_64.rpm'�}perf-5.14.0-611.49.1.el9_7.x86_64.rpm)�}rtla-5.14.0-611.49.1.el9_7.x86_64.rpm�}kernel-doc-5.14.0-611.49.1.el9_7.noarch.rpm+�}rv-5.14.0-611.49.1.el9_7.x86_64.rpm(�}kernel-headers-5.14.0-611.49.1.el9_7.x86_64.rpm%�}kernel-devel-5.14.0-611.49.1.el9_7.x86_64.rpm#�}kernel-debug-devel-5.14.0-611.49.1.el9_7.x86_64.rpm
$�}kernel-debug-devel-matched-5.14.0-611.49.1.el9_7.x86_64.rpm&�}kernel-devel-matched-5.14.0-611.49.1.el9_7.x86_64.rpm;�}python3-perf-5.14.0-611.49.1.el9_7.x86_64.rpm'�}perf-5.14.0-611.49.1.el9_7.x86_64.rpm)�}rtla-5.14.0-611.49.1.el9_7.x86_64.rpm�}kernel-doc-5.14.0-611.49.1.el9_7.noarch.rpm+�}rv-5.14.0-611.49.1.el9_7.x86_64.rpm(�}kernel-headers-5.14.0-611.49.1.el9_7.x86_64.rpm%�}kernel-devel-5.14.0-611.49.1.el9_7.x86_64.rpm#�}kernel-debug-devel-5.14.0-611.49.1.el9_7.x86_64.rpm�Ϣ�7�6	����BBBBBsecurityImportant: osbuild-composer security update��J�8https://access.redhat.com/errata/RHSA-2026:9044RHSA-2026:9044RHSA-2026:9044https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-9044.htmlALSA-2026:9044ALSA-2026:9044
�w�yosbuild-composer-149-5.el9_7.alma.3.x86_64.rpm�x�yosbuild-composer-core-149-5.el9_7.alma.3.x86_64.rpm�y�yosbuild-composer-worker-149-5.el9_7.alma.3.x86_64.rpm�w�yosbuild-composer-149-5.el9_7.alma.3.x86_64.rpm�x�yosbuild-composer-core-149-5.el9_7.alma.3.x86_64.rpm�y�yosbuild-composer-worker-149-5.el9_7.alma.3.x86_64.rpm�Ϣ��7	����IBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update���Y	https://access.redhat.com/errata/RHSA-2026:9683RHSA-2026:9683RHSA-2026:9683https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://errata.almalinux.org/9/ALSA-2026-9683.htmlALSA-2026:9683ALSA-2026:9683
�V�vjava-1.8.0-openjdk-devel-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�T�vjava-1.8.0-openjdk-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�X�vjava-1.8.0-openjdk-src-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�U�vjava-1.8.0-openjdk-demo-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�8�vjava-1.8.0-openjdk-javadoc-zip-1.8.0.492.b09-2.el9.alma.1.noarch.rpm�7�vjava-1.8.0-openjdk-javadoc-1.8.0.492.b09-2.el9.alma.1.noarch.rpm�W�vjava-1.8.0-openjdk-headless-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�V�vjava-1.8.0-openjdk-devel-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�T�vjava-1.8.0-openjdk-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�X�vjava-1.8.0-openjdk-src-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�U�vjava-1.8.0-openjdk-demo-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�8�vjava-1.8.0-openjdk-javadoc-zip-1.8.0.492.b09-2.el9.alma.1.noarch.rpm�7�vjava-1.8.0-openjdk-javadoc-1.8.0.492.b09-2.el9.alma.1.noarch.rpm�W�vjava-1.8.0-openjdk-headless-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm��́l�8	��(��VBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update��[�
https://access.redhat.com/errata/RHSA-2026:9686RHSA-2026:9686RHSA-2026:9686https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9686.htmlALSA-2026:9686ALSA-2026:9686
	��+java-17-openjdk-headless-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-javadoc-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-src-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-devel-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-javadoc-zip-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-jmods-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-demo-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-static-libs-17.0.19.0.10-2.el9.alma.1.x86_64.rpm	��+java-17-openjdk-headless-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-javadoc-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-src-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-devel-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-javadoc-zip-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-jmods-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-demo-17.0.19.0.10-2.el9.alma.1.x86_64.rpm��+java-17-openjdk-static-libs-17.0.19.0.10-2.el9.alma.1.x86_64.rpm����}�9	��;��iBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��m�Z
https://access.redhat.com/errata/RHSA-2026:9689RHSA-2026:9689RHSA-2026:9689https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9689.htmlALSA-2026:9689ALSA-2026:9689
	�t�3java-21-openjdk-src-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�u�3java-21-openjdk-static-libs-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�s�3java-21-openjdk-jmods-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�p�3java-21-openjdk-headless-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�n�3java-21-openjdk-demo-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�m�3java-21-openjdk-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�o�3java-21-openjdk-devel-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�r�3java-21-openjdk-javadoc-zip-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�q�3java-21-openjdk-javadoc-21.0.11.0.10-2.el9.alma.1.x86_64.rpm	�t�3java-21-openjdk-src-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�u�3java-21-openjdk-static-libs-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�s�3java-21-openjdk-jmods-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�p�3java-21-openjdk-headless-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�n�3java-21-openjdk-demo-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�m�3java-21-openjdk-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�o�3java-21-openjdk-devel-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�r�3java-21-openjdk-javadoc-zip-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�q�3java-21-openjdk-javadoc-21.0.11.0.10-2.el9.alma.1.x86_64.rpm��̅�:	����|BBBBBBBBBBsecurityImportant: webkit2gtk3 security update��G�&https://access.redhat.com/errata/RHSA-2026:9692RHSA-2026:9692RHSA-2026:9692https://access.redhat.com/security/cve/CVE-2025-43213CVE-2025-43213CVE-2025-43213https://access.redhat.com/security/cve/CVE-2025-43214CVE-2025-43214CVE-2025-43214https://access.redhat.com/security/cve/CVE-2025-43457CVE-2025-43457CVE-2025-43457https://access.redhat.com/security/cve/CVE-2025-43511CVE-2025-43511CVE-2025-43511https://access.redhat.com/security/cve/CVE-2025-46299CVE-2025-46299CVE-2025-46299https://access.redhat.com/security/cve/CVE-2026-20608CVE-2026-20608CVE-2026-20608https://access.redhat.com/security/cve/CVE-2026-20635CVE-2026-20635CVE-2026-20635https://access.redhat.com/security/cve/CVE-2026-20636CVE-2026-20636CVE-2026-20636https://access.redhat.com/security/cve/CVE-2026-20643CVE-2026-20643CVE-2026-20643https://access.redhat.com/security/cve/CVE-2026-20644CVE-2026-20644CVE-2026-20644https://access.redhat.com/security/cve/CVE-2026-20652CVE-2026-20652CVE-2026-20652https://access.redhat.com/security/cve/CVE-2026-20664CVE-2026-20664CVE-2026-20664https://access.redhat.com/security/cve/CVE-2026-20665CVE-2026-20665CVE-2026-20665https://access.redhat.com/security/cve/CVE-2026-20676CVE-2026-20676CVE-2026-20676https://access.redhat.com/security/cve/CVE-2026-20691CVE-2026-20691CVE-2026-20691https://access.redhat.com/security/cve/CVE-2026-28857CVE-2026-28857CVE-2026-28857https://access.redhat.com/security/cve/CVE-2026-28859CVE-2026-28859CVE-2026-28859https://access.redhat.com/security/cve/CVE-2026-28871CVE-2026-28871CVE-2026-28871https://bugzilla.redhat.com/24487812448781https://bugzilla.redhat.com/24487822448782https://bugzilla.redhat.com/24487862448786https://bugzilla.redhat.com/24487872448787https://bugzilla.redhat.com/24487882448788https://bugzilla.redhat.com/24487892448789https://bugzilla.redhat.com/24487902448790https://bugzilla.redhat.com/24487912448791https://bugzilla.redhat.com/24487922448792https://bugzilla.redhat.com/24487932448793https://bugzilla.redhat.com/24487942448794https://bugzilla.redhat.com/24530002453000https://bugzilla.redhat.com/24530012453001https://bugzilla.redhat.com/24530022453002https://bugzilla.redhat.com/24530032453003https://bugzilla.redhat.com/24530042453004https://bugzilla.redhat.com/24530062453006https://bugzilla.redhat.com/24530082453008https://errata.almalinux.org/9/ALSA-2026-9692.htmlALSA-2026:9692ALSA-2026:9692
1�Cwebkit2gtk3-devel-2.52.3-0.el9_7.1.i686.rpm3�Cwebkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.x86_64.rpm2�Cwebkit2gtk3-jsc-2.52.3-0.el9_7.1.i686.rpm1�Cwebkit2gtk3-devel-2.52.3-0.el9_7.1.x86_64.rpm3�Cwebkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.i686.rpm0�Cwebkit2gtk3-2.52.3-0.el9_7.1.i686.rpm0�Cwebkit2gtk3-2.52.3-0.el9_7.1.x86_64.rpm2�Cwebkit2gtk3-jsc-2.52.3-0.el9_7.1.x86_64.rpm1�Cwebkit2gtk3-devel-2.52.3-0.el9_7.1.i686.rpm3�Cwebkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.x86_64.rpm2�Cwebkit2gtk3-jsc-2.52.3-0.el9_7.1.i686.rpm1�Cwebkit2gtk3-devel-2.52.3-0.el9_7.1.x86_64.rpm3�Cwebkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.i686.rpm0�Cwebkit2gtk3-2.52.3-0.el9_7.1.i686.rpm0�Cwebkit2gtk3-2.52.3-0.el9_7.1.x86_64.rpm2�Cwebkit2gtk3-jsc-2.52.3-0.el9_7.1.x86_64.rpm�Ϭ�Q�;	����IBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update��W�Khttps://access.redhat.com/errata/RHSA-2026:9693RHSA-2026:9693RHSA-2026:9693https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22008CVE-2026-22008CVE-2026-22008https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-26740CVE-2026-26740CVE-2026-26740https://access.redhat.com/security/cve/CVE-2026-33416CVE-2026-33416CVE-2026-33416https://access.redhat.com/security/cve/CVE-2026-33636CVE-2026-33636CVE-2026-33636https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9693.htmlALSA-2026:9693ALSA-2026:9693

�e�Mjava-25-openjdk-javadoc-zip-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�b�Mjava-25-openjdk-devel-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�d�Mjava-25-openjdk-javadoc-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�h�Mjava-25-openjdk-static-libs-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�_�Mjava-25-openjdk-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�g�Mjava-25-openjdk-src-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�a�Mjava-25-openjdk-demo-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�c�Mjava-25-openjdk-headless-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�f�Mjava-25-openjdk-jmods-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�`�Mjava-25-openjdk-crypto-adapter-25.0.3.0.9-1.el9.alma.1.x86_64.rpm
�e�Mjava-25-openjdk-javadoc-zip-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�b�Mjava-25-openjdk-devel-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�d�Mjava-25-openjdk-javadoc-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�h�Mjava-25-openjdk-static-libs-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�_�Mjava-25-openjdk-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�g�Mjava-25-openjdk-src-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�a�Mjava-25-openjdk-demo-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�c�Mjava-25-openjdk-headless-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�f�Mjava-25-openjdk-jmods-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�`�Mjava-25-openjdk-crypto-adapter-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�Ϭ�>�<	��1��^BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��"�https://access.redhat.com/security/cve/CVE-2026-31431CVE-2026-31431CVE-2026-31431https://bugzilla.redhat.com/show_bug.cgi?id=2460538show_bug.cgi?id=2460538https://errata.almalinux.org/9/ALSA-2026-A002.htmlALSA-2026:A002ALSA-2026:A002

;�~python3-perf-5.14.0-611.49.2.el9_7.x86_64.rpm+�~rv-5.14.0-611.49.2.el9_7.x86_64.rpm&�~kernel-devel-matched-5.14.0-611.49.2.el9_7.x86_64.rpm#�~kernel-debug-devel-5.14.0-611.49.2.el9_7.x86_64.rpm'�~perf-5.14.0-611.49.2.el9_7.x86_64.rpm%�~kernel-devel-5.14.0-611.49.2.el9_7.x86_64.rpm(�~kernel-headers-5.14.0-611.49.2.el9_7.x86_64.rpm�~kernel-doc-5.14.0-611.49.2.el9_7.noarch.rpm$�~kernel-debug-devel-matched-5.14.0-611.49.2.el9_7.x86_64.rpm)�~rtla-5.14.0-611.49.2.el9_7.x86_64.rpm
;�~python3-perf-5.14.0-611.49.2.el9_7.x86_64.rpm+�~rv-5.14.0-611.49.2.el9_7.x86_64.rpm&�~kernel-devel-matched-5.14.0-611.49.2.el9_7.x86_64.rpm#�~kernel-debug-devel-5.14.0-611.49.2.el9_7.x86_64.rpm'�~perf-5.14.0-611.49.2.el9_7.x86_64.rpm%�~kernel-devel-5.14.0-611.49.2.el9_7.x86_64.rpm(�~kernel-headers-5.14.0-611.49.2.el9_7.x86_64.rpm�~kernel-doc-5.14.0-611.49.2.el9_7.noarch.rpm$�~kernel-debug-devel-matched-5.14.0-611.49.2.el9_7.x86_64.rpm)�~rtla-5.14.0-611.49.2.el9_7.x86_64.rpm����W�=	����rBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update��!�https://access.redhat.com/security/cve/CVE-2026-43284CVE-2026-43284CVE-2026-43284https://bugzilla.redhat.com/show_bug.cgi?id=2467771show_bug.cgi?id=2467771https://errata.almalinux.org/9/ALSA-2026-A005.htmlALSA-2026:A005ALSA-2026:A005

#�kernel-debug-devel-5.14.0-611.54.3.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.54.3.el9_7.x86_64.rpm+�rv-5.14.0-611.54.3.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.54.3.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.54.3.el9_7.x86_64.rpm'�perf-5.14.0-611.54.3.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.54.3.el9_7.x86_64.rpm)�rtla-5.14.0-611.54.3.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.54.3.el9_7.noarch.rpm;�python3-perf-5.14.0-611.54.3.el9_7.x86_64.rpm
#�kernel-debug-devel-5.14.0-611.54.3.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.54.3.el9_7.x86_64.rpm+�rv-5.14.0-611.54.3.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.54.3.el9_7.x86_64.rpm%�kernel-devel-5.14.0-611.54.3.el9_7.x86_64.rpm'�perf-5.14.0-611.54.3.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.54.3.el9_7.x86_64.rpm)�rtla-5.14.0-611.54.3.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.54.3.el9_7.noarch.rpm;�python3-perf-5.14.0-611.54.3.el9_7.x86_64.rpm����>	����FBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update�� �^https://access.redhat.com/security/cve/CVE-2026-46300CVE-2026-46300CVE-2026-46300https://access.redhat.com/security/cve/CVE-2026-46333CVE-2026-46333CVE-2026-46333https://bugzilla.redhat.com/show_bug.cgi?id=2477015show_bug.cgi?id=2477015https://bugzilla.redhat.com/show_bug.cgi?id=2477802show_bug.cgi?id=2477802https://errata.almalinux.org/9/ALSA-2026-A009.htmlALSA-2026:A009ALSA-2026:A009

;�python3-perf-5.14.0-611.54.6.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.54.6.el9_7.x86_64.rpm+�rv-5.14.0-611.54.6.el9_7.x86_64.rpm)�rtla-5.14.0-611.54.6.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.54.6.el9_7.x86_64.rpm'�perf-5.14.0-611.54.6.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.54.6.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.54.6.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.54.6.el9_7.noarch.rpm%�kernel-devel-5.14.0-611.54.6.el9_7.x86_64.rpm
;�python3-perf-5.14.0-611.54.6.el9_7.x86_64.rpm#�kernel-debug-devel-5.14.0-611.54.6.el9_7.x86_64.rpm+�rv-5.14.0-611.54.6.el9_7.x86_64.rpm)�rtla-5.14.0-611.54.6.el9_7.x86_64.rpm$�kernel-debug-devel-matched-5.14.0-611.54.6.el9_7.x86_64.rpm'�perf-5.14.0-611.54.6.el9_7.x86_64.rpm(�kernel-headers-5.14.0-611.54.6.el9_7.x86_64.rpm&�kernel-devel-matched-5.14.0-611.54.6.el9_7.x86_64.rpm�kernel-doc-5.14.0-611.54.6.el9_7.noarch.rpm%�kernel-devel-5.14.0-611.54.6.el9_7.x86_64.rpm���UFor detailed information �changes� this release, see�e AlmaLinux R� Not�0link�Nfrom�'Referenc�sec�^.�3x�w
XZ Util�]s an�ctegrat�7coll�& of user-space f���mpress�u�@iti�Wb�}d���oLempel-Ziv-Markov�ɡ�algorithm (LZMA), which per����ossl�[ data�i. T�W�?provide�� highÔr�?�Y��keeping��de�%time short.
Secu�Wy Fix(es):
* gzip: arbitrary-��-w�%e vulnerab��y (CVE-2022-1271)
��mor�o�ա�bout��s�gissue(s�includ��im�gt,��CVSS sc�G�
cknow�gments,���j�/r����8,�f�to�R�� pag�m�s�,��Vi��Vi IM�aed)�upd�g�yim� ver�J�$�Ovi editor�Pvim: U���.Out-of-r�� Po�{r Offset��v���V0554)�@Heap-�lBuff�6v�=low oc�ts�?943�?�y��420�2h�r b�lo�l�+621�+�&-read�'9�'us��f�{free��utf_ptr2�)r�51���SExpat�G C�.b�N f��pa�?��XML docu���<e�C: st���haus��v�9type�M�;2531���=����in�8pyStr�8()�:�w�1kernel p�va�Iconta�3��!,�����any�ope�N��sy�om���C: Small table��turb size��TCP sourc��x gen�^o�c�nl�:����k�012)�{r���di��U_ev�f_�ƤTs�Upriv���escal�^�Y7���Ya��-��-�����net���sub�$���l�roo�q966�t�o�mIP�� ESP t�s�code�76�K�
Bug�`make SHA512_ar�1�.s�CRYPTO_USER�4��-ins (BZ#20726�SR-IOV�gan�*> 50%���d��3483�fix�rrup�iau�yby dm-�1	��982187�mCTP cli�$-sid�eloff�ns [al�(�_-9]�<404���#��n�	f��in��asymme�c�<u��itu¼8548��F�6�zb�fMultipl�jT VMs ea�Bw�m m�vCPUs�E696�6spec:�����^a��tools�hd�-9�u��c�����
���eeh_p�C
�%
ob��:��vm�o�n��cap�/ed�
��kdump���ggere�n2255�n�Y
�
underX NIC d�j�pas unmai���7638)���D�,�G
�mm�L���c�te����sev�l dif��t
st��7�K��s�KGNU�r, cpio�/ISO ��0 CD-ROM�j�.
L��is �f��Jy�'bsdt��sy,��rip�l��uag�"in�ws
su�$s python-�񤄦�popula�sktop���ag��	���J:�
o�O	�Znds�+via�Mmpon�+ �Jx_lzma_al�_init
�62���7�
�<�
�l�inpu���Jth�h�ule�Ģdevi�9�	display �rs��applic��s�Ene�Ndir�sly�H�����X���%:�� s����m���
��215�	K�j�LVir�Jl�U��n�NKVM� fu��v�iz�solu���*	�va�����D	�%t�lur���qemu-kvm�	�����h�:�_runn����m����J����QEMU:�8io-�:�<p�J	�P��err��u�
�Ye��35�
�Hhost-vsock�Iis�p�]queu��w�V�	me�(�^k�_�g��9.0 g��t���6���<�l��e��;>�8.6�1102)Mozilla�bird���#
nd�g m�Z��newsg�4p�.
T�O����	���K�
��91.11�_��: CS���jbox�0d�L���`�ow-�s`�be�D	pas�z�/re��ge�ijava�+�.RI�,34468)�uU���nsSH���j�870�8A�p��nd�]could�������a way��l�
h�dd�@ ba�� web�T
���p9�pM��saf�bugs�`
�iFi�}�7�׫��ESR�{�Y84�nd��� 	at��bu������a�n
��oto�.�����20�&�ɳD��a��0�}g O�S
PGP�
gna�� �Lwas�|cept��s�lid�c26�c�9� en���[sty�1he�j�
�174��5il�yPAC����ul��O�freq��s��ebl��ed�2�XPo��i�u�=Re�ceEle�eA�8�Squi�V�f-�@
�Jx�,�
�����fs,�p���"FTP, Gop����HT�'
�b
ob����s��: DoS��xce�zg�M�|��p�/	es��1-467�/����-��jdk�A��JDK �1J�/ Run��En�on�����+Softwa�!D�lop�,Ki�*������xhave�Hen�?�3a ��r�� 
�D:�(�S0.16�8).�77�C�����t�	�"���BXa�
-J (JAX�m82�07��3416��Ocl�{�r	il�N(Hot�Pt�F1859� 1�X�F�p����I�rMe�dH�.invokeBasic�o�a��a�?�	rh1991003 p�E br�
s�#n.��.pkcs�wr�
er.PKCS��In��ce�7�@,��P�[�L9�e�#�G�YKey�je/im�z���^
don't����KA_SIGN�M��FIPS���g�{107�ǡ{R�ct�
s������1�@��e�6�=ge���v���h.8.0�-8�,�*�T+��(�.342.b���06�$08�/���V/�z��95�V.�u�-Graf����	n�%�, fe����h �u�shboar�g�qh���	
G���, InfluxDB &��TSDB�e���Au�account�3ke�g��107�$�7��	7��	�+�T���(17�4��	9��ara�tm����\s��L�8��J3875�J9��Pr�ous���\s�&"��a�b��he �)�+  �A���i��rd��fac���S�N�i�����%��a���"m���u�mo�i�*����5at���%de��d�E%i�0��=�\�g�!e���3����<�����/W�0p�v,����q��w�f��B����la������e�U�`�9�w�ce�<��/N�����figu����105395�ޢ/r�'�>���T'�ma�;���v���_�8i�~u�Tbo�h-D��}�HeS�P�F�=���U-D�.��.fips=f�	e��,�ڢa�n�{�������r�'�{�F�1l��E��ha�}�
r������I��i��7��e��,�Ṇ���1�� �x	��M����a���7ule�ss�- �����(�!� ��ed¶3����\	-�"� brows��g��:�rd��li�,� ��{����|t��2�U�U����3���.1�50��LD��O��xe�bu�F�\��*f�t*�URL��amet���631�Mo��Pos��#�of���C�0�)#�G�FGo T�!�!�8
s�+Go��� � �!��l�b.�,���Zn���.
y ��n��go�<. �6
���
�r�	e�*�Q:�%�R/�p+��'R�O.���0��)�I��/http��	�����T��.En�4%����V17���Ugo/�Y(er̛��"P�*�s�M962�Me�w/xml�PDe��%r.Skip�W81��io/fs�BGlob�(0�:�Kh/�!��B��U�#rsh��F3�Fgob���K�����$#: NewS�]leH��`seP�- omit X-�war�n�	�$wor��j2148�vC�	��
�t-git�`es��9�b�]U�XGo�J�I7�L�+8�PHP��HTML-embe��	��$��m�S��$��Apac��S���:php��ssword��ex�ve�^ ng�M�4&��F)� ��o RCE���-�4)�N�/O��%Wr�+�88���*o�*�0+�_reg�)+_�>�
r�xp.c�K897�K�S/i�-/�Embyte�D927��M�a�F���)-�%$,�th��BSQL�Hb���
�*is�(��(omp����pMy�4���0gal� (26�	11), m��db�0.5.�_�ysql-sel��(�5)�p�=: ���ou��3�M9�w�@�:ack��_����
on�_co��_to_in�(%��-�K�xBIGINT��!�O��J�E6�l���2�h�� �f�U�o�@5u���T�f�\'o��~0�wi�a�g-�;��&���0,8˒����ex�fnc��/�k���]�.���o��,�v50�	a��v(bef��u��i�"a�(�t,ifi��51�uCONNECT S��REng�'�4P��(E��(V��5�p2�p�ir�3�;���I�_��s::walk�
�D73��D�poison����
ex���i�vol�i�.%�	�X7�X��cr��0�,_tmp_�1::f��1�F8�F�(��_�B� or::�e_r�*_��X9�X��my_d���::�uor=�A80�AField::�
�Ifa��H&�=�y�)f�^�s���2�c�T���R���f�x�!�[s/�`_�w_�a)_��_�^�o�S���y_�$ca���8�~8���I��4�N0�*���V3�V�#ɺ�2e�e::�-_�vr_c�t	_�/kǮ4��e��N%ry_are������$��SEL����(view�`���d�(_��_s�8����V�]HAVING��NOT EXIST�d�|��a��&q��+��c&�����_el�f445��IS NULLޡ�_�;B��Ti�&
:�_�M7�&ɤ���v��B
�it �Q*���G�R�4�/i�L�3.cc�A�;���)�in ����;�
ORD�4BY�O5�
�‘�u˔5���LWHERE�$�h�	�n�er�	
�in���d�(˩VD�3:��/���_�ȴ�in����K"d��ue"�-�:�=,g�D3ique�P�$�)o5�'��)�T�Pun��d����/�=b�up/ds��
���
2�Xk�C���c�5�VIEW�=gg�
�\�9�S�|
5���n�L�fi��_�:��d�����^�*n�
���9�b(CTE��1˚�13���_�,::�Vɹ�er�G�>���|3�|�+�&��_p�'jo����a��#��
�ă4�� ���P�8ȏbe�c8�j��k����Ĉ5�-�y��~D�2IN�	�8�b+�S+=���3��csi_i��>l�>049�[�k��c_��1_�y<��s��	d/cls_api�0�[�9 ower9��LPAR�';t��:�Sha�xp�,.����:�(#s��[H��&22��H��$����+�:�_D�y�ss-ng�`���Ts�O�F5��fi������|nam����>3�gfs2�;�=��<�Ll�?3�i�N en�q5is��Dght�K7�9�Ki/o���i�~
��u���:�K��;� �g��
���)372.9.1.el8.x86_��[82�k	��41�0'es�2'�&3�SSATA� 7�#G�+5���re�����3�?5���F���lo�+��<�{Oops ���� l�t�[ �?�IRIP�q�+_� _�_�\2el�r	�g�?�!��718�D�l�	
BUG:�U�H���:��tas�D�(n����5fs4�ton�
�;��lookup�r��lpa��ɢ�: ��8��of�4d��a�"i�6�/[#�F,����+tu�bon��t�D��(P10/ ibmvnic/����L)��30�OS�����^vm��O�U��m��q�\e�'���)
Enh��^�'�B�u/vt-d���@DMAR_UNITS_SUPPORTED��(" ���U53��.NET�V� d��7'f�z�D.�5����a��A�qo���C�- API�^	s�]=n����i��P�u CLR�Z��.
N�/�����_�+$�v6a��;���9#�5�p:��U�'�VS�9!�z1108����f(�1��dot�F:Ext�$E�2�"I�5�K:��E�6v�?���.47�x+�:���8��m��>������?�h
d�v�����o�#�>�(�^<�#�oc���
�7,�e5�DAP���{:�f����en��6of�ti����8�5�;Un�5��j7�+#�57�5��-KRB�m�t��2�C*��$�T�;3����#A�:�*#�vXSLT���-�8�9Cro����(�<D�I�_%�>inhe����%nt's�+�e3�e��$4�>�2;�$2�Y7�!Y,�V,�m�z�m�$D�����;p�P:��PK11_C�'PW�S6�
�'3�'�j>��*SSL�@��'ki�����
�<��e�2���Lay�r(�:)���'�
���(TLS)�Xas��ll��E-�_
��A
-pur�
e�typt�(phy���L����S���9h��$��x����?129�G�CS�!r��C�N�/urn�Ca�R�r�">�}�@_NOCHECKS�o3�<L�oOPEN�H_LH_��4s�"�6re��s�D���D��� ��~	8�GAES��B��0�� so��#s�>�P#���S�3�1l�HI�n$�71��mgnutls��FFDHE�8032� �. �T�Z3DES�+�3�v4����Bs��
�uD��3ll��&c��
v���,�|��L��N5508�]m�U�C�`��ECDSA�
�
��k��/�Z�T��s_��-�w
�ip256k1�>�[�X�xM19/X���S6�UC�o#�X�8p�-on�Sl�+���FKAT�8�$=�1RR���s�������Pon����23�+�q�s
�G
�u��Y��O�Z�t��K���w��su�&�]�|i�N5�(O�5[IBM��HW�$T] POWER10�pPe���/�5�\�y�G�|[���� �1ew]�R-�R�*��1�*DH t�Tg�*5856�*EC�*7�*�S�+8�+AND�,9�,zero�-�,�_�,HKDF�5mi��1�47�?�Q��K�4/��go�"�~
���VM��6�S�k����I� �.L�!�K���9us����ri�%��K.
�X�!�Ivm-��/:��4�dT��M�h�]�4	16�4	�5	���Z�6���9��9����9�Q��D�Of�-�- ASP�]C�MVC������/�s-�"
M�lS�=D�Q;�r�u��.�0�Y�wRub�xa�< �o�w+���pr��L,�Z)�en��(/���O"�?����xt�)�Ȣ�M������sk�9�4�+r��(�p4��=1�e]28)�J��Iu�!�
R�-��=�
87���:��)�S�r�=�[��-F�6t�����E�l�9y��(���.�>�-i��L���M�	daem�0�-d�!m����k��5�a�86�6H�w (��E0�J�,8���J�2:�2�6	t�zer��Xun�B,d�>�6C(��X�g2r ��Z?41��4�35�6�7�8�40�52�9�6�78��$�D�v���3�N��N�N�$V5�VInno�"�/��j1�51�2��DDL�/�2��2*�iFTS�$=27�NG�'�Plu�K�#c5ʲPAM �E�ZJul�Z5�/Zε�Log��#R60�R�!`�
50��5�;526�7�8��O30�1�53��o69��R
�"5�+��T�3����(2�gP�=	d�!�.�22�v��ede�yd�$@4���: E���#_�d	���,D�2logro��E��
t�jr��(���l�VN�.j�G�}
�$d�BIp���^��B�fas�I�Z��
�;%��E���IS���Z	�2?�7�5Y	n�ϡ�(�_S�bS���-���	2�9�t	�$�?��
��	�G�$:�Mt�NX��
��c� INI�m�u0-778���Hg��4-���og�`�s,�� 0��4��Ka��
-�O:�JRe�WV) m��XANSI�'����%�D1�7�lr��ze-�� �B��!��B�43502����p�] �o��
���7v�%.git��S.�+��C��<lu��ir��ve�W�
a�A�C^��92���DNS �V'�,b�7-�4epec�.�y6��7 �	'��2�!1���I"�[Y smugg��T/flaw����,��|�A�\3�\i��/de��a��Af�.ƺ4�]�-���w
l�L���@�u_�ng��L�z��6��3�v����&X �:^���_39�4���16/��Re���^�~��N� 16����I�M1�)��7� y���?-��-icu-��-�u�#�(str�m��f���a��e�V:acy�*�*,(GnuPG�e*GPG�?b����`�)�W�9�ig����3'�x�� �*���q]�7S/MIME�!��gpg:�(�'� ��/u�-r��f]4�9+��/�l�k�1p�'^nft_�9�8�f��/�g��H�?�	of��B�Rd���>�S�W2�Z20��$R��+/mlx5�jnu�jDr��l��NX�#ntr�����/7��
�8,�Bt�C�+"d�B�\-�\ke�,ex�tOp-�.��G5�wF�'�J0�)un�1�U`M��"�u-�: WR��0x��V��amazo�4.32x�i�P�n9���nX86/�
/UV��-S�T/Fi�[KUV5�
�77�G�l�!:�#�2�-sync s�\��
��0��.b��>mq_�]2_�h�-	_�Ma[9�J
0.z�w11�O��NVMe/��lder��a��k�
n-�doni�p�s,�nic�^77�WAd���[nvme�Ӫa�0-��7��(/tcp�9�iV�Fs��tag�3Brq(�)_�)��l(q��f)�O�'m��I�Q��R
b���Y�&929�x�2 9/ppc64��	I�]�#�
& "�T�
���"�=�a�T�wlscpu�+"�17���,/
*�/� ��H��vw�J��1AMX�	�2amx�0C8, �	bf�- �H82�L1���G
�pm�#H�!4�!avf�"19�Q&i40e�"�dWeb�VGTK�I��������'l�8(re�+�e�	B�:�q�B��7��x�%2gtk��&2.36.7)��+�*:�4�(
�@�Rf�k�x��R:�289��])*�**��(�**���(B��f�SF�Po�����=���dE�B�k����4�_"�
�	)-�5��9UTF-8�C�Y��L����)5�.��)3�Y��*���"e�$����#��4���
__�M�n__�8p�vix�8�l�[�gs��-�g�4-��Zh�C6�C�h���s�T���C�j��WASM��ARM64�T�
�-�0��0�K�GL�n�n��S�-���6�_#�r�Jl��)�2n�N��jME�z8�&resh ����G/-2022-3033)
* Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE�R40959�SData-race when�0r�`non-UTF-8 URLs i�Thread�L60�LMemory safety bugs fixed�?Firefox 105 and�ESR�2.3�Y2�YR�Yte cont��specifi�Yan HTML docum�that was n��#side�'iframe's src�. at�8bute�.ot block�3����ċA�G ele�p��email��uld �[gger a��twork��qu���]4�Ca�6x SDK�@ndl��with Th�
erbird vulnerable to denial-of-service��ack�e60��KSec�J C�Zxt�L for��oki�D��__Ho����__�8p�ǡ��d8�l�[nt-�1ity-��base-� b���C6�CIncoher�n��u��cach��build��WASM�ARM64�T7)

F�ֱ�e�9t��s abou�6e s�� issue(s),�mclu�W� impact,��CVSS sc�G�
cknow��g�s,�!oth��rela���Mma��, �2����R�����m li���R�&ences���:.T�Berk�{y�ter�\ N��Do�|n (BIND)����mp���y of�X�)�5Sy�rm (DNS)��otocols. �E��es�� �`��(n�8d);��.ol�libra��(r�Kines�=app��{s��us��i��fac�W�Z�~;�7tool�=�Wify�za����i��p�t� ��r�"ly.

S��Fix(es):
�Hbind:��9��s�Qfig�Ǣw �7w�Yfrom�Y��zero stale-�!-time�3may ��mina�Dunexp��edly��8�'��m�$leak��ECDSA��SEC��/����E8177�Fs�Gd�G���Expat�� C�z�2�X�s�e�E:�Cus��f��-free�xdo� fun�n�xml�de.c�Z674�TSquid�Thigh-p���Xnce�xy������pweb cli��suppor��FTP, Gop����HTTP d�n obj�r��s��:��ff��ov��z��SSPI�LSMB auth�v���131����gnut��p�v��	��v���3GNU T��	�p Lay�h�N(GnuTLS�g�,�tich�
�ryptograp� algor��ms����ѡ6�	SSL, �R��D�	��Nettle�1�O�����Bign�dfit easily��alm�Ry��	xt���N�kit��7-��en�=langu�,��C++, Pyth�}�2Pike,�f�l� LSH�!�GPG�+eve��k�Rl�c
��䪈follow���have be�2up��d�@ �r��eam�s�s:��(3.7.6�nn�;�8)�	�3:�u��	�d�&���_pkcs7_�'.�2509�

Bug�[IBM 9.1] [P10] POWER10 �enh���4�y:�u-��r�	l �(BZ#2�58�(A��M�d�K��AlmaLinux���385�!DES-CBC��
g��{�� FIPS�41531�a�h���
�u��R��keys <2�2�Fm���K9770).NET���
�ed-softwar�9�	��. It�a�9bs�@
�
�C�- API�sev�i	l�?w���i�� 
CLR�n
�"w�s�d�`�add�	������il�
��n�av���E.�
e�Zd�f�U�'�V�3
 6.0.1����Run�	�0�jdot�: Nug�
�	poison������via�.ld-w�B�ڤ+di�~
�	��:�N�g.js�X�Pd�lop�} p�p�k�n�
fa�(scal�(���yJ��Script�{g��m�D��. �6�n�ϡ�(16.17.1�{�':��a���omn����WebC���ge�z35255)�>�R�Smugg�Odu�in��
�"hea�,��l�o�[���j��-17-�
njdk��O�J��17���Environ�y���+S��D�Kit���?:�r�S MultiBy�r�;��n�o
�`�
 �
f�(JGS�	82860�
�16�
�eexce�{����
����:X.� ce�G�e�(���h5��h26�hHttpS�no��n����limi�L��twe����2�c9���c�̯2ha���lo�NTLM� h��	�4s�á��,9�_ns�jic�F��iz�+�hJNDI��numb��(���0ƿ4�_mi�NI�����/2 (N���O936ï3939�h	Prep�6or�4n�quar�R��n�\releas��10, �Z0.5) [a�0	l�:-9]�329���	.8.0�8��*�&
�o���1��1���+�p�1�V7��1��)�� �����ur�{�Dbrow�W,�+���undar�com�7
��,���/��7��b�'�
s�}�9���w.0��1�"��4���JS��Egin�m�viol�k��U�[��cross�/� ��292�� C��up�JS��g��:�&D��������ni�
w.pri�e�>���} 6�d�} 4�Y����6 �����e � ����sg�p���w�L�{�w�� ��fon���� by �lciou���ad�2ist�or�7924�)��������g!9�x�-j���e1�e���"h�"c�l�b�3�"�P7�'�/¾��=����1� ���;�<��e��4%��(�:)�(����f,�well�a�Kll �r	ng�,�a�{purpo�|	�� �h�	���:�kE��A�yB��O���c60���>Vari��L���N78�z�m��a��-��l�^l�"��mp�0����U
d���dif�w��" ���
�*p-�E&d��. or�i�f��
�
�.�1rg�szip��
ra���43������a�3���!,����c����}%s�C&����cpu ��r�J�C%�m�l �vile��e�=����cUn�(d�T��K�c&PTRACE_SEIZE�W���O_SUSPEND_�)%COMP���`3�-)������cras�+!��^boo�T14/G2 AMD��^p (mt7921e�iule)���)5�,execve���A,�.nt�D+c��ed�666���Jbl��scr��vVGA �Uput�
some�Ns.��201��need�Q(o��a�+y��hee�,�DRBG�f�
mi��y��c�f�N�'�)�v�x�)watchdog BUG:���k�.- CPU#30�u����
34s! [sw��er/30:0]�O785��U�V�,��5.16�"�A	Bad������L qemu-kvm  pfn:68a74600�?��vfio�(�Em����s�����2M �H+a�5�>879���Vhpa�2)�9�� 

E��!(��N�lo�!e hpilo���q&� HPE RL3�
Gen�"���, (aarch64�f94���&$���*��T,�a�Gve,�u$���_%�
!�3��cl��,���g��y�b'�v�cdy�2�5%�.type��d���l. �����t�C+e���B�9���C�pi���b	t�
��=
�&���sp�}:�u()����PyL�_F��St�$�doe�L/�wam��dd�pt�gv���)�pt�t��o��$S�0�g735�pPubl��K�-fra��.�@(PKI)�b
e�s�Qda�����A0i�,�4	�$C�C��-��ki-��:���O�Sxt��ee�yt��/�2�J+�XXE�41�	lua��
�]�ILua��pow�tul�V�G-�N���dn���".�V�lso��'�("ntl��d�
�\,�-��� #����:�%��G_err�Cs���de�.c�"un��ro��r�a���)�7��<	30�)Im��B��$e�i0�&�[����$cus��z�MOS a��ac���*VM�̳S��OST��
�
mi�%�
use�'s�S�((��hood��go��: ��h/bi�	�l(o���
.Flo�`'nd�
R�:1�T��pan�i��'en�0d m�	��i��Th��,����i���(���j�n��218�&��i�
��Ch�hes:�Ҥ��j�
c�%�Ti��', se���R�BN�\�,n��	���podman��l��)s��`�.���g��s��)�D.r��)��<����3���f�v.��5��!�#���Kub�4e�N��.org/x/�-P��n��P�EAc�UL�U��l�)-u-�Z��3288�#�-g�v�Ycp47 tag�f�)��:��m�`e�D.w�Fgvp�?1��Qboun�Ma�	IP�1�(��R�8�H��3r�
�_����s�Q
as ��i�;���X�T��d�R
�*�B/s�8��:�~	��c�[�>29�^�X-/h���6l��� eP���Yw���es�firs�
�emp�,�l33��,�l�/�/�> ��wr��
���A-�-�t�
���_45�u
�_�"in�}�>�ws��	7�271��>�sk�f��!mm���fyou ins�j7�]�7���g����-�� l��Q���/�cre�U��y��les�,���4J����
y���g���n�(r��v�9fa�%�	�Np�t�����;�s�����i���c�35��cg�-f��5�' a����|�
�g	nd�E�:�
&tua��Wdisk�����y:���_�T2��
���t����<��-��<�T�	��l	�be�t���6b��6�<�����#�W����</�[�>�&ics�i"�M���:�on��S�6y/UUID/��&�*, ��r��scr����m��0�K���FV�hM�h(KVM�K@���(�F?u������]�M�/r�Itec�V��5���p����-�}9���_run�5����.�6)4��(��.0)�0647�FB��QEMU�qcd-ehci�MA ���Ec����u�	�7�G"�Nfdc���aad�=�qf�U�L507�L�5l-hda:���a��a�
,�s�r"��+�K6��KNULL �e��r�]��pci_�$7e�Yhw/acpi/�hp.�~415�Ay�%-v2v��c���G�Rc��U�C�cKVM�	�') hyp�
sor�
��E�Xi�I�3�;�
�����wbo�
�p���4��:ssoci���N�+�ta�.�zso,���O�9� ���ۢ�IO driv�po�~	�k:���H$��PP�b$���Googl�J�/����.�3�Ce�*�$�d�? ��/yet��
�R���/#fl�5�,�8�"��Bom��me��is�U;seri�8�����9I�d:n���ar��.�mbol�N�%pt���25��=�GI�"(��C�M�pul��P�i��I�!�'	si� �*e����,.�R���<m�^�box����	 ��#�r?n�}C�;e�#��b-p�8)l�W�9���A-a��.�y���ts�I,��m�4-�u���g�2:�	�Nough��cr�Q	d XCF��}� 6�H�Cu�f �*��
&�C�$����89�=Spee�[1 pa�9N��H(�� �be�P��0�Ach����vo��Run��a��#w�1t-ra���Zx:�h����f#��_sa� +s��
�I�GWAV��93903�Cp�
�Z�ls�$�D��B���#n�N�^��cap�3�
�>���X�
)�vn��D�,�����Nr�������_�~ed�#�4���(8.5��031����
�3�F8�'���nw�ۡj���NumOfNWF��<	�:�	:08���>�ah�
�Qli�ng�� OCI�Qs�^
m�`�>t�D:s��c�'�to:�(�@ �Y:�N�6i�B�A�8����#���i;�V�$�K�l�W�$�=T�va��ck�F��;��!���-�
��K��Hl�sU�]*�R9��,�(ur�z#v�Md�h< �i<�N��5�N�W�m�h��2���s�
��[c��0�Gn��
6�K9�AL��,K�>[
FriBidi�]
�$���
�	��K��s�J�n�%ex��	 Hebrew, A�Lc)���a����play�^d�7�^�:@�;-,�X"��*�Ftself��l�$����t�Plog�M-�>����
f��Z���
8� 9a�3�425�V)�7H�J3�0-��� _�	_rtl_to_�4�SV�N9�NSEGV�>��ve_�marks�=1�AGQt5���
�Qt 5�.�P
5�&Qt�:��M�& �IP��q�QP�0�z:�)2u�b�$�n���?r��
��EO�,�C.f�(%�xPATH�8�mM�:8��N�@FGTK��$�&��@l��@re�*�Ge�	<�:��B�B�,�F�Y:gtk: U�
�1��o�@���
de�M�
�2��D�9P8�P���Q9�QC�[_�
��Ys�I�2��	�B�f�:a�f��<��S=��6700�:c�P9�<P1ơ�6�16�=�7�F��U���:��Ro�2:T��GM�6�=::�"��Es�=��30�?�<�G�N�+�&
�mpe�!�uF, f�f r��-�r��#�Z
shboar��#�1?�o�]G�[t�=I�
=uxDB &��>TSDB�8rUg���G!��85�p553�C�f�2t��dl�?���3U�K�!�zin�1Url�H��1-�5B4�(�:�R��T�M!-E���>��170�qgo/�Hr:�D!exhaus�����m.*���M�f�2: F� OAu�I�@t�)Toke��P������5�F;�Y� �n167�;pro�)heus/�-_��D��?I�;�vH�.
��u�!�]��ª���Yin›�D42�V�CSRF�F�Y�
2>�O3�OIDOR�O�h171�Q�3e�"/�J��D�3��
Skip�I8�(L�Iio/�^ �BGlob�d630�:�"/��@�BR��.��IÄp����ߌ2�Unm�h�j�F�Xgob�X��K�
�\S�]le��h�- o�:X-���Q]����j21�^�>�unb���d(�a���c�8�=���P�1Q���g�g�8���(1.�Q\2��87�@)���4�\��g��d�i��I�"_��s����Tl�o�Ved������n�S�&���q��A.8���2�Zp�`�T��<�$��$���9�7���(�?N�A�<79�mT�<�2:�1_����ad/�h*�xyon�����394�R�;�=Us�46uni�	�o�Vu���r:��	body�O2�c
�O�r�V8���i
��or�q�A�mL��b?�#`B�i21Źp�_ajp�r�Xps�a`�C63�8l����9404�5�o���7	��522ʮ:�Ed�qpe��@ho�yy-h�tF�&�T181�Out��p���,�#��o,��8614�<��p_��cmp_m��A5�>I�"
��+s�M��a���'q�>f����-�7	���f��1�y���GoS���u�G�$TCP�!�
039�Adnsmasq��  D��-�D�D�(��N)��?DHCP�'�H�vC�6�4-)�#�x���� �J�UZdhcp6_no_��y�/9�uO�~LAC�P�
�`F��L�QA�8o���ZD. �*is�!=mila��Ogg Vo�	�$�=)�8��1�0�?�<K��si�08�p�
��Q���e/���de�i�8R�2���>-l�xp��,���@�>���=���;�82��2��f��N: �x����
in����(�_fifo_����ved_�X�_���505�0O�>�>8C�M����F��� ���DF�� (OCF) ��a
�C�n��R�A��Ai�1ha�Ubinher�^n�y*�1�)�:$Redis�(
adv�Pd��m-���'e�R.of�#���;z�T�I-�3 �	si���6�6�s�0O�ah���1s��Gwets, and sorte��. For performance, Redis work�ith�2 in-memory data�9. You c��<sist it e�.er b�&umping ��2 to �Zk eve�Io�m�X a whil�xo�9append�;each comm���;a log.

Security Fix(es):

* r��: Cod�Tjection via Lu�}crip��x�:�environment (CVE-2022-24735)�MMal��+�D��crash�)�>6)

�R�,��etails about�s��issue(s),��clu�� impact,��CVSS�s�G�
cknowledg����o�lrela��in�¢�,�f��3�R�� pag�m l���,�R�&e��s���:�^Addi�
al Changes:�Ҥ��j o��%�T���eas��see�fAlmaLinux�p� Not�0link�NfromΎToolbox is�t� f���Mo�z���9sy��m��Jc��llows�Su�mof�Fn��neriz�q�Tl��
�It�jbuilt��top�>Podman�ust�ar�J�X techno��i����OCI��gol�4: net/http:��r�� san�z�^f Trans�-Enco�'head�(�x170���Uio/f����ck��haus�M��Glob�930630�:�press/gzip�BR�~.��I1�Ipath/f�0�ߌ2�<?SWTPM�=�emu���i��libtpms �}vi�F�'fun�@al�l�rQEMU VMs��sw�F: Unchec����s�q��dic�wag�-s�p�����C3645�<FRRou�'i�ee�ftwar�Zat ��a�|TCP/IP b�]d r�2�tocol�supp�=s BGP4, OSPFv2�3, ISIS�AIP�ng, PIM, NHRP�
BR, EIGRP�zBFD. 

T��fo��m����have been upgr�I���r�stream v�|on:���8.2.2). (BZ#2069563)���/��: ov���g��un��_tlv_�$er_cap�612�=�Ign������xu����m�pu����a
r�K�:ramf��T���ies�
rt�U�)�z
�Q�Ҵڦ�8ri����	reg�nr�,�td�i��etc.)���fig����r��On�6r��boo���r�s i�<�4�Z��^
ourc�tru�v��mo��URL,�'� m���Orvi�hyp�
s��ridge�����Ll��%�t.�6xi��(2.14.0�~90647�~�5:����Gacc�zible���riv��ge�i	��� run��o����duc�a�	�=�WavP��	���0
letel��
pe�#�7o�F
�ߣ��`lossl���igh-qu�e�y�Fa�ique�ݲ��Nm��
�8�Wwav��: Hea�ut-of-��nd�a�eW�#��Sa��s()�01-44269�<1Pop�gr�1P�@a��Docu�F�!(PDF) r�e�O�
rar���l�G
i����
s Evi�l��
p�y: A �
c e�r�:Hi��::���
��a�9deni�A��o�7337�<'389 Dir��kS�s�4n LDAP�u 3 (�v3)�iant��� ��b�w����vL�rtwe��jA�y P��
�^)�R���3-�3���or�%dm�st�=a�-ds-���d.3��
1801�c�7:���T�f�m���uld �[ult��DoS��0918)�JSIGSEGV�-sync_repl�850�3��
ir�vpass��d�s s�El����������9�>]��iff��h	���������XTag�	Im�OFile��TIF���C���}: D�j���j����I�H�56�p�BNu�N�Fpo����l�����"^2�^r����er���.865�.O�|�-�{�!cp��24�=�.-buff���:.c�m�����
35Ą�	_����cpy�>�T_�q	x�V��284Ĕh�T	�� “ex��ct�S�[�9����p�Pd���drg��
���b��F��hN�[l�s��dir��ü�~8�tDi�z
e By Zero�rop�89��������RawD�St�ed��f�����N�;W
HP�HTML-embed�O��C
�}u��mmonl�S���}pac�HTTP�o�7�php�0.2�575����
hp�A��r�due�e�_f����at(�Wail����
�j1-2����Qni�m�e
�arra�Rpg_�b
ry_�am�
�,�jo RCE�316�>�O�-JPEG���<��w��r����i�j����E2000�i�j�ajpeg�
�m��fa�	opj2_de�k�yu�=���12�=�D�gco��IM��c��U�UNIX�k���ten �>mari�����;���als���	�sma�POP3�t�x�e-m��B������m����
SQL d�����u�1nt�� plug-�z���sub�z��d�):�
�( escal�Zwh�Simi��mas����non-��zdb�|���05���:�Mut�� �E	�f������b�"t�W
�?d MIME�yc��n�[�K��mo�U�!s�������+���lM��,�we��A������6���^m��:�uu�T��a�
28�<cX.Or���U-�Ui����h�AX W�	��S�<������6��-l�$l��@f��-f�k���
phic�� �.fa��a��s�ed�.
�:�Jxorg-x11-�: ����cXkbSetGeo����
�F��
31���W�7���bDe�,I�����.
�"h�I���@kb�en��t2�==Xwayl���X ��X�s un�sW�2�jlxml�fML����-����o��72�&�s�Y�/�+u�?�qPyth��E�T��API��	���9ULL�<�Der���������:��G�.�+$�in�vP�:,�|+-Pil��os���}�)��Atim����v�&�
�P�X+,��v�*CP �yic�bpf�le���>da�,��	s�l,�Ad�+bo�)���	�)�Be��/gob�AD��
.��K��i��R��ewS�]leH�R��se�!xy - om�b.X-�w��ed�	��
t�.���j214�=VY�/An��JSON��(YAJL)��
�<��nt-���SAX-style)�7�n����ANSI C�K�Cv�_da���5gen��-o���yajl��3�
�
�Q���g�:�x��a��t�D�5�T479�=�Udpdk �d�{
�1�W P�,e D�{
op� Kit��/�tet��h�>�q�vfa��a�,��
���&�
spa�D"��:��Ca Vh�+���@�s�tha�Uwo��
�o��$s ��m���51�eDPDK��/�,��v�y_��_��_��l�� _f�ymay���2�b1-383����r�v�3i�lx5�4�T�zd�/�l�%��R�
#819�A~	kern��*��3�W�!,��1��any�/3��off-�! �'+�4r�X�U5��5or ��Bat�Hc��	'�?. s�[��
0-3651�!*�g-��-��vul��b��+in���_so�-�"ms����64�	smb2_ioctl�����#�d�#�016��*i�df_�"�]_�.	_�icbd��)�y,��b��[617��wiotlb�!��k�DMA_FROM_DEVI�g08�"*�s�,���H��r	��nft_do_�uin�&�$� �,�UM�i10���J�H��Ws��pcm_hw_���P��o��M4�S� ���78�p��4�Gm�����ŷ�o�a��rup�����k18�#c�@8ur��y�wbe��%�`drm�%���,�m_�F*_get��3,28�c�K�Y�����pfkey_���:353�	in �P9k_htc_�Rbe�i�6(�&�%��an�of���ß67���	�x86_��3e_�]n���%185�}��
o� y�su��fd�:t����p���G�99�nf_��)s�%-�)poten���@£lo�C����g258���	���	�F��M�H���_sfa_�4�G#26�,s�-���P_�Dv�2�3�din�-�ean-u�O8m�ri-�sha�'�
�乮 SBDR�N�c3�Ni�]archit�u��f�Z'�TS�T5�T��5if���R��C���&�_DRPW�_6��po��/�0�de�l3����Nz�#����;�of�Uo�]149��AMD:�+tBle�@Arb�2�6*p���)�=�<E�;�~�2ur�V��ru�q�816, �9900�nBran�T�t1�[nfu���Pretb��)�L�cIn�!/:�s��r�
r��S��B�P�y<ȓ637��dou�1�R���

b_��rt_x�i��
/�^�/�!/�)��%�
���x�q"i��UNRPC��)�589���B
�3upd����c���_��s�w#d/cl��32Ę958��5�?��ӣ`���fqnl_ma�x����o#/nf��	�hueê3694������) b�8�8al��y �C ��D91��nfs_����_�(�/������	��*�aENOTDIR��44�>�r��,�6en��1us�it�J!�(��*hr�|6z�#���(3r�F��[��5.��.�γǤois��be�%���&�"�1-if��in�q��
��@6�5�.whol���!���b�""u�)�n��	��ol�Ez���-�*�9�g�����@�B)��m�+a���w�u*��el��7434�@��2�z��������E�3own�(�f���u�!�v��ou�at�!�), F��e�1�~�}:�d�H
IPv6�3n�ԩ �I�1777�=��^7ba�@n��!�sMe�2Blo�[SMB)��[�8C��+�(rn���~0S�IFS�;�D�V-�
���P	ma�;ne���;pr�\
�����C.�6-,s�,(4.16.4�/,7748�E;�2��)�8�i�s�?�E1�$274�=�)F������:, �&�font�<g�J6�@$c�,�-�A�$��[�>s�W�[r�.9��d��0u�glyph�)f�
�
"ly�$�W:��sfn�`i�\�$�*40��>S�Q,viol�	a FNT_S�	_R��!�H5�Ht�HT�B�O�G�=6�!��pre��,�ac�{
�Kb�-or�he�.g�M0m�V�{1�� m�?�^cla�:,��	cep�x���9 �p'dynam���%��d���l.�S"�*���x't�ABy ����C�2,�3 �.��w�(���[-�7�p��3.9 (��;A���}24�?���6:�q-�D: find�ch�2�Bdo����� �se���a5�A15�0��^���!;����;��~.py���c��?ur�1�H�7�>�e2fs���D��mu�"5�O'��<c���|, �I�	mod��
�@��g�z�}
2,�3�����)�������9��13��:;HarfBuzz�����4�Lay�i����h�Rb�R: �V!��on�h�ht-�|pe-f��Y.c�k�@$�A�p��P�\Q�
L����P���G�.Q�HI�!��<�Yy�!�f�C�
��f�v.�X��O��ep�<Ku��net�T>��:�y���m���4�R
98�d�'Odah�,K���Bug�c(�6��est)�v�	�Nnew��	 "s��It��S�1"�04�=U��nf-�=broke�h*�n��t�!n���53�p.�������<���/�8>/cni��.d�	.��/�?//�/�X9��Xk�P��d�1�=[�x�	]�747�Y�&�
��4.js�ge�C7mpt�(�ssudden�fwer�I�H3627�CPANIC���&- �q#�
��&/panic�>�8Enh�+� �髺��Tvolume��+�+��sh��be���5 [a��l��-9�D0 Z��67��[RFE]�[��o�\X�stom a�P�� un��lth�5�+��1).NET���d-�Pf�ee�9���+�e��C�-�@��,����=�B��lLR��	N�0��s�d�`��add�9;�&���6���� avai�-�p��d�U�'�VSDK 7�A>1��;RC �Y/�R�;!�����8MQdot�*7�X(�}�3464�rF�7��Age���Z?��s�O��.��	��ld-��	�_�+�n���=410�VKeyl�����`U��8�/��O�8P�|%es�}	��r���J	��m��ur���9>l��k���G�i�
+��m�B��/�K��orna�a$�3�@35�����
w��#�֪m��"p�g+f�K^�� ��1h�#
��29���PMoz�#a���$bird��s�,\lon�'?���usg�]Vp��<�is�6!�s�L��� 102.5������N�*W���]m�L��*r�	�Y�h#�%���
m�a��540�!�_Fu�icr�Y�;&�
by�X?�:4�:U�!'I�/S��~�H5�Hof�rJ�aS�_Re��@6����&Name�I8��Garb� C��(�@9�@M��safety�Xfix�wFi���>��B�ESR��Y21�Y�	�-�;�e�A����S��S�cooki���
y�^10�^C�=�4T�;����M�5
�D�%%�rd�	r���s�]żym��s��)l���[
�W�R!� #�&�S2�S��o�6CS��-���)L�0+�:�0C��
mo�ur�|W�)�h	drawn�!��w�c0UI�U�<I�
���
�Q�r��e�3�2�ui�-��������;web�P, �M?�!�Z�9�R�8��d�����t�}�p�l�tK�_
e�J�
�)(�I���� i��+v�Y���y��Eb�%)li�)4��n�-��I�d
c�=�(� V��(�p��ry�A���Jl��g�B�'�R&���Ƴ��Uj�G�Phel�G/a�e�c$�p��y�M5�#�H��>b�o,c��2KDC)�}rb5�����PAC�v�7
�f28�O1�fV�i�8C���k�#��Q�b1l��;�td�-s��m�'m�o���don'�it�9�����@�Z���f, giv�*�(s�Ta �^��bp�.up��v���.��"Forg��V��<06�<N�_j�;�d�;p�p�k�	�O���,����x�$�y�Z���8�n�ϡ�(18.1�l[�4�69, �30�4�5�$��X-�#\�b�'�0�5b�7E�t8�(L35�Z8�F�<NS���c0i���3t�Oin�>? ��6�*��|�V�R���.6�.��2��/�a��ro�7e�v�N�X��687�f	��
�
6���g��_�
rWebGL�3�C9Ɠ�F"u��6�
Dra�Dropp����+n���	��t�"�����c���1J�3�

ʜ��2�U�6���Quo�j�n��Z�A���
cer�< tag����t�O�h
�Q�l���B, �h�Q�Pg�
l�U������b���6µ�X
�N�=���Byt����8�w%�&g�G��\�1�oCE�Gi���g�19�6��v��C��way�	�$yze,�;��m�}m(b��
ry)�	���t�D� ����.��
��-��-��: a�
byt�AJp��ked��o��=�n��29�����FGTK���$�K!�� �E0������N0�:�v�B�~���Fkitgtk:�X�N���W�)�p����+an����hy�����"��11�Y�"�3�$�8�"�G(�s�
5445�#/�"P�Ha�*?�q%�^�ponse��:�\L��JO���C�2�?����TI��3-��3�P
��j��P-�F
j��K�`�17�
�E�X}���+S�2��K���?:�"�!,ke�?�H�QxDTLS���9��JSSE, 82�1���8�P�Ys�Obank�ns���:(S��I93�77�I4�cv��V� the References section.

Bug Fix(es):

* In FIPS mode,�6use of a SQLite databa�provided by NSS was assumed, which�open�$in read-only�] and with no PIN exp��ed. This�^event�:��o�r���\r��tting���Don�.���%. �Pup��vllows��re control ov�U�kus�Stwo new��perti�q- fips.nssdb.pa�������-��can b�ffigur�ˡFman�שi��java.��urity�Ile��temporari�(via�Cmm�i-lin��rg�fnts to�CJ�C�&rtual mach�%(RHBZ#2147476)��Prepa��f�_�5next quarter�fO��JDK�(st��m��le�(2023-01, 17.0.6) [alma��ux-9] (�f53097)T��-11-��jdk packages�3�}�n11��Runtime En��on�߫[�+Softw��D�$lop�,Kit��S�I���?: h�Qshak�9oS att�� against DTLS��n�s (JSSE, 8287411) (CVE-�21835)�Ysoundbank URL�:mo�lload�H(S��I93742�I43)

F����detail�Kbout���i�^e(s),�;clu�Z� im�at,�CV��sc�G�
cknowledg�+,�M�A��a�Zin�ma��,�fer�Q����g�m lis�,�G�0j1�j18�k7798�k.8.0�n8�m�*�&l���8�ݡ�i�T�FCORBA��seri��z���$��v502�v0�Jv8u362�t9912�|solr broken due��ac��s�Dni��("��io.F��P���B��" "/etc/pki/�!/cac�Ws��"�w,�;��-8��63594��sudo����a�)�util�����sys�W admini�ator�C�(���Fu��s��Qp���,ex�t�iv��g���s,�or�Fd���u� ���<purpo�,�b�ohav�Uo��g���9roo�c��:�fbit�$�6wr�����s�6�?unAs���2809�Mozilla��Dox is �w�;-�rc�eb��w��,�vig�	��t��ards��plia�Z,������	�Q���N	upgrad���}��v�<�+102.�0 ESR����:��busrsctp�
�Ӫ����f��2-46871)�:A��I from GTK drag��d��
L�\��R8�OMe�
y safe��bugs�Xx����109�U�����Y605�Y��ciou�mm�?could�#
hidd�Nin��vtools��p�Ī9�P��be���纉��cross-origi�Rframe�Y��s�	�� t�g��n�xg�ù�cCo�����Po��y��n't����r���hap�Ked�WebSocket��
Work�y�n2�nFullscre�notific��bypas�:�
7ĩall��<c�e>c�role.�V</��ed�L�����w�� di��iv����B�J�p�cf�Ma�f fun�f��anipula�{
T�{Im�= F��F�6(TIFF)��s�LibT�}:���Di�By Zero Erro�2�56, �7��ΥԢVub��f�M�X
��up�Min�ct�N��()�� a���<c�3.c�z519�\�%�Yeap-buf�b-�Of�d�a�r��bS�u���^953�^Ass�w�2f�Y�"�20�QInv���int�4����`�a��Cl��_�V_c��W� �USBGu���	���-w��	�6	pr�[�n�1i�?�*v�H�i�aby��l����b�fc�	te�����bl��cap�`i�@a�;	on�Q�r�t�D T�	����-defi��p�,��u�"�����unel�� au�}	r�feat���usbg�V:� un�<�y�
�/D-Bu�19�(���)L�eOff�3�]	 �]	,��un��-d�!���-�3du�8��su�. I�7�ߡbkey�	kt��4����su�Gs��d�H�cor�sp��shee�pr�Int���f�&��u�
edit�8nd��)w�Y�Qg��. ���?
la���*
��
��|imilar b��enh�$
d�#��en������Ml�t�(�	c�������ipt�l���|314���CE�(�U���գZs D�
I�C�V�Ve V��	��63�	�dS�dc�D���V�'��A�d
�fRec�RP����2W��j�]W�K�ƶ�Mast�8Ő6ǐWeak�4Keys�0�	�yPostgre�{�xadv�qobj�$-�p�*���i��Re p�Ksql-jdbc�����.jar��<e�ͪ���0����a ���p���: �/In���@�ResultSet.�-�$hRow�����6lumn�me��3119��N�.js����Q�6�p�k��buil��fas�scala��	net��P�y��S�Z��m�Dlan��g����@���&��e��en����a �r�R�:�de��(16��.1�p�-�m�l2���	�/�m�6:�yotyp��ll�1-449��_�7atch:�g�T���br��Exp�,�9
�E517�F: HTTP�Aque�`Smuggl����=��
�!r�F
�whe��?elds�Z256�[DNS�+bin��i�sp�L��i�
oct��IP��dr�n�P4354�V��P�sd�I�Zu�*ci do�ot�ct�declar�,.��162�Go�@
�\e������G�� ���	i�
Go��lt�P
a����4�go�<.�F��C�s�r��r��S���ve/tar:�b���m��um��
wh���1	�g���(87��
�X�>/http��G�G�\eProx�h���orw�in�e�}�/���t�i80�ir�xp/sy�	x�m�ԥ��>b�H�]�+�171��I�����k���ө�ppc64le��4454�cryp�z�c��*�/�|o�390x�493���
�)l�������
���h�d��{�C���
v��Tv�E����c�^��s, F��eLDAP��}�*OST�PUT��fu�6�22��������� ��� ny������
�]�E:��t�
����>�pdi�V��l�lt���o e��Z���b�U��AX88179_178A��e�Knet�.�V64�Vi915���GPU TLB flushïr��om����
�Z3ïnfsd ���,!���RPC m�:���TCP�g��
���945ò2c�leng�=���g�s�)smt_��� ��0�	�YUn���ma�W PTRACE_SEIZE�e��O_SUSPEND�CCOMP�1�'	0��wl 9.2:�%��n�avf��s�32788�vvfio z��w�]pp���af�2M �(a�|�>851�>nvme-tcp�o��c re�~!����ly�z
r�@EMC�w��t�~NDU��d313�q�%Dri��U��/5.19�)207�WARNING�APU:�~ 6�P$D: 3440��n/x86/mm/����.c:105�_�V"�_f���+0x3f/0x50�f458�drm:���ed c���rm_��acy_�_����r_�er��in�)�&or�$��i6���p���$el�rough�f�o
re�n�*�"-EINVAL e�v�S69��DELL���i�
boo�j�eRT���erc12.�J9��JN�w����P	���VGA �
��	�@l�{A���9�-��ac�io��%d�01�JP�|i�dy�_	"Dumm�it" �'ar�|�o���s�M�y�����& oom��n��e��re's��c�aleft��zswap��Z39�%fa���t:�{in�ck�T: Br�Ch t�%et��n��g�	9�IAMdCLIENT: �5�u�D&�
 "no�:�"�̪�m�+�8�\��7�\z�&�zCI�v�a�6�ECI_�5MA�@MEMORY�me���M�' �x#�S50910�S z-�E:�t#��i���'���oy�nVMs�^ �qg�'�
l�ed��+��	�	��s1���9���- On PE R760��,���e�sob��	�L��g����Eun�e��ss�l�>�w
����0�/
se��Bs�^tw�a��0� d�?�P�:�e�I-w�
�bu��r�)�>�B��-�+�i� e��!�4��fac���	d�W:�-da�cra�s�\
cei�!�����#��ne��#nthe�����
y��"�)�>��z�V)���$
�@�varra�r�J��ns�"n�0el��P�p1�p`_�_m�~
hal_by����`���p� fd�\Ă"f���" ��ann�)��u�����������������������Np���K�$�mV�
�init������{���ll�pm�\,�s� �R���&v�B��tar�&��s,���D
on-��æ#�"���ekeeps�8k��)e��cg�wp��n���S��t�7p�	��nap����W�\�q���t��mai�r�	u��(�[	�
������� el�l�=��ns�	�Pep��ncy-������7-�Mc����also �x�s�p#-i��R�r�Yysv���j�/:��Z���_��r��8��������v�<�
XML�c�.�Ie�E:��-���ca�Z�Ye�}d�*u�I�. ���RDTD���m_Ex�E��tyP��rCre�5��
6���#xml2�{����b�%�z���W�H�J�����l'���u: �����U��PARSE_HUGE�w030�9"�Adict�_�e��� �� cyc��M���2�Cth�W�� �3�. A l�i�b��
�ȡ&92�N��2A�lete�A�!����-ngle��sk��API�(�)�Tv�>,����,���2A������"����1,o���+w�<�Jflexi�)�
���+�4�,�Eh���5����f�_�����ql��:�z�	-��s��f bi��
��of �n	�F,�Jtr�|�2��ڪK�573�
A���Ab��ct�	�1�B�hO��3ASN.1,�|�J�0��dX.� ITU-T �cmmen�� )�R���ure�+�D��Di�$ui�sEn�K)�5Ru�;DER�y�[!�l90) e�"�=de��E(�t�T*1: Out-of�)��4ETYP�K��1�*�
X.Or����4�Xp�0�2��0�-:��
���/��	�$PATH��88�1�>R��%w�6
o�'-�U�q��0�n����h��ht�H�o7�IInf��	e�Jun�@(�&0�v�=6���/Th����$rd�x��lon���n�ws� cli��.�P/�Lt�T/1�
�nP/�� o���*u�b	S/M�]����5�)s�=�bche�kd�043��
Gi�]d��
�Z-�]�)���]�S��entr�)ed�}"�.�1- A��>p�����'���Ss�T��-�<����e�"�	�
ea�L?�cop���'�]os�+��o0� 
�$�c���his�/�g?��on�b�*h�s�X��on�����)��
�(�Ǯ��0)��)'�38p��#ch��Ot�Jr ��*i�m����],�Pm�=s�po�M��1o�å��n�?�� ���G$i���\/�
�~�23�0�>H��1�`git�$`,���8--��`����'C��19�V�@N��C�}u�3(VNC)�t�<�{�y�f�:���i�Aa�ŤG�-/e�=��o���Aw��;i��Y���"� �5�y$��!�e����t�Y��1i�.�����.�-���s�C����xorg-x�7A�3�X�GC��P�3Cla�E��-���,!�"le���9���\��:8��:�^��<�	PKCS 12���D�76�	�b	��p�b	l�0�>viol��W�Mu���
�,
572�S�(
hij����Q��F
�l�E�@�EPo������Q��rt��m��f%��Spi��Mon�3�^���6�s'c�.�<VGUt��::S�� pSt�?Ge�Jr�M�NUĢi�ߤ:�'%�O�mL��'�xxt::~��a�Y���9h�<+i�

F����A�N�S
1��S
8�Y4�Y�I6�I�2n��r�
���e�-4��)s�b
���I���Q�b2�SO���K�M�d�eIn�:S�/��#
�3�L*�%Key����
������V�8��0�U�x� f�-l��
�t
�"��bi�%�ZIME�_�G:PGP�61�
��w���=J�Ki�n�󪫦�F2��
re�K��� �:�v�B�7�Y�Fkitgtk�E6�C�N�Q8l�if���pc�9�(-be�@ loi��@�;�9��;3�9���SS�p: �9ki���8�<�p��Layer�sKSL)��T�L#�ۤ��(�gN)�1as�}ll�7#�G�)�&g��K-�2I��2�lph��*�
�M��g4a�/in�5�v���~���&�b�Qti�5�@O�JRSA����:�)�I�Z �Id�C�"�u)�\PEM_��_��+_ex�D450�D�E�3BIO_�_NDEF�215�@�r8�Cder���d2i_�7�E�M6�MNULL�B�\a�D�(p���/,��0�]+�EX.400�8�(c��3��G� N��L8Ւ�+�������7�����0HMAC�[����7re�����>*s <�*2 ��mT�6a��d�,���4U�-00���PU���ns�l��;um�*�j��?��PBKDF2�X��stun��-��8��hig�>��'����+p�{+�"��3��\a �R�!S�p��ɭ8SHAKE��dig��.���-OAEP�>�g10�g�SS�VP�L�:���#�a�o��s��`hash�6(�]",ٙ2���R�%9.31��d��m5�o��N4,�38�512��P�56����e�B�
��)DRBGs��3�
5-�3��7ު�áQ���欘�h�v9��k�C<��48�_���
EVP��EY_���m+u�w���(?�0�2.1 N�!ly[0�%R]�O0��1�J'�93:di�kl��"F ro��e�
����]&���?c������PXibmca�
�-2��#l��%c�VXo.4 (��3.0)��9�m��H��su�d������084�
�b�9����(l2���(�m�J_sdu�(5��=blueto�U/�'����J35�C9s���%	do_�:_d�vec���skip_sp�2��78�QŹ�Q__�P942_ssc_����fs/n�4�)(c�+�3D�!(a�/6S�-�	�~�9��N����vul��(�1ft_pay��<_�B_vla�1�[�|�%s�Q��9-�9�O!�7���v?���W��W4: L�ACT����+�����R8f�!14�~S��!hir�da��s P�n��8�T+�|330�%�d1�I�NMI�<dog's�f5r��	LPM����5�FMDSERVER�F:�:dp�H0��i�3�It�Ua�V4�wLaul��G�&a�$�!:�Rqla2xx�(VMe-F�38�c90�a912�"52��xs/scsi/�=�_�/0c:70�S_�ɹ�ne_�A�s�p925/�u90 [�#�B21��Re�2�E�8p�7o��$��vo T4�')�cAH�9�=-C�h/�y���V32�)#Sch��6le�`:(�h@�N;)�.79�7�4, Nx_Gzi�?Pnr_tot�i4cr�K�,6�decr�I
����tLs�%+�a7�dlpa�
��/��|9FW10�/ DL�B.��43�R%SFT, �7A��ET�D�t��-9�M�?o�Q
r-CQ��rG��_i�L�Rfix�b51��=��7v�"8�W������
�Vi-MSI�B4��;�BÕ�T8D�8�.F�gs���F�F9��'��' �{�fs�o�Z�#�?��K�b�ABg�L�?���.�x/���Hto ��Cc�W�(H6.�<613�hCEE�phf�6��:��y�?���ORIP�I��:n��s_��q_un��ef�8��]�p41�b�' l�:��Ц25�hPy�/n�{�.pret�G�ac��%�C	�K��!��p��E�/Z��e��;�P,,����,�f���,�y��l�1 dy�	K�l�� ��d��i�F ���W5�����5m�� �z�C�Z�"�to��1wind�c��#���}�����s���He�#��IDN�^�	�,��6�C�?&8loc������L�&-��d�J�Sre�lL�!fs.�#d_������Vf�t���xd��>��f��a��	��a l�[�
��e���
�57ua���@����ua���4���V�3-w�R0� �x
�>e��
� ?Lua��Yfr���.D�!�d�E,��-���O�`1ua��
���&Sa�|c��s�;���O�V�<�S�_re���ldo.c�Sa �O�?��U�/�d3�Z�1(m�(i IM�0ed�#(�dQd�g���O�Ovi��V��vim�Q���c6�5��D�u�}XC�*GC(�{�)�702�7'PHP�VHTML-�'ed�nI�W�p��K)�=�YApac��R�ze�s�4)Sphp (�"27).�
6��!��XKCP:�����
�,����g5������( ��s�	oki��Q2������`__H��U-`�+����5�
�t�T�z�K9�zOOB ��ZSsu�
�3�@o�i�]�f�a�K16���X�X��PDO::qu�S�?���un��
8��Z1�Zpha�Gr��er��oc��*�]qu�g�����7���$R��
��3����䤣��s��
��,���v:�/
_da�G��M/��!���K�Q;�06��4�Hp��R_aj��P�l/�Ms�m
�U��6�,G�C�;V�f	on�<pli�N	37�,@���	-�y�Lto c�7�
h�3.cr����^��"�g" �Yn���=�r/dh�Is.p�
�"id�,p�!���l�/l�y �	>s�
�f5975���=�i	�����R���UEFI �#�,�+�qas�B
i�t�7���a�1���NQ�v���D�h�U5���Iibjpeg-�b��k��eJPEG�-�0he��3so�s��W��F�o=����=�Mse�-�9�*a�1�-�?as�K�1�^bet��/����re��L_�=_rgb_�)�^rdppm��6>2�{Ignutl�4�fYN�T��$Gnu�$�N���p$i�gor��ms��p��$�b�K,�G ���Qs�����J$s��-�6�}��� ��� ����3��FCCM�(g�"��b��m�'�f����s���%�	,���jB!5�T,d��cmd�P[��]:��i��� �>�^c���le�%�1elf� i��r�0)�14�{P�14��W���$��JI�Y�7]���1+5�y>�-1����,9�Y�X��+��.�
��Pr�le�ce�pĮ�y,��.��>l�.P��6�,��?�~8�L��?�4��?ed��?�w��9���\ �`�j1�9�I��+to���a�W�c�5K��c-en�od�}���������#�-2�(7�P��|ns�c'�7�
�N�K=�I���=ew�����3��H87�WE9��4�C�-of-bounds when accessing throttled streams (CVE-2023-25752)
* Mozilla: Invalid downcast in Worklet�8816�8URL be�pdragg�nfrom a remov�cross-orig�Riframe�\to��e s�
tab t�ger�/navigation�w4)

For more details a��t�Jecurity issue(s),�fclud��tmpact,��CVSS sc�G,�0know�&gments�nd o�/r��lat��inform��,�f����� pag�m lis�,�R�&en�����:.T�kernel p�v�7s con�Ȥ3Linux�!,��� of��y�oper����sy�om.

S��Fix(es):
���E: tun: avo��uble��ee��un_�_netdev�l2-474�k* ALSA: pcm:��ve rwsem lock�?sid�snd_ctl_elem_�dd�prev�J UAF�0266�T���u: CPU soft�Tup��TC mir�egre�9to-��
 a�H©269�

Bug�Alma��9.0 - zfcp: fix���au�eort��an��thus�target�!��BZ#2127880�~Cgroups_v2,�0c���Onew c�/��er��s���pu affin�Nmasks f�xall usr��o�z��o�쵠��437���boo�Add��e���ǩQ�;51528�<-rt-debug: WARNING:����circular�R�epend�ty��u��(&n->��_�%->&p->pi��wai�)��6061�Sup�}��.sched�)ad_bala�� by chang�fault��s��dir��ory�uct��_1105�! s390/kexec�ipl����add���kdump�K6903�Klibgpio��esn't�e�ñ?w�� with�terphase �*chi�E5��z�����xsi:��orvs��F��swiotlb ��uf�leak���Rfid�Kial VM�`7��7��Enh�7�k(�IBM 9.2 FEAT�epgrade�WQETH�liv�q����u����, e.g.�l6�F��30�¢�l�_ SPR����MX�m��v�l��_f�V�e ���cod��8382)Virtu��Net�VCompu�T(VNC)�{�te��splay���ich�Cows �Nrs��vi��a�i�Gdesktop environ�( n�'only�oma��ne��r��t�vrunn�?,���"�J� �5��net�F�w��variety�~�Yar��Bu�t. Ti����suit����v�ˢTcli�C��xorg-x11-�3: X.Org S�
 O��.Win� �B-Af��-F��Loc�vP��-ge Escal�;Vuln�*bil�p�139��Hhttpd�G�����2Apac�HTTP�F��powerful���c����exten�<web�����v:�[requ�z��it���Omod�wr��_���x�25��Post�SQL�n�v���obj�$-�p�*��da��
�bman�`���(DBMS)�pp�dsq�3	E����scripts�lace�ps�belo�z��e�6.�:	262�l�_C�� mem��clos��)onn����Kerbe���f��ifie�����	18�1�pa���r��lia�?, high-p�g�v�n�� �r�TCP���J-�d ap�Ic���.��:��g�XDoS�g0��'��muggl�Rattac��{/1 he�[r��r�?
�'�%����t
�,� 	��ra���M�1�|�>�����f�ns�-��u�:�4ou�atocols�
�m, F��eLDAP���}�em��i-�����	��M	�L	�q��i�l�3916��]/FUSE����	-p�_d�	 �s e�p�38�{�Upd�i�8_id�H��Eagle�s/S�hir�Oapids�
�&
�*61�K�E�nn���Opp�>n robu��utex�ud�����e�g
m��
()�_�`)�����ox�o�-sourc��brows�	�Wigned����ndard�emp���, ���p���W
�'This�w�u�s�}��er��102.10�ESR��MFSA-TMP��01�gD�-�����
86�^)�A�.Fullsc�,n�if�bobscu�]�+9533�<Pote�
M�
Corrup�@fo���Garbage�ll���6��^5�^�k���DJavaS���]
�=6�=��saf��s��ͮw112����s���Z50�Z��SS�h B�0��CĞ194��Con�;-D��
osi�2�,n���
��l���9	�|�=e���TD�e�9���~�lal���r��	��uld���b���n�8�4�!�h41�cor��Atimiz����x�	ARM64�B��w�CThund��
ird��� �]��il���6s�5����L���6:��v���*atus��S/Mi�[��ip��`
��$a��ck�054�z�a�x SDK�Und�9�b¹v�Ule������Z
�842�f�\��@Hang��
��8�/�R	O�$PGP�
ss�k	47����*�.��j�!-17-�c	jdk�e
�[J�X17�Q Runt�E���y
�+S� wa�!D�Wlop�,Kit�2�?:�r����ha���?d�8�TLS�shak�>8���)��193���WS�dHTML�2���>��
2�>9�>i�len��7��r�]�og�c��Z8191�Z54�Z� ���Ǥ��W��s�>nego�I��]310�]67�]�_st�:�R�zNULL��ract��62��O����	�K��P�Buil��]5���]8˭����lash�ZURI�apath�&��6�������
I�IPS�e�D�D��crypto�p��cs��algor�m�v����l�;����os��at ���c�V
t. It�f� �%t�5	�B���-�too�lc��also��S�wribut�hes��n�<m�A����nhey�,i�n-��7RH�8�@P���ly�4X��Ja���r��un�/	��y. F����e�
�:�+�R�r���b�.ed�ois�e��dń��1���PKCS#11�[�by���m�i��
�xt�@tokens��some�&��y�� �~ia���Yf�8
y�f�{��,�\�Yo���e�	�"�#wn���-��.�J��mre�A�H�
�?�)xp��|��ߢN����
�#7)�1�1��+�9�.8.0��8���*�K�
T�(SAPSSS�	i�u
�M	���U�)�ys�\�cSun��:�0H�9!�D!�S#did�����
e�N�b��1�D	��
empt�Jo��
	���3��&��Kerro����re�����cu�<m��m�����P�M���wil���
���I���	��$�2�l$�
��	8024)Web��GTK�T	��r�]���re���e� e �:�
�Bp�<�7�*�l:�y-a�($�~�a�	t�����T'u�3�82�'��GNU E�%s�w�#�(��� self-docu�����^ edi����s��#�`�w�6di�-fe�a���"�l�eu��(el�)�碩cap�%���0,e-�J��e��:�Am�*inj���U��N&���617��B�a�� ool���L�P �����.��im����Ma l�yy��n ��d��/ta�h�� ��=s�Pco�st�a�+c ��"o��VP8�i�+�$�l,�(Re��(�M+�u
�:F��(RIFF)�wmas�,�Gd�V	��`����us�����,��(v��nd�$�B����C�E'ly���	�����1999�Samba�[�y����)M�u B�_0(SMB)��t�E#�?��C��A�*�S�N'CIFS�;��.�b+ PC-�
t��(��*�sh��!, pri�Z�%��#���s���C4/HMAC-MD5�,Logon �1�Lhan��"is���-�bsh�2�1��2-38��f�-�2��������(���P�D-���J)�$�������y��fai�or��v�N��no����b�c�y res�@1�Ϊ
��4��ܥe. �py�n-o�1h�޺�S�5�e�Q	����IPV6��608�

��1��<����:�Ҥ��j�c�%�T�se��,�?$�p� No��
��������*�?2�h�/M��.(KVM�/�� v��sol�)
�k�\&n�+�'/�/��qemu-kvm�E�N&-sp�+��X ���/����k����j ���?�c�� �a�+1r�%1� :��(7.2.0)�311769, �3580��&��QEM�=1�/�teg�e��f�|i�	nc_�!_�o_�e
_�i
��	6exha�\�c�16���aACPI ERST:�,�s���9�$&��t_�or���.��e417��}kE��(Embed�~���g������ UEFI�W�	��Vi�>�=
�L�{p�A64-b�6�Hfirmw���I�A�~�:���ssl�2400�_5typ�kfu��0X.509 Ge�|lN� ��	02�**�&
k2�SmmEntryPoi��un��p��"SMM���2�p*1�!57�-���� n��-��De�����	�� 5�I�5:�P c�R�\PEM_�hbio_ex�D4�"�D��BIO_�
_NDE�,:1��}��/5RADIUS�z�0�	�ly��igu��%��R�w	Auth��c��D���@U�`
���.�e) �/�c+��	��r�Yed a�R����^�w��a�G1�w��r�:u�#I�Ul�`�&�REAP-PWD��85���=Cr�U�:un�*��1�ASIM�A60�Ai�M&�n��4�<�j�:�Graf��| �|,� r�
me�V s��shboa�!����wG��t�=�TluxDB &�TSDB�Cgo���>/�/7��J2�)�eP�I4��
�Norw��un�e�x�Lr�n4�1A���:2��=�i:��T�0�s�`�7GOAWAY�M�=4�N�=�h6�e�:dm��o�W���u�/p��i�:�5957�Y�&3e�����4(�I ����s�~�?�6i�
9229�r�xp/sy��x�smi��6����+�R�
�>s���plu�D�UP�uCo-Pilo�oD�Ie��ta������@#�`se�m
�pm�
�PRe�,���PC��*��bpftr�d
�S�>da�,��wel��s��a�9����:�>z�@�8fs-w�"�T�9��s�i�b>s �3��@�X�A��\�H�r����
����G�&�;y���@�m��k�A�cn��3g:�9p��\Aov�P�&�y/1-467�b=�@cr��d NTFS�t�tca�O�]��R_�ID_�K'_��� �0784�da��_�
s_�_�at�p6�<pmf�_��c�k8�<k�1�6g�array�t��F�{Bu�3e�TFns��� u�~-��Z� C���to���$Ign��0c�&�4����{�^a�l:��<�7�b��(0.16�3��3���O��Nm�n"/big: deco�4�
.F�1�%�
R�$!�F�pan�;�en�)d�y2�H
�+h��*�
ly�ha�j��<�D� �=DFRRo�Fi�@	e�B��&���s��@/IP��r�2��,�us BGP4, OSPF�J�3�k
SIS, RIP��FPIM, NHRP�
BR, EIGR�=ABFD�
�4Sfr�%.3.1�O2973��v�F���O�� ��B�M5dae���,l����dC����703�=�I���'��x��b��;�4#�OOS a�(ac�)�%�2��J� �;OST��"i�%��!s�S���hood�
^� /�:�:�i�.���
m�������3B�7��7��9�ʝ�@���	�0�#ve�cg�U"�i�G�c�A0�s�XE2 �{E�{�=��gdk-pix�w2��[ ��$�E�-%����2�X:�Wby�'���
u��E���!Q�+%�����)�kits��(+��c�:�4 ������
�=���[	�lzw�$e��U�8���j1�6�:�i����Im��;ng��ea�)��U��GIF�
G�j68��:���C�n OCI����x0mon�)�����D��A���Qar�
io�#�+�8��W��H�&��f�},�Z�\I/O a��vit��(����	:et��
���Ma�3��Ts�G�732 ��"��
�Q1�>G�b�I����M��+)s�S�of�p��-l���T���
�7A�T�>Podman�u�jI���7%hno��������2V
�_
��D��V���-X�V��,�1� �	�l�Nl�_%�G$a�b1��
�G-f�ke��i�3W� ��,fa��a���!up�:�y�W��_GetCoun��S�\7()�xkb/�.�c��F�Xkb�EKbdBy�]%u�B$�H283�AT�rSwapF�9Input�v�_���D634͇IPa��Ungr�`�����H1�HvdiSe��,V��oN�Hy�֡H2�HS�<ISa�SetA��@�K�#I�P�Y:ty��4�IDeepCop��&erCla�^œl��&��&�����f�%49�e�vl�U\�I9�(�
j�=n#Xwayl�
��X��c��,X�\��W�2�_��0ah��	�����9����)�8Amo��>th�'�P�c�,s you�\��)ea��^�3>�R�N�E_i�B��sc�H
ch�_4�s�p��&�P4�p��;�V�$�K�l�W�$n�Qi�Oi�yDo��;���c���-�
��R
�_
�rJ/tl�F+��A�Wk�fl�Zra�m�_��_ad�p(06�>}�Z�?�F�Agtk�40����I�
�?�2�-$�V�74�Y3�`]5���BY8�Y�	�W�M�2e�Bi�f���{�"����c�c�.��$�c�ê�Rn���[�JIT�f�E�]923�]حUI�
�V�p=�K��3�$xƢ��Mv���� �h�D4�c�5�#�a�p�<��Y6��3�6�Av�y
691�YS�O�pPo�;y��pa���=�H��cȋ�y��P�A�7�9�DY700�Y�d�n�C�V::R�2Lay�}:��Ch�(�H5�y:�)U�er�U6�*��
,N�1S�3>i��[1�+�pa�(
�
A��
�hGaps�f2�)f�\D�R8e�ntD�)otFlag�k�@�}W	�<5n���:7Mako�<�@N�� ��$�te�1P�D�2a�(m�(ar,��X�AX�B'�Q�:i��/�B�%maximum�g���Em���U(E�E��L�8�K$a�&0��F�}&Popp�Bw�)P�D��M�EKPDF)��I,���&�n��&Evi�	��y�@�JBIG2 ��e��mal��ѳ}�38�_4�:GS�,(��:(���B9a ��'��M�6��M�]s�.�@"��;�v(�Fg�Ver1-�9s-goo�t����I�9-�N\�<-��C��@qu�����E-LGPL l� ns����Ñ�Sf�7���n�3_m�goska_d�%Gx�p_wvpk_�^-�&2�M2�,�jH�
 6���~ �g��)��eAVI�&E�-2022-1921)
* gstreamer-plugins-good: Potential heap overwrite in mkv demuxing us�zlib�compression (CVE�k2�8kbz2�j3�8jlzo�j4�8jHEADERSTRIP�r5�&rp4��21��
For more�'tails about the secu�]y issue(s),�gclud�[� impact, a CVSS sc�G�
cknowledgm��s�nd o�/r related�Fformat��,�f�to�R�� pag�m lis�,�R�&ences���:.

Addi�
�Changes:�Ҥ��j �c�%�Tis��eas��see�fAlmaLinux�p� N�ts��nk�NfromΎT�Berk�8y Internet N�� Domai�~BIND) is��>le�#��f�X�)�5Sy�m (DNS) protocols. �E��es�~���rv�G(n�8d);���ol��rary (r��in�2f�"applic�{s�~u��when�X��fac��with�^�P��tool�=�Wify�	a�/����operat� �r�"ly��S�SFix(es)��* bin�ܡ�c����arg��leg��may�[ve��y�grade��p���婎��79�M�^fl�B��UPDATE�Aquest�_��ᩁS�E3094�Esen�Dspecific �?rie�@����Pca�Sa�P736�;P��>�podman�� �a�l��conta�Gr�7�����It�part�ֹ��<��,�iich�$��O��f�v. C��D�#cept�Kub�pes�ggol�3: �$/http: ex�rve me�;y growth�Na Go��ac�d��TTP/2�7�41717)�ecrypto/tls���~tickets��ck r�5���_�H_add�y629�@�sk�o �m��l��you �gp�'�ԤG����gi�i��ge�+�G� lay��Q��signatur��c�����@ f�����Publ�K�V	fra��uc�T (PKI)��
����unda�W	l p�8����ir�lby��Cert�u���l	�;pki-��: W�#	�`��caS�r��gen_DirU���X����,�r�(n�2c�s���UIDs��e�}	�\��	�RSubj��fiel�l2393�<kJ��son�Zsu�Y
�data-�
�Java�Sflagship ��
�JSON��/ �%�o�, ��ch�)�j�
���a�(modul�O���7 ��od�ovarious����E�j��-�+�
den�i��Si�Zvia��p�u�ne��o���^0-36518�<�Gi�X
a d�bu��revi��r�
s�6��a �e�alize�Gr�ite�=. A�
pose��'v���Ss�Tcli�,-�mmo�
, ��ens����
ea��
work��copy�0a�'re�vit��
exact�$�c�le����h��/. T�Wnot�n�
allow�pe�g�Ȣr����)�0���c��ne��ha�V�Kmi��/ush�#�ִEir����� ���	b�Salso��k�t �sible�1ǥ��no�����n�|�	it: O��ulti-�Lma�>�n�Y���igh�3nd�smse�Ds unex��	edly�����x��;476��mBypass�
afe.di�������s�<9187�<�qo��Ins�Nv���5�a��l�O�a�[��53�Ng��shell��c�?�ks�B
����
�u��w��arbit��@�<�}
�k60�<�F�ZRDP�f�g��R����Desktop P�� (�<),��d ��	���p���[c�We�e x�ardp����T�M���s��c��s Microsoft Wi���L�P, x�J��VirtualBox���y:�zs�%
`/��el`�t
�] s������r��unini�����8�g�g�`/video�/h3�h�����nds�A�*zgfx�^o���>316�>��f���}e�d��r�?7�?di��zero�<urbdrc��nel�>8�>���P	eng�mv��d�y�G9�G�3buf���{f�x�B20ˊpa��sa�����`dr�`�H47�Hinp�����N4��N�>����
f�u��5��E��Cm�pula�Tagg�hI�JFil��� (TIFF)�-�~�}��B������p.c�[57���>�-of-���`_���tcp�:�./�_�Mx�Q97�Qex�ct��igSa�sShif��24b�����m
/͹98�g��oS�^leS���W9�s���S626�0e�S�g�g��%	�XR�RGBAT�GEx��V�m�
�W�;p�K�I4645�I�B�b��� �
��TAG_INKNAMES�F��NUMBEROF�$S�u��3�774�zH����32�~,�0�Z���>�L�X�S��(LF��a
�~�I�!��	a�To�J��, ����se�C�/p�p�tex�
����si�L����}�f������h	o��r�
�E
��
�impr��iz�
T�Vs�-E��xhea�	170�
�U���l:�U��
e�5xy� 
ou�,�#��war��	�a��cy��b��i2880�i: h�Hl�� error�}ft����GOAWAY�M7664�Nio/f�]t�Nexh���Glob�063�2	/����B2�Be�`/gob�AD�
.��K�
�New�fHost�- om��X-F��ed�	����j2148�jr��xp/sy�Lx:�O�K�u�
b���
�+��˹: A��t�er�'
�_�Ibm��big�^��
.Float���
R�P yp�?	��p�.c i���m��� i�o��r��po�#��_����l8�=�GNU E�Bs��pow�mul�8u�Zm���jlf-doc��K�ed�K�B�/���Y�!�ۻ�� �-fe�W�wscri���fu�:e�7p)�v��cap��l�ȩd��e-m��!new�Xe���mt�� loc���^ex�0�Tvul���a�593�A�
!N�:�q%fa��NI�0%�8co����|�h#���"�
�s#�
��w�y'-i�
�Bfigu��ni�n����.��lon�m$a number�u�pr�o�a��!NI�:�n�2�����v�*�I�l�m�.��l���a�<$ur����%���s �a%�'�~�_1�un�����$�ng��[��c�Yg�,(���SEC����&���l�c	RDe�(������(n��ol�����ump�1(N��Resp����LA�L)�0�AX'wi��ha���'��p�a��yz����
to���!�-
r������� runn�}o�M�Du��V�����'*5eth�L�r�m"�'e �<*���-cy�:yle���o�19�=?P�M
greSQL�O
n�!v��+�t -����� �^�)�*��p�Ksql-jdbc����e�F.jar�e���o��!��g�5�m��s��
����h�:�a�H�k��pre��
�vstat���du��in�Be �po�U���P946�=�H��n��ML-e��	d�&���(��	��~�}p��	 �?&�䲠fo��� be�u&p�.�� �br��h$�!�(hp (8.1.14)��XKCP:�
��SHA-3�������745���r�O�x'r����cooki��b��)d� '__�'-'��S�3��5���g�-�g��	�zOOB ��
�"u�!�;�"��*�tdf�y()�X�w�XPDO::qu��$�/re�|n�i�����w��1��Z1�Zp�o��a��3�Y�(�gz�Q&���=`%���+-snmp��
�V'�1��(�<�-�M��� SNMP�a��)��X��'��-#�ag�?,�h�8
���~t�
�(��S�<s�=�(�xd����.t�*�S�O�#n�p
ta�M��0us��7�#a Tk/Perl���B��(MIB)�	�@����ULL�c�o Ex�Con�+��ipDefa�%TTL�479��Npv6IpF���Q�=w+�;pm�2��x�6Tru��P��� M�+�PM���a�|��v�#��#�f�s: TCG �G2.0��s��l����c��6u�P�3-10��Q2�7R�A���#�}�3�W�!,��1�:ny���8�Z��se-� -�&��2�_���t�le�_���)�rb����1�7re�^289�U �-ulp:�r���UL�&o�9�c046�cpu��MD CPU�9t��A	ly���
yon�Lcon���* br�
h�Z1-2634�[m��)�. FBIOPUT_VSCREENINFO�ct����8��	�!�$�Z3�].���]+r������$r� ty�_��
s�A146�KVM�p�de�n kvm_mmu_invpcid_gva�F78�
�~�_pipe_���D
�l�*pr��leg�Cs�W��W88��nVMX�%IBPB�ex����/g��*S�+r��2�6�1�G�d
���mf���!k_i��&�r�r�r�D66�5(��)m_��b�lg�+�/��N30��
*�|"fib_nh_ma��(��"�
ipv4/�!se�t��7#4��Ȩhu�3l�Yo_��)�mm/��%$�@���in i�:_re�O_o��s�^5�U@���s�,�G��k->�_af�;�do_�P�� ��opt�K66�K�I�G�D�/�ű�\��v_acl�L�P��36�+)�j�����Q_p��$�Sgu�V#�8
�u�}2���e�uy�\��A�]�{ f�Cdev��,o�!�_�� _�y5�Q�USB-���C�brcmf�D�<��������3�1��_d�ein�A4�vDou���?��._2MB_gtt_�����%�l�t_�<�p_���n��f70�ptc���sub���Gal at���tim�41�l2�(�s+ock��c�o�+��u�_�i�
ό�d�gig���ni�Yhe�mc_rcu�y���oclo�7+et�
2�1����
.�r,�0�b-IMA�,15�#d�� ��usb_8�~_�0
rt_x�!������/�&��*�
�}-8�Jn�Dba��nd���ront�<���d SKB��XSA-4�����Hn�&m�Z��_r�n	()��m� ��^VM_PFNMAP �/s�os�b9e TLB�91�¢fl�E3�5	�are� �I�=
�9�	K�nV�_P�MPTED�m�{�o���M����t�8���vl�
5�dfg8�<1_upd��
_�~#�
�	���416�B(�f�!�����
on_vma�re���G270���]ss_����(�l�/s�#��	7�M.B�����4�����_�(�[��D��b��5on��3��	P2P-de�O#�H���mo�	�5375���	���c�����6�H��9�Hraw�R��5_p�&_f�
'�39����9q�_gr�+�D�G590�G���%�P
���h��;fs/� ��q�*119�{��tipc���e�63�Q
�>R�2�P�/�1�������V��7(��m��f�|�u�4���s��M, F��eLDAP���}�|�������W"�_�m%cha�-���b��525��QU���gge�v?�.��p�)���M��@35�P�>�fw��a�6�E9�L;�h#�7w��`�4 ��firm��`�n:��*l�!ad���J	��;/etc/�&/� f�.c�f%�[2�F:�N?�3r��rty����
e�6ot�	�?4301�-@2�-@�=,�1ba�~��-��#����\ M�B�(SM��b"��8C��M�0�jI�0�;��I�PC-������=�)h�E��,���Z�����C.�6s�,(4.17.5).�NZ#21�"�����2: GnuTLS gnu�z'_rnd�an�Q��g�?%pr�+ct���'�3�16�.�:O��SS�# ��ki�Iat���"�T S��L�I��SL)�,�z2�*��(���rP,�w�t?���-l-�j�u:�Nl-purp�l
�)�r3y��&��ss�8����". Cip���NID_�A<��,��l�r�t35�A5���<D���%��F��
�
,��!��s�3� f�St�G�K����
�?0�9,�io�eISO 9660 CD-ROM �wL.���i�#e��4��X
��bsdtar�i,��#�pGs�S6py�Dn-�񤄦�po�;���@�&�p&r�	�;�L�u�$_��!22�=�=Kerbe�A�I�oauthe�7���e����i��7v�~�s�qy��@��6�5nat�~�%p�T
�G��=7�s��/�Ji�q$���ҩ�!3��B���/�����G���&�IEp�� t�a�d��
��#key�xH��0H�OKDC�i&�4�krb5 (1.20.1�0�:%��[���U6��-c�X��+���	S4U2�7�V0�[94�A0lua��n�2��Lua�1�6�X�D-we�D�b��p�NR��%���"(.�V���If�(%����,�(-�3e�k��ua��>����C;�=�
My�-�J,�th���B�-�	�'�i�6�a�M�4dae��
(my�-d�m��!�AH���^�'�7��w�+0.�<�
77731, ����>:����#�*�[ �K�6ed�8PU�,r ��� �p�_O�<	mi�1�TO�V��R�1�Vƴto�$P��Pd��$[9�[InnoDB�#I60ʥ�,�608�5�11ɞ�9�:N Ha���$^7�@��q�0��_3��Re��%V3�5�3�AU�4 �9T�0�BT8�@T1ʩDML�NJ��2��8�_�%��T63�AT4�AT5�AT7�AT�J�I�3�5�7��*�7���.����E�U�$_�AG7��+S�A�78�AT���I8�*��T1�AT��GIS�%N�*���TT��Z2o�z	���A���!��RFRe�<�f5�8��Vx�M�;��49���F�Fia�+Ymeta��!�C�n!83�
�D��Finj�Q��ruby-��[.�LT�A8Ɇ�;��Ihtml�x9�d�K�L�"eswan���,�IP�,��IKE���.�i���88�J�:us�ttr�eF�rto�nbo�}F���"���!s�?�5����f�Pbui��!�{��u�OV���m.gh��;��I�5��0���(VPN��<l�@�L�ZoS��cr�\$�S��y��-�`G����$s�\�A�W�0300�^�H�\�	�� �i�jH�}%�H�m, UNIX��s�^����4��j�e�����Ac�V!��³k�!���>�_�����O�=�Word�%.�)�x�72(��"�_�'N()�,�+�~&�!�51��
��v(FTP �Oea�(?��*���9-3�>R5�3�WebKitGTK������<#web re��^����?�:�v�Bpl�:�`�l�[205�[2�&N�j�2
��(d��lop�}�N����as��7����B�y�FS�,
����J�4(n�ϡ�(18��C.2�?g�U-�AFnt�� Ex�v��/�`�/1��+0�c-ares�#D�)ig_s�����}�/��3�C��3��	9�]�QN-�Le�Gf�7ޯRe�)��2����: �@�Gpo�:e�8be�ed�bp�Ri.�u�c>�@9�[`�W�%�W�9�"���	��R9�RFe��8API�l��W�v��ag��lt CRLF ���6Xs�\���\� ���
CU�C8��	�_�uA��	on�+���^�2�^����H��f��U48�6�{6.19�!,�-��>2��
���O�Mozilla���Dox�
�.��	�G, ��"�EK��j����N,��z���8
��� is�1G�upgrades Firefox to version 102.11.0 ESR.

Security�*x(es):

* Mozilla: Browser prompts could have been obs�>ed by popups (CVE-2023-32205)�NCrash in RLB��Expat driv�b�76�7Potential permis��s request�{pass via clickjacking�Q7�QMemory safe��bugs fix�ȡ��4113 and��0�=�Z1��on���3ces�3��due��invalid wasm�Mde�J1�spoof�D�uaddr�bbar�G2�Gm��corrupt���leRe�0r::Do�	Data()�S3)

For �Ae details about the s�I��ue(s),�[clud��� impact, a CVSS sc�G�
cknowledgm��s,�ro�/r��lat��forma��, �����R�� pag�m lis�,�R�&enc����:.T�A���Portabl�'u�m��APR)����p�il��libra�0us��Z
�BHTTP Ser������j�os. apr-util�T�Hwhich�%vi��
��i�����+�>�>rfa��f�m��;�Hsup���XML����ng,
LDAP, da��ase�E, URI�'��������: ��-of-��nds w�)���^�%_�g64�$2-25147�$L��eswan��n��le�u�Z ��IP�,��IKE��Linux.��6�[I��net Protocol �n�:�P�ttro��crypto�phy��� b�� au�M��c��;���1�s�i��. ��se� allow you�Pbui��{�@unnel��rough �ru���works�dc�x�Rrtu�u��d�  (VPN)�@l�@:�_g��7�L0570�o�OAlma�E�s2295�M����Derbird�st�talone ma�$��newsg��p�����aTh�-upd�}���L�����Git�Rdi�Oibu�/revi�con�d�jy�Gm wi�R��ce���z�prch��ct�~. As o�c�����'�h�Ss�T��-�e�Odel, ��ensur��tha�a�[�E�@copy�a�'re�vit���{ex�Z�$�cco��
��h��/��2not only��u�����@���)�n��c��ne�����/u���#chang�׫�ir��fic����i�b�Salso��k��t �si�~	�=ǥ��no�n��n����git:�f���%	pe��ly��f�@p��o `git�p�--re��`���h��s�y����tre�ꩍbe o���	t�%���V	t�h�le�^����565����a�t�
�*figur��in���	wh�a��am���$�Let�a�� f��v�Bfile�w90�#�w�
�T�#t�.��mal��ous�/��490�M�H:�&>��h3946�h�� pl��
�Q�4�<m�,a���4��wa��mpi���hr��p�hi�d58���o Toolse��Y�+G���5m�Fl��u�T�do�ᡏ�i�@
Go�ul�
��ve�
��n�	
go�<. �e�
 p��x�
�s��r���S: html/�Vp�":�[rop�h��l�f JavaScript�O
�p���4540���hc�{	-���y�n�^ain� ck�\d���#softwar��a�o�`��Cth�I�Comm�	UNIX�in�eS�.(CUPS)�Y�2���kw�
����depe�ntly�'����:�mo��0	ex�/��&,�8h ����e����80�WebKitGTK�:�����l�Oeb���	��engi�:�:�v�B�6���f�Fkitgtk��u-�Cr-f��?��
�d������H
37�H
�^n�Ar�
�c�U28204��-a�	C�d�nes�Yynch��DNS (Do�T Na���) �
���n�"�Volv��API���~: 0-by�oUDP��ylo��Den�	�l���9��06��N�\.js�t�de��op�I�1�
�)��fast��scal���
���������*��?Buf�!U�����_i��_��an�
�	0�DI���r��omn�i�T	ene�1
��������IDs�Q4ÖAutoT�kdo����CARES_RANDOM_FILE���cro�Z�)�m�\2�.NET��man�5d-��fr�ϲ`�Gt�u��ub�6��C�-���sever�1�E������m CLR���3N�0��s�d�`�4��s�Zvul�
������i�%��d�U�'�VSDK 6�118�����8.�c
fo�����f
��
�a ��r �3t�bm�u:�tt��6��(�s). (BZ#�J379)���7:��Ke�V����X509 Ce�f�����933��W�Cexi����uGe��
e�-���r��
��*�L
l�K��sym��tt�
�v7�vR�n	C�n	E�n	- Sour�`��or�,s��g��un�� heap�G
�x�3128�B��r�Pi��
des���d�Ja �S��r�
T�~�����	93�%�Py�t�lac�P��,��gh-l���y�	c�htyped�Ʊ����^�s,�Vig���Nmphasi��t�	���u�)�{t�ive�r�,y�
ha�v�&eco�^��-�e�=�]�ip��: url�+.�e� block�<���
�329�;��^�2��C�-�c�^�ce�p���la�&441���&4���&2�Z������o���
���b�3�U���lia�Z,�.������Q!�*��$2��$�R*��7�J07����7�=�7��r�187��ٽE�
���"�L�- Tar��.Extr�ToD��c�Egnor��e��<d�argu�f	�32�t�2
�
�
��v��ob�M-�n�Q�%
�'�d�ul�cl�y��?,��y�
 �
�
�X�
����i�5���'�-t��'to�Ky� ��
�C�;
,�well����.wi��b� �d
�texl����@ TeXL�)�F��'���'�X�!�k�k�����!doc�}�8	e�old���	�70�����ef��"+�{fun��f��anipu�w
��Tag�DIma�� F�� (TIFF)�!���}:�-�*d��	�� f�3)i�C�yS�w!��()���4/�Dc�.c��2-4828�)�e��i�Y��Q&igSa�xsShi�^16�5�i3-07�)�)h24�h6�h_�z�&cpy�R�/�T_unix�T����ry��ׁ7�+�8��8�g��c32�d9����0!8�.�i�I�801�,��V802�VV3�,i�y8�Post�.SQL�	adv�d�	�pi�0�0�%��	(DBMS�n.p�dsq��s�1ma_el�?d��at�$��)��e��)_�&�(�t�7$)�Sr��jpol�s�#reg��(ID�M�3����	�]�"���0���(�s����ag�n�P�����^�\0iz�q	cap�S�^��v	���&��	����V,���!��&���g$�Y�_�~ed�
�	�Z�
��
k�$�PCIV�HF�List�<ean���	O�SS�̫^ki��a���<�Ee�%�%�Lay�r(�:)��T��s��$��t(TL�m&���03�a�xll-��ng�B�{l-pur�-�D3������ss��P�,DoS t���e
ASN.1� �Nnt�er�,65�b�L�bs�bb��d�zre�Nu�*�?��fy�n��\�Ns��i�L�464�mI�s0���i�f�s��s��'�d�a5�a���he��-�,bl�?6š��+�^-�	AES-XTS�t
n �O6b�TARM�Y12�8

Bug�I�@I��(�'0,�4 KDF�4h�3o��/�F��ah�Qalgor�Fms�17586���T�O��.�
�y�h �u-or���	keys��B��c���i4�i�@���GCM�B��[
�n�6IV�*�T�N�6n����d�\	���������8f-t�O4��zero�� `��`��`��_�lg�C��lrs/fips/�F_�F�	�s��(�
�W�9RSA�7���2�
�z1p��n�o�J/�M�8SVE)�
��9�EVP_PKEY_�"�z	()���DHX�,�r3�v�us�.l�3	�FECDSA_do_�J(��R�pub�c_�"��z8_�+���pairwi�o� st�>y ��s����e�j err�t���DH PCT�r�n�O�galways�v0��PB�o2 ��er �,�K�o��;pkcs5 ��2�Z
�Ut�B1��1�+S�j�0*i��EMS���W 1.2�faul�=it�ci�ǥP880�~1��rsa_�'r��!ver�7n'��s�*�5��as�5�d�3�99��- sshd�4mp�re��bmca�,i�5��2e�7��_�= CIPHERS�bALL�S��)�E3����
k�;l����
�!,���of ���
�x�E�\�R�w�E_�e_������J�{K��P�t Ev�	�23����\�^/��n�����j���batch�]�`���e�"����3���.K��blue�B
th:�"��<����c�0��;��0����OOB�<%�>�'s XFS���0�H�!�Hi2c��x�_sli�2_�)_x��()�N9�Ntl��0��I��_g��#o�#may�K���NULL�	i�der�`�y8�	�%	t��QAT U�0 - (���p��1768�RPL-P IOTG/�
S�
: cpu f���!���85�?���g� $��¡��-R�*�kPT�_l���'�>��172�j��BUG�iwlmv�:fi�9=�Q�vBMe��	�k:�F672�NAz�h
�=?9 B����Q�G��93827a0a36�f2fd6368a54a020f420c8916e9b [KVM: VMX:�����������Nr�_vmcs]��82����blk�
nvme/047��a���E753��S���
�,'�s�E ��s�,be��es��r�W;���y� l�th�2 h�
s�`70����[-rt]��ask�8a�i6e��	:1778�)�����\�Q622��o�$��65�h�d8���5���map��_�
_�J�5934���2.��w�s�
 �^l�&���=�occ�ձ�hu�]lb�wc�D�^9234�w�G_wd�6�|do��� �ri�U�Munexp�k�^9�#9����:�CPU���}GNS�eptp4���I1�L�"smpb�: S���ir���ri�w�wobbly,�lab�7!"��nohz_����pl�HC�n	�}7��D�_�K��k�r"��ca�����E3���Q[a��l��-9]�P2�^FJ���: [REG] N�Yinf�e��op�COMMIT�5�.�$4ERR_DELAY �\;�$7�Y3�����s��"ev�� 4tax�: '�_�l�8d_c_�}_��rt_�5'" b'_ ���o�Ng���,�hximum�D	�V'��747���cha��{t���rpmins�,��D���/�K�/zh_CN/�G/m�c-number.rst��824�7cifs:��7��sm�Cp�����&���06l��9�-�1��ae��fc40a7f�T��w�rEun���?f���= urn�/!�)_�<_��n�ܥ�904����x86_64�*�
 2n��wil�"�*ly��n�
 �g"kvm��-g�@	25.hv2"�_106�{&��;cmd/go:���	�����k �$a�-�F�N%��yc�A��94�	�g�7
e��e4�ec�fA�Ot���Fb�nk���b(s�W5�W�>:���:avi���Ltuid/�gid��n���Q�K�� �N Ma�C��
T���s��"�G�!�!VM�(�6��'��'�(��z�
�����,���Cnh���*�����d$c��4Im���U��-���:��I�F�vg�,�
u��A08�9G�h<���,����>����
r�%��s�	shbo���� edi�qG��,��fluxDB &�hTSDB��0g��:�Sount�
ke��D�8�D OA�����'�@�+�?b+��+9,��+9�u+96�I�u+��C��S��InM�Ar<TU�6> P��d�A�>��hod�C��
�9��D6�D�i:20�D�20�E�D� E�^�43��4U�?�CRTC��6�72�!%��M��om�V9�f �Km�A�oSp�Mon�}�^�0N��25,���23���+��o��NFu��,cr�J�?����NĬ7�<La�
���$���o��Diagcab��)�F�q�53��5�?�Be�l���^W�)G�5G(BIND)�0��_G�_(N�u$. �E���=�U<��#e��uGd);���#l��'(rout��G���=t�����1���=�~;�7�&�6�za����is�cor��4l��$b�T: ��'�9�$s�!��it��b�gn���)$�$e�	�N282�Mj�7-11-�>jdk��,J��	� V�L?��	En��on�v���+S��
D��?�K���?: ZIP��Q�[���a(830�L3�z�I��Dw�(�'?�y#��D��D41�Di��Osl���a�e\��-�Z+on�4�e531�e�L�@fbuzz:�oO(n^�,g���H�W�Ae�av��	�Z�I519��?�]��	 i�7@�N�4K���2475ŝ0�Harra�}d��8��tege�22��K44�$���&P��
o�%n�%��%�er�1��+
re��s�!�07, �Z�
�k231�,+�7��7���+��o��}��0��4�
�In�Tll����%�-h�2�ǽ����F�f�a��1��<ul���VTin��Z�k;�
Ga�
�����*��Z� *be���DS �[ve��5��>�)�Ga�A%�ǥupr�e�B�{�?�;��,�;��'�j�m���!(be�on�\�=&�ui�-�c
����Ib�d���7���F�S�!��RH�f165���0��)8��28��'��.8.0��8���*�&��JD�[�/y8u3��x066�x�e^W��a���$��o�$>�3�?�.�Y�h@��
u�z�%V��?�X9b�(����iMes�$B�"(SMB��U���[�l�o>�F�7�IB�1PC-�t�+�
��sh���,�5+�Z�%��A��gs���E%MB2�Bet��T�(e�D�k9�t"�9�$= �#.ed"�0�f�3��i�j���h�jio�J(p�tw��]�Xs�5�
��m�Y�8��)ed�6���:�v�Q���T�rS��n��j���V2��&�6�8�9�����5���k�cinM�".���"�"#�l�L8me�Kis�/�D	�CC�Pp�oi�'�G�uiP�84�Q-�Y	���cx�V9�9�i8�i�R�}jSmugg�
��E�&ky ��
s��]CR�S9�SDif�6:H��:ma�/��&�o7�Gs��a�ov��Y�ye�xT6�.1�Y3�Y36��Y40�2��+Y���xml2��e�\�]box�i���,�
�9N�O���u:��1�4�%mlS��1upCo�jxT��-848��IHash��of�Zty di�<t�
�<�u8d�
9min�Ac�M�7j����M-�k7�c�lC��� t�am�o�9e�dd�O��h�c
�t�7�n���B����txy-��(�7�4���T26�l�c�'O�{��}����/�u��w�v�w/�7[���� �
s���s�Ms�
���| ��e��w���}:�N�0dc�m�!�_8I��C�e�!V�q�32�3�V��POST�!PUT��6�a!���1���|�3�A<ipvl�7wo�:���un�^F��kb->cb���o�Oc�c:�W��;�Sin�0_s�6�9ve_o�a?�P57���Q�8�2/mmu��:�^U_�f_�=�N�!O�A9�N�=4��O�Q��:�Qo�@� �3K�:/�P�/K�[�YS�I1��v2�$T mi�K�'
��bl�<19�M�CJ�
5���ejHOibrary implementing the Javascript Object Sign�and Encryption (JOSE).

Security Fix(es):

* cjose: AES GCM de�7uses�iTag length from�actual Au���ca�2�)provided in��WE (CVE-2023-37464)

For more�ptails about�0s��issue(s),�Jclud���
�~, a CVSS sc�G,��knowledg�%s,�o�/r relat��form��,�f�to�R�� pag�m lis�,�R�&enc�s�d�:.OpenSSH���d �	��tocol��suppor�Nby��numb�tof Linux, UNIX��simila�pera��sy��ms. It����� fil�ne��s�f�Pbo���!��cli���_erver�o�0ssh:��mot�bde ex�*��i��sh-� �MPKCS#11����8408��Mozilla��Dox�� -source web brow�R, ���v�R��st��ards�@�ia�Z, �ѣ�����6abil���Th�bupda�wupgra��}�©�s��102.14.0 ESR����: Off�een Can�(��uld have��pass��cross-orig�restri�s��4045)�YIn��r�ovalue�&d d����WASM��il���G6�GP�g�9�D�m��xrequ���� via��ckj��a�P7�PCrash��DOMPars�d���A�|-of-me��y��ndi��8�M�U����ra���8whe�1leas��p��� o��X9�XSt�� buf��ov�low��Stor��Man�r�B50�BM��safe��bugs�x�ֶ8116,��1�5.1��Q, Thunderbird�&����*Ĕ6�6��m��l��ookie ja�Bca��unexp����%st�^�Q����9��lone m�գ�newsgroup��x�L�|�x� kt�#��le Ext�%	�]Spoof�u����Text Di���!O�_ri�D	Chara��W341��D-Bus��
�R	en��m��
g�/betw�^appl�w�#s���:���I-w���B�"�urvi�	a�s�-us�lo�-ses��4��fac�	�d�W:�-da��n: ��r�f��ure��a �it����ve�����g
driv�Pcannot����l����O969�I�&��to�I
which���as�;maximum TCP b���ԩ频tu��vario��p�pmet��UDP c����ic�.�lre�s�L��lay jitt���?�a-g�R l���i�P3: ��allo�hazard�Jc�(��/
3�Ru�5T��set�s�-���<m��langu������"c,�-cargo��il�xo�depe�ncy m����i�l�ie�����b-�\:�cdo�9�N�y�Z�~umask�����-���ies�97�.NET�o�Zd��ftwar�~�Awork�X���ub�����W�C�- API�tsev��l�u
���i����LR�.�\N�0�s
s�d�`tha��ddres���Zvuln�f�I ��n�8��
ble.����
d�6�U�'�VSDK 7��
110���Ru�x	me���
dotnet�.CE �&���m�K�,539�F	�4K��
elž��s�rea�-t�	s l��0o Den�
�S��$�18�i�6�}21��21�`���C�E��� P�w�"S�
(CUPS)�a���7p�*�Z�~�
����ups��ݪ�k����gh C�-Get-Docu��Y�3236��^5���u�N��IPC�Trans�o�n57�
�DolorP�erShownC�o
b�t�L4�L���K5�KJIT U�FRegExpS�=cs�G7�G�O7�<5�c2�O�&����2Ô84�0����l�IFull�3�0�
if�Jobscu��
�8��� dia��P051�Pe��rn���P�Erro�������Z
hods�
Spi��Monke���t��g��
Ou��UExce���Pu�&
¼s��v�N��di���
����\�XLL�;���s�����load�wi���b�>s�Q�]B��Cont���ly�Rc����Hc�1�,P���]Wind�J�_�
��
�{/5�/�ׯFLAC�xs�F�z L��l��A��o�-�$. �*i�;��oOgg Vo�,��b��l�8���0���$co��st�/�t�C���ť¢� en�n"��x�in��y�2�1��-line�
���@�>���"#�J�;m���� ed���2�,flac�!#C�fE�!#(�r)�5��bitw�>er_g��_ fun�},���7#ly��f��p�>�ͭ
�u0-2221���k��el p�va��con�Ȥ3��!���;any���e��l���Y�n�S�!�a ��r ����*:��(5���,'�&: UAF��nf����
_�_l�up_glob��[f�{h�bl��n��anonym��>��bat����������W:�~_��:����Hin��a�� ��c���Brt�7�H�jNFT_MSG_NEWRUL�'61�x/sched:�5s_fw�	on�i�b��ploit���^sul�X�	��cf_ch�e_i�v�'�x776���-�T-f���s��r�( e���zmoval��_pipapo_�e()�J04�
\_�@ru���d�]a �i�E�BA_�<_CHAIN_ID�-s��Ű�y1�R �y���3�īݶibyid��312�T �Os�-o� �?�-���Ybyteord�e�4�V5001�V��/�!���Jula��MSRs�!S3��s�F�*um�163��hw�+m�KC�"Proc���L���92059����!�`sha����)e�S�a�e�'	�Q1�
�e

Bug�[I�l 9.3 BUG] [SPR][EM�FHF] ACPI�s"�s���wake�,(BZ#�802��[Del�T2�TM�������
lu�#D19TBS��SUT��
�&�'VGA/DVI��ype-C��	ngle�j946��rtmu�	�#wai�bwok���#�)ue��in�2_�3_adj�_p��1�Σ^�`2��Alma�\AWS ARM�gs�l D�Mi�$hift e2�D��H33��H9.x��`	SEV-SNP g�_$�5+�>�Q
�Lo����!�
� ne��� blo�$��lk_fl�}_�m��562�<bpf_��_l�	t hi��g�-�dpy_�6��7�1�;69�w%�|	��,hard�cm�72�)#�V�q���.�	��B707�Tempo�	�%�!���FIPS i��g�S�U����=zeroiz�6�9�]76��I�\��
�avf�
�
s Ju���Ӧ1815��i40e/�]��:����:��rf�n%MAC/v�i�41e:b7:e2:02:b1:aa/0��ifn��4f0 ��0�
��t��i��un�����lv�	ve�--sp�rca�I,�
��
�s get��g�H4���2�
MR�5	�`un�
PMU�s301�NVIDIA�G�e&�,
��'i2��
���A
S��$�-
�bs��m�w��S483�S�nPEC���%MBUS�� ��X�*[Hy�#V][�i]in�8e�6fc_���m�/���vsc�V%s�/�de�in�Ai�	_���K307�K�"
��fig���XCONFIG_CRYPTO_STATS�������til�gs�0h����18�d'�ק���$�Shv_���$���$�wsrb_�?�E
 SRB��US_INTERNAL_ERROR  (0x30)�{9�N
�z-9:�K)RNING:�
������
���e�&!�A�H��drm/as�b
��
��&���t6.4�M3��Lenovo�J1��]  �_����"echo c > /p�9/��rq-�x".�\70�h-9] bz�)2169�/��/��0�'�N�~�g-suit�
�d�	arch64�P�s[�Z]/w��
����d392�1E����(�FEAT] cpuf��:�l_p�:��3�<HWP IO��&�f�@a�:��1�z��7����Y- ��MB�,AMP���(nge��Maya��y (a��d)�X896�X���ZMDRA��
-�L������k
�G2��G�� Add����5��-�ue�	$����1�&L�ap��6�4�s�POSIX.1��t	er�� 6)�[a��15 �M�i�l�t�������)�T+_�_��dup�G260�3�>�j��
��p���_c�t����?�
Keyl�� ��TPM�a�highly��a�/�
te��t�W e��w��r�!�B�((�sol�����: ��istra�)�F"��'DoS�/	��SSL�n���&2�WK�Q�l�	e-�`&�-�t�6��`a�P5�����X�����svg2��%!��S��V�1���>ph�SVG)�ʴo�g�art����u��8r���[�\�7x�# h���Os����"�/*��63���-�OVir��9M�j
�(KVM)��f�	v�iz���R�X���,�x+�z�rchi�"ure�qemu-kvm����q-sp��0�@�_����:���!���Y*at�����QEMU: VNC:�I/O�9�W�TLS��3ke�l��Z�y���:e�_��$�A.� 35��:�@��] rh����	ed��Qm��i���	�\F�%���r����Wa�G	�C�De�HIni��m�w19��[a�	l�t�v] hot��/�un�jmlx vdpa d�N��oc�)%ied�'��]n���-
dump�'��mshut�s���77�3�(2���(2���j(�5(�EC�<C�41f�q�3��d�(�r679���Q�-��*��QFRRou��is �7�Q�´gs�I3/IP�]	r�2�
�U5�
s BGP�7OSPFv2�3, ISIS, RIP�ng, PIM, NHRP�
BR, EIGRP��BFD��1fr����%�S�Min pars���v�d���+���$��de-peer a��e�788�G
��  �}%1�	}%����He���:Web��48��
���
����5�H�L�g�$
��.�����?8����ssy����*d�|=t�R$h��Q�=s�P�!a c���
VP8�i�+�$��er�(��)r�� �S;F��(RIFF)�wmas�x
,��d�l���������
��to��,�v��d�aibut�����Cef��)ly��c�X`/����2��G�T� ���v(�m��	�*
VM��6�	�	��	�N
���k#������>�u���ri�g�`������vm-��AML�:k����a�c�O�09���N��.j�?�	��}�A��4;��f�i���@n�-?��-?�y�ALS�AL�L'�;�	�4^%�)��(18).�M�8�?
��440�9��;�d*�Cpol��b�XD�'Modu�s_�0*��	��\�P��?mv��#�,u��(�����2-258��ח�E��on��&m�����.�htru�.�R��<�~#��6�y���.�
&�S55�����3�f�5��%������i��,O��% �r*�9P��'Op�95�$�9U�nI���i�?�97�R-�n/8�n/3�J�n/3�l����vpx��vp8�'+��in�/�H2�aE�v	��� ��!gl�������_ C���C (�/���u�����$�Am�,�%m)�ڢi�%��<%�G (nscd)�|&by�pl�A0s��T.�1�`2�se�q�.���G�,��D�):�,ld.so�X?p�� ��g���	�`�;491��Q��K�H�Uget���no-a��we�K527�K�}L���P�;-8��Baih_i�
�@�H$�Py�8n�ac�s	i�,�� -l��~y��ic�4�*d�Ʃ�}
�^������`mph�N����2����1V�,�N5v���y�
���s��
co���-�-p�y���p��:�R�
40��Gho��>
�&e��tt�8$��e�I��P�1�p
��PDF��A��P��(��s�4��t������ m�y�ҡ���a�B�)�
�p�yB�r�Un������:��l�tOS�w��inj�r�S/���� ��f�z�#K��i�J�.6�Z�����ac�1,�Q�Re�����L���5,��	��
�e�9���y�_ �_�^�L�_��d���l. �����,�2m�s5��ll�C�	a�9ll��E
�yMw�/9����D��+�v��Y]�p��#� Re��T�et N� 16��e��q#�'-�m+6434)����������a�@�P�
�e���6�C���,���C1����'��M��med�W�u��'�>�A�1�
�H��Q���UVP9�A44��0���aDB�����>U,��
�BSQL��s�. ��8�y���z������My�4��2}gal�
(2�i0��;), m��db�0.5�$��;�(���es���D�.��	poin���S@o�',e�ysq�
2g�b4���0�H1�iX�d�+
�Os�On p�I7�0_inpl�_�}
_�@��v	r0a�:.c��2��4�_�V�.
�[->g�<�
_coun�
== 0�`d�[0��\2�\�6a�_��;�?��)�$�u6lect�K4�K�&�Yi�3�5_l��7u�((::�	�	_��M9�MJO�;CACHE::�o�\"�7fiel�&O�N9�E�a_���<7��t�3*�9�7�f�N87�NNU�B�?e��r�j���C_db_m�>::�_w�B�2-4701�Z��Be�Ql��, �PN��Dom�8(BIND�,�K���)�5�ODN�Ot��$�E��e���'(�?); a re��,��. (�$%e��
�	t��=�Y.�M�W�,�~;�7��!v�f�B�
������W����=�haus���ntro��.n�6d�6y��,��0��\�D��O)�W6�J�:�+3���+3�KHTTP/2�B�'�����8�L���r�&�J�73�TRapid Re�ZA����	��
n�9�t��h�hxy���c���I���,�%f����������o���
�n\u�4^��
���\j�l-1.8.0-�Hjdk���#J�f8��aEn�	on����*S�D�
Ki���>�h	��iM��KB�;��Z!�4�@I�<deser�m1���GCORBA (83033�	��22067�Hc�U- �BF���P��6�l�-n�d9966�d8��yA �`�$�s��@�Ope�c, �f.��c.�-S�(�&)S�&,�4�r�c��8u�(8�z
�Y�g���-�d�+E6�bde�3�)8�<�Kis���e�b���3m�e<�so��JAR�$K�7�w,��92��r�s�to�O�c(�s=13�E�f/usr/�/jf��<��	a�AF�J
w �3e������_�#Go��`Go� �	�W���,������En�go�<�%%�
�$�s�I�����S�lIhttp, x/���r���r�����@�$�9@�[�]��	9�����_(���Po/t��'�p\��Qf�l��E�?L�Srg��SA��;�C2940��Mid����,-gi�`Aes�^'�ZI��1���3���+�&��?d�k�x�"���rG�F�03Zip�B�P�2�E�R/r���B�^5�0�D,�L�u���z3zip�h�������3�(�l�k��\��G�!�LHh�8��/a��p�mMp���KQ�����!�����!�j�zs�VP�7�����-D��.��.��`E�fF�V��=�e.��H�7�YG�I����\��������1������@w�#G���)�fV�gn��5�G�$e�kQ�H����"��;��.se�2�sJ�=�)d���
tely.�y�12432��K�$��^�32�\jcm��M��P-�l� �Y, ra�vth�9�-�X,��m�Sit��"Ƙ6)��07�0�o:��<�:��<�'_7��7���+�&��s�+]�o�0D86_�i�VAVX�2��{*�@��P����8�T��k9�.�>�by some Zip64 creation tools. With bo�releases, the checks can be disabled using -Djdk.util.zip.��`ExtraFieldValid�k=true. (RHBZ#2237185)
* T�g/usr/bin/jfr altern�3ve is now own�v�â�java-17-open�� package (AlmaLinux-13648�\jcmd��Mprovid�P-headless�Y, ra�'r�,��-devel,�` mak��t more acc�Bi�Ř51)��curl�as����lib��rary and����oity for d�load��fil�Ffrom servers��variou�atoc��, inclu�5HTTP, F��eLDAP.

Se�j�dFix(es):
�J�}: a �p-b�#�?uff�o�mfl�Xin��SOCKS5�pxy h�Wsh�(CVE-2023-3854���Scookie�=jec��w��none���86)

F���edetails about�|s��issue(s)�� im�tt,��CVSS sc�G, �����gments�o���at��in�sm��,�����R����g�m��s�,�R�&enc��s��.Node.js��a��ftwa�ɱFop�} p�p�k��buil��ast��scala�Xnetwork applic��s�yJ��Script��gramm�Dlangu��. ��n��js:�/2: Multip�l� en�web�h��vulner���a DDoS att�X��apid�set A�)��44487��A �( ��Bulleti�hich addr�W��ur���i�law�^v������JL�_D�integ�����or��o po��ie��circumven�o�p52�Ucod�via WebA��mbly export nam�Z�F9333�F-und�{��p���514�.�Grafana��n �-��urc��f�}u��r��met�s dashboard���cph edit���G�it�=InfluxDB & O�UTSDB�z�go�:�P/http, x/���r�Est�	m r�L��cause�@�6����B2�3�"$Varnish Cac���*high-p��`�-��	le��	or. It��or�H�%�m�me��M�<don't��v�8�_��	same�@�*	��gai��giv�*�(site��ignifi���pee�up.�v��PHP�HTML-�ed�s�����mmon��u��
�
�UAp�J�4S�Y��php: XML �ex��l ��,�S�:be����2�:�Hphar���vmism�`ge���04�01-by�Orray�trun��ש3��
solv�����G0568�G�!�6�whe�?r�dm�ya�request�Mdy�L662�LMis�5���F���ins���nt�'nd�����w�kDig�\auth�>��SOAP�247�oPassw�_��ify()�cways����'����#ha�+�����Tom�2�,
��l��cont�e�f�@��	�բ���	��J�(JSP) technolog�G	�5��rhel9/�box�im��
�T�(�oob�*�!��Biz�
mm��line��viron�׫qi�U�B�'�[t���..�w�M�Vt �Op of Podm���&st���	���=�OCI�FT�upda��t���A��Wregi�]	y�J���	 ���G��un �c���Kfol���� s�� �p�̣I�\�y.io/ġ(�ed)�C�"�J�x/ubi�Jun�Lngin�ra�:�a�g�D sup����������a��c����	����y, �	�����usa�z�
����g�4fs-w��� pa����s ��Win�s �3���@�ɪ-�������H�ga��us���q���&mod� �tu�m�2�"(VM)�k�8��NTFS-3G:��{��!���rex�N���Nc�7�3m���a�8a�;���2-40284�Mozilla�K�Do���0-�0�3br��er,����R�
�W��m�����:�	�a��id���}�º���115.4.0 ESR����: Queue� ��d�i�Guld�
�w�����yc�kj���5721)�WM�m
afe�zbugs�x�P��119,�������Thu��bi�{��l30�l�vpx:�ys��ޡ�VP9 ��o�+�p�(��#��Lar���GL dr�a�l�Ua�h�4�E�?E�&n��s�B�Aa��t�URLs�B5�BIm��p��b� �5ck��du��GC����e�^eг.�q�A�u�sr�oof�f��bid�����Vc���p�~�����r�i��l�km�գ�newsgro�/������L�1��.NET���-d-��fr��g��im�
�
a�o	b�F	�W�C�- API�1	sev�
l�ͣ��it��p	 CLR�Za��

N�0��s�d�`�^t���	�Z�w�����.���8d�U�'�VSDK 6.0.124���Ru�S���24�Gdot��eni�桨�i��BC� Ce�pf��t�cKe��l�O36799�P7�P13�P�3�P�mGho��
��su��s��!�%o�|��P�1� ��PDF�^����.�Pt�Ks��s�4�{
���
�map�c�ҡ���a�B�)�$�Qye��Si�0����:�PDL�Hl�b#�{r�G���������3�>�Squi�+
���c�g �����;
�����#Goph�,����I�s��SQUID�V:3 s�������A��68��V1�VR�%/��p�[��muggl���_/1.1��IC���V6�V5�VdʭFT�?� 	�0pip�.�#�sy�=m��\�Atal�t�%���=����te�Py�n. Many� ��foun���)���I��PyPI). ��r�L��ac�hym�V�P�
��ei�&"P�5I��s�Xs"�i��z"��p�: tar�@&��ul���
����a�J07�t!5�I� ddi�
��Ch��e���Ҥ��j�c�%�Ti��),�S��bR� No�H��ked���E�((E�]D�QKit)��ro�
o�" UEFI��V�M�s��;���(a�l�r64-b�3	�Hfirm�	�IQEMU�~KVM��edk�Fun�� GetEfiGlobalV�E��2�B�;val��not����DxeI�V�o�H�w�[ (�19-1456���Essl:���4*���_ASN��5id�rfi�
265�L�:�X.Org������X� S����+���ic�K-l��#�da��f�"-f�ke�%ical� �l	rfa��a���	up�:��xorg-x11-�:� ����O�l� ��Use-Af�d-Fr�=Lo�zPr�"le�iE�,(��V�B�1�$�=�� l��X �
��n�7X�

 �W W�2.�U�����Ebe���j�O�Ir��&�
:�F-��(22�9)���/158761)�ƌLibR�7( �0��e��$RAW�0� �Odigit��pho�r����RW/CR2, NEF,�<�DNG�Os)����:�E
���0� _�_�
��::g�s)�i�
rc/��w� .cpp�E1�J$142�<F�;"a �3�D�M�����s� ��*���H�;�t��"��;�"��go-yaml���ahe�$st��,pre�^.��CPU/�L!ab��b�j
�I'a�.o�!r��YAML��2-306��q,html/�1p�;:�t�k�3�[���Vw�O-spa���D
454�
�,�^.�/��,avo�quad��c��	x���PACK�]���417��(�(-m�A/�K(���0�����$-�(�	co�7!mp���j5�j�	t�)�#�i�������334�f�=��y6�b�bti�0����'as�.��delimi��T8�Wsan�Sz�CSS�
�M9��e��y�+�$ribut�T9400�q�1�D*ơHo���7�o�M�V6�~��4k���`���0you��p���O$�G��(�%'i�:ge�+�G� �r�Q�C�
�V2���/�v��+����Bcrypto/tl�4�4���w9reco�!$ma�G�*p�cs�O���/�go/�����4in��lo�����>�F4�z��I_�,_�idc��7ID Conn���1�~���73���J�!�<�e���n��y��P���-?/�iO� 2�(R���p���:�g�>�7�To�_v��@e_r�_��>�N��g)�K#�2352���fNULL�)�� der�{�b3OIDCSt�mC�.:��;�I �w�&���"u��;e�I4286�B8�9K��5el�A� (K�:-�����Y-��u5���n�+�A�V'��arc�ac���!qemu-kvm���b���'-��K�s(n�D�)��-�N�u���6/��(8�"0�8089�~����Mcd-eh� =DMA re��ra�0�� (in�%	te�s(�ܵ��7���68�=Q�?6�4�ki�e�54�;�G@�/qt�-0-�E�!��rep�}9��a�S ���332�IF�M�#�W"�G2�xbypas�Ǥ�r�L$ic����F�=�C�$ ���]�v4410�v����0n QXmlS�R�37369�>i�
���=8197��Un�8i�Xed�=�G�3�Gm_u�sPerEm�C2��)�@#	cloud-����3��%��%�5 �!�R.�'��ed �7��9to��6�<,����\Ae�|!n�K�SSH key��to����d�O�3H�f����:��nsi�I�j$�,b��%po�Z�n�D��178�A�GNU�j!b�N%�1GDB)���5d���E�#�,J��E���|C, C++�YF�!��W�_ibe��TH�;J/����d�m_l�@E��d�gKm��*c�C1��>�AC�C����l�(twe��\6�K6l�!�3
C��F�� (OCF) �j
�
�;r�;,�U�;��nc�(oot��M��Ms `/�r/fs/c�3`����R
5809�Fv��m�u�@��� (r�H�5��B�#99�O3�S75�4�SAppArm��v'�ed�`/�Bc` i�p��<s�5m����;�4fic���,figur��������?I���Z�Amsg�8ng�bf��O�e�s	�pB���8�'
��̋1��+7��9��i�@��$ ��il�=�p&����k-�����])or��L�PB�>����Is�'�
u�(�Ul��7 �u,�*��9�Jun��'o�0m�*��/ha�vhyphen�2. �!1�.�Ye�%ly�`ad��h���	?����Na�� ���3������ro�M. �aal�>/��m�dE�b(Ne��<h��M�76urg�� l�O�[�_�Q	Fil�)���g��&�76�.�Q�
D�	P���?8�?L�?T��9�=V+��aN�OI�(�}NI)�X+����4������@�2���lug-�T+����n�n�(����������:g�numb�,f���a��NI�:c�Js �elf�C���T�p�!���%t��l�����FK�e���s�7�N�(de�Dd�a�z���d�N��:p�4@r��, e�¬2e�?�0
��G�7T��(2�@57�R440�����2:�tp�I7_u�wAi��r�|6pl��N�
2�>�)h��H��vy�s�$��<��ag��n���/c���Q�Jcap�-������X�?�A�S*.�/	��,����<I���J�a7�_�~ed�Q�6���(9.5�:757���*�3���XBin��S�
��P��ObjL�9Se�\�l�;����Y�;�r!Yg��:�4Js�A��xs�� ������	�� �[�B�#�'�s�3�=�
�3�-�<	�֥C� ��>�!s�$[��Z"token���Sd�P�Ȱ3�@0�|D�|������Ń��[݃9�Ãe�H�Y����C\��
b�u���K3�	�KU�enum��o�I?for�@)���U�@7�@S� Fo��origi�.U�b�B�� naps��1s�N�1:�g��L��i�� Go�) �N�W�5P�MV�1�g[�@,�A�pq��9��A�/SQL��6�$�2�p�t�b,�
&�
�E�U��+p�*sq�1�zD���B��s���;�|�K�Jero�{�6Q�i%���8�X�AC�bjs�l�G
�I�Ent���O�7=�f��JSON)���@�c%�T�(�9����J�@�PC�����p��m��!-��b�����Gvert�#��� �#re�ԭaf�|�<�-c��
�,���7ut-of-b��A�
e�#�6�m�g0-127�>�FRRou�ci�1ee�c%��s TCP/IP�}r�2����W�`�{BGP�rOOSPFv2�3� 
SIS, RIP�ng, PIM�9HRP�
BR, EIGR�=XBFD�@frr��Ea����r�*�D	eek_�<_as4_�
y��864��O�by�&�
�� OPEN m���D�d�A�type 0xff�0302�>di�gp��+_�_��/�v��ȏ18����'����H��daem�{�*�P368�y=�=mwi�}��-�in�  a��~ a��yzer�G���
�3��W�mt�k��+o�M�'�V�����}TPS���or��R�wa�"�1IEEE C37�M8�Bnchrop�:�c�G8�GC�����p���2�:2�Ci�:VMS��IP��e�=���S�?er�8ƱXRA��i�3�89���>F�zlah��>�O�$a���l�p=�qe�8��Am�`�>t�M�P�c�	�l8�	C�
8�Ti�R�N,�{J��sc�7�ho���n�o�x2�>�cM�;�V�$�K�l�W�$�J
i�,�LDo�8#��;��ei�@)o�u��-�
���cd���4�(�iups��Tt �-�[�d�c �K517����e��e
���w���ZD�q�h��o�X#���
or�^s�{5�f�v.��#��!�#��Kub�w6t��c�e�m�Wro�u4�g
�^n�[397�
��C��
?�+��-b�[��66n��av�6d�zc���c�PP�y(AMQ�o�:�balEklows you to communicate with AMQP servers using protocol �ion 0-9-1.

Security Fix(es):

* rabbitmq-c/lib�
: Ins�.e credentials submis�T(CVE-2023-35789)

For mo�1detai�-about the �J�y�<ue(s), includ��� impact, a CVSS sc�G�
cknowledgm��s�nd o�/r rel�d�Fformat��,�f��&�R�� pag�m lis�,�R�&ences���:�Addi�
al Changes:�Ҥ��j �c�%�Tis��eas��see�fAlmaLinux�p� Not�0link�NfromΎTa�is��� f��bin�0data��network��es�?. It�We�:daem��which�vi�cryptograp� oper��s�b�]a��mote��i�]Th�آ�p���Y�S�㣨s� of�N��Bou��Disk En��ANBDE)�Dj�����p: Race��n�� ex�Эze key gen�ȳ$��fun�Ral�X�1672�<�Pyth�c��n�ater����,�a�&v�job��-orien����mm�Vl��u��,����module�Mclass�exce�G��wy high level dynam�ܼ(ype��d���l. ��suppor�N��fa�ԩ�many sy��m call�C�#����s well��.v�ous�ndow�̤;s���8foll��=s have been up�d��w�%r�stream��: p��3.11 (�.5). (BZ#2210785)�B�7:�Jrf��L dir��o�:tra�d�F� 07-455���<�9pa�rtr�S�jt \0�U����`4110���:�ha�0xy�E��liabl�l�-p�̢�n�:�*load bal��TTCP�@HTTP-b��d appli�Ჽ�S��:�c��k via fcgi��que��
0836�@�X�
��!���ª ��
cl�r��y���S�
itExt.c���� w�+e �~
�'n��6�$����pla�5�"ct�<
i�ex�1�6
��1d�7a buf���af�"�Y
138�<5L��eOffice��
�ource,�_ty-d�I�d�ܣ-�Fdu���nsu�
�o
�	�ktop�A,�,��a�
�����sor��spr�	hee����
�	��f�&� ula e�K�8nd ��
ra�Q�B. ��re����O���6�
a�
milar��t enh�d�#�������0re�(: Emp���ry��Java��;��2-3874��>Arra�8dex u���HCalc�par��
�_950�L��
������183�3R��docu��1��l�tp�\pt��IF�s�P225�=�F��p�[�
�
�buil�4,��	�mi���
�unn�
�boxed�������7�
f��(1.12.8�
2179�l
�=�4: TIOCLINUX�ose����ġ�ut�W���V���
��rtu��c��ol�810��gM����?NSI�6ro�>� an�us�(is���er��b��p���a1�=�ornado���
web�4�q��
�synchron�w
��
�Q���]a�������sc��7non-bloc�F�p���mtool��%
-t��:�ire�b
 vul�bi��1S��cF�WH�Zl�M�� ��	��figu��l370�@Hdnsmasq�ID��-l�T
twe� DNS (Dom�"N�S�()�war�˪?DH�]
(D�wHo�
C�� P�)�i�_��:�!fault�	ximum E��.0 UDP��et��z��a��t��4096��s�ld�� 1232�T45�=TWebKitGTK���$�+
�'
��p�bre���Gengine �:��Bp�*����Fkitgt��a��	����
�/���U
239�	�6byp�
S��Origi��o�+y�785�3�7P���.�5�bm��
�9�/ّ859�Y�64�#65�#67�!66��611�6Memo�3rru�B���+�lp���Q2��88����	��craf�u�O�5793���s�d���g���r� s�� us����U5���	��r�ree�M��198�:���p��l���T f����c�G�eclos���̿3813�\���d9�>���c943�,j�scri��
�A403�tt�ur�L��S�E�@��eƲ�f45�>O��PAN��W��
���ry, �n���_ �Al�z�`�D���	�3:�'.pm�Tes�Ut�nify TLS��
if��s��z������}�S��1484�<!�c::Tin�2�kma����s�*�2� /���E�Mten��P���http-t�V:�)��e���
���A(Gho�����Fain�4"t�Hi��o��
P�1���*PDF�.�P��ns�Bs�4��t�"���V"ap��at���Xa�ѣ)�ube���Be��r��jd�[g��:�Ein ��/sbcp���)� o��D	�A87�}�YOu�f-b�� ��[g�$�n.c:1973��_pcx_�m_rl���v
����"Do��8�h�:��sw� ����~f IP�,�IKE�����
I� n�F� ���:us�tt�g�U#y�C�bo�	authent�z�;e�#�_#s�`#�b
� al���%��At�el��rou� un�q���s�t��Kva���	(VPN)�Yl�@�v�;#�'v2 REKEY��po�. �&��s�[ t��71��I1 Qui�M��ID�H1�H��e�H��SA�ole���O�sh�o�Y�=$Y�+An��JSON���(YAJL)�Z�^nt-drive�SAX-style)�7��e�U�d�C�K�C�at���5�&o�Fyajl�Gl� �Y�_t�Y_�u�2&�+346�=!GNU���ro�%
d�C����mak���V��������
�/er��p����a��������: ��(�2737�A���st�a��$�Qa�Bio�#�
�$�en�Y��i
�  �u��L
k,���\I/O ac�� ���:�eck_�X
()� �
�L���O
��ly�(�	l�n��"320�=�A��Tomc�6�R� le�C��e�&�@�!S��"��OP��(JSP)�chnologi���xC��s ��Up��:��Y�+�*��v�T)�|*�n49��t��:�?���e�}�*���h���2870�[���
�}�?���8t�@�>�/h��'�f��a�	���y��ipul�	Tagg�hIma�/�p F�� (TIFF)�$���}�jull�#�	- der����LZWDe�()��3/�_lzw�c�1��W�c�5�a��C�f�a�%16�Lm�	�[Á�2�4heap��*�O��a�������E�乳�R���j26965�kB�O�uv_en�<�:�D+qb�W�K��A�m�purp��of�-�^�R0�F-�/�q
reus�|f�ur�0�u�9�;gi�%���-������5����p�%i�0��qb�k��k_���*%�997�Anb�;t�G�qc�Ť+�[b�C&�m�s�Z���(�%3����]2���)��s�+�Ka� +��g��f, ld�m�x3copy�dump, ��E��a�7f��;",����s�p��addr2l� �����
: NULL��_bfd_�t_get_symbol_v�%_���#.seg�(2-42��2�=��
 UNIX��in�ZS�[
(CUPS)�P'��"p�*��^��,�I�C�l-�q8�,� 5�Gc�a*�����N��$���=��-��-��in�dAc�<6C����s���r/���7424�=G��K�%����, �)�+��9���,�,C��]�>�,u�
�-GNOME,�%��'lo�+-�3� ��g���f�	y��=�0��q�3��g��: GV��an�af��'�ae�Q0��'i�Q���is_n��l�\
94�K"�Wg_v�X_byt�Ip�-�t�\����tim�X>so�	�+�Y�fpu�32�$Ŷdeseria����� �Xc�Wpec�'�[��Y6�A�c-ar��[���s�H-��*�-) ��7�
�[n�"�Volv�{API.�6P0���O09.1��:�-�5�3��U-_s�����due����@��wngth�`�r90�Y�a�yU�0�[3in �_in����n��1130�D�fAu�z3�S!ra�;<mn��J��>�l���#�.s�Q47�QAutoT�.�y�FCARES_RANDOM_FILE�������pi�~
�\�M�:��|ssh����>�r�SSH�ft�x���"!�to�.�#�e	���;����� re��7��algor�m gu�(�/166���Z��-z���Z*�Upki���&_�_sign�B�2�6�:z�V�A9�A�8�A�����(�A�>$	gmp���MP�(��
��,p��i�N6a�e��#�?����teg�C�lG�{��numb��ff�p���. �1mp�B�^���Hr�n&��	��/���s1-4361�=q?�c1ba�s�8-�8�`�4�|M�Za�iB��#MB�x��:�+�8��&��IFS�;��Z&PC-�	���bm��to�+6are�3,�����F�C�7@s�,(4�:.6�<1�x1��F�2�q9�)���)����J AUTH_CRAP��212��@in�
����0dssvc RPC �'��pot�
8�'4���K���nu��L˜�#��	-�
=���T@���E�=��Durl�����1���"����+����0�b�u����O�f��s��$, F��eLDAP���}����)g�(�1�J%�4��n�ީ*-��753�դCTELNET���-IAC��j�;�43�4SFT�:��~��%���)�y�:4�:������we�ill�=�=�pip����r��t�D�n�-%�22�%�Bftw��.�42��
. M���p	��f�k/�'�P��I�E(PyPI� ��r���O#ac��y���7&an st�Z	�Dei��"P�5I��s�Xs"�r0��z"�	�y�n���(new ����rout���pa��C-�iGp��2�P9e��d��p�U,c��N �e�d�r��o�w(�
m���!S�����D�������f�/3pi�B�C��de��c�c� r���s�;I��Ec�0�s�S	�7l �to�>�&��: Local�:��t�<�t��-��va�/m�<�Z����ed����=DKer�os���1�n2��*�3rov�~�s��y��Eb��Jli�&t�~�7p�+c�.#�G��ss��K�9�/�Jin�2e��2��orm���s�s���	�%���ea�����#help��a�R���d�cL�S)y���#�Li�]:�8��(KDC�	3krb5: Denial����y3�V���Oi�$Y�d�M�60��>�Pdou�=��� TGS��	c�T�#�=Avahi����oS��Di�0v��� M�X���;@�#����<i�Z�n��E�	Yi����f�&�at���dd�do�)��A. ���~�	-aw����.6plug���=u�����z�%nd,�Hn�t��,���C�peo�;to��t�0���n���l	�t�����Y�P����a�����!��-4busy-����M
���l�/�2/�C-�[/so�G�Q1-��3�-�ir�Y�����R�u�_s_�:_��_�er_�K6�>��do ��:dly-�˺�?�>s502��®��6ed�TDBu����B�A�2��$=��:�PDL�Hl�@%��4�C�&���R�4�&���E-���jdk�����NTJDK 21�>2Run�5#En�j;on����+S�D�]U�,��I���?:�k�H�x86_64��AVX-51��K831��:1�$��.�T�C ��O9�^�" �_�W
�d09��d�B�;���"���"s�Fh��l���=Zip���;�h-�'2483,�r��	t�IW��21.0��Mr��B��,��3�u��%�=zip�]to n���H��$arr�	;��+�k1,�z��z�-��"h�	,r�a��p���p��by����cre��#Q W���>�ws��3���t�1�[-D�r.�h.��.��`�ZraFieldV��=���W�� �O�E ��,'pr�t��]jar.�-S�(�)S��,��4�0�����0596,�t ��D�)8 MB�}��u
�sb�o��:���MJAR�3���1�(r�O�;�F16�d(�-14�?KW�T�tpar��Hu�<��6TH��6�unc�Tc���X��o�
�8��j
����
�-�������.)Re���Se���(RSS)��y�%a r��cbe�fQ�Z	��k��l�=�ݼ��s�zJ���
h��p�����V�AM����7VM)�
tt��t�S:�9�I��er�e�H�a � �`ge� �	�#is�@b�dt�
�&)c���Ert�I���Dv�%�)�Q�H����6�C
��&s�'��-��l�W&����wo��f���s�ű���-in�0��!.jsa�p���&���be�>W�yDS�h�vve��5� �G.st �'	ac���>�ǥu�:e���(�
�g"um�*�3,�=���,S�"on��*����<���`��?�,��4��/usr/��/jfr��ter��Ns��[�V�>�5�19�]jcm��ol�N��Q��� �th���-�T^,�m�t,it�$ac��y�8)��@�	�smbd�,�2�i�yx d�+���l�����as��*�W6�-�d�"��u��e���d-onl���	l�	09�R"rpc�9=o" �M`��
�(��d�Z�y�w[e�.ll��AD �"�h�".�D�Na�N;�i-��OCKS5�p�f��k� 85�a�Scooki��S�n���8��8Squid���g�3c�Ng�/���S��,�O�"��Gop�����E���)�ls���������DDig�eA�
�684�"�IR�%0/��	ponse�ugg��R�EP��IC�#�I6�Idʓ�N �2��.�U!��7d-�8��^��9�.a�q�4�W�C�_�1�sev�i�Gw���i�&pCLR�K�,dot�:�Xd�)Wr�+�XDele�V�W:�@Ftp�i�(��604�~�\SP����	 B�>.�Z�WBlazo�ms�X55�CNew�'�i�`��%<��sE�Z�Y���V
�
i�sa�3�ped�U�'��k7�14����r�4.
  �{�6��25��25�w^�����!�@7�Ԣ:��e�
uVM��6�!�9�V��g��n�>�S� 5�Kon����l�HD��#�pe�3c����S��c�@vm-�:�1SML�:k���=�5��40���=��w��hij���f�!vm�!-��-s��	-wr�R���f��
�|�o�~g��t�;�D�3A58��9Moz�,a�z�Iib�$���)al�Fm����@sg�#p�t.�0is���0s�L���� ��.5���z���8Z�����+cGL2��@it�Ho�F�62�o<�OU��B��P�.::En�+{��C5�CCl�vW����������o�-�efu�+�(�}�$�Z6՞Re�im�3B�p@S��1QueueE��@::B��7�Q�Usafety�ggs�r��nin�q�-�
n120,�ESR���j���l12ž��Se�G�a��5G�
 ���Wu�:Js�2.��8�^I�"R �qof��URLs�����"///"�Q>E-2023-6209)

For more details about the security issue(s), including� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fformation,�f�to�RCVE pag�m lis�,�R�&ences���:.Mozilla Fi�Dox���l open-source web browser,��sign�Rf��st��ards complia�Z, per�����portabil�.

Th�bupd�šgrad���}��vers�� 115.5.0 ESR�5S�HFix(es):

* ��: Out-of-�v�nme��y�C��s��WebGL2 b��Framebuf�.(�(��4)�OUse-after-free�CM�K�SP��::En��gl��C5�CClickj�ɪ�m���pr�+t�s�fullsc�h��ransit�'�Z6՞ReadableByteStreamQueue��ry::B��7�QM�3safe�cbugs fix�9��120,�������Th�yerbird��l12ž��Sel�� API would�Fpy�nt���{�X11�2ima���2.��8�^In�Dr�(�r�jof�6ive URLs��rt�with "///"�Q��T�A������ Runtime (APR)����Tbr�eus�Zby�Z�BHTTP��rv������j�os. It�vi��a ���M�{C ��a�tructur�#�Cr�Lines��apr:�eg�jov�Tlow/wra�ջ��#_e��de��2-24963�r�l�<��w��ul�}ktop-neu�)l��rst cla��ob���jbas��tag/m���|���search��ol. �p�m���{ains various m��r���Kextr�ors�������-�I:�cndb�Aescap�3-5557��jKitGTK���$�`�����Q�9�0��eng� �:�v�Bp�����Y�Fkitgtk: A�zt�oR��t���Ex�6�L4291�f���`xml2�h�)develop���޲h���le�������XML���s�u: cr�d �
 c�1	cau�]glob���a��~39615�~f�-�2��>s���col���c��i���/h��l��r���� �/
�A���$��st���ices�e��	l�Mf�0e��r un��ch�Tno�}��be�Acibly �l���-�r�pved�om�ܥe. ��python-ce�-fi:�\v�ߡ�e-Tu�
��o�� c��
��7920)�Furl�>3:��okie��que�head��n't�%ipp��du�cross-orig��redi��s��38�
�QPixm�D���x
l�ipul�����n�BX Wind�
Sy�Ym��Cairo.���_�
�O���_sa�_�or_�
	���o��p o�bs w�a�s44638��sk�
o��
m�hle�kyou �p�^���A�,����zgi��e��ge�+�G� lay����-�Ja�
to c��t�v�fy��l����gol�
�ypto/tl�\�ӣ=���|��,�����zlar��RSA key�X294��hhtml/�np�v:��rope���kHTML-lik�J	m���c�u���x�39318�h��i���	�b���4p�jc whe��5�cpost-�qsha��m� �RQUIC�dn�8�g21�gl�ˢ�a��mit�J�(ed�m�Q�>�YrunC���lightwe�,�
��ROp��C�mF�� (OCF)�a�|
�r��
.�u<�_pbuildah��
����Lfac�a��0�OCI���Amo�z���ng���cen���*to������r��N, ei�B�Bs�Ft���	���+a���po�	;�V�$�K�l�W��n��Bin�0Do��f; B�� bo�����
��pod�j��t
s��w��������,����<�,��i��i��
appl���
��	�f�v.�����#cept��Kubernet�)���Net��r���NI)�X�Zs�Rs�+��΢��uie�m���lug-���Gonfig�Jn�ni�n�Linux��,�e���a number�hup�
���a��N�)c���Lt�f���x�=�p�"v�����l�������c�o��|s���N�6�!dele�'�P��greSQL���dv�;d��-�p�*al���-s�(DBMS)���dsql: �
��$�;�g��array�Wd�0�z586�3�X�Ddisclosure�Egg��^func�Ecalls�K8�K��en�/��@substit��s@��quo����Dn�5ĭ394���bRol�
	g_�l_ba����an ��a�;u�auser��
¿7���s��ERGE�/�ae�,c�!PDATE�SELECT r����po��TĹ��G�#e�Ts�
��m�U� ����d�g�l h�}	�"t����p�K�"�;�� g�Ver1-�%	�O-bad�#��`���%�	�����j�V1 �!c�
�!�-����44�)�IMXF��muxer�
�f$vuln���-"�F4�$��'��$�&a����il��newsg�"p�@i����&�Lt��&6.0��&H�ī�-��a�c�l��& <��>DrawE�9sIn���</��!h����&a VM driv�+��685�d&�&1�&6���&6�l6�p'S/MIME� �'p���Gp�k�>'m�*���o
�m�0761�VT�Z�P�(�
 wa��hown����id�ePGP���Z��&Sym�nks��fol�\&�䡥���!�ex�4���R�o�'����k��nsT���(�
���N�'�#(PR_GetIdent�(esL��B9�BPot�+��#du�ꤙV�SoBridge�����m�G�_��0���A��::Pi���(void)�{���Oless�5e�q��#�eDNS��&�z �j�
U��fi�^behavior�JShutd�jObs�>'()�P�&Virtu�)��C��*u�(VNC�m(��!�	play�3
�S�:	s�s�&�,iew� �G�&��v��n�u
no�)ly���ma� e��	�����t�(ny� �5�~n���J��"v�\t��Y�8'���(��i�
���+u��-���s�T�&��xorg-x11-�3��,�l �|XICh�9eD�#P�ty/RR��5�+��36�k�g�� �8-r�>s/�ts�uKB�;ton a��637�Z�Rͱ�*�P�r��647�
�o�v/6�v/�ؠ����V��un�'�iz��+�En����������80�Y�C2pop��>286���Squi��
h�#-�=�]xy��l��a���,��"FTP, Goph����/1��=��s��: Den��ص��SSL C���4672��INULL �-!e�<+r���g����tocol�5�N8�N�-��F���5�fe�9
49285�Q�3Che��F�Re�<n Val�In��l��P�_�n�_�}�5�#����.�=se�u�������a�2,�=0 �/��c-�#�
�ݵ����ns�ti�@att�ag��t�/���538�	Alma�2��y M�IdM��cen�3�auth�,c�i�:�����(��-z����1�|�$tr�,�a���ud��e���*7��#
��ipa���CSRF����45�0.NET���od�cftware���"�~)��
b�r�W�C�#�8��
seve�5n�����z�e�ICLR�Za��

New�t�b�`�$#addr����Z�{��n��v�����{��d�U�'�VSDK 7�q��
����8�5�&dot��)�� D�[�D.SqlC�C(MD�&�/.��� (S��Y4-00���aX509��s -�
��Bypa��� Az�f�L7�L���VV��4-21���8��01�����6��26���26���j���-�jdk�@�f9�<�J�21 J�/�	E�'���+S�9D�#�<�?�?:�!���pC���n��9�� c��
��C�mpi��(831�:8)�09��&�j�Mp�E�L�����ys�-c�nel�TLS�b7547�b52�bJ�o�D?�
0�#(e��law�n��A�&�7e�_=��295��9�g��f8�T8p�����ܣI30Ʊ�9'�Ilogg���
d�:t�I�p�:a�0�(�O6976�O4�<� 1.���#8�"�*�!a�A��ō�gNas�j��84�N6�p

Bug��I�+prev�@Are�4=s�jO�D�6.2�B�u392),�YPMs�x�G8 we���ge���%2��%��, j������
�����s��2��	���tI���`	�Er�=nt�$��be���G����oBp��Cnc��i� (��ex�S>, "Re��6:Ŀ 1:�.")�~���-s�
b�J��rt�y��o�6"�8�ue.��G�O-1�F���7)�0�Q1�Q�+�/�o7�o7�o�+�oi����1�2ZIP��A�du�s�t��(82��'23�\3�i��W��4T� par�%Hu�mP��(THP)�aun�-�b�X&�$��a�&,�y��:�m�Y&���@%��f�Nto �g�/�P6e����Se��! (RSS��*��a r�8be�)B�7k�&l���)�p�s���j%�<Qh��p���@���'M��&(��)�+�"er��s�9�I�|"on���J�sa guard�+���
�&	�;is���WP�F�5g��c�幎ert�I���	���F������6�R�1�4�5)�7�m�U�=ki�ua�C���Re�t�!"���"�:)���]���(�l��9t�t���ll��@�
-�/ng��QK�-pur�h$���%7�0�Q���fss�1�eci��k�=K��IV��G�g����)(��!PHP��n�p9e�:d���3���~8u�e�9o�?*����U�R�pphp: 1-���Qv��4���]���V�2�o!�5�t4�GDoS��w9��Tmulti�{?�8Lbody�L6�>$�LM���or�T�s�l��!��3nt�qd��*����)��Dig�\��
SOAP�o3247�o�=Olo�3K�65r��?��i��ut�E
�R�H823�Hphar�w"��/��!�04�0P���d_�y()�way��N"��Ce��so�U	h��
��Q��P�]
� r�UP� ��K-l���[)�X�.��7c�dU�H�l�+	al�	,��(�
�n�
��r�	������
�Frpm�1OCTOU���=���un��)���)��1-3593���A�:�N
ch��&/ch�'/�ͺP�U
�7�\O�δ��U8�Uш�t�{+e�+�|%�6�8�o��
�a��
�.s��� �7��9�?�4:��T�NH�	��&92�N�i@�%��,e�60�A�!tor��a ��le�U0k��?�TZi�#%����	v�E�ƫ�of��i�D���.���9��
o�Y�R�Jflexi�of����4adm�5,stra�Zha�e�5�R(�.����Ds�
���9i�@�7�-t s���
Buzz�71�<R�^S���|pr�B,�ac�g,��<�����	g��A��F���?u��,��ex�6�%�y�?*�T	�tdyn�R:c�)type��d���l. �����ae�C�w�E�ll�C�',�<
�.�Vw�,�v�;�l�T�7�W�!�e��8/_�C:�.p�S��Q
�q�.���Hup���a2704�S
�
Tomc������le�QC�D�b�@������=]�oJSP) �&hno�i�t�q:�����M�%
��FORM�	�4108�/�MF�&Up�	�u
�nccum�sU���fDo�xU���$/s�\2794�\i�Dc�;�FEo�_cyc�H�-�6��_�]���k�_5�_��ly��Thtt�.��NW���Y�/smugg��^564�*FRRo�%7is �q0�z	����	�<CP/�v�/*r�2��5#�BGP�+OSPFv2�3, ISIS, RIP���	PIM, NHRP�
BR, EIGRP��BFD��Gffr���:p�>�2bgpd/�_��.c�4�c�@Ou�r��.�A�N#el�>7�>rr�F��P�2Gly���[MP_UNREACH_NLRI-�HB�%<�CA�<�P7234�b�A�$
EOR�N�
gnutl�*\�3GNU�<Gnu�?�dN�c
�#�falgor�p	m�9�߱��h:s�Y1,���D�	�~��:�O��SA-PSK�}598�H�K���
�6�5�+�:4�53�:re�<�2�J�C�U
i�9ed�st�J���;d<�8�]<FocusE��\�3XIQ��P�]4��681��b�t�G5�n��G���s�4��'��8�	o�7<���2�D�qh��XIS���Hier�by��U218�4�V�<)�(�W�I�E�0���8���?ANGLE�74�9F���to��se�p��im�'bmp�A�9����:�9	�	���"�?�<��*���R�x��P�qI������l�H��Det�a��9P�o�8��:�f��D �[Ql �Ib��
bar�U��;�:�k	���v�Ic�:�P50�Pr�Rlege��;�m��ough��s�@��HSTS�J��@����쥒� f up��#�W3�W�P>2�P>7���P>7�l��	��@7�*p�f@��{c�L:��#de� �`���	6��&�{GIMP�N�lI�caM�ciP��E
�`a�o�QB��e�#��,.�R�w��"�<m�^����C��H�,�$���%he�Cs,��-�j�W�9�&a��-a�I���9���.5,��
��7-�u�����: dds��RC���P���0PSD�02�0psp ��T�13�1off�f -�s�+���A�l�M�rv��&�"��61����9�[?��9���9��E�)lR���3�[�>�9�92�@4���<7�w�<7�Aw��sB�udo packages contain the s�utility which allows system
administrators t�Grovide cer�Fuse�with�Qpermission�,execute
privileged�~mmands,�ore�Cd for�u � ��ment purpose�.�bout
having�]log ��as root.

Bug Fix(es) �c Enhanc�H(s):

* CVE-2023-28487�: S�do�not escape�'rol charact��l�0replay ��p���S6�S��mess���N42465�NTarget�&Corrupt�`of Regis�G��St�� Variables.NET is a�Pd-softw�qframework. It impl�%�+subset�\�ϣC�- APIs�kseveral new�,�it��clude�ICLR�Za����N�0v���
s�d�`that addr����5r��vuln�fb����now avail��. Th�=pda��U�'�VSDK 8.0.102���Runtime�2��S�l�9�&dotnet: Deni�塧Service��SignalR s��z(��4-21386)�>X509C�=ific��2�@404)

F�mo��det���b�m�����eue��,�r�he�q�Z,�VSS sc�G�
ck�:ledg�笮o�/r rel�?in��m��,�f��d�R���?g�m l�o�,�R�&e�cs����PostgreSQL�|n��v���obj�$-�p�*���abase���(DBMS)��p�dsql:�n-own��'REFRESH MATERIALIZED VIEW CONCURRENTLY'��+bi��ry ���0985�6�Mozilla�7�Dox��open�ur�web br�xer, �=�a�t��ard��Ki��,�f�����port�'��Th�b��gra��}���* 115.� ESR����: Out-of-�vn��me��y�a������qc�sne����154��KAl� d�og��uld ��e bee�bpoof��n�٬�si���O7�OM��safe��bugs fix����123,���=Th��e��rd��l53�lFullscr��No���L��hidd�by�l�
 el�W��8�[Custom ��s���Qobs�e�]�^	�=�L9�ou�ХKre-��i���unexpec��ly¸l�to�inte�d�q�G�"�0�qultipa��HTTP���nse�
�baccep��Set-Cookie head�㩪r�/ �B�h1�hInc�	�Tco�
ge�&�	n 32-b�ARM�J�u�J2�O���	�,l����il���	sgroup cli����L�"��
n����a valid�eng�e��iv�Ecach��DNS ��SEC�wol�. �bind9: KeyTrap - Extrem��PU��sum����S��o�>
3-5038���OP�h����a�K�53����+n�	r���]
c� exhau��s���W	s�]86�M��Virtu�N�P�
mput��(VNC)�r��te�s��������iew�2c�G�
ktop�aviron��only�=��m�&e�Rere���unn�Rb�Lfr�any� �5I�3rn�Z��!����v����ȦYar�t��u����iger����u���-��s�����/���  * xorg-x11-�9: t�\vnc:�jp-�
d��f��ov�hl�s����6
��D963�D�j
Why?�'s��p��ncy��ee�Vquir�-zero��figur�s���s ��i�Gmai�{��&ex�Fsi��Aplug-i���"i�u�u��shell�rip��. When�s������10 MB� AM��l-App-cpan��us�>��e��#�::� ��DC�[E��
V�
45321�P��g��Authe�D��Modul�jPAM)�g�w�����
a�7polici����zne�b��ile�Pg��ha�e�H��am��m�Ep��H�na��pre����(_��L�r�oA�C�Bypas�-0�����0k�l�/�&L��x�!,����^����^�T�����K: bpf:��h�� ���������R100��
�IUSB:��
:��s7840:�� crash��Wu���F2244�Fcxl/�K���&-af�)-���
���or�
de�c
r�utd��_50226�tu��M
�������%�;���s���*��o�1���Mrofi���	)�x: `�_��`����`�}�-���f���S�,s�nd�v
�4�2336)�si�5san�
z�*��`�t�{_�K` pa� ��5� c�te()` � hod�p7�&ebKitGTK�	�%�>������r�D��eng��	�:�w�Bp������Lkitgtk:��xo�	b�v��43�7�orna�^�
Py�Wn�`��|asynch��ous�lib������q	� ������
��,��bloc�F�p��mtool�yp��-t������h��i	c���Ns�aDoS��528�)���+��8�R�Jot�0	��is�:��
�۹o��xt��O��PGP�\ryp�������yf�,:�iCSP�'	��X�WExp�pvia����<��Shi��	�b694�bUn�
d�Y�1���dd-�	�t�nV�l�~�_6�_S�����	�be����o����`2�`��3��x��28.5���'�ō�
�URL Bar S�X���M��pu��Puny�G�jW�s�7���� �n5�n��.pr�^H�͢x���N
�2F�C�[�j D���l7��T�
6�7�E�}$(Embed�(D�0%lop�O��
��4�!�ae�UEFI��p�E����M��
��
��3a�l% 64���H�e��%�IQEMU��KVM��edk2: B���DHCPv6�~�Qa �g��$�/ID�
��3�23��Yw����h��	�z�Ms�K�|a�zAdv�:%�"��i�=%�
��#�vS�$'OLE,�	SESSION AUTHORIZAT�
���wr���N����0978)�fPL/P�{�h�	��%�g�����g9�gr�d��be�se.�A��(quer��reg�D�ɦ��i���_Rub���Y�=����ed,�ior���8 l�u�m�.�xfe�V��0� ������O
��0task��rexm��REXML���	�4��1�U�edis�key-�#ue st���2�1ten�mre�las���-�4u�! �since�Is�#�I�'i�,��h��3��s, ���s��ed�. �\�������o4a�-�j(��9. You�wp��st� ei�Bb�&u�U���2�ΡZk ��2��"�1a�2#��o�9ap�!�;ea�H#��4�
�3�
]�`:��SORT_RO��y�ACL�'�F!��10�b(�F�)�4!�=��Un�s�et�'�
!�!�Ap�Q5145�Q�2����due��mal��������	6����31227�ULua �m�5��l�*to���4��ORCE�\449ܲ�&����r$ �-��&͵8�h�e��Y/sm�=%�k���l rmb_d�)% �Q!��SMC-D��n�����2661��� �k: i�}�/(z��teg�		�G�-�$bef��wri���Umed��385��i��u���� los�J$���v�_�(�_�,*_fa��*()�V499�V��t�^&�������
������+�O5018�O�x��,sma�don't����che�U��n�g
_�Iecctx h�Z�b6����:�Z7oi�,�-���qd�;_pkt_len_�̩�UFO�9���nf�ayload:�Y��f��!l��S�c����kb_����!�}�d!5�^%HP�HTML-e�7�	�Jo��&�7;�z;Apac��I�A�>
hp:�s���"�W�~�V�M�k-�	�o2�0629���75�{�T�?w��!_v�y�+rr���l�0�`�7�]pe�#ATO��#s�309�VF�A���L�R_v��(FIL�i6_V�j6D�s6_��%458�JE�����w�|*�.�F
��A8925�Acgi.�&���k.��̤���M���0ol�$��q7�q�!-FPM L�,���1�x(90�}$��#��Z�a�'��1�g�O+m�9�A��es���+,�����e���&
high�ve��y�'ic�typ���i�-������t�\a���	�
����C�>i��as�ll�to� ��w�+2ow�!�;��$:�U�s(v�
) �8�@�6(�o	qu�V1�Ths�L28���[U���
����C
S�
T�45s�.�
��	es����
�F���6o��'I�l�ӡFu���Ce� 1�T5�9��LGSt��-m�?�O�ea�"��+�i6o�9;ph���	s�C��@7�;���Fg�Ver1-�45�"-goo�/�a�A	���a��-�7���q5��@qua�-	� ���LGPL l��5�͘:�4<��� 6����Ma�a3ska/�I&�;muxe�ZG47540)�aOOB-�E�P�.mp4/qt�K.c�K�x/�K�K�u"_to_s334_1a�M9�Mnull�U�� der�6�\�4_gdk_pix�'_�N2_flu�2�b613�b�e�X#�MP4/MOV�O�ԭs�)1c�;�.��o��?�sč06�'������/9ed �5�����=: ���S�c.ck-��:��vo�s_�)_iden��@_��et�8)�z�R�hOg�p<���	�Pϻ�Nopus�H��e_�A@��O`(�
��(I��PeC�
Lo��Re�eIm����(@9��"�3url�	3�v�3�<��	��O
���M��+�'��� POST �i���	��|��S"s�Zody�?st�	p���9 ���?303��tu�x�o"r�@��6�G�#���z80�1;mpg�4F���l �bPMPEG 1.0/2�5�<dio�t3yer/�8:�9�s 1, 2��3 (m����K�*�also ��n��MP3),����Eu�a�g�o�R������+�k���P.CM�!�v$57���>��L���"l�xr��	�!�<��04�]��cur����2� �� �����W����=����z$��"�|'��N�atoc�9�����1��eLDAP�ZK�}����7�"�Ilo����U�i2c�%
flaw�q62�M��8S�NR��	�]���aV��e��=a�y
�	�=L�@ UNIX��sim�FV�� s��$���7���o�x0�%�bo�c���1�_�j��ssh:��H�/t�@��"a�#n B�'E�ePa�nP��(BPP)���		�,*�.�T��$inj�%�1�KEmetac��3�'I13�qS�{
o���G�G(��1�v���S��"http/��n�sB��W(�D()�rRe��7C�K���	�3	�393��pcmd/g�3=�F�b�*��r6��$m��q	2����Tomca�(�xBle�\�#�H	�@J� Z�������4P�
(JS�D�_Jhno�'�	��t�q:� sm��m���"'��-�<�N�6589���7l��
�~T�p��l�bC�&@�a�~Lb�^C�'s���r�|[���mea�����A�JI��k��� R�Vf�G�����['���2:�]���46367�36My�n1�-�0,�thr��d�WY��J���co�-�~o�C�M��+daem�d(my�0d�V_�^���
��U���E�noDB�s�dR�Yed�k-��OApr ����2191��Q�I���|DL�%N9, �2�33�nO�miz��#t20�d5�4�6�7�7�82ɴ�=��!n���s�$�4ž4�~6�~P�/#���#t53�AT5�TJS�!4�#O66��M�%�7�HC�q�#R80ɡRepl��VJul�V200��7�57�v���i8�)�O��T32Ů9�64���70�8��O9�o103�10���*>�+��T4����R5�054��i��n�U�`�J66�*�
8��9�)104�4��UDF�#�1�>���N�@R�fD�����E4�P4-2��(�����T1�S�2�5�6�7�1�2�3�4��^�_8����`	:��h�I���3�_P�Vs�%_���s�V7�*�	1�$R�\�U�N9�:N8�$��N� � �W,rewall�%_�$��N�jzst�� �T��Y�"
���!2�9���"��Q�3�/�$Y4�Y�!�����4m�
F��I�b�#�S30199�`�b32�r�j�Creg�(���--s�_gtid-�m�vl=OFF (Alma�-�uU��*�aha��xy�b�]l�.,�-��:�Q �H�Bl��TCP���l�\�u:�%�U���ʢ��Iw�@�e�ry��X�-L�`5��022�d�Qun�m�BURI�#�X��9e�Lof�Kf�/"��A�:��Q��:%�R�Ox-�_-R��C�r��L�>ig�1�T�n�ap�Qa�<�=i� �:�8�r��T�qt�!�)����_����8t��<f���P?rd�!�U�%��l7be�Vu�z�ODz���d���V�8��ld-�z��n�B�X�V01��cu;B�?to����2�[r�~;�g(-ptr-�c(���_�!_�x�Z�73�DN�r;�[�sO BPF_PROG_TYPE_CGROUP_SKB�h�,�R$f��3�in�3LINK_CRE�j4�i�R�
�i�la�Bv��Oer�[i�9��9�PO�o;��90�Lnfs�en���(�4�;ttr_�;ss.����T�`e�!�U6�uNˢ�\���_u��be_�f_�k_�Ĭ7675�sdiv�&���;988�<arm64: �y�P@mo�Phrok�yLDR (li�.l) ����%�V5�<]�xfr�  �B�qV���-�*���T<algo�AA�O��O�SCO��UAF�
c�E+�2���H25�HIS�H��+�H�n�&�&S�Ign��nCR3[4:0]���PDPTE�e�++��š�:�Y�uSA&#39;���le�&w�[SA��uy�r��=.�i�}
e��42�
bne��wi�h��-�n?p�(_unr�!v�X�Virq�?p/gic-v4:�zY�/�M]a V�C,P�ra�0��VPE�O9Шhci���_�!_�_�J$cs�\25�qsc�"/���mk�>he���	k-�F_�8_�	�F>23��o��*t��_�w_n�W_��P��9#sk���e�N le�
y�eEi�u�?x��2����v2ge�+�G� �&��u����P��y�!��R�\��bu�>ah�����	��]��X4�	��0�OCI����A�.g��t� s,�c�,�;t�� C����G�R�N,�G�_%cr�E�G�Gan�����F���;�V�$�K�l�W��ns��H�q
�<a�ck��w;�	)i�0Xo�?
����
��S�#�x��|7�|17���|�7�h
�[|�L�b�9C�/ YARP�/ 2�[�c< G�support (CVE-2024-21392)

For more details about the security issue(s), including� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fformation,�f�to�R�� pag�m lis�,�R�&ences���:..NET����man�5d-softwa��framework. It��le���+subset of�W�C�- APIs��several new���it�e�ICLR�Za��

N�0�:s�
s�d�`that addres���Zvuln�fbil�
���; av��able. T��upd�6�U�'�VSDK 8.0.103���Runtime�3��S�lFix(es):

* dotnet: DoS�a�8C�/ YARP HTTP�2 WebSock�0��D�adnsmasq p�w�8s con��n D���lightwe� DNS (Dom�"Na�kSer��) ���~d����DHCP�'ynamic Host�cnfigur�� Protocol)���@����: bind9: KeyTrap - Extrem��PU��sump�Y��NSSEC
vali�?����3-50387)�XPrepar��a�١>3 close��en�	r pro��can
exhau�ԡ|��our�Y�f868�Squid�eh��-per�X�%�
xy�
ch���ò web�8i���8�"FTP, Gop�����g��a obj�rs�s��:�Ani����mice���Dhea�w�����561��AD�AS�AChunked�!co��D111�DІrequ�.���C�
269�
LibreOff���) open ��,��mmun��-d�?l�d�$�-�+du�Ev��suite��Nkey �ktop applic���?ch a���d�Hc�Fo�A spr��shee�p�����&��ula edit�8� a draw�Y�Qg�. ���	la��O���6�,vi�sim�r bu�h�d�#extend������� 6186�����6: v�ous flaw�XJIRA:AlmaLinux�465���A5� A�P�WgreSQL��adv���R-�p�*���ibase��� sy�am�jp�Ksql-jdbc����.ja��il�nee����J��Is��ac��������*JDBC Dri�Rallow�Jtta��'in�� ��f u�kP�EQueryMode=SIMPLE��159��N��.js���
�n��p�p�k��buil��fast��sca�\
 �
��
�m�y��Script��m�Dlangu��. ��n��js: ��0un�ed�with��x�(c�{�7��
���
��s�201�I�ngo�P�v
�[�3Go�y�bp�{�+
 *�T:�-fips/�ssl: Me�0y leak��co�n��ryp���de�RSA��ylo�c�G394)Mozil�TFi�ox�-��	br����>ign�-st�i�)s
��li�, �[	�z�7	�
��Th�b�

����}��� 
 115.9.1 ESR�h�
: ti�Z�` ag�������L�38��
* ��: Crash�EN�ATLS method�(0743�2JIT�sfail���sav�mturn�g�8r�9n Armv7-A�607�NInteg��ov�9l�:could h�R�^��	�hs wri�<�Q8�Qm��e h�~l��;�B-of-m�;�f�E�,ICU�N16�Np���Ohtml��body tags���d CSP�C�[�����\0��kj���W�J�a�$�Jcc�a�"	lly �Bn�硡m�)���p1�pSelf��2��b��mpote�S�^�y-af��-fre��2�a��safe��bu�fix�I��124,����0Th�Orbi�(
��l4�lPr�
leg�^��Ex�0��via Ev�RH�����M994�N�8�
�_����6�X�lon�*	i���
sgroup��
���L�0�}�L�g���e����)��F������+�V193��r�
�
��)��\�<�
�T�
�V�
���JGraf�T
�fea��i�����s�

shboar�1g��h�� 	G���,��fluxDB &�TSDB�Cg���P�	�i-pcp�񢼫plug�h��PCPյ�K�P��6?
�)?
�>
�������vp� e���th�gh ���p�eie�,189���Y�
�m�le�X���an�Ble�enbac���PKCS#1 v1.5��d�Ma�xn)�
4680�;�5F
�FExpat��C��a�����PXML�cu���Ge�E:�3�g�}kens� �g�Na�#���P52425)�N�zE�B�l����87�MRuby��2���g�ep�ed,�or�G	�s�+�"�has�=��� t�Y�����:����task�(�pfo���f�s�be��	���r�st�.m��	�<��(3.1). (�J905����3/cgi-��:�jsp�/e������CGI�P1-3362���?:�.�q�M�3UR�33��5�3-��'��ete���i�K�[36�JӏT�|Đ�

Bug���-irb�	RB��h�dep�Bncy�!
�'r���u4��	������not���4��\�IPS��[�u
�E 9�R��3�$�I��]�e�K��h��a�
l �mon��-��buf�H���M6�M�%tiple�w�0�Xpass��du��i�?
ŀs�B�&
san��z���r1�r�H�
w��c��k--�p-fs-�ժA����a0�as�sid()�7es �dr�ell���o_u�����Varni�^C���Z��E�ler�t��sto��
�£��Lso��:s��n'�v��cre��r�e �@��=��
, giv��(s��gnific�Rspe��up��v���/2 Br�0 W� �pA�zmay��&���=4-301��	�#��2�a �\!���e��s���� �+"��!�:ol����A�Ow�	�}������n�r��defa���,,
���any�8	�ys�a�����Pm�fy�r�L$
c�"�+�t�?�="���"�?#rol-�^cer�;
no"�"�$�\
ei���Y
�Vit�"im�use�Ia�]P�5%���Z��f�"
�W�����T���f a���Gn�;�Blo�h�#to
��$8953,��%�+al�
�~����(.���i�n�%
�?�g�j�k��
o�
ipu�����pn������
���f�h$���衠m��r�$��quer�?�.d��ǣ�
�����{�me�����isru��(�Lltoge���R����g�����='�
"/etc/�,/�E.d/r�t� ��.�"�
���e���}��
�w%����l, "���R����,��%�vwo
di�<����a�h�@limit��M�K�a��: "/���� "�-�"yes"��se ��,� "manÆ"�{Up�x���f�����dvis�v���m��
��k���B����+y���zi�Z
��	,�Ȼ������^t�!| g�f"� "�Jma�㺭��pu�a����(�)"�3�n� dpipe)",̝
����d�t �l���'�^�S�
����
beca��it�fe��7#�L�R���|
�
b���f�
����9�"	�Q�:
�X�xe�����8�"����a cu��m��������r�����$�I�614���
�5Berk�
y�rn�@+�)*�5*(BIND)�&��C,���_*��(�E)��t�5*�.�E��
�l�(�);�S���O(rout�F���
��s�A
he�D*���W�
�~;�7tool�=��za����is ���l�����*��* ��*�\�:+��	o�:+�NSpec�_�	�sy�
��s�0l�to��o�K�a65�C�`E�~�bo��64���_-s�-e�b�|�sser��7u�A���������679�v�D%�5RFC 1918�4�ae zo�7�r�>�“nxd���
���”��T�~51�VP��Om�@�|�yex�U�Ъ����O44���"$j�c-1.��/-�jdk��?�J�0�'�0Environ�����*S�D�Kit���>: �g�Ece�7�����c�(8319851��0��M�l���C1���$�gen�O��8322122�X��XP�.200�.�|�7c�I��I85�IC2���4f�P�"��
)_�t_��s�1ray"��75���[9�;��j�1��11���+�h��[��"�\��look�F�O57�{�N�'4��7��7���+����U�2��2���+�ͣ��G�_h2 Ap��httpd�ul���N;�A�02� (h2+h2c)�c��4�
�wng�B2�2�L2.4�%�� �(�5ONTINUATION�;�{�u73�4
�A&�0nutls��GNU Tr�v!�Lay�h�6(Gnu��)�g��,�
�n&��%�ph�algor�yms���T�n6SSL,�C*��D�	������Min���d�ha�nl�+��%��883���N�����J�D�/���M�	��,�*a1��@a110.0�b1  ��GetB�$�����,�be�^wr��*�38�N#��0�m��* ��-�mize��E���X�#�J�WI�/����drg�J%�+�+�tgarb�c�@$���`�P�3�Nmp�"�Rd��+��i� �"i�)cu��+� ��,-����o��\��Typ�{�%å�VP�V�껷Al�DB�5 s�X,-m�2�I6�},�,�,5�,10�{�,10�d�!�]^0������-�>�=9��l�30���?y7�x7��/�, x/�2:���Ye��u�����l������52��~>sw�3�
����QIP��<IKE��N$.��6����B�H�:��st��5��)�auth�L�~�;e�-on��	i�z�se���Y�P���6�u�&���%u�Ous�4�&��tu�I��'�&(VPN)��l�@:�s�5<Sha�K��0�n���( �l��3�9>��}ah�	�������� a�3�+(OCI�*�e�!�G. Am����t�#���c�s���4��$��@�)3�N, �"f�G�,a��or������A�L�]Cpo�;�V�$�K�l�W��ns�r�!�t"a���t>�; B�������
����: full�{�'pe �9���f�3�fGi���F�!S�P��(LF��fB����-��B���76������os,�E@��'�����G�.��O'in��$���
�}�'��"�	o������h�,VU#421644.�;��`I���7�&���w�[�N�] ��OS ��fac���VM�c�rST�
�!i�%�|�Oos�I�%	��hood���--���Y�,ac���o�	%��GPG�������9��osi�^e��30�(

Ad�
�nCh��es:�Ҥ��j�Ic�%�T��re��se,�S�d	�}/R� N�xs ���H��R�L�oGTK����6!��l�re��Geng�7#�:��B�/� �Fkitgtk� �'�N��I�9���t�c!�6�K=��04�=�?Y2�4�>Y����M�Ya�J�T �,�,�:�U��!����w1�45�vU�!�r �I�rb�{�lou��&a�-to-��,�=c���S+�9�83��	9�g��M�� aReco��M�P�v�XGS�X3�5��F�^s�i9928� ��M��.�p�ma�X+�I�6	�Z�G�Z�X�+��/�cA�Zly�|f�� p�����ifing�[6in�Pu�"�0�;���Q+�-ag���Ia �+�[�(4�3&��1�n	power �7�$�~s���4�D�w�T@�n�o��
�8�&b�[c�x8�0�e�J,�pv�ܥe��url�33��6�4�@�st����M���$�Z3�S��*���[4�A��G�tS�	80�jpy�sd�-:�>�2��OAEP �B��PyC�9���Jx�k52���kj�4a2����9�&ri��M���4��n���X��a�N�mxml�9���x219��}xK�l�]V�M�k2�KVM�T*�f�"�5�'�>��o���s7��c�u@c�q;�8/qemu-kvm�,��f�3mp������0�m���k/�R���t	QEMU: e1000���Rp���_�5_��et_to_g�e(�3�4���UVNC�=�4�"5��p�Linf�7_�,7()����	32�l;�Yi�+IDE�r����pX�K�MBR��6�*8ũNULL�� der�����_�-p�HB_�a�66��Qam53c974��S�di�#0�$�H	�@o�46�=���Raw����?�:RAW�ob�2�Odigit�hoto�[mera�h
RW/CR2, NEF,�<�DNG�Os���: a�o-��|in �.T2�@
_ex�d1729�@`	�X�)�w�5�3� ���"�D��5:�D�s(�2�b_XkbR���Syms���?�z(�Ks�:�/�_���b�x.o�utSub��T6�T��#X���=�M�?���$�,�X�=�X.Org�}��pm�&:�|pm�|�y�|���ߡ��F����*�%�No�NPM�c�u��L�&�#p�L�=��;I��L�:M��
(Id�
centr�
ed�J�b�:��B�(�d��
�tra��/c��0e�E	�(s�7��(�&�i
ipa����3���.Bs�[M��	�	?��61�<tFRRou�GGs�� �D�q�F�>!CP/�V>�r�2�&�A�_s BGP��NOSPFv2��>ISI�'RIP��?PIM�q	HRP�
BR, EIGRP�zBFD�Zfrr���ect�7ng�he�Li�gp_�Dy_llg��Edo�93�T���W�$ng�U�_p�X_��Q�S��S����7 NLRIs�[�:�p���=1358�K���ai�	�c�A���	
�Gnlri_�a_���()�d/�!�.c�d90�Fha�T�jl��ed�a�|� 3-�'
��D�3�N UPDATE��,�E3�Ea��a�	�J��f ORF�a�*6���>�py�|n-���5!�;P�#�!�1-��W"p�Z!�f�;�:P�� ��G���}�@!�.i�`�Y�is�DF��6+ross�qM�Q�s�		804�=2��b�+ �O#�z�=�Ns�-�7D�S�&���."�)	���Al�����Pds�St���~/Pod�AB�u�,�X ��hn�g�.D����"���!�.W/��p����I�Y-lik����
in�����%31�*�h�	�W�b9�b�!/�P�?�))(�)�[Re�-C�:>��
�p2�=���\�k�/i�PAX��J�MA�-��
�1l�ULl��4�Cn�ha�6�E
�V-f�ke�y$a�I-�`M�
Fs�m�/up�:�Ixorg-x�@;�#�}"O��i��I�nD�P��ty/RR�O�D��u53��g���Rs/�ts�uKB ��	ton a�	��637�Z�Rͱ���P��r��6478�sH���N�1�/F�a/��^�h�pXI��@P�?
�b8�~A�b�t��K��
i�l�Rmas���	�d�q�]229�qSE��P&abe�\GLX�a��@��@�@��	��=�~h�SXIS�V#�YHier�3y�]�U�O�$�VD�d%�W�I��U��0���,y���
8�=Xw�e[���X ���X�o�'W�2�/�>��C�
�
��u�Q�U*�Z
�x7�	�L
F�� (OCF) �7
�g
�q
�3�
c
io/f��V�c�Glob�2�� 63��:�!�?/gzip�B���$��I1�I��W/��ߌ2Ì�$/��;T��YS�D"����$��Y���a��f�[�E���(N3�)/�=��Vsnd���`��9���� �բ�1d s��,�/AIF� AU,�'WAV����src/�
4.��6�au.c�b�#�2�86�=�&��S�.�Z�s,���1���pa�/��pod�l�@��P�=&�f�v.�}���c�i�= Ku�3net�\�\�YH�details about the security issue(s), including� impact, a CVSS score�
cknowledgments�nd o�/r related�Fformation,�f�to�RCVE pag�m lis�,�R�&ences���:.

Addi�
al Changes:

For ���j �c�%�Tis��eas��see�fAlmaLinux�p� Not�0link�NfromΎT�Pro�s Man�ƪ Interface (PMI) provid�8p�+m�+fun�Ls f��MPI�dl�a�. �C Exascal�Qx�Ran extend��vers��f���7st��ard specifi�Cly �8ign�1��support ��st�@ up����e�~sizes��S�*Fix(es)��* pmix: r��con�� �pow��tt�'�_�\ob����wn�hip��arbitrary f��s (�-2023-41915)��m�q���*�Network Block Devi��NBD) is�%�_tocol��ac���J�.��h�Ydisks�9�	-lik���!) over�N�n. �1libnbd�gus�p�1li����wwr�1�u����z�S:��licious�4�\�may crash�z�[5871)�?C�&�hisbehav�K��hen�Preturn�|unexp�U�pb��!�`2�>�FreeRDP�@fre�!�2�Rem�S��sktop���(�<),��d��d����h��cense��x�ardp��can��n���M���s�Jch a�
icrosoft Wind�m�Wine��x�J��VirtualBox���y:�P��r�qoffse��lcul��Ŵ*o DOS�z39350)�GNull Poi��r�\�C�@���9FX�L1�Linv�ld���ǑO��Of Bou��W��e�S2�Smi�g�S-of-�Ss��a��gdi_multi_opaque_�/�l6�l�g��f��co�cb��w��vul�abil���qCre�jSu���018�mO�Qs�Rin�Uear_decompr�e_ba�_��a�N567�N��`�g�Kive�Y`�k due��i�V�Os�v9�vbuff�2�rncrush�h�M��s�rwith�
f�dput�`8�`��U���3�*O�/nsc_rl� �t�I4���1-U�1�2�f�ezgfx�bse��)�X��r��e�}l_LumaToYUV444�F8�<h�tcpdump p�a�i��
t�ut��monitor�Sn�d	t���z�O�3�Oap�Pe�D	pl��_�t�h��_on�	arti��r�_���or�$����2	��s��:�	-��r-���K�Rr�
_� ()�g1�043�<gP���l�Co-Pilot��
CP�su����ools�sr�^�"�1ie�Aacquis��,�S
�vv�v�)a��ysis�Jsy�$m-level p��m������. It��ght-we���tribu�a�^t��mak�t��iwell-���lc�Ur��z�=���lex���`cp:�	safe���9di�o���j�%�kroot����l� e����56917�@4�=
if�2�0�ZM�s�9e�nee���u�ppl��Ps�|
i�V��ynam����ag�st�V,�|�q�WM,�q��r�FXpm: ���\����	�Im�GF�B�	�#�37��No�NPM�	�	up�����p�L�"	�=pl�Zh����5amm�4l�|uag�iat�)����wus�\��� ad�0�������8eb�V����:�
pa���ee�Bvia il��9�,-defi�Unicode�_�?�Q�2703�A
��vir��

s�$ A�����E��	ac����^�Cu����	�T�5�%���X��a�A���w�,����%��r��n�_�~ed�
o�Z�8ULL p�8d�8i����C�L��All�s�4-2496�@�sk�!o��
e�	you ����3��G�������g��	�K
ge�+��� ��y�Q�q	�7a��	��c�
��if�. �Ogo�X:�7ypto/tls: Ti�qSide�Qnel�,�2RSA ba�sTLS key��Q.��528�A�	buildah��	�v�e�d�����0�OCI�m��A�Dg�>th�'�P�cenab���to��\ ���R�N, ei�B��sc�c�u�:�P��a�<
t���;�V�$�K�l�W�$n�.u�!�va Do����; B����	����-�
����/http/�i�:�ni��S�
 (DoS)�Res��5ns�T��HTTP�
�st����2��Ansible�
r�p�
s��edel-dr���figu�
�, �-n�2
deploy��D�&task�ԩ��<����}�s��SSH�8doe�
�f�ji����w�
�.aem�)��b�<al�=�^�t���@E�����u��b�u�)ten�kny��~�d�xns�2�N�e��d�p auto���2��a��-�h:�(s�o������$s �gn��ANSIBLE_NO_LOG��0690�Bug�zUpd�����2.14� (JIRA:�<-2�
3)EDK (Embed�5D�op��	Kit��j��M�Z UEFI������-�is����
sa�k64-b���Hfirm��IQEMU��KVM��edk2: B�B�\h�;l�}�aID�
�A�DHCPv6��xy Adve��s�ss���3�q* �#�m�;p��Tcg2Me��GptT��
2-36763�FPe��E�B���qu�?���"��IA_NA/�TA��f���29�l�$�5B�t�j�D�o�A�O��c�R���`1��fin�lo�d��ar��un�n����D�in�O����e2�ea PadN�.�c���@nss�lEx��v��ime�4#��hec�DH���}ame�0#�^44�A�C�	�"�a%CN�a%��co�G���P$��$���2�+�_"plug-������`���� 
��l��
�9a nu�r�c�jed�a. ���:ce�?"itself�C�)�=�p�!�O��*��l�v��l�s"��r�

s��N�~s dele�'�$�
Q��Q��	�
ki�Ed�~�����qt5-b�l�
�� ����xml�X���3Qt��q��� �����%5171�qt���	t�Բ����P�?��KTX�%��	2558��	�=���j�9�}�Zp�%�f�3
�:pow��ul���q�%�2e�_����%��v:�_�Gr�o�!�$��1122�<GSt�sm��a�*ea�)m�
�(��+�o�-#raph���	�F�Le�"�;��#�g�Ver1-���d�!�
�l���e�B���`�j�i��&����%MXF�n� �Bun�l$e�=d��047��I�AES3�wdi�y5�y�_H.265�������s����k6�k����&��5��'�>����% �a��
�1��ip�(�XTag���t�]l��� (TIFF)����}�2�X�
a�(�G��2�[0���A��'�9fa�f�4Fax3En��
�,/�_f�.c�1618�Qi��cp�740745�8���Braw2�'�D117�D��-�H��cpS�	pToTi�1����	/ɠ622�=�Mut�����
,�� l��|���"���MIME e-m����.. �K�s���x �!s�(��s,��.mbo�Ma���s	�q#�A�82s��POP3�6IMAP��m����.�i�8���0�=�1Python���s�{pr�_,��� v�job�-�'n���c#,�	�pe�G�,��ass�e���,�hy�� �#�&��	 type�"��i�y# ������t�6y��#�)�C�-���.v��c4w�T&���
�(�}:���or��e�p/_����!r.py���f���/u�H�. �(�h/�j)�%tupl��27�?�+�jpeg-�!b�
�$�JPEG��Wy��so�F���o4�2��+c�(t���j�M�k�1sa���*a��
���$as�Kb���bet�Q�,�K	��?�9-�]in �1mo�A�}1�jdcoefct�J1-293�>�9���TC��u��(VNC�E��0�#�+�o-��9�iew��Gd�z7en�F&on��.��o�(��er�����}ni����ny� �5�n�$���"w���et���Y�.�"i����K�[/���7�T�p:xorg-x11-�3: U�D1bu�Da���ro�U5���F�@��,�F3�>w�gk�$�M�g�O1mai��d �5�]�n����su�tl����73�>�
�ekgoo�V�
k����@qu�E�� ��LGPL �A=���P���	�<�~FLAC�F	�#g���A*��-���y�N�s
C�&�
Au��q's��6yCA'��I�D��s*�$�G��5mi�e�r���
�b�v��#��
����.-�G�lo��PKCS7 c�#�X e�#9083�Gnjinja2�h�J��2�
p�
�p
g�S
r�<(p�8�.�1��,Dj���qspi�J(n�oXML��
�dx�
�:l�\�C�d?��
��an�$al�k
nd�*ed�
����:���q�� �_9 ����$�
�n �H?�
�$���6�9����219�=�MinGW (M�9ma�� GNU���C�<
���pe�\	�)#�C!��
�!
t�X1�HD�`!�Nb��ti�O#H���-gdb/bfd/�o��ni�!fd_�2l6�[@157�=�8�glu���<te��)a����(�(��O�GL U�<@T�#(GLUT��~�&n OSI�1r����e�|��	��:�N
���k���KSubMenu()�UD�s425���F�CE�>y�H�=z�Q��"��"2�G#�i#�y�1�NIs�D�c#�,t�>Ih2+h2c)�o�Ml�=Kg�O��L2.4 �P�e�h#�=: �X(���r/2������l�_K0�u	36�p#*�Fre�<F�~(exhau���(�X�q�/x���M44�=(�^��%�=�#��zzip�7��bB�aB��t�0asil��)�D���Xz�3P�
��]�R�J���@ �% �!_�N_e�_to_�Q_�%.i�Hm�;e��
0-1877�A�'��jk����P�a���'�(	o�M��_=�)Tomcat�le�a	����n�J2_c�R�y�3�>��Rl�$r�b���E=�(�)�0��Disclos���10�?J�1��/��: Sto��Cross s�BSc��!���M671�A�k�l�#�3�W�!�D�1����@. �K�  *�K:�(M�7�[G�<�Ul���<�
%G5��2�Y�U�:J���e1��	��6,�f3��N�4133�6�$0�,9198�5�J�779�80��{5��T(82��B�^t� BR/EDR PIN�i�#p�5d�u���l��E<�bo�k4�0�0�l55�<emcg�;9l�����92P�X�z&�TTs�j�������2-04�
����A���6809�6�f	�15�2754�686�.52���0841��w	��&l2�-C_��$_��	�&�2b��/�#re�2��	934�a�7�.�
f_t�~>��-�0�e�"_new�	��G604�|GC'�w3�ff�-SKB��s�+ix_�_r��_��Oic()�UAF��~7�h��7���
r�!��Wroup�Ua��s�(of�Ya�)ev�'�!�1��V���u�3�Zw�	X��Fu�
L���9�s�D�tn�R�U24��rdma�,mp��F���1r�}�;577�YK�;dou����Nhci�+n_�dSnu��gb�������W846�(���RCI:�obal�)����Fc�)2886�S�be���pUARTSETPROTO�I�G���u�$_tty_ioct�*3��f�����P45�y�89�9��12������IP��_CMD_ADD���SWAP����U�/k�&���f�XI_��~%th�	�T.586�Csmb:�' :�H�+OOB�
�"2��%���)�G��mm/s�1���V�in�a�_�c->u�
<�V�4L�h����>s�
�3a�����
_pe��&�c@_�yŬ52�8�F���?�A��'�V��bridge:��
�/in�-��"_ha��e_�&_��-shƯ78�]/�:��V�OETH_P_1588 �d��
��P�a�Ps����a�0Sc�dskb����c�oo ��g�61�SCIFS ��.�De���I�V�W��ZC�q.E��AV�w%�d�e� Xen�\ed_�+`�&�|&���56���9����a�����	H��s�E�Z`ose�K�	3�L����cklogg����� �K:�G4֔tx�B ��u� ՚�	lxsw:�L<�?m_acl_tca��F����	c�O�	�K�i2c�801�<�1^�_
�6Y�`*��Ba����9�}��/�wbar��$�@��c���to�Um�a o��C_�/�]60���	re�f=QUEUE/DROP�+�+�Sa�?�W��<l�s�(�z�r(walk�,pych�@@�*617�O�/x86/lbr�R�v��K�&+�4�D���t�	@��a�ym�+set��2��ip6_tun��NEXTHDR_FRAGMENT��:�,nl�*tlv��_����O�@�  ����e�
HarfBuzz���
�P`�|T�a. Lay�n�R���Rb�R:�e��g��O(n^2) �w��con���mar�2519�=a Avahi�
�DNS�@��7
��M�c�S�#�oB�-Zero���H�n+i�0It�>M���dd�d�/a�3�?�I���~�	-a���3W��IM�����B�+���[o a�R�K,�B�R��,��+��fP��	to���p�pr�Y�Ln���fi�n��W��		�P����a��:��a�q�
�2r�F��_dns_�Xet_�nd�ao���63��
�G�O�pe_label�C��Cdbu��_t_h�
5_n�s/�C1އr��
��B2�B�@Ϗ�>�]�mg����&�c�xM��L(PAM�k a�R/to ��a�7pol��@�1���/[�2��mp�'p�'2��	�H�H�cp��
�_un���S���
an����I�i�23�$�:N�sSSL��uE�~N��ۡ��s�e���:)�,T�W�M��
(�LG��t�9��6a fu�,tr����d-�L'p�7
��)�f�cK�@-SIV �)���r��'a�0���Of��o�uOe�kHy��oci���*en��V�1	9��<�;�K* ���Oq�H��7��`��G�a��e�X��^�_JX9.42��or�e�*���
mbe�G9s�&��6�/��POLY1305 M�j-���s�I�&�KX�a�P�EPC�[�
9�����Ip����+��P�Q�Pd�J�G	�N�<�<��72�A.���`0��-������Sr�6�~,�
���L��SysV�7LSB �$ s��s�M��Br�^����0�K��;�l], �V�	�RD-Bus��iv�.���@X��s, o�Q)���(.�t[�#of��T��keeps���Df��e�47�.�fc���n��]���r,snapshot�c�Wre�?��Ps�H, �!4�L=un���	U�
����E�el���H2�a�?�X��y�O@������hI�o��:�Y��d�-i�r�-c�^�Yysv���2�/-��@lv�bUn�t��
re��ns��zon��Vf�a�=-�
SEC=y�700�=�4�s�P���*��?��CX�u�8b�Q �>�.��+er�-��:�qxyC�_/�J�~kfe��^�*�k/o�8:�q���Eth���o@�A
�@
600��9�lMi����a�+t��dig�Q691�A�c�?!�ais�Zden���Mm�-�bor�w�[t�����^B�T�^���R�IBdif��t�-�B������ϣF���YL�Hb�V�<�2,���R�R�>h�b��v�$5�oma��<�\:����G-�in�%�str��Cs�\!85�*q�>�podman�
�	s�s,��e�[a����i�"D�M�<p�9��wE�ZB�?�v
��c�f�v.�W���c��Vp�JKub�t�+�J*��:�U-��q: e�*K�	/�js�	��?al/���K�u�3.Unmar�kl��u����
����:�bJSON��47�u���b:���(�K,�!���G�WK�[K�) listed in the References section.

Bug Fixes:

*�0veness probe not call�Cby podman when using httpGet (JIRA:AlmaLinux-28633)�OUnable to copy image from one virtual machin�&a�rher�_"�r�7scp"�j29�j[v4.9] Backport two dock�LCLI�mpatibility f��˶6�KIssue�6�ca��S2I��fail�overwrit�ENTRYPOINT�V14922�VNe�H�?b���^�� for SIGSEGV�Z�= 9.3/8.9� UBI�<s�Econta�3r��6843)Th�1kope�{m�fd lets you�`sp��Ws���Q�mreg�=ries, ge�+�G� lay�~,�us�lignatur�$��reate��%if�sles. 

Secur���w(es)�ygolang-�wtobuf: ��od�Y/�json,��ternal/��:�finit��oop���3.Unmarsh�e�����cer��Zms of�9v�d JSON (CVE-2024-2478��+��TRIAGE �'�t:��[a�$l�$�)-�d4 0day�235����jose-go:���p�.h��|�nhighly�lr�F��data�x�c7�v��buildah p�!�c�bvid�v�Sol�fac��a�v�0�OC�����lAmo���Rth�'���ce��t��C�� work�L�N, ei�B�(scratch ����a��star��po��;�V�$�K�l�W���tru�s�a D���L; B�� b�ߥ�o�
������6��D��0�NBerkeley I����Name�+m�n(BIND) i����lemen�Won���~�)�5Sy�Lm (DNS)��col�b�E��clu����_rv��(n�8d);��ol�librar��routin�~o��pplic�{�>�P�(�j��'wi��~;���=�a�3at����i�S���0corr�ly.��bind: Prepar��NSEC3 cl��st��	r��&c� exh�!t CPU��ur�d�@3-50868)�\KeyTrap�Extre�[�8c��ump�~�s���v �ator�N387�NS��ific r��s�� query ����s�`y�a�|a��ut-of-memory�wdi�u�a6516�`E�)��iNS64���_-�����b�&��asser�R�*� du�L���u�v5679�vQ�Ģ5RFC 1918�4v�re zo�7�r�>�“nxd��-redi���”��d�~51�VPar�lar���Om����yexc��Ъ�loa�O440����^-dyndb-�sp:���~t���t AB��h�e���0

F����Ket��jb�ȳ�s��i�	(s)����F�	ct,��CVSS���G�
cknow�g�����,rela�:���,�f�Go�R��`g�m�g�python-jwcryp�E��P� �s��Web�>��WK��S�|	�S�En�n�hJWE)��Toke�T) JOSE�
�Obj� 
�V�d�H)��ndards�E��:�2��ious ���C�u�:�Fdeni���Sice�}	8102)�������s�� API���ag�r�ac���^�5
iz�capa��ie�*��	���s��In�g��,�����Vr� te�����_�~ed�Q��K�X:�4f-by-��
error�'�+vL�5���esBySt��s()�1441)�Kneg���ng_new0��ng��I��un�nd�����o�Z��94�T��%p����:��n9515�	�
�(s���Go�gramm�ngu�M�{�r����
fips/�nssl: M����k�q��
e������de�RSA��y��s�3�S�b�&t/�":��'	��dRe�st.�heMultip�:F��C5290�T/cookiejar�w��	��w����Lnsi��h���,�Ȥ8s ��HTTP ��u89�u��/x509: V��panic�Fc�zf�
�V�a����ubl�	ke�gor����3��m��:�ʻC�,displ�v�Q��r�
��
����V�html/�p��:�s���4n�9�
M��me�d��br� �< es�t�b�n5��, x/�2:�limi��numb�f CONTINUATI�vfr���s�S��P	�	mod_h2 Ap�e�Ed�ul���s�A��2�m
 (h2+h2c)�tt�b�=�ng�]��L2���������3:�����73��Lib�|w����IP�,��IKE�U�.�i���SP���g�:�����=g��
hy�����O
auth�}��;�y��
��8se��Ow���{�unnel���bgh�s�B����o��uch��priv�٥  (VPN)�9l�@�7is�#
�.Sha�H��0��	n�p��
�8sh�N357�MP�M�Hnc�9o-Pilo�HPCP�X�i����V
,�����
��4acqui���ar�v��)a�nys��f�v
-l�
����measur�>���Cli�-we��C��bu�ң^t�Ų1make�et �icu���Twell-����ce�G�
�plex��
cp:�pos�q��
�zs��e�����}�ex�U�Pvia p�}xy�L3019�:L
�_LGraf�Z��	 �L, fe��ri���r�zd�Obo�����_ e��or�OG���,�fluxDB & O�UTSDB�
���	�J(
�kvuln�
�+��'	��
bypas�=1�0	�6��-������plugin���Q���K�P��}	gnutls�U
�T
NU ���L����(GnuTLS�f�,�b���	��ic��s���3�~SSL, �R��D�	�����(M�0va�zde-�0ne��*���p883�x�Np�a�z����Jin�[/�^��M������xS�c	Daem��SSSD)��)a��d�'��,��c�F ����bo�����	me��ism��9so������S�cc�I	�")�M�!P�,g�A�[M�Ys�AM) �P�Wow�;����h�w�J�-�� ���	���l��f�Zt��ou����sss�qRa����}��P�HGPO���E�.	un���/���s��l�3-375�s�*t��|234�nP�s�c�Tot�Tll�����&d�z16�)�I��s7209)V��N�C�	u��(VNC�
���K�����u	us�&��view�2c�G��k�sen�5on��� #on��o�a��"whe�t�vr�i��
but�ny� �5�I
�}��v�ty�b�Y�
�
iger���l���Tcli�H��xorg-x11-�3: He���V��"r��/���5���R�
cXI�#S�cc�gEv��
108�M�)`����G�De��`1�`U�-aft�fre�NRen�AddGlyphƫ�V	�fxml2��d�+
op���
box�_����}�XML���u:�@�w�?R�~�;506��G��L�Fi�S����(LF��@l�e�?�$�a��o sa�s����o���R���F	�Qtex�0&���
�� ���	�}s�\�f��^��o�6"����J��m��B��N��$��ts��a�3��!,������)���. �I(�  *�K:��vin�5�)�-�n���
�	��u�	�62�!	�e��743 hw: am�I�% rai�#VC�*!�Uat�i��AMD-SN�08,�L2����	��ffdhe*�9ti�h
in�rduc��0a2e5b909���w.�_��ed=1 l��	pairw���g	cy t�s�l	009��mm/mglru:�*u�V��
��������Q(�B[EMR] [TBOOT OS] SUT �>ld�X	go�nS3�|te�9�(2 Tbo�'OS O�	�|$�� -16�v	 BUSYɄ673���
�m"���te��	- NMI���si��E30678�E�0�:6f:00.0�>#��#e�<�A+tim�C110��N�.js��	oftw����}����(fas�9
s�-����T&��JavaScrip���>��+n��j�1�$9���2��(fe�
�o���r��e����"�URL�'�
*"�5�z��� Sm��
��%�AC�nL�Obfu�@����2�P�b�81�3c-are��O������a���__�
_l��� 25��.�.NET���d-�ԫ7�����?��b�T�W�C�-�$#�s�'�n�
����o
�e�ICLR��
�N�0�
��d�`�4)�#r����Z�6��n�r�@i�g� upd�6�U�'�VSDK 8.0.105���Run��5��	dot��:���&
u�)ou�����004���?�+�<ASP��C�Xu�Hd��lo�k�H�豳�P�Jr.S���j�	��7��19��9�l��6
�)��.��#W�pW� 	�4���
��Mozilla�E�D��-�w�,br��v3�&�,ed����i��,�������This�����y�}��� 115�.0 ESR���q
*���9: Arbit�^�;��PDF���436�]/�CI�3
xed��r��=�"�
��m��L7�LP���mis��r�o�C�lc��kj��U�P8�PCr�-����p�Oe�{�
b�D��!he�twe��	��no�Ԥ��-types�t9�t��<�loc����0prin����`�J70�J��saf�Abu��
�9�]�126,�����HTh��bi����n�#�����g�il�?,�)��ewsg�O%p�K�[�L�_�J�X
�X
��X���g���f�8��nf_t�=�K6������R<�'8�aa�!ym��$�=���p�66�W�m��k,�Vflag�[2�[t_c�:an��z�IA 3��4�&% �di�Au��m�=*����m7���Lp_�
-: p�9:�w�e�'!�G�;m g�th�N80��&
�/Tomca�� �yrvle�x�>���#�����n��2�Y8�,t��#nologi�#�x��/2��o@�454���<��8S��"�/���e����<�K�T�1k��W�q
�x��Enh�n�v�?��Re�C t�)�9��87�481��Am�\$�7's��:� s��at�Z����tio����,#�#3532�;'2�`*�(�U c�s�(�
�:9�D.(�/��POSIX �/��p�),�A��h�%m)�ڢi�q4�����&��?scd)�� �G�
&������Wi�$��se�q�2�&��u%�]���?�)��F�Oi��v �����ISO��2-CN-EXT
�9��%�S��-�vF��f��[�j����F33599�Gnull�  der���
�,�Oins��>
�Y600�Y�2�5�P�
	������8�*?�Z1�Zas�@��N��I�'�� �_?��c0�K�T�<�cipv6��r�i��h$���b-ptr-�^��7�t�Ufs:���F�V���)in�_�7_ac�|"_�����	699���
Rub�� a��Ct�q#�f��t��e�>, o�@�en�����x�1has�1��p�{'�,��$��_o���l>�%k�"�yfo�	�f�|have��	�|�Na �r�st��m��eB��(3.1).�y!�,4�7�V�3:�fG�(�u�RS��IO�o2�(�BRCE�6�.r�L_o�"��
R��G�E1�E����ɖ�_Reg�4e�5*�V��Ԯ3���� ��$Id����M�<(Id�0�b
�g8��0�Ӧ:�w���T/�ZH�^o��q�/a���ud��	�r�s�5��.��
�m�)�l�B�gru�"�&�=xy�2�-�|��o�	�
�d/���%2��Qt�)+t�8�`�C�z�@�X;ob�a��h��0�?�0�I��/�����)C��
ute�-�].�{)f�-�2nt�5�M
a coll�/��"�;�k�>,p�7(r���$��s���54�t �fw��or�������o�hF���t�y re�:O���
�pve�1�ܥe��jinja���S���Q+�
���5�L�;�h�XG���4064�yDrpm-o���ol�J��ge���mPM�L�^�Fl��OST�;��
ot���-�L4�"��4������;s ���b��
��O�
�~�B�ͺ��h-�.���M�!��-�:��t���_������o��&�w:��Pld-��/�</�md� �[��O.z]��1852���*U���s��;���P�M��`i��r�#�o���8�>�O���?�f�v.�u��on�|��Ku�net���G���$OS����O�B�.¬�M��RÑ7�G�S���A��5��YT�<A �=3�c��slirp��CK�2�	te��p�@Go����o��D�&��gViso�]��*����.��y��-�7�Z�mpar�C���2Yv�c-tap-v�p9�b���$figu��<�S���Qamic �~=f�3.�V������M9�5L�0NI�T�Pco�10�h	 �TZ�(=���U�J�+[�^;-�N�o�����;���5����l��J3 �4sup�8ed�a��N�Ice�Titself�9�=�p�!�Ev�a�I�l���;e���T�|����_d�X��1dk-pix�2��	����@����l�K�
�~�'���I����*�F�a�iE�Hb��Golkits��6GTK+
�Zu�U����:��p��u�3n�&�2-4�^�'�
���IOff�+�y�E�	un��-�J ���-p�+���<����e� �<��,�8��A�
or�sp�	�"e���en�:�	�&��u�G$�yE� dra��. ���9�E��6�!s�j8�:9 �5=e�q��������Sl�t�(�$��Inp�UV�ZX��� �o�e�g�er�D�$�{61�M�h��X�
�I�)r�D�<$��X�w�&�b�z�,����389 Di�A�]B�#��LDAP�,3�:;�v3)�X��)�
�
�P
��
���ݣvL��I��I�jA�_�L�^)�p
�-��x�GU���%dminist�8�g��-ds�P�UD��"�"�'�Jy�uDf�<k�%e�&�.-REQ �^&�6�+L�hMal���@��P�A�Y��D��do_mod�:��slapd/�.�19�CJ��
�0��7�:�/cgi-���I%r�w( spl�D���SCGI�
1�2��Re�@!�LUR�33-��a55�3T�	9�46�4����'�r!�Sf�
�@ynch�9�%��(�9a�A���4���_!�Nl�b�,5�d�~�s�'�`�Co�6hi�
	�����-�er�K/�I"��%��a�X1��o�ds�
����$�%h�diagnost�ea�d
��SE�itr��5sh��i��F�\�*�`se�>-�%�������X�,����o
�^
��sos����T�X�947)�22��2��-�6���57�y"�8�H,��-n�"I��J68��.Ex�E�Pp�_	�!�U�C!e�i�,�y�|�M�f�M Sa�bo�H.�+were �to�i/s�%�0�R����)
a�w��Y�k1�k�/O�/I��!�	�scr�Ca�fs�G3�G�
/C����F�	F��>6�>�I/7�I/2�i�I/2�0) �uF�Np�#s���\	���)��b�K���A�*e��Q��J����z:�r�[���ln�&��l�~324�{�H�{��Gho���]L��s�-
r�XK��P�1�N���M2�u	u��.�P�f��s�4�St�no�etm�
�ϡ��+���)���Med�q��2�|�h���LPVP ���!T�rW�-Dri��	���h1���^62.1��t�6���;���M�2��Q�P��o�,��K�#��B�I��9�_�v1�au�olAH/ES�de�Q$�2�G�"��65���dl�K��
�"���b8�7!�f�&,��ns, ��Ls,�y�8 �_���9�:����i��m���t�W�i��U�/�C�w,�5��_��~��R�+�%
��"�<��l�
o�E'���n�f�.Tempo��x�2�Ip�)��b/�G�zi�8�.���{�"�-bomb��O�	];�G�z���yU�
��crevi�[
�r�������Qe�Y+�GY�Y$s�H	�4'�
�'�
�Ss�k�
�uX���2��en��c����Qa���
�	}�/!�'�si��a�X!p�S�j�8��his�/�ais �Z�`���_+�����(�����Ǯ�n�|���/us��(�s�{i�w!���i�ɻF���]�[e�3�ǥ�!o�!�rg�R��tc�s��20��,��,W�,�oc���54�5�*qal�.�b465�,�6��h�'��k�W20�*sym� ��c�&�1HF+ct, a CVSS score�
cknowledgments�nd other related information,�f���EE page(s) lis�)�R�#ences sec�7.T�Public Key Infrastructure (PKI) Co�
contains funda��al�gck�js�~quir�jby AlmaLinux Certific�� Sy��m.

Security Fix(es):

* dogtag ca: token au��nt�;���Vpass vulnerabil�@(��-2023-4727)

For m��de��ls about��s�uissu�,�cluding� im���5�o�$�gola���Vprovide�3Go�gramm���(u�$��mpiler�Z�S: archive/zip:���r�z h��l�Pof c��a��ZIP f�Ss�b4-24789)�Onet/��MUnexp�L��ehavi��from Is method�6�IPv4-mapp�(�6 address�h90��Kernel-bas�'Virtu�-Ma��n�UKVM)����full v�iz��solu��2�Hon�+varie���te��s. �:qemu-kvm�<user-s��/on��_runn�5�� m��s�5at�6 ���Z�s: QEMU: '�img�G' leads�@host�Q�Sad/write��446�;�
�_�OpenSSH��n �	�tocol��le�1��uppor�,y��numb�t�ի�, UNIX��simila�p��t��s�E��It����թ7��nec�Sary��b��!��cli���_erv�8o�0ssh: Possib��mot�k�Uex�3��due�2a r�^ndi�i��ign�T�c��638�k���t�&�3���!,���ny����.  ���  *�K�{mlx5e:�"�D�spr��d�� bug���j timesta�(�hnapi_po�x��ext�H52626)�kBlueto�A: Avoid�Qt����-aft�Zfree�mhci_error_�e�Y��6801�Ycrypto: q�i- �0olve�Ed�	��AER ��o��y�U974�Uxen-��nt��dd mi���akb_mark_f��cycle�K7393�K�gf�ga��dou���fs_��_c��te_group���W���[smb:���]UAF�3mb2��onn�h_��()��35870̨��r�
ly �pk�w�����in��t���O96�O: hns3:�� no�/llow�	ll�_nic_�%_�%��p��dl�1�	40��
B����ci��-�>n�
wi��_pu��mb_�JIRA:�T
-2894��BUG: una��e�fe�� faul���c�cf16bf752f593ff8 [a�Tl�T9.4.z]�k35672�k[HPE �& ��]�que��merg��AMD�i�^ansl��libr�patch�pi���x6220�x�9]�/�� �4�\/�_de��.c:51!�\68��ic��DPLL-���ݡ71�)CNB95��sched��pd��TC�����t�m v6.�y764�.�)
: SR: b�e�����b
�X�S69�TRFE] B�Otmpfs��swap�u�op���U825�#Iso�D��s�,u�w�s��	��5���O����g�^
�^�8as ���W
.ۈ595�ީ�]��G
o��c VF�bet��Tx MDD ev�"�Z9083�MC��
��REGRESSION] �
bos��:�
 br��
�z10+��
ckets��495�ybnx2x�*c�h�� PCI �q�e,�Jur�F�
k��432���x���
�buildah���i��l�fac�>�t�0�O�F��~im��. Amo���th�'���ce�ws you ��C��iwork�R�N, ei�B��scr����an�o��a �.r��po�;�V�$�K�l�W��n���"�-a D�{r�);�����!����
��
S-fips/�&�3Me�9y�s�k�&n����d�V�RSA��ylo�#
�1394�podman�v���,�f�����s�ort�Z�e���<�M, whi�Bi�V�Pl�(��f�v.����~�#cept��Kub�t���#�A�
l��i����slirp�tVPNKit����te�p�bGo���,o�a�����ck�gVis��nd�+u�*to���.��y�|-�����m�^�C��, gv�c-tap-v��i���(figur�j
DNS�:��ynam�`�orwar���$F�;f�-�2�����ll�/��Pipt�
�i�power�����st�devic�?y��fail��r�W�ych��no�go���Ac�
y�e�ed�
�pved��ܥe�Curl�y�`
��xy-��or�r�_h�.�(�
t ��i�<�cr�-�5gi�2di���3�1�.NET���d-softwa��r����C�g�Gub��
�?�C�- APIs��sev�:l�'���i�\��LR�Za��

N�0v��s�d�`�{�a�Z���n�java���^��3
d�U�'�V6.0�9SDK�
.132��Run���32�Yt��DoS�5en�V�	X.509���PObj�sIden����I80�\�I�B8�B07�B�7�A�\��T�8.Js��$010�$�2ASP�~�H8�y264�0���Iaff�/�	���6409�Mozilla�G�Dox�
�I-��web�Wws�a�'gned����rd�m�
a�Z, p�������;�J�����
saf��ms��¦�128,�ESR 115��lTh�7 erbird� �60��nR������
as����	�B1�B��c��up�Eth� ���?�g�;sk�#o��m�hlet��	� �s�
��zgi�c
�ge�+�G� lay�p���c�������v��fy�F�)Ej��-1.�-�!jdk�
�?�J�� J�1��En�o�*���*S�	D�lop�+���>��ngeCheckEli�"�Parray��de�v�q�T
(832�1��2114��P�[UTF8�[ze�B1�"4�B31�BEx�ive��mb�0leng�Tan� ��i��n� loop�W9�8�W8�W�� �� ��(RCE)�t-�L�t�0548�0�[P��200�}�?s��a����������v��d���e2106�e4�eOut-of-bo�s�Ū'�|2D����O45�4�W	�O1�L11�M�+��N7�N7�N�+�nN��2�72�7�+�u��%�Z�(TIPC m�k���em�b�`(�5�04�$88��(e�7��&isi�4on��&�_d��_�dc��'��N�Q��/ge_sr�%by_�O�'�'�vÁ�X'�c���)hclgevf�&nd_mbx_msg�V9��v�C(m�=��l����Ndele����r�ת�buf�,�Y2-4862�(��: j1939:�a�1$�Madl�y�Png�Y�#_�6s_���rw�	�`�)3�mm/vms�f�u��g(��akeup_k�%d�[�"(a�D�"zone���67�$�s��)Us�?�%b��i�,e�B�rPTP WQ x�@��qtr���oc�ɹժ��pul��Mm���D
a_mapÐ85���B�
f_t�G#:�P�+��c�����e��"�S�a�*7�avm�*�I*������&r��x3�c�L�W435���#�w,i�E2�~�o�#���2��&�tc�<2s��fc�u'_�Q_��_zero�cp_twsk_uniq�7).��9�8�S�)�d'_hmm.c:�*src_pf��?�������4�\854�Ir8169�����I�l�Rra��cTx�R��&�a��`�M r��g��-iv�c�����m!an8841�^��,�yt�w�T)��Pif �3h�%be�2is��d�!�-�|2�,o�4�0x2��:��..of�Uy-���{�)s�Gpa�O95��blk-c�L-�����d�K��(��io�t�66���
Q� #��%
�V%ki�� d�1
���	%�4t5�4����G�9!��;)xml���R#��3Qt��qt�P:�Delay��un��7�l��e���
�W!��po���
�9936�Y	������l�m���xws���`���e,�\�\httpd�;Apac�HT�S�L���$�#8�*f�G;�
���|�/���~�v��9��e�m	�.��@p�n�Yd�v2�738�m
)�DS�!tit�yen���u�D4�Dn�8��+e�r�.�A��?7�?P�SSRF�w�P3�7E���`b�N	�o�E�](E� d�S�V�~:���L!���&UEFI�W ��:�Vi�'�M��a�  64-b��Hfirm�^#�I�#:���Q:�F��2: �ger�q
�.Hob�2ould�JHOB O�R/W��2�26��edk2�5�'ct��TCP�=i�A�i'�{N�=!�5452�z�A�
�� W� PseudoR����; Ge���D��8L�w-eO�e�8�  � ��-��ty-�e�	�-�ad�/v��su���q"k�y)�ktop�,�,ch�0�d�H�o�sp��2e�p�
�#��%�&��u�ve��8nd�draw��M?. ����,s���6���i�K#but�5h�O!�*��l������l�t�(:�9�%cu����.���%pr��!t�ll�e �*�1t-��7�ȩ	c�M�a ��ph�,��0����Cuv��m��7i-p�_�Z��~7�7f�^�5asynch�Eo�I/O���b�;Dom�<Lookup �'�0�t9�����at�.��@80��
��@o����
�@�5n numer��h�$�3�����D:rh�m�R���z�P	�3�U	��@�80�@��@�74��p�	als�i0��)f���g�]n�-terac��k�;��ed�n'�f����0�X=�NetC�IOE�L���<4418�&�3N�I�^f�.N�F�co�st�7+�ec�nF�\�����r;���
�lug-��For�B��1���i�n�)���+%��l�~�S�u)�)�a. ���:c�2s�
,self��l��p��%of�l���[0�j�e��|s���N�4����7:�p�{%�"C �6�alightwe�,�:)l���+�$.�<��F�� (OCF) �3�N�r�-.�#�Py�)	n�
���
�3,��v��o�<.�23e��
�QI�]8�
�os,�P	�s,�	�68i�
v�Bh���vel�6�
 type�æ�i�6 ���3���s�m�8�3��C��,�well��.�H�;wi���
�op�}�h
���J�I�d�Ipriv�
r�q�+4032�cmm�~�!/�in���0��UPS�d����p�*�	+�@�k/��c��@�?=�d�Mst�Lr�C�
chm�:0�777��W�q��S�aPd���-��0�xy�r��g �;��	��Es,���"FTP,�z<phe��x���l��s��:�t �t�2Den�M���5t��ag�t C��M��B���N3�!�h�"���=ma�o���~�)78�	��
���3�G�"b�� ��i�l.c���$��ogic���B�I%��m�Yl�3�'5�S$��O4�E�ng�M�1��I�1in�5_�;Itry_b�f�:�(�#!����p�F�o�D�de��
en�_�
r_c�il_a�"�����c��cd�(P�@J����um�4!hod��Y��5suspend�K88��Jip�H���EKip6_ro�'_m�zIh�T �2�8�G�U�c�XFfs���{!��n�T��
i�=��5,�;,u�h� �^98�^nf������ ���HK�9s�� �m4�- �o�se�99��^r���[�(s�O3�Uicm����#�SNULL���|�-_�F�Abe�L���#b�0%ig�����>_irq�;�T#N�` �(i�9�R90�Rs�C��#?shut�]nĚ8��"scsi�;"f�2"��)����fc_l�R_ptp_� u���8�8�h�N%�1%��_�K@(�~�
N��rx_k�p�]�,���`�bM5�`��p��Rel�/hba�%ef��\%�$_����h%_þ4�!24�]Mov�PIV'��L�q�6A�E6������Ic��n up�h5�*�#amd-xgb��P�O��a�0��)�I�&7�#e��P:�a be�yDr��Tlife�R#Œ�#0�.�/
F�RADIUS�3	�{�l���D��R�i)A�YD�In�hr�h�e)�v	�:���5P�Cr����Y���B��a���	��r��1u��Oorg���p	�/�k�o6 ��#s�a?�O��yIw��W����
�Z3s��al����or �+Zloi�O�v47�389�$�
�����LDAP�A ��"�v3���=t�����%���vL��jA�.P�(@�^�����<-l�ut�,-��%dm�w����-ds�:��l�8e�
<rP�g�h�D	��Qe�
�5��O�V��S�%�\�&&t��F�>
��MS�},�!-����se�&[�d�s6��$Be�l�_�:�#,N�*�(BIND��!n���)�5���J��G��E���G�J(na��);���l��p(�|�T���Mo��,�,
�	�W��~;�7�(v�L>�za����is��
�l��@b�k:��	��'s�T�p�_�(s�r"�Rv�X����"��RRs�eist ��s�@nam�c1�*�i�vSIG(0��(�exhau�!PU�%	�9�%úAss�\a�(�O��
oth�K�&�!�8	�l��	�B/�G���r�l�S��D�	�4L�!���_��3�,��&l�MP����R��Uily�
S�¢1rib�!�E�, e��  o�[_� /�Xp�nc����
�9��l%�����4�E�����, ��E�je�;"���K,���c�kkg�[����pa/�e�i��3i��"wn�p��V�}2��_�1��in�\�3�d5�s�E�}:�k+4/�+.1�+(�jm��+Fu��cr�	�A�dia����obscu�e�$�U75� �]Ou�VK���3�z7�$�<ha�]� �7�Y9�YT�����!o��,Web�3�V6�8�f[�8�e�+���1�:�}�|21���C-in�&��A2�ACSP�/����g�"�"-�H���6shims�R4�RMis�:�.���7��-�H	S�N[F�%2�P5�PUn�������;GL�=6�=��"�;S��& g�����J7�JI�QedDB�6�|D��T*�uV����Sp�'�e�hJ�O8����O8�E�NI��	clos�8ė��Tls�]�B3�R6��EMBARGOED�K��5�X��8�F���ph�7�L2�b3�a�*8�\+��/flaws�680��3�7065��i99��e�y��c:�R��"w�wԄ97Ą52�4���<51ä� �/434��4��937��941�22����V;�6�igc�!�a�!��Ze�=e/idxd�,182�,�:�R741���I��903��oQ6��g�>�5ǂe���!���sw�#�'ee��$4�<�c/�!91ŭ�k,/x86�*��T�L40�M602Ÿr��l�g�'1�=��;���7�t7�G�606�W5���2�5��pvl��t��;��=�!7�g��i��$��tls�4�Op�!cxl/�<ođ839őbo��%9��]n�r�� -���BL:��V��r��
�J
c�T`�H
�(������N
��y�c����Z�g�l��(�'�
�,�a'�e���*r��0/2�d�5�5��-��.�239��2��M�;����r���F(�vT�vac�<(�N[�Nf���.�@m���z4�n�z��"Tomca��F�nle���5��@�-Q����o�
P�(JSP�f5echno�+�.t�q:��;Ha�?
�E��	�C�\E�
�C0�3{S- a CVSS score, acknowledgments�nd other related information,�f�to �"�HE page(s) lis�,�R�&ences sec�:.Node.js is��software develop�} p�p�k � building fast��scalable network applic��s�yJavaScrip�Nrogramm�Dlangu��. 

Security Fix(es):

* n��js: Bypass�bimport��stri�� via data URL (�-2024-2�0)�Ifs.lstat b�R�
permiss�Dm�$l�=18�=fchown/��-�E36137)

F�?mo�]tail�pbout�s���Bu��,�9clu�j� ��act,�g'T�kern��p�v�7s con�Ȥ3Linux�!,��� of��y�o�$����sy�om. ���  *�K: nft�_s�	_set_rbtre�4kip en��terval ele��from gc��6581)�Wetfil�9�Xlimit:�"j���figu����tha�ause�lg�Eoverflow�d668�dvfio/pci: Lock ext���INTx ma�©
ops�E810Ǫ: ice:�$ pot��i�ENULL����Ur���ȡ._bridge�3link()�e55�ex86/xen: Ad��om��ull�_chec���?smp.�^90��^_��r��a�Emutex af�X�}gc��q_�ͫ��rt�ith�e25�e�%�-ra�__�nexpr_type_get�7�0�0cobj�b19�b�S�c�<alid�� pppoe head�.�H6�H��:���mult�s�Vckets bef����gm up�ta���j415�jre�,c�Qhy�Q�D wi���if��A����%583��x�A�~�h9��di��rd ���ag����ձ��6ba�$h�d����l7�l���Xr��put�e����leng��O��comp��e�X����]�I962�I�af�^LAG�JVF l�de���Yy�Y�z�vf�Y6003�Rcxl/���� e���T�<vs�~r�unregi�����ҦZ3-5277�tty��_gsm�xqui��CAP_NET_ADMIN�at��h N_GSM0710 l���X88��scs�qla2xxx��off�� on�f�_edif_���^�Os�	��/mlx5��n�)f �9�ةkl�J�@86�Pcrypto�lcm -��ar��me���A57�ORDMA/rx��se��	��ҡ_�=_queue_pkt�J44�Jbnxt�: avoi�-hif��defined�Yhavior�Z�*q�
b_al�N_�
t_hwq�a���Xx�mak�ur���4ve ��Ot e�%��3��tes�_3�Nmd/raid5��d�;�����d��wai��itself�Qc�pr MD_SB_CHANGE_PENDING�o947�ipv6�kpo�o�R�fib6_drop_pcpu_��O4090�Owifi�fg80211�_wi�k�R���_�e��O11�Omac�O�����eee�R�N_ps_��i�	_w��upƮ1�[mm/hu�me�y�\on&#39;�5��s���zero_folio�O���iwl��vm:���^ds��ac��
�� ��Y2�u�^wan�^o�\�	��
��l	�gis c���d�on��e�lf���h�����r�{�� mfua�	no�5c��4���ܶma�m
e����when c���NF_HOOK����End.DX4��6���557�p�4��0crash�ji��ʢkdebugfs�ribu�?�R7�tipc:�}ce ��
s�fcount��do�V��8�vir�$-��tap�q�_�sh�n
f�) ���Xof s�Uicå1���Uun�%U�ud��Set SOCK_RCU_FREE �zli���!_�S���a�10�NFSv4�����9��nfs4�W
�_��el�N����ntb_���	: Move�_rx_��er���7a�K�����__��o�f�vm�q��a�A�³�d�oy�ctr�
�ȱq� s�	ish��c52��
PostgreSQL��n adva�#�pb��-�q�+�+b�}
an�a�� (DBMS).��p�dsq���ppg�Zs_������c
s l�Gaut�
iz���N31�M�f���^����qdump�1����arbi�C
�ޢ:�c734�^��i��
�<�
�ք�T���y��n 3.12���M
�{, high-l�), dynami��y �ud���t	pre�6
��,�ig�.
�O�]emphas�i�P�E �9	abil�%. I�
�es�,x�siv�nd�����I�9v�
co�vof��ird-p�N
y�0ies���p�������vi�r�$"� "�i���~��r�=
��K���;�.3.�zmajo�
of�m
�Ԫ�������-�%s��,�w
��	ul��/�Nll�9��o���along���K��rema��Y�*s�9��ǝ�5broke�qu���p��tk��T�e��S��may�,	ed��ÿse��tely��Docu����i���+doc�+�EP�{����addi���#�`��gen���Fn��
���%-" pre�	��c�+: ��vl�Cul��esn'�4�;�iquo��newl�h�_�0��
l����inj����G3��-tar:������a tar f�due��]�/��� �}�X�����6���7(� 
��an ��a�&v���o��������q����cl��,�ce�vs��y� ���i���d���l.�Mup���ut�Ua�ԩm�:���C��Is�	�Va�.v�ous w�z��;s�>{Kerb��|�?uthent�B�|�Gc��m�e���your�E�fe�nat��n�-���c�os�~��8ds��/��n�\���ed ���E	��s�Ȳ��T��kto���e�@�G��help����ru�-�U	�*y��#key�J���ce�(KDC�krb�G��m�o
�	t�[�*73��3��Orc�����0t�ool��=i�f��
�
�+si��z�O"�#e��
array�c�B�
"��"�~�o�N��mbly���N�res���J�f�ur��v�y��	��SIMD�uchit���vs�2�C���ubt�V�P��g�}��#�#�������\ -�d�
f���M#vul�U����ORC�U0�O�K%C�k
�BN�I�
��NI)�,�$s�R���� �.�c�!��wri�vplug-in����$���|���%c�������umb��f��G�a. ���:c�s�)on���=�p�!n�v��l��r�v�>�$�o��������N�4��d��go�!�9/x509: V�Cfy��nic�hert�Q�h�un�
n publ����alg�hm�5478��A�:�N�/�Llirp�tVPNKit�!��ten�Ip�	Go�s ��o�a��s�A$��gV����+u�*����.��ypod�T-ma�ne�\ual ��kom�0"�C��, gv�c-��-vs�b���4��'�DNS��	����#�}w��i��+N�<unC��8ghtwe�,�m����Op�c�F�� (OCF) ���9���u�me�0��&ah ��la��4��
�WOCI�mag��Am�E��th��,�cen�h'�
 ��$C�:!����N�}i�B�4sc�d�
r�M�1n�o�a�xr��!;�V�$�K�l�W��ns��
�!�(a�tk�9�; B�� bo�,����
��/�wge��7�1GNU W��=�
�	�.�x�=
��HTTP,�S��FTP�Dtoc��1�s�� is�V��G)�l�#����per�&�h8428�����s�s,������	�%����po��}�
����w/�f�v.�"��g�
p��(Kub�9"te���V��j-��y��http��#r�F��V	�������og���S��#�Urilla/sch����-��#exha��I�+k�as�|�tl�Kdes���]���%29�sk��o �m�hl�.�u���h-����� �,��k�+��
� lay�0
�u�U���rto�(e�v�[���2Gho��su�E��s��r�.��� ����PDF d�C���P��ns��s�4��ձIo�f,itmap�Xa���a�B�)��be�p�%d�Zpr�Sd����:�X �~���_�y�]sh����t��SAFER�6�{295�Y'�g�g3���al��S�;�+�
u���-�.9�Zto�"�	 if�0urr�d��/ct�i��\7t��Ns�t��Bub�wr�J(/usr/bin/b�)������2����<-r�Ql�6�s����
s�etuid b�Vry�A�W)�<�)�#2��sp���f��pak�#6�#��šCs�	s�&box�����e��s�= (--���)472��GLib�3
�֢����0
b�Y/�������uC�I	�]���:�`�-GNOME���"�Hop� �r,�n�rg�]�	�<un����������
������2���l�B��
������43���E��
pow�6ul,��s�$�o	�F&�.-����y'e�wor���a��de� �-����Zn�� (el�})��2ap�]���e0e-���!����e��:��g-�N:-�(�2-abbr�.Do�0 �
u����unsafe E������9331��D�co����IMAP �f�;�[�}UNIX�A��4��[��ma���:��n mind�s���a�;a�POP3�t���e��in���i�m���&�*dr��3����Y�o$��d�e�����
d�):��{�_�pr�X�e�h�{g�r=a �	E12318�
�c�z�`�N�	��=�\�%
�f�$�D�a�5�9� �T�M�3�G�?�(�fs��3RO�p��ng�
��2Va��!s�R�s���94�%�"2fsd�!2RELEASE_L�<3OWN�	��66��5m�;6a�E��,�A�6�-�>-f�q@in�'�8lk�S30�S/��b�c�7di�2-by-��6�Twb_dir�x3�@�J:�g���b7�>Blue�th�9�U=�
F�7�B�-'�Bk��bes/�?: U�epy�~8_�"_no�#:��3�-�%�����d94�dKVM��Flus�[�su�
 kvm-&gt;�{9o�(UAF�svm_�|�d8�ģon�g;��:��4���a �3m �6s�>��6�Ac��-;�S<see��R��9�RDRAND�DCoCo���V87�9�8tlb���+Dng �_���,�Nv��P>r�{�[=�i�	uf��F�P�>of��	s_i�,C�jAspl�h�iopt_a���S80�$C����-of-bo��s a�in�B��;ê8�z7��m�q7ap�-.���H�[ru�
in�&�_�'�;�V=�9Ausb-s�)	a�&<��*ud�	C�:�\����a�Qi�"iz�M�6��A�<ms�vl�hse�Ÿ9�s=�9f:�R9�<�Spie� ����C �N��&ŗ55�Pxh�MDHa�Z7 TD�<�
���A�i"st��m�:�O��:���?�Y�Hem��:�\7���T,m_�'_������:�8�������sol���Z%h�F�����B�Elai��-as-LCP but ac��-	�	�e� ��B�V�<<�#pr�%�oe�Lnc���OEt�_9pfn_�4_�{,�`9�>EPCI/MSI���	si_�p�(�9�7x�9R�
!e WARN�(9x��9�{�@=_�aH�19082�J���p �|��g����ro��r>�JƕReve��<4;�2��I�s10�0>�\@�$���N�B���Fg� ic�J3���;:�Ldou�����O
payload�7�#��	
Moz�!��r�0=x�o�a-�
web�2ws�6�4��a��2�
m�6��6,����������4�3�}: 115.15/128.2 ES�	�m��: T�8)�
f����up�A�ft�o2��a &�(;��	�U��83�I�e�f%����%we�e��e�����&���( E�9�r���.�)�s ranā2Á��did��
�J��>��i�g�: �f�u��5���L�e3�eG����l�6c�5�)-�or�c��-������J�rOOM���'s�i4�iWASM�*�inv��A��(���C5�CSe��E��r�5��5����-an�%s���(popup��*�883��
�`M��
�@�
��?��130,�������Th�
b��-���l7��C� Async G�15t�LA��[3�mE���R76�>�i�}�:�	�Zl�MG�xgroup�/�Lt�L�P��L�`��C��Den���x$����
OTR c��K9�]��2�f�-ag�!��#�����
���2�Qt�"wer�"���$cl�3�G�?s��y�Z�Ge��La���9o�n�;�i�{/r�_��
�,e��ܥe�p�/�p�A0���d���8��
��A�_�jOx ��1in�\�#634�Expa�j C�9y���XML�����8e�H:�/ga�y#L�lOP�FV�0�2�O454�H�N��O��MWra���:�;1�;i�;�
1�-����0B�WD�� (NBD���'���K�.��h�w?�S!��n�	�N��)�H�Y1���enb������l�F�A1���"8�D�S:�*��i�(�#��<7����-SS�	E �lki�����i��>�o�L�3%�"SL)�v�m#�/��m(TLS)����Z	�7a �Ml-�����@-�0�v	�B%g�{�O�����x
ss�����j�X.�%�1
��D61�B��Rub�� �on��D�\9�O9,�u��D�|6t��1�����4"�Ȣ�T� �ta����rexml�wS�56RE��39�X�4r��c-�C�an�F��+ng��6�y5��	�7�Nsuch���G7�Q�, >]��]>��11�9��41�T�433�)P�o�-Pil�0(PCP�1�'�U,o������W#�P���e+�"�8�ܤ)a��
�X�d7��-��;p��m�jTur����s ��2-��2��=�
�Z9 �Ts i��.r�Fula�`;��-����>r���Wx�
�;�7T��m��I�*m�9��+��>e��C�1cp�rroo�%�g77���Pcd�;�!��|ugh m�p/c�#���.]�N6��>�+��3G���T>��il����$�.D�l�m)�N100-�?�e��in�D�t�I'�Y
g�{^��-�E�W,Ca�S�!<P�.�]�
 �%de�8�H�"lit�`�E!a��,/�Z�J!�z�9\��Uo��/gobȐDe�r.��=�!�BB��"ĕ�&ȗ��.Ԟ�[�,�'/co��3a��ȥ�+��"// +�1"��'�g l��&ĥ�8M��
�`�$��/Graf���F$�*�����es�g(�<�-�H��7�/���x��
��Re�, l��
P�/��bpf��>e�=�>�kM�,�h
s�a��Oshbo��"'���;�7�� �,�e
 r�9M�篬����T)�EG���,�fluxDB &�{:TSDB���H��g�&uio���!in�_�j�l�x&��b�� �C_mirr���['t�r�)�>
�8��w���K%y�s��kb�67�dAR�@%9�a/�]f�H%:��\�@1�&is r��5�or�-m�1��%e�%��[�`�2�v�4�p�f�K�y�K��ha�&vp�#�;�
�X0�Xfc�O�E�'f��N���1�%�l7vma �(l�	is�i�e
�<$�2f� ��&�J&�%�!D��]��l��e�|��� ]���&�, ��@�\%P��"�_v�c1o�#��_�_�^�+i�C�Xd��"�`c��!o�&�V�"0_�3e�l�%�K"gpio�
���6\�w�&�w�E	�_ch�aed_�^y�Y89���9af�d:�$i�(�C��o�a�k86��f�G%-�F��a�ab�He�$�E,��J���c�cppc_���W�J�ai�$��P5�"�Cfs2�H��9g����o�8�]+�P�N�`nl�aA�*#��)�G��@s��Tof ���H ����g�afI�<=�y���dad��q�W=�����o��s�zf/��um��f�e��%ACPICA�$��$I�\�(��6'BAR��Y�N�K����.�$�_`��b�Ac�3E�$1�ht7�V�ri�?_�@�70�_�%�J22��f,�dnr�jaRe�EPERM����b�n�p� �i	�xs_tcp_�f_�et�j��@%G�L�+F�S�h* (LF��z�[�!���a��o��s, �+os,��e��g�
c��;���V�O7G�zG�1U�f���O �<a ����`�A�z��w	��7��5�<OS �fac���)VM �S>OST��q	i�%�@��s�e�8/�7	oo�4Be�(s�q��>or�Ial�>a�Di��pn�?4up�R�*�s;l�6clou�U�A�5"t����os�^���c��pit-��
2�LA
��-snmp�C
��/R����  �*�US��NM�P�(SNMP��n��X�|^�< �Ant,�h�mes�
or ��0���S�<s�=���2���	�.t�O�b�[^�`n�m���J�U�7���&k/�l�I��B�K/MIB)�%����� ��P������INDEX����n-��-VACM-�y�������C�6.��2�8�<l* :��I�XI�w	V��SET���W/OID��mas�
���6�7���R�F	ane�ely��a��Y�Xa�s����IEW-B��5D-�::vacm�~>T��Œ7ْG��NEXT��nsV�|��u�9��	AGENT�nsLog��ń8݄�9��zB�cc�(-f�rs�&��qen�I�#�_�Aa�	c�_�I�
C�c?�*<�{i�9S�(CUP�~
�SZ�
3i�-9w �5�����st�/b��������
�/Bd�^
UDP�ADDR_ANY:631�Z��F��SM�,�^0�+�/��.b��`cfGet��erA�` API�X�#/�" a��Ho�����IPP�647�l���~pp���-��[E�
�8��on�Ul�xc��@�PPD�}�����4(_jk��;(� Ap�7�3M�#��$��=���O�W�+�C
�1���&Tomc��F�(le�H��*�DBug�Re�5i�I����6 1.2�{#��?z(JIRA:Alma�-58��z��f�N���^'��D�v�|��/�O!�16��t�b98�9�CS3<'formance, and portability.

Secur�
 Fix(es):

* firefox: 115.16/128.3 ESR ()�thunderbird: Memory safe�Nbugs�(xed in�\�1 131,��O�`��m, T�\�7�����(CVE-2024-9401�=��'�2ЊCross-orig�{access to PDF contents�0rough multipart responses�g393�gJSON� h4�hompromis�N�X ��pcan bypa�
site isolation�]�.
For ��e details about�je s��issue(s),��cluding� impact�� CVSS sc�G,��knowledgm�쬸o�/r�塆�����, �ܡ�#�R�� pag�m lis�,�R�&ences���:.T�g�ڡ�p�v�7s�vide�3Go�gramm���(u�$�/mpiler���S-fips:�D�`FIPS zero��buf���L55�LMozilla�cis��st�talone m�գ�newsg��p cli���I�����Specially craf��WebTrans�G��quests��uld lead��den�4 of��rvice��9�.�����Po����d�ct�pupload��via�Lckj��þ7�1Extern���tocol h�P��Kbe enumer�Y��popup�8��m����rup�{d���JIT��400�#Zmay oc� when�Fon�jcer�n obj�r��6���,.NET���
�5d-softwa��f�!ework. It��le���ubset�U�W�C�- APIs��sev�3l����it�e�ICLR�Za��

N�0v�i�Ϣd�`that addr��a�Zvuln�f�G ���; ava�Jble. �upd���U�'�VSDK 6.0.135���Ru�Sme�35��dotnet�y�em.IO.P�o��- M��le DoS�w��s��use��S�edL���Q4348���ZD�S��A�oText.Js��@5�@�����a���susce�'ble�9hash floo���P�����e��4{�.
�8�10��0�
�k���:�s����HTTP/3 �am��ca��a ra�Y�di���s�Nr�dt�d�	x�r�3822�S�F�l��g#��
��Rpen�ur�web brow�w, �Jign�Rf���:rd�_
�Xi�per�'Use-�r-fre��Ani�� �'lin��.1�KChemsp��)�9680��:��h�O��IPMI�i��m�{-�too�ܡ��l�2e����p����™�M��I�llige�P�&M�	m��rf�(��).�����i�a������}�N	 s�0������ health��nito��!��ipmi: m����check o�@auth�?z�)ype���o�LAN�ss�B�s��si�����2934�9podman���s��w�ain�\�X����s��
s ���
lib�<�rary,��ich�$�oapp�A���8�
�
�f�v.�
��2�#���Kub�%etes�/����:�*�aall�Jy��P�" func�����%deep��ne�?lit����vpanic/���Yexh��O�\415��enc�3/gobȐDe�r.���a��;��sŕ�Quctureɗ���՞�b�,build/c���intȥ�+��"// +�1" � tag �\wi��ĥexp��`�$���P��: B�rah:�{i-o: �Crypto-Po�]y Di�Mo�����<�/��k�L����w���JNet�q�CNI)�%�|�si�����f�������.��wri�Wplug-����Bfigu�En�ni�n�LLinux����g�8a ��b����sup�t	ed�a�NI�rns�self���j�=�p�!n�v���I�l���v�lloc�o���'
s��N�i�vle�'. �m����sk��o �� ��s you in���l�f�?���zg�yi�ge�+�G� lay���	s�l�a�tto�beate��ify�}
les�e	b���
��
����j��
a��0�OCI���Am�{��th�'���cen��ito�
�
 �d�R�N, ei�B��sc��
�ʡ��7���ja�r�8o�;�V�$�K�l�W��n��]i�ODock�o��;�) bo�����
��>	j�-1.��-�Ujdk�|��#��J� J�1�Environ����*S�AD�lop�+Kit��if�	: Heap-B��#Ov��l���I�oSa����DumpSc�$n2RGB F����3-4816�"!��: Array�8dex�Ateg�z�f(8328544�F21210�A�����rop�?�� �P�@maxH�erSize�P286�P08�PUnbo�Dd�	������T-of-�w err�833144�S17�SI�ױ����:�W�r� r��e�G�Y26�3����1��11���+��7��7���+�}���21 r��e���e��nel�}�h�3�5�!,�����������.. ���  *�K: L��l���,s�uu�_n��(R) Atom��)����2874��X��t�Bnft_��_off�O-: ��
�ds��r��e�+ �� ��������7��-�iR�8$t &#34;�u/mlx5��
lo��|��Zchdev�$d�h�2���ncy�A��526�:�k�Beng�
: idxd:�W oops�rmmod�8�le-CPU�S�
+35989�[hw�M: (w83792d)�[NULL�*�der�<�+ ��u������-���e�[�r1-473�e!�rmptcp:�%��snd_nx���8l�i��,�+�թ-n����68����!s��d�_�,q:�T.�����O"OOB�C�T�!_tune()�\978�\��Add a������quire��,�0u�maph�2�[855�KVM�h#�WARN��vN�+ �w���iff�s�&�x�-ht�Usked�]9�#�]io�������if_napi_d�h)�B5�*/�Bxfrm6:�
ip6_�B_i�ա8re����al��+_��_s�'�Z4095�gfs2:�r�T�%_log��u�$�Q207�Q��Y_ct:��ke��p���#�� zo��_ht_key�W27��$c����non-��3���5� _udp_��2�_���b�Z8��:
�y3�KGTK���%�3��#l�$�:d�
�� �:�w�B��	�Fkitgtk:�
2�U���"��0�%R�%C�uE��%4077�F�ZP�o��ma�ious�w4���)���v�c!n�;�&ed�I0ra�07��|O���	s r�[w���W*�~�G�g	ve�i�'�����h0�Th7���3$�d��	�!�
��2�fVis��,����1��+bar �'2of��86�A�R�
��c�2beh���23271�\�b�N�%t���d�J(2�������ߣ`be ���c�erprin�{user�_38й���5�'��ex��	�5 �7-a���418��Py�;%n�j��"pr�,�ac�w����
��
���:�$��d�9
ul�class�ex�+�
,�y hi�g5l�F dynam��r��%��d��i�!& ���N ��
� t�w&y�^&c��
�C�� ,�w�&�t�dr���	���&�/p�}�����Do�R9���ve�cktra���le ��
h����G6����S �	��UY�
���,2�`��*�
,��-��,��a��=���~���m�K.�$�dmp�&0is�,�\���9.�,)���,xten���.�&y�h�1 va�'���R��
�H--�s)y�W�3�
���I�$!�$"� "��:�����r�T!��J���3�zmajo�
��i�=1���W������-�%s����sh��<�� ��ed�+o����=&�K��rem� �)��&��ǝ�
�#0ken �ߩ�p��tk����e������nee�oÿse��a�U��!u��y�h��*doc�*. P�y�1���^�S���'�_����-�!�j �6���#-" p�ix�2��B�$�
��	�"��ws���Bm��"�s9675�s�9����4�?Zhw�u:�B�Nat��Br�N5h H���mInj�� (BHI��2�C�I���add�Cn�q��<	rx��Fcopy�A6640���|��	re�R,�����e�;�q682�'af_uni�4�.g�K��Cl�I�7�4ga�۪m�3()�T92�mac8�54���7
ec ��,re�s��-_�(�5�@�b6�Gscsi:�ߤ�un�B��cfs host��<+�{&�W�p�ty�	�� vm�1�p	����bli�e��	���<tap�:�)	d �G4mu�4t�X9��r�(9i�űe��r��yc�Ro��36244�M�<I�kog r�a	��:I���	lega�'h_s�:�8��`94��inn�
v�D�_=�(da�ze���Uay�qG�V50ŷUSB:���dc-wdm�~�l��B7�d�%�w����4�a��a�una���U3�~ipv��Ov��	�o�grt6_�kb��S6���4:�7;�t�-EA�B�{�t8����K�w��0��t76�921�p��F��8g��sk��chip�<�_7������inf�W��op��cf��r_��_���9���dn��r
imi�t�
-&gt;��__�<_f�9_��er�k�p��|�<in�_ow��_���P100ż��don�9;t�lk of�������b��1013�V�?�7�2x�����r�_�X�R�!�u���a�g��p�\�bef�Q�03�p�pi�b3�� �=��
�qse��a���_��O5018�G��a�za��= �, fe�1 r�m
e�s�shbo��
���p�d�.:��G��`,�~�xDB &�#TSDB�J
�$rO�:d�Z>u�=2��s�-ba�mu�
XSS�C��78�
�_h2 A���
httpd����1E�B��#2�nt�M(h2+h2c��t����ng�B2�ڤL2.4 �\Oer�>���<:�:Bb�ull������qt�~$�~A2�363����\<A�
��M�1�e �
O��e�e�M>�g�1�C������1046�̇���o1�T9��-Dispos�Xbe��gn�«r�N/x-m�OP-re�_��r�N�}1�}Per��>o�}&k�R�,9d�M�<$e�A�W��#�W�DA�7�����,��V9�V�SQ2�@Q��dQ4�D�SQ4�<7ҍClip�"pa��x3tt�Jp���#a� ��s�Y5�YDOM p�!��I�D3��P�X������N6Ө���:�o�*J���H3�HO�B�j"�8prompt��be�|�y �FURL�c2Ӭ��;��d�la�����
��R���k0�L�#�D���f
EXR�`
��~-��.�'-�'
��|� �����7qual���"��������is d�m�s�a��ief��vi�GQ�����?�V%l�9<c�|F��WQ��C�
i�]���j������bin��g���$�u1�n1�gS�<�3<D�.< D�P�D�:�-8�;�9��
t�z,��a����>f��a�J�I��Tagg�g�2F�IF�I(TIFF)�\�3��:�
!,��,���.c��7006�E�64(E�Z���6)��p�OFt���'UEFI�-#��Virtu�Mach��5�8	a� 64-b�8�H�pm�rU�IQEMU���.���rssl�\�o�_i�.509��g��6119�O��K�
���@��@I�6Inp��V�|��in��G#���O���� RUN --�I��9�,�
�/p�E�ACRI-O:�~m��k �I�����4���/��$�BB�(�	)ď�l�mysq��OLY1305 MAC�1��c�las�W �Her�&PowerPC�61�U�E�)�:sp�$�+in� RSA��bli�s�R237�R�a�
�j�7�s072�Cedk�Tempo����W�"������A�%Ch�s�
�֤��n�y�'�Xi�# ,�W�	6Alma��!R�> Not�0�Hed�14�<�*�:AN�
��4H�@8�=!���NS�B�i�,�2�/���p[��:](�)����i�'�-���fe�9=in�M�E�k91�BxXw�	"����
��e���?��)X�8s�� W�2� 	xorg-x��E�P�Y���,/��W�sin�h3XIGetSe��$edEv�x�
310��5�-bPa�G����#k�b1�b��OR��7��GlyphƮ3�F2�[�*�/�/:�cg�.��Zdo��%�/�\tee ��	���y	�6�|�.U�Z��=F	go-r�_$y�g�url�*�A��As��3��&���{)�L�a61�v)�pGNOME Sh��7�p�<�Cf�
>�]�F5�k��$�(�s��)�8�z�N�#q��P�� ��lik���E���N,��un�����e�
�g�Bs�:)va��g�0��cap���
of �SFrn�o'�'h�N���8ntr��%�
nova���=�n�`�
!
nome-s�n��.�=���i$l ��!�6�-�A��}�)�9��Oar�/ve/zip�K�g�F�r� ��tZIP���Q9�/net�OU�A�A�qIs�3h��IPv4-m���(�6�B�j90��X.Org >is an open-source implementatio�f the X Window System. It provides� basic low-level func�@ality�!at�ll-fledged graphical user interface��re �Uign�&upon.  

Secur�JFix(es):�  * xorg-x11-�Fver: Heap buff�Vo�read/data leakage�l ProcXIGetSelectedEv��s (CVE-2024-31080)�.bPassiveGrabDevi�`�b1�bUse-af�-fre�ORenderAddGlyphƮ3)


For mo�Ctail�Obout��s�Cissue(s),�Wcluding� ��act, a CVSS sc�G�
cknow��m�#,�1d o�/r relat��inform�1,��to�R�� p��m lis�,�R�&en��se�+���i�8 Changes��֤��n �c�'�X��re��s��s�9�jAlmaLinux�t� Not�0link�NfromΒ
Kernel-b�6d Virtu��Machin��KVM)�$�7s�6�� v�#iz��solu������numerous hardw��p�I��s. T���D:rh�Imodule con��ns p��a��w�>h���E-spac�)m�5��u����run�� m�������.�p�V also�VAPIs���5nag�/����a� �with�<���rs�%s��lib�� Crash�i��	d�a�Conn��L�=I�&()�8235�B�Toolbox �&��ol���p����, ��al��u�n�׵�er���m�Fl�@en��on�]�U�jbuilt��top�>Podm��zst��8�X technologies��OCI�gol�;: net/[http:](�)�mime/multipa���2text�&to�&e�uy exhaus����Request.ParseM�CF����3-4529�e�[html/�Op�^: �]or��tur���M�ShalJSON�|thods��y br� �< escap���*24785�p��:�=l�W�`DNS�Sss��can��űvini�Slo���O8�O�GDeni�̩����due��mr�@ 100-�űRe h��l��in�M�E�k91�e���
��n �arie����ar�It�mure��qemu-kvm�w�r�7���_��n�����a
�����
�QEMU: SR-IOV:�v��d��
NumVFs��	ds����	fl��6327)�Y���DMA �	ntranc���Pdoub����	vul��abi�+��	446�Y�MS�M�!I��Synch�K���*�7 NBD�0�"D��=Socket Closur�
7409�B`WebKitGTK�G�%port�\
�a�
web r���Leng�~�:�
�B�*
���Lkit��si�a��ici�v
�s���4���^addr���
�apoof�9�2843)�Zh�
�t��Qrbi���code����o�U950�Up��es�
��b���c�]�B�mium-br��b
 ������ANGLE�4558�CW
��y�n-jinja2���J��7���w�o���p�P�H.�1�a Dj��o �Npir��n�oXML�
�dx��t sup�~���
xpr�|ons����;s��
�H�
�`�	���:��cep�fkeys��"��attri��e�u�W
�L�064�B�LLDP���Ld���[��c������.�5�p����L�k-Lay��4s�)�

s E�b��CDP�go��{t�l���Hve�kr��	�me�	ism�;eli���wnotif�N�أSadj�=	���Gwork�4��
�ldp/�
vs��ch:�]�s��1
��
��rigge�]�
l���0-278�	�]d: ��-of-��nd����wh��de�%�ONMP�e�1-43612�JC�CPDU P�+ cdp.c�_�1910�BLPop�9r�(P��Docu� F�� (PDF)���� ,�by a�E�ȿDvi�m��p��?df��: c�W����k�`��s�o�-d��Ura�I���x623�C
���_auth_�nidc�O�
ID �� �!e�c����	Ap�
e HTTP���>en�v�J�!�A�e�U�n��y��P�y��/�iOAu��2.0��$�p�
���:�S�z`OIDCS�mTyp�li���okie`�m�pula���2481�CJo�s�-�'u�
�Javascript Obj�GS�0�]�2Encryp�/�[�j�b�
�jdep��/�[clev��~a�Q�.��toge���>�nN��B� Disk�}(�E)�.��Q��: r�����817�a
�.���o�ol��CPU�sump�P3-50967�Fu�>+�s�)
��-�X ��k�t�hc�A	�}����
tk3�����pv����3�o�A:��/
L���>
����CWD�65�C�Ip�������
m�J�tmaximum TCP�0ndwidth�une���V	��U���is�����lre��L, d�iy�At�,���c-g�R ���i�V3:�
�`�
�	(7250,ESNET-SECADV�000�p�M�l��marv����0 i��o��i��:6306�B�BPF��	mpi�C�q�B(BCC����e�"�(����f eff�x�k� t�����	on�D�����\�����!��d Berk��y�F��e�ee��)����bc�8
un�lv���:#�}s����c�a�o�h�mi�hl�=h��N23�D1
�в%��	high�%�;�F
�t�fenhan�� �&�`
il�t��re���@����4.x)������LLVM���Ucke�o�#ile �
�,�5-byt�e��ke��T�ע���!���p� ,�owe�&�ex���.�%����i���`dynam�B&�$(k��be�{�
�J�%u�%�{��poin�L ��������nwk�9C�@p�ec�
or�Lrs�DT�I�&�'T��
�pf�C�>��C�%�G�
12��n��<,��,����d�_�pre���m�����F�;�]��h�ys�ٺy���
#��es�,�O�I(��:��h����co���Cird-p���0i�������$"� "��:�r�A��r�&��J����ajo��o�e
ts�Ӫ���F��-�%�'�u$shoul�Ң��N�e�	o�=��alo��K��rem��)s�|��ǝ�'�S�r����tk��T�est������nee�ÿse�?t�.�H��h���*���*.�\�y�a�� �_��ge��
�Dna�#$�"�j"�=fi�T�0:�vzipf������^���mbs������4-04�L�fin��re�IPv4���6 ��r�Q�B4032�Bc�I����"�5�ZIP ����!�f8088�I�����v�ko�-or����������Rcl��-�ex���ys��y�& ��.�&���y�'.�d�t�
/�any �����C���n	�.�ww�/����+�\��QT�R�!�!a�|!-��MySQL��&��Py�#i�O'e ���C-���xc�W�x�(db�f���`C�h,�GP��I�}!��%J�
��-pymysql�(���]����u�u���a+input�i360�F�Xj�ay�{-imapd���������m�� �����IMAP�'OP3, NNTP�DSIE����)���%b�e�J#�I1�Eby�xn���LITERAL�a �Nl�1�Y1�?40�D"�6unC � �n
�7ghtwe�,��+�3�x �v �j�F�� (OC���.���2ru�Um�#�9�1�D6�t�'�r��)M�aT�s� .Ag�(MTA)���'p�j(lik�D�SM��"AUTH (SASL�TLS����:�?smuggl����0����CD�6 H��#���ut�J� json�
s �3�EB�z��D'�3oci-�>-�-h�[�[����	�z'l�k$��
�)�]�U�7�c��w'���7�zKub��t�
j*���
jw�B$o��>�k���=��
W�1Ke�;JWK�y��!%a�6�S��$JWE���T�v�T) JOSE�
��
x%)�y%�	�JWC���,���Via�3ec�g-�
�^*f�W�323�"81�F��:��7�[p��)�?pow�ul,���7�O�u5����|:�a�'p��e�l�"���387�F7�3R�3S�3�)�]<�o��)79�C��()M��@e�.�d�/1���m�(s�L1�5�n�X�Ft�4t�8keep �q�:�.v���,��������e���UE���K,��s�tmob�(�adb��(WWAN�8PPPoE��,�.�=�TVP�ytegr���;dif�Ft�+��L�d:�
�650�C5C��;pi�/�| t� 4min��r GNU/�`��Da��/9���D��figu�5, �}A �[!�|,�4agno��' ��'�E�itr�=s�
�-�����-l�7s�7����vc��: A�'e�u!�Q
ki���Bp�g:�����pam_�4'�*_����'�12�C�'�@b�Gs��j�T)�l$�*i�9#v��x�ky�.�Eb�Cli��at��n�-��
�}���	�jp���8ds��/�Jin une�b
��o�=�"�D��!�U�u��each���S��G�Da �t��! ��!,�"�#k�Zdis�?:��&e�7&KDC)�'krb5: M�7��/�/src/�/rpc/p�_rmt�X7�64�=�Fg��
pi�k5sealv3�N61�Nkdc/ndr�=2�C��SS�H�1+�	��
�*$�d��WBs �:(S��1�����(�)����mD-���=��"-�p�83��0��$y���5ss�U�hg���b���o�F��v1.3�t51���UExc�:���+nt �c�GDSA�=��/�R4���R�@A�@F�@���U_�@_�D�A74Ɣ�-se�-_n��_�k�N�B55�DJK�*�"�0"e�	g���5���>�.����alg�5*h�XP�{�3M�3A�3��23�C�Vi��NVi�'�d�|3n��Ud���
�d�#,�>vi e��o��vim�H�L�K��1-39�m�D�bluez ��R!�3fo� 
�A���f���� B�9too����ci�
,��n7h�
�,�p�6d�2�,���q
��2(���pcmc�����\.��?���!��
o�H�D@�c���	t�/. �$���K���23e�#K586�c=�Z��dio�X��AVR�9�NV��NArr�I��
��mo�wC�l0E�hV��2734����phon���B�1������r�t�L�Y596�tOBEX�Do��E���
c��N�`4�`a�L��avrcp�se_me��_��d���2z2�ze��3{89�{�m_�m�J_�s�4n0�n��s�y�2(44431�^��0�`t2�C(Bub�
wra�S /usr/bin/b��%<�%��N���7�n!�
�� s��s�Wi��r�n�9������U3��T��
f��pak�M�k���"�Is�	�N��!��p�Z	s�<Q= (--��B[4�l�D�5e�8	�V:�cDos��M�p���J<��:���"l��Fr�f�:�JWue��HK�[�T:�
��0Co-Pilo�\QCP�su�.)���5s�/	�!����acqu�$Z���]vi�@�)a��y�f�L�A�1e�H����"�
/-�/��r�
^ �fBi��r���F*ly��-���Be�B]�Wd��*lex��cp�m��,�0m�
�G�e�B+a�Zp�
t�4eoo�	�&	577��8�Rcd�[c�f<u�$ th�� gh�ar��pmst�g�yP�-�P69���.�c�1�0%p�b,� ��2g���5�c��[��po���	���,�_�f�v.�,���n�,����,/�%r�cC�4�n�O��c�j�Ade�u6���Fli�
l�D��,a��nic/s���gO341��3��en�'W/gobȒD��Er.��;a�P-�-!��sŗs�m �aș��Oՠ��0��ed/cons����ȧ�/��"// +�1" ����V��[�Hħ�[�%�� �Xf: B�ta��X�+-�+FIPS�h�{-Po�iy�LQ�D@�+Mo�3��I���H��/��o�No�N�x93��o���I�7��^bin�	�ag�O�f�xD�p� RUN --m���E���940�Yb�����d��Q�E67���=CRI-O:�_�I��	al���G�5����?	�����DU)ď6�?A�������cu�m�OS �$f�����H��I�R��OST�& ��i�%��/s�X� ��x'd.�vJ�6s�q�M���{8��Qa�Dit���lup�H�*�*��o �ud���\�Ƣos��I�%��'-��4%����url��3�+�</�	��cie�#y��.�=�. �<b��[s�cri�_
 fea�]���4mi��c��N
i�& 
�•�
�safe���Y��poo���OY��#/��#�i�)_�'F�@��s����k�n�+H�'����re�1`��r��k��dea���H�-0�$s�DS���Dg�PC�f��,�7tli��zstdǀ�xy�0�A�c�/SOCKS�'�Yk% �Oc�x��W���exy-���r���T
is�q`�3ipped���]cr�kS�Ugi�2���%78�k�5���!���NE�	�����P�� �*i�
�
������pf�WP�za��	��9��. Am�0��thi��,�c�o/�~, �O6C�\T�P��x�N�Fi�B�sc�#�,���o�N�����P;�V�$�K�l�W���'
�ba�P
;��	������c�
��
��Q6
�I��1C�UNIX�wi��W��UP�0�D��Ep�*l��0�W� ,�I��s�4la����cup�
��W<�H"�G�]&����e�Gl�wc����PPD�n
AU ()


For more details about the security issue(s), including� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fformation,�f�to�RCVE pag�m lis�,�R�&ences���:.
T�Grafana plug�+f��Per�`�- Co-Pilot���>datasour�J�-scalable tim��ri�rom pm�
��Redi��live PCP metric�bpftrace�Kript�>da��s well�several��shboards.  

S�pFix(es):�  * ��o�u/gob: golang: Call��De�er.� on��mess�F which con��ns��eply ne�Ystructur��can�use a�nic due��st�� exh��t (��-2024-34156�C�?i�� open �, fea� r�D�ﯴ��graph �t��MG�it�=InfluxDB & O�UTSDB������domp��fy:�[��-bas�bmuta�6X��vuln��bil��H47875�0Kerberos�1�twork au�0ntic�sy�Gm,���v��rove��of y�l�Eby eliminat��n�-e prac�_e�4sen�pass�8ds ov�С/�J��un��ryp�Ѣ�. It �Mow�	li�)�(���=s��Ƴea���Hwith�ahelp��a �X�.thi�party,�"�#key dis�:bu�c�]�L(KDC)��fre�Edius:��gery at���59�Expat�OC�/bra���M�Rs��XML�|cu���6�>e�N: �Do��ia�C_Res�CP�U���E50602�F.NET�Em��ged-softwa��frame����le���+subset�ТX�C�- API�#�new���i�W��LR�Za����N�2�_�s�f�btha��ddr����]�<���> av���. ��upd�9�U�'�VSDK 9.0.100���Run�����
?dot�B: Type�Qfu�bŗlead�/AV���eC�7Nrbf��<mpon�
�3498)�h�<-��- (un�vnd�᫄f�Wor)�i�_9���
��	EXR�0
-�0
 high-dynamic-r�	�wlo��-poin�xa�ile �����7qual���"�+c����}�c���is�	�%es��b�f�vi�o�f���?�
l�
�4ce��r�qpecif�	
�
i�
���jp�Y���Z
e�8e b��&
���g�U�$: Heap Ov�
l���gS�	l�Y��
ep D�
 ����:3-5841�9Mozilla�Y�@rb�4	��}ndalo�m�֣��hsgroup�	�,	i��ox: Use-af�b	-�?	��Ani�����j(128.3.1 ESR Chemsp��)�9680)�Yt����i��y i��	f�could hav�ee�|
��'�nDeni�?��S���1n�7
���4br�
�]��10464҇�o��Co��nt-Dispos�Xbe��ign�뫛multi�
/x-mix�"re����Jponse�}1�}�hmis��uk�f	embe�Ar obj�����i�W58�W��lay���ac��_
�V9�VMem��safe�8bugs�(x�F�1 132,����/�;4�'�'��<7ҍClip�H"��te" �"t�Jp���Lac�C�rabs�Y5�YDOM push��	����������N6Ө��ori�_video� 
���H3�HO�B���8pr�*t��b�oofed�
�g URL�c2Ӭ��8d��6�n���ex�Vn���wtocol�dler���k0�uWebKitGTK�k�%por����web re�G��eng�'�:�w�Bp�������Lkitgtk: Vi�����licious�sit���	�a�bar���<	08���]A�Tex�c�xte�� �G-��T4187�T�
2�P��i�Ycr�d�5c�w���|xp��ed���5���~5�i~244�9~�	v�C��Po�<y��e��c�C�����h�&�6��, �9�ed��	���?li�,�,���������&	����/����gra��esw��VPN�*�}N�uM�wr���2GNOME��ktop����@-�k: Loc��iv�6��e����Yleft�ow��905��ts���s���m�THTTP������@���0�a:��in�A
lo����rea��\
ock�'�O
�i5253�z�H��requ�# smugg����	pp�
nu�byt�E�	���!h�ue�ames�k��k�nel�����4Linux�!�N���qny�ope���i���K�t�xtho��In���
ze��9elds��dumped�(�4228���Siommuf�cR��i��ri�Msup����He_inv�p�_u���]6824�]�{c��pm:�� uaf��__�	r_d�F�Jsync�F�H�&S�Nd�� ��xy�S��������,�~�*�"FTP, Goph�s�������	�Us��:��
�ESI�/
�
�58�d�vpx��4VP8���n�e��!��de���6�E	�@c,�
mon�=�2�|�M�m�u"a�8���U������te��4��_img_��c(�5197�){��/aux��AUX��f���c&�����71�kRDMA/bnxt_re�Ga�������-L�l-2 PBL��E0208�elxsw:�
��!m_ipip�_m�
��whe�!�/�er��+IPv6��d52��co���"�?ub�xcre��in�&_rcv_sp�_adjust�Z312�G�'��br���7�$s�����5-���S�Uru�t�J�
J�� S� T�ISe�n��V4�fAlt-Svc AL��I�4f���"%�dr�r�ã�0���4�6�{�6��3�P�15.19ˠ�7�&ٴ�b�C��L�'#sus�\i�L+���te��put�%���Com�� ��h�C���
%�=JSON�duleĨ�#��r�Lw5447���l�No502�2o�
���e5�\����Q!�"��XI�	�Jto���-meas�-maximum T��1b��wid�G��tu�uv��$�W�xamet���UDP��-�ust�0�S*�l�4�s�L�	�ljitt�x�s-g�R�fs�ui�V�uin� D��I�\.p�+�Ha����-358�:dpdk�z�<&�51e�2�
op�G����Y��+�&��3��^fast�aet������������O����g�%�Jhyp�!so���(DP��+Vho�����11614��f�-�3nt��� �l�0���c5������power �-���$��st�de�s�B-y��9ed�unr��0�V	no��-��b�Qc��
y re�r�Ϫ�pved��e.��3��: Jinja�ij��Ub��n
����gh�=���f�?���~�4hod [al�Q�-9.5.z]�632���}��_��m20�)Rap�5�
RDF��)��T�ki���U7l�q�*�����@p�@������Ple�D�$/�+1�YN-T���r����
���vn�g��ja�vI��R5tle���7823�r�Z�3�T��b�j�2��"��y���*�4n�O�+s l�ly����/5. S�.���V�ois�be�&!���4��dif���Ƥq�5��ad�K�35whol���M1���"lso�v�mirro�`
�H���K�Zfo�� Uni�jd S��!���7A��(Ide�x2��M�(IdM)��
6r��>7�Ԧ:�����(���4sol�V6�Kbo���26�a�2cloud�8e�#p�	�vi�|�
�E��#�|dm��st�wv��@�e���1�d j�����02�1���S	��vs������s����o�>�X��t�Cp��o�7�0ac�l�:�.v�!��5It��:p����	�8e���UE��K,�mrel��	,��b�<�hadb��(WWAN)�APPPoE��,��=��T�!�*!��a�>��
�y�t�8!��v�m��f�~R������Kto�n�#6t�je��o�a�x��JIRA:��-730�d�i�U���ۢW��&�rou���.?��is�@2e�#ipv4.�'e-�%ڂ1�i$�y���2�����\i�P3ru����s�g�n��3661�z"�HCP��op���8�1=pu�M����'�Z��t���H3؊647�	
�dj��-17-�j���@3J�17���7E���C�+S�#�
���A:�^h�parr���n�,21�\

B���B������߹�y�����F-��-�5ig�$��K5s��u�h��to�Uw�9�b. W�	is����}��
�)�/t������w�V9��Ɩ�H�E���}so��years�ҢIr���9(�867, �71�2).�J
��21������+�R��%���/dc�Don&#39;t�p��#p�(�A:�3&sk_�7&u�$�8k(�$@�Y
015� $arm64/sve�^i�(���4�xCPU�	��'��S�7t��
��B�Wi40�Rf���Ec�-by���I�b1er'���!te�
�x�~08�Py�|n��	��M�s,��	,�Q$�n2�q����m����Du�q��	s ��s,���B�ex�M�
v�A�%�mve�:G�e;�t�9�N
���l. ���@����7m���
��C���	�.�w�ow��@j�f2�8����VG�Lar��F�S��< (LFS) �0s�9�!��su�Z%s�
dio�Mm��,�@%s,��Ie���G�G��r �=���G�"�}��
��R%���a �h���git-lf�h��FS��.�H�5�d�_en� s�/� �'��.����\�MK�Hadv�d �,F-��!u����
�"oft��!�F���	�C�H��H�� si�3�I����w,n�	h�E�*��s, �%so���. �\�N#���&�F�-���9. You�wp�1� Dei�Bby�W+���2�ΡZ�{I���?�8a��,�;�qp�'�G�(�	�
log����:��' Lua�M�Gs�~���dJex�T���4698�#�Y��(d��-of-��4�
�O�cACL��������17��?�`�h�UB��*��l��cjs�n�imsg�
���y2-24834��po�L6�y�dK���x �1���4��� �Q3��,145�Q�x�M�Ţ�RCE�ͬ��(31449�\D�u�Ep�^r��t�6.�X��/���75�F
��2����<�3�",��MTF-8�����-_�53_��am_��_�c�A+2�C+�Ma�8-�_Q�i�/-�,��R��pQL�������F��pa�(�My�4�8mysql�9��:���r��Q�Apr ���\/210�=��&un��d�e�(k��a�OJ���8a�e/��i�wM�������daem�m��dbd)�
��X���s�"�4�2�������- �/���S�q�S�gInno�Z�\O����\3-2�W�����epa��W��y� s�Y��rob�0f�0�a��load�l�L	�բ(���~/�8�)�ePrel�Mo���r-��wid�'�hIP�PD�i�VS��(IPV�%���-��}&��/�>�C�E�)Ō.�S��K�f�!�7ck���e����adap�l�i�
�W�a�k�^��p�'�?�T�
����lth�q�?�*s����'���r�u��n�sCP��=(VRRPv2)�X
�	eve���o�&�:Z�t�	��=�S5�Li�a5rrp�`3�_�d>�&	11���Tpodman �|)�	s�s,�0�����s���	0�	�po�y��'�����: �a�`�f�v.�r!��n�d��Ku�Vnet�
����	ildah:�W��b����--jobs=2�'�K�_3�G�9�"�l%�S��11218��?�F�%�3���ja���(OCI�C. Am�B��t���¦c�$y��to�Be�a��R�N,���scr�2or����Q���
��O;�V�$�K�l�W��n�����B�0�s�; B����"����
��S�zip2�
�ʡ��'$��",��S��f�(9o��
�����(�'�m���,<��7
,���ha�C�k�����~
�+��:��U-��"�,e�'���n�2�;�-�O��'il��19��&90�.��9��I�PC��I�9%��i�'%�롿�Ita�64�C�q�IF��F�5Set�:��A�:Incor����7�h���9K�Yed��d�$�I�.c�Z�b��9���8���	Ex��Iship������y5o�)�rI�
UUID�f�)�"�cp���Wa���O�*� /te�^m��rs�f�/��=0�A443��PB�i�O���Q��od�vc��m�k�(�j��1��)227�}�kE�d�����x!�e�_5��[��]�fA�a6t�wri��(�t�8r��
��h�,
�S��&���)�K@e��m���&��t�C����1��>����i��H0A�mWnso�����'D���,�h+k Sp�E�1n��Cr��&�6a�)�$��b�
///�K,ks�598�Fs��8t�-9��b�9h�'bi-��i�6�R�#e�
t��0s�3b�2�\0th�d-�Z�T�#�X�B�/a�$)��Gs�	P�/)��s�eip���4nd��"�.��:��������p�9"c�3/t�[��5466�"�cU/�56�c�';:�e��RCU��t����igmp6_�:��O��07�[�Oovl��.UAF�9�_��ry_�(3_��^�� m���d��I�/�+�_�%�d8�\`�d�Tatm�i��6 ��[ecɬ200��/ud�CF�Ns�l-�1�$b��$s ���L7in�*_f�_��X2-��j46�Xvmx��3�N�(��e�6�>in�'_p�B_xd�377��j�������'�xTLS��
�k����603�4�[R�'D�[�D�'�[�cr�U�W��Y(���`��[�Q=�z�me-�n-�=�n��r��C�ky�>C�um�jK��(M��R�GPDU�K0�a�BV� �J5�J5�J7���J7��10�=̌�~Cu�d-m�cghl�t�L�
�c�4��jK20���K�&��
�aPo��#Jpen��of �1_�;
�'���0bi��D��2s�o�
�LA�]�MA�m�G�+�E���r�qvl�a��N�f�
Hd��XSLT�@0�
�SCe���e�[ngt�KRas�S>p�/K����$d�
]eŖdu��urren�?az�C�Y�vCAcfer to the CVE page(s) listed in�Re�&ences section.
T�golang�5ck�8s provide�4Go�grammi�#�(u�$ compiler.  

Security Fix(es):�  * net/[http:](�) Sensitive headers not clear��on cross-orig���ir���âL�D (��-2025-4673)


For more details about��s��issu�,�Kclud�΢ im��t, a�:SS sc�G�
cknowledgments�n���/r��la�Vforma�H,��+�libxml2�rar����develop���Zolbox����le��� of various XML st��ards���{: Heap use aft��free (UAF�ĩ�s��Denial�gservic� DoS)�9794)�WTyp�0nfus���L6�L2: Integ��Overflow�Z�BuildQName() L�bSt�� Buff�1�o�k6021�Kkernel���z�ɤ4Linux�!,�����any�oper����sy�pm�=�K: x86/mi��code/AMD:�* �;-of-�Cn�����Ss with CPU-less NUMA�	d���2199�cloud-init�ga�+t���scripts f��5��ȡS. C���{spec�H�9��run d���T�iz�"�etrieve��Kll SSH��y�	�%le�`us��O�Y�f���:����erm������law��4-6174��java-1.8.0-�Jnjdk�[O�JDK 8 J�1 Runtime Environ����*Softwa�#D�!Kit���@: Bet��Glyph draw�;�r30749)�.Enh�i TLS��t�ݱhupport�654�6Im��e�+�J�3s�461�4˚���450106�'Bug��O�>er���f�vigur���the�5�QIPv4� �wa�����v���6 (ei�$due�
-D��.�.�-�B�`=tr�"be�續fi�Hr���Iint�za�*�%�@s��)�method �^I�Addr�.getLocalHost()��	��would��ur��fully qu�h�+na�T����e�Ih���. Thi��havi���on�He���nd�L�S�+
ris���Bt�i�Hfrom��'�U�>�
.���-�O��ease�wi���Ĵ�K��M(Alma��-102904, �5�6�7�8�9�10�1�2��7��17���+��HTTP��i���� h��l�t5005�t�/��6�Z�D����Hdefault �
phic�#display��yWayl�B����"��se��ca�!�f��ure�*tradi�!�bX11��that��awt.Rob��
�@�{ak�c�fn�Xpt�O,��duc�a b��k��[. W�/
�+upd�Ӥ�RPM n���$omme�c
���2PipeWi����,�ich��scan�����N���f66�669�70����21����+�83��84�5���
����x��choo��migr��task�j	one�;�$an���Y	�1 garba�ll��or,�AllocReg�obj���r�\ssoc��	����9at��sa�m�ʪ�ob�|�r�e�
���r�.thr�
�S
�ic�C, b�O��h��êl�)��rbit�'ch����T��-to-�T�����
�Qa��crash�9��)­��(d�cmid-���O�� � olv�is� by�
ways ��s�
��L�p�/��ough�an ��}903�
�8�1�JGLib�]s�F��applic��b���b�Jk�G�Ui��q�-����t��uC�4t�]������-GNOME��ploop�,�n �2
g�^��util�dfun�դ�st����o�ata�uc���g��:���������u_�n��_msg(�^4-52533)�?�(Und�@o��r���&/g��.c ��
�� g_�_�x�_uni�9r��43�A���Tomcat���/�ie���A��������#P�+	(JSP) technologi�
�t�w���V��g�p��0379 - RCE�TOCTOU��ޡu���6�6337)�k��: ���mal�S�/�/2 PRIORITY_UPDATE����>	1650�)dm�a: uvc�o:��m�
d��%po��f��8002)�Fsunrpc:�
e SVC_GARBAG�.�5svc au�p��es�as��'o��38089�[i��di���e�[vi���r���	�cen��^ed�chite�. As��po�.���'v���Ss�T�G-s�%m�(l�	���:�
�j	ea�
work�Acopy�_�'re�vi�	�Gn exact�$�c�9��h��/����al��
��Ȣr�{�n�)��*�G
�c�����e��/us�~�`	��ir���
a�����
also�xkes�wpo�Mble�o���N�����L��Hdoe�sa�Eze URL�2
��y�xc�
en�e�
t��c���?�03�p�^Newline���in�H�Elp���
�exfilt�

�9g����0�3���3�z
ex����8384�6fi�g�.	es�35�3k�4�*c��`�����3�1���(���4ƚGUI���h�L������Z	��
�has �"�����
5�f�-�3nts�a �����w�r�^�)ow�an�A���lus���}�s�1�e��i�a������b��c��y ��tar�Ϫ�pve�G�e���	�s�%p�"!s:�V	��Tra�e�)Vuln��b�u��+�*�I��
x�72�
Moz�Aa�,�E�:"��-sourc��eb br��e���ign�{o�a�:"�+i�,�1�������Z�Rf��:��u�]bird: L�
�
n���#c����t�xc��

�8028)�`Mem�safe��bugs�<���<�ar�}$��
pp�ݩsC�=����P1�P���ng��dwr�c�����val����7�dPot�#��-a���)���?C�a���?��m����0�j�
P4�P�	st�ma�:	n����or�[3�[XSLT�cu�W�Fbypa�\"���I2�I��:���4����'emb��a�29�9T����l�um�֣�newsg�p�
�!�V�����13�‘��ESR 128.7��'��101�
AUs�5�'-�'��ust�Highl�t�L0���!�15.20���7�&�6�C�-��� priv���0��ab�xn�tl���d�5�o�
�A��JWebAss�Yl�
�����.��in����f���n��c�V! book �"!ldŧ�
��v�@0���ߥu�Ee-�8se��
be�4"oofe��S��g%e�(�[05�iCe�@f��e�?ngth��!���	��Shecke�����
�����c�d�|z�w��Y��unb�(�Cv��d���f��s�
��c��g DNS��SEC���)�
�
�r���{C���so���g59�p+�8SF�Ndou�V����p�Y�x�e798���Kw�: iwl�limi�}�d����FW �$����*05�MRDMA/mlx5���M_s��)�-���G2091�Gext4:�v�+ �wn�_xattr��t_��_��_��
�/�Z12�Zavoi�&o�
a�7sb�o�<if� �Jdes�y���_�'���u���J�e� ��
8�Un��W�fsc�Xa ��. v�+cl�?
��37797�Wmm/hu��m���oder��>in�. pmd��i��Cy�Z958Dz:�9���Wun��+�^acc�]�mii_n�w_�Y�Z�6�Z/mdiobu�:�e��-�
�645�7/�B�y�a1��SQL����
C�>y �w���M�(�base��
.����ub���&92�N�R"ed�%��A�!tor���n�le��le�API�B��*v�	����M�ms�����ı�k aga�U�������'o�����Jflexi��n����adm��s���3�<��]�����.����D����sql���2T��Bi�����696��Red�P �vadv�yd �/-��,�i�ft�f��,to��d-�G�j�Zce�I�!�j�,��h�s����ǥ�s���. �\����m����-���e�"You�w��ist���m-by��m�h��2�λ�,y o���#��l�xo�9���X�;����
 �\�`r��:���94�X715��7Un�#�A���4���4�C�;67�CHy�og� O�B�W�u���|��7���+��=C�(�s�s��U�Y �(ICU�Q��!r����/-f�u��7�n6�hicu:��W!��SRBRoot::�UTag�
!�522�
����B�]#B�]#(TBB)�'++�'4��)�1�&t��G�?��5v��t�U�ne�N�lor��ti�Xm��i-���k�@
jque�	Un��� <�bon>���HT�59�2�>DOM��ipu�$!��(��0-11�r��tpm�l�T��T�FP�z�u Mo�'e�PM)��a��$���+tu������:�|����R���4913��Vt�}C����5
Ja�fo�-a�kf�J��9�A��� ell��L
ic�(7�LA�wi�
��|.fas�r	�?.j�r.��/��~���
���%	�	E�&5299��"�j�Asl��A�A�F����.�Jat�xArrup�u��A��Pt�742�*Py�	n����pre�4,����C-�R&�p��D�2��es m������exce�U��hi�-��
dynam�������d��in����=�%<t��&n�3c��C�y�
'��.�Q�|���U(�
��'���z�	�l��<rc��&�k�+���P4�@#08�*LC�Skip��`�V-�V��U�+VS_UNDEFINED�ӡ9_�.e_��5310�*0pa����5in��qorde�Z21�K&�qHI�E��l-ish-hi��x���y�[�$tp_�&_�'�19��%_�Y�ccl�b9�b��@�-�g����5.�	D��o�lunt �s�`6�.m��A�*�x_usb_m�qslab-��n�'_drv���e2��eisc/vmw_vmc����:fo��i��_�q@_do_r��B_���2�%2�H8��h�,e���hi�Eqd����37890�h/ti��/��� �?��%_a�_�Nryp��n�18052�]���z�ztap�{_�	_�l �xB�07��<9�������?�a�;�6�u��<Te�
���	g�p�5M� smug��1��3�p�H�c�`c�Q
��!�i�:M2287��"�	�--�Ogcc-��et-14-�13�]�\��GNU��Q ����F�14�����3�*�3�9���SSL� ��ki���)!�=�oe��C�(�Laye�'�:)��T�s�nC���(�C)�t�C��~<��str��(�l-pur�y7 ����phy�F��0��*� �FC7250�#�P�p6�u���Os �H	't��rt��exp�"e��4-12�3$��io�����{:�li�#U3241�:���;b�;�S�7maIDCF��N�ET�Ws�N�o9���".c��C,�&!,�,�=%t�, O��2'C��Ada 95�������J�0�2B�"!�l�:�h�XI��Q2N�%�}�04�}�	����:L��9�B��FX��������:�Cgif_��/�L�4��6�_�J�7�#����P�8��12k���S��5�j�(�G29��.������
��s���!K�ӭ�er�p>��)��Ie��Xs�3� t��(t�?R�>Podm��3���6�X�-P�O:OCI�1n�a-�C�Kk�JIP��?��EEs�9�H�H�#?I�>d�?NVIDIA�X��T�I�23�[��@�lZGTK���%�tof��$%�DGr��?���Z,�:�w�Bpl�7/��a��7�!�W�p�3�i>on�5�9�8+�*d�fa�65�G:����g�lKA ��nload?s �ekmay�@i� ,�M�V��0�QP��!�&�j@r�d��u�ɢh�\.�E�r�(�P1�	�Sh8�h�T�
��5��N4�(�B�/�an���NSaf�
�B�q2�^q6�-q��"l�s�n�7/���r27�6r�?�]6�/s���B8�r6��F�ocmd/go:�EVCS�{��E�_��36��i�c�	bpf, te�&�3��'�_skb_pkt_�c��'8�:m��m_��R�\�'or��E�%�94-2895�Q@�Atlb:�F�0�M�b4�@V�^p�,�Fbef��80�R�Y�
�nA�LA_�f��vs GUP-��0 rac�P�
B��&dp gs��3�!se�3�qpull�b	�u+g_��S12Ť�Artw88�[��'��>'�G:��C�g�6C�9���D�c5�B�4to���Y(�(�N����	� fl�jU����Y�Ti2c/�S@�rc�(��	�
�P�H3�Et��^�W�B�/'��:�C��so�]5�~T�&�x��m�T�Rer�]al�4�Do�%\X��b� S���^D�5HVT�[��Tektr�Hx 4�I����/�^�i�y�
a�2� �1
�nw�l�-�aul�!�	s���"^�b^s��Ll��k!ics�.�*2-����6���Y��X�7�.�V�hGsevera�yef�T�{7��5�K��s����$��E�Jpio��ISO 9660 CD-R��e�OL���ou��Ya�KM��bsdt�_�`,�=�o��bi�?As�g���&�v-�񤄦�po��Vsk���Hm�)Vr���R�R^��2>�_�9�0_�Y�ek�-()���&��.�}�&K� �|�t|`Ć�`in�?�8up�`��	89�/�S`�rco�k<aint�@:��e/p�/-�?M�Vs�]�Yo��a�U-�u�G-�����pC� F�U����`���zü7�����L-��`"M�+��DRe�"�G�FKa���0c�a��ro�H�3�9��f��f�c��0�!<4�/<� <35�j�M�!Y�>F�e�/o�r#����G�|:�R�bR�0�9182���l��S���	es�j�r�L�cb�tAu�>L/V�6GMP�q79�qme��}po��y����Ca��s2D��0�gUn��
ed��b�?E���a1�a��U��U7��U1�3l�B��+40.2�*/Oerbird ESR 140.2, Firefox�2 and Thund�&�(CVE-2025-9185)


For more details about the security issue(s), including� impact, a CVSS sc�G�
cknowledgments,��o�/r related�Fformation, ���to�R�� pag�m lis�,�R�&ences���:.
T�kernel p�w�8s con�ɤ4Linux�!,��� of��y�oper����sy�pm.  

S��Fix(es):�  *�K: udp:� me�>y��coun�Fleak.�j22058)�=net_sched: ets�Hdouble�� ad��class with�1em a��hild qdisc�c37914�cice: f�Xes�Ach��de�����areset��enario�P8417� N��.js����softwa��velop�~ p�q�l f��bu�\��fa����scala����work applic��s�zJavaScrip�Nrogramm�angu���Q�	R��ici: U� Us��Insuff���ly R��om Valu��Z150��n��j�J��W���6Threa�#xposu��via Diagnostics Chan�>�S3083�SGOAWAY HTTP/2 f�ߺgaus�O�si�cheap�P5�J��Adva�d�Gtrus� D�� Environ��(AIDE)�util��that c��te�databas�fil�o�y�y�ǡn u���=�3��en�â:��teg�;�4d���G���s��a��:�cr���p��neutraliza���b��byp�����54389��Mozilla�.	��t�ualon��֣�newsgroup��S�bf�	:�|�[:�Anial-of-serv� du��4��^��Graph�: WebRe�F��mp���w����	2���l��S��bo�cap�rinv��d po�Rr�tA��o/V�!o�	MP�q79�qme-orig�Tpo��y�F��Ca��s2D��0�gUniniti�����=�QEn��e�a1�aM�Ssafety��gs�[	�W�u�15.27,�28.14,�^��+���*���P�greSQL��n��obj�%-�q�+al�(man�a��(DBMS)��p�jsq�:�vex�0��e���Gi�;t�M�@�*�~8715)�W�D�\�9�N4�K��Imod_h2 A��h��ttpd�ul��le���B�2�toco�<h2+h2c)��
op��
libng�B2�

�L2.4 ��er��
�.:���dxy_�I: u��
���
from�4�	���s�f���
f�	�����X����49630�yth�����	pre�4,�a�'v�����	en�R�y, w�	h��e�3����excep�y���y high�#ve�ynamic�	 typ��d���l. ��support�&
��fa�թm��7�Ll�C�jra���J�-ell��.v��u�@��w�̤;�|cp���
����^
�o��w�
par�

��ar�
�194��:�g��Whfsc�Xa��ten� UAF���_deque�B)���782��K40�LMMIO wr����es�-�!�E��a�1_c�r_hw�\8200�\RDMA/iwcm����-af��-fre��,�h�	� cm_i�s���b11�b�/�Always �notif����^�xbe�)��emp�s�`3�*�`tipc˾��_��n�os�o�J46�vsock�K��	ns��_* TOCTOU�:��xfrm:���Ő�?ha�g �l�W_md�=�<�i5���U�7ks��M�vi����n,�l�������Kipu�� �N, ����
ic�M�&�hnolog�A��u�F: O�bo��s ���UD��D���,06��,g�X
�f�У3���
 S�u
��pow��ul����ext�_i�web �
��
i�a�\�#�us�u�(�
d�W���|
ss�r4-4725��
�#:�v�>r�i�=by ��
�����u��TLS 1.3 ses���um���	�48�z�/�3Hij�Z�5a�Pup�v�`�A49812�lugg�Auth�.	� M�D (PAM)�`a��m�B �a�7���<� �need�2r�Zp�����
h��le�H��l�-
-pa�L�
�r���Tra�ma��602��<In��lete�4��0�<941�)�udmabuf�	a �
 s� ov�low�4�r�Y�-�E��0�dp�X��v��5�� m�+x�� s�lo����
9���!N�D-crypt�phy�H#ULL�der�m�%pkcs12.���u_key_��_c�x�T
��R
all�b�6a�s
n-���g
n�}�,��priv��L���hmac_hash�r�{�8261��g�drm/vkm�'��"��*���'��Qi��rr�n�C2097�scs�#lpf�U�/#�
��XBIOS�.�a�32�F��ix-cpu-tim�0�3r�b�D$e�]�3_�)_�)_�)�j�P���l�35�s���)cqui�fr���GEM�ss���$b�	�t�X449�Com�xUNIX Pri��)S�(CUPS�	s�_rt�F	p�*lay�Q� 
��,�K��similar��

up��'u�P�D��Ң� ipp_�F_io��L�	�Zo��mo�gDoS���583��d�
B�!�a��E�+$H��b�R06�=� 
�=
 
�ipv6�
c�J(�<$�Q �pmc->i�t��mld�ޢ�
��55�&C����K���6ed ��#�a��ma�s�)��OpenTe��t��	x�0[�:](�)���=	��(d���> ��ed�cr���$���ТL�D�4673�podman �6��s��%
�er��������It�a����f��	�<��	y�
���/+�)��f�v.���	�#�
��Kub�Tt�
���� ��k�6��+�b mm��m��	�host�)�9566��My��!�B
lti-��,�t�_.�A�#��!�<I�
s�cs��M� �t (my�!d����������op���:Ti���,-�����ECDSA�gnat�M+�8ut��Y13176�	��:�d�A� spec���vuln��b��+(CPU�wr ���0722�NO�7
m�8r�#N688�NS�"d�o�#���#U99�UUDF�%�1�;��<Re�	�%P3�PC�=�*i��#��[$�XP��#��/74�7D�N8ĚDML�%H�{�0��-InnoDB�%47�;y�N�(40�S�%�6�2G70�9��K�s��$L��0]ĝ�7�0�<��<3�G�'T�t5�6K703�8��KDD�&����0t�P�l:���1S�xet e�Cs��:539�!�JulDž� 9�7����N�%��N7�8�7���H���-�9�:210�N��Η�!��K�8��/��X�7�-��
En�=�/�C��%�1�%���ė�g�U�	�+1�;���.N��=Poo�'�$��=�(�;+9��+S�:�102�^����R�7�
�����	�=����P302�x�j�K�I��.�!-sour�-�4brow��)��!�S�A$��Krd�'m��D, p�p.�������)�N����K�gK�;h�K1052���s�2r�p&b�=9�E�P��l�
K��KC�h�,��� fi�fbehavior�8�XL��8Ԉ�[LLay���\9�\��K�K3��K3�K3�W�K3�v���>�t;�I=�w��N�QR���U�7��6�d�SPer�3�^SVG�P��(gnutl�(�H9GNU�H6n�>�V�i�(Gnu�8�h�(�1G�W2�2algor�*�Lp�DGs��*ch��2SSL,�k8��D�	����: V�i�/���d2�)temp�:�q)��Q3299�N�NSCT�+:on�J��J��N�� SAN�T�_�I8�I��3�T_�$_fig�_�)o�s@iph�l*u�)�-63��

Bug�Q�oEnh���(�3dBZ#235962�+`�F1�)\�E2�<X�X7675�U��85Z�^ZV�|
�cT6�:�b�:msc75x��L�^t���(leng�g5��Akb->le� 13�12��P�Kdwc3: gadg�^�
�e?�3�=n�unt�U;e�>5�@>� ��E:�v����?10�jdo_��Ie_�Y>(�ܩ��Yto�
�;unm�oed/�l���>u��]84��;390/����cSCCB pr�*c����>96�+�Mmm�ig����<�8�Di�U���%p�WF�B��7��24���BIND�Ue�	l�
@��6 ��Dom���l`n�j�
��#DNS�\W�(�4�<)�q. �d��e��3�$(n�3d)����olv�$��6��pAIP�fr��,es;�@�&r�
 (rout���7��#A�A���9��);�_�L�=v�lAfy��a���is�p��`l��b�&B:�9�u���F��������?F���
�cexhaus�}�7611�|�]��-��-�S�s�??��V��%ple���9d���vy��D�7o��s2�� �eg8�_se�EPn��XX����Ce�553�8rb5��nm�A��tok��A���43737�c�Q0ASN.1��r�s72�fQ�"�O��G�@�{D123���A�DJin�#M1�%�͜4�tC���$��%�S�ma�%�7�W�3ͣ1�$	�N0�!�&�>��G���GCS�%Z�AFT�%H�#Heal�Mo�Eo�%C1�w��!�H� �-��<H�6v3�6K�Q�6K�2PS�%G�{%�H����$�w4�8:3�+�Y��%rc ��word��31�� J�
20�214���S�����6
V�M�>52��H�LP�RK�A�[�ti��#�:�pę�)�����	�0=5��, �N�#�Hs�$O4�B�k����	Una�eHed�X�NN�Rif�3�5��+��������P�4�'��"�h�,�)����#͢�<��NP��!�+�3�;49�<g�#��.����*��X	�-���
�RN�Y�ZMis��A�;C���O�%�%�`�"N(����!�*ͤ��,�
���Y����N�LP���yt��gu�*�L��
f�ctra�c�cr�~V�lr�Iv�Tu�ussed ent�z���W7�=�Wm� �r��ci��ifs_op�Y_br�l�Q��Qctp�nea�� c�Pd gso���T�%_rcv�K7�@�K�#���~���o-���o��rx_���T9�p9�Tio_�/f�}Z:��w��_wait�>#�FP�A6p��e�l�-�a�>��M�more details about the security issue(s), including� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fformation,�f�to�RCVE pag�m lis�,�R�&ences���:.
AlmaLinux Id�l��Man�?�z (IdM)����c�raliz�Pau�O�,c��i�:m�:���(oriz�' solu��� b�� �Qdi�al�/cloud-bas�d�Derprise�
viron�
.  

S�XFix(es):�  * FreeIPA:��m: Privileg�Ascal��from host�1doma�adm���? (�F-2025-7493)


F����T�kernel p�w�8s conta�4��!,��� of��y�oper����sy�pm���K:�/keys: fix slab-�<-of-�Dnds���_task_�fm�I����4-50301)�YKVM: x86/hy�2-v: Skip non-ca�ic�Uddress��d����PV TLB flush��3835�_wifi: ath12k: Decr�TID ��RX pe��frag��tup err�%h��l�j�]9761�Elibpq�D prov��s�3P�TgreSQL��i�*�,rary, which allows��;grams����n�f�
�Eserver���	ip�0sq���<quo��APIs �P neu����sy�x��ex��at f����o�|v�3d�<��1094���/���	va�#�pbj�%-�q��a����	 (DBMS)��Ц�Open Virtu��Machine Too�ˡע;o�"sourc��l����p�!VMw�,�6. �Vy�<a�g�#guest� v�v�o	compon����enh�4 �6���
us��ex�ie��`�I�C���u	��-vm-t��: Lo�yp�|	in�,�4124�[�ip������ic ���f��nito�B
a�Ptwork��p����o:�xi��g��ov���	�
896�fVi��Vi IM�)
ed�Ln upd�h�z��� ��	�vi ed�s�vi��
�gpa�Q�F�\�K53906)�,i�-5�)�
HID:�L�
ard��32ton() ag�~������0 bit�
3855���Tev�1pol�
F�Bemi-un�=�r���1�D614�DALS�usb-a��o�	��e UAC3 c�t�pse�� d�rip��Ü9757�Wcry�%��qiv -���e EBUSY�	r��ly�C3�c37�UWebKitGTK�բ%por��ab�web �:de�<eng�	�:�w�Bp�����d�Lkitgtk��oce�'�Tm��cious�ecraf���v���may lead�o�}n��c�%Safari�4�43272)�Bqp�D�r34�rA�site�Qbe �R�Tc�Esens�C����t�D��	��s���g�\�VL368�_L�`.NET�1�!
d-soft�f�:e�. It�F�+sub�'�X�C�-�
��sever�new���it�e�ICLR���N�2�s�f�b�@
�n��]vuln�hb�L	��n��av��������U�'�VSDK 8.0.121���Ru�ome�21.�-dot�	:�4I�#Dis�ksu�eVß�524���F�leat�@Bypa���G315�GDen�x�>S��icԉ7��9��1���0��Mozilla���Eox�������br��er,�J
ign�S�Jst������i�,����@	�?�	thu�]	bird�`��: Me�]y safet�9ug��
117��=Ou�s�`s�)ad/wr�in�u���trigg�'d by��	GL�Wure�w09�wCross-�T���k�]du��2 IPC m�,����0�iUse-�jr-f����M�naTr�FGraphI��::GetIn��ce���8�_An OBJEC�La����K�%bute��rode�!��	havior�Y�0�Fs��	a�	-�K��2҉�	��඿ESR 140.4,���D��)144���&�Đ5ҐSo����R��
O��L��scould��
m�fi���`�N�s�
��)�(��=SSH�tocol�!can�u�'�{�.�Z��< appl�����: o�����sftp_����8�)-nfs�don'�gn�U�^re�:��d�esvc_�_reg��r�2��/�km�Z	:�|m_scp��En�#�_�9�yno�-s�i�robe��d2�08�sunrpc���ysi����	�
l����71�K�?�ƣW�K6�,fivarf�i�+�n �#_d_��	�S981���
 cfg80211��me:��p��� l��th�W__�#_��_��ult��`49�cs�`lpfc��buf���/c��rder�cd���j�Xeive���]��c	�i�,�@	lon�i�:$�sgro�!����2	�j�n-1.�-�o
jdk��I�)h�J�= J�1�fE�L(���*S�D�Vlop�+��S�@�c�cP�F�-or���530��0C��f�	e�?�t�6�u

Bug�ySi�A��8.8�te�T���)��9.2��has�X
a �le��il�k�e��ea�
maj�
�E�Z. Wi�^his�,�
sam�O�|w��so�o���fo�%&�l���@��8.2,�4�6�f�3 On���{	s�omean� ��'s FIPS�#e�(ll���4en�V���_a��e����P���>.�!��ver��p��b�u�u�k-D�d.��.fips=f������8777, �8�9�82��7��17���+�������־��8�8�9������
�����+��6St�0�1617�����t�f�u���fun�4�$an�A$l�kTag��Ima�i'Fil��� (TIFF)�A
le����:��b�4��A��F�����#���A��W�-W�w�e�[9900�GNU E�)s�pow�u�c�C"om�)�L,�0lf-docu�����k'��$It�סZ���B��� �-f��� �"�langu��(e��p)�袪���t��e-�"�	e���lhe�	Inj������vi���� "��" URI Schem�o
��)R������)�2-�')ue st����Ht�;
�m��to a�'��)-struc�m����� 3���s���h�� ���s�T��s�"ed�. �\�D���(���in-m�����9. You�wp�st�6ei�B�um��(��2�ΡZk�%�������o�9�y�#�;�O�m��o��og��r���Ou��@s�"�B)�bpo���MRCE�46��R�_�A��6e�-��ex���LUA�s��i��;�e#�b8�b��;�#DoS�<���"�l�X9�X�!��r���U�ͺ�V�*�K��gZipv6�Wr�OMAC��pa�R<�w,b�j�� i���+0� �Qs�UAF/GPF���nil�Dmdt_de�o� �236�*,x�A�(,4�m1�5N�71 C��u��(VNC�a>�d��
lay�s�9:����view�2c�G�|ktop�*>��onl�����4��re�&��unn�?, but�>�u� �5I�>ne�R�!���va�t�
�Yar�te�A�5i����su��-��^s�T���xorg�6�@l�3��XP�t�HNo�
y���cre���6222��Xw�Xkb���c��v�71�R30�R��V���RSet�atMap�&�H�G�a��fas��5nch���m�^imas�n0ws�~���
�!�-/)��2nsa�^�;6�Bsim�(��!�@��D�t�*)��e <https://gi�~b.�W/�rship/�+-�+> �os�y�]a�x��Z�ۥ����gwww.g�*c�t1�r>���my��6High��A�
}(i�y�7��2149��m��adb��DB�,C�Z.D�CEmp�OB�Gt��e��8��2969�M�]I��_di��_��_�l�K7������	�/����*(CPU Apr ���p 0722�NInno���"K6�C�C �:��l�Wtwe�,�2i��;��;C�����uOC�t�p��c�$r��_��:�4�>;��3'm� Ced ��!'�m�Z��ou����:�UE�&#1133)�`�m�$ �fig�^/dev/�-	ole�k�����w�
2565�m�=d������mar�6�'r�4gadge���A�� fs���A�{88���d7�-l�B"�z�}���/i��>�EAMD��"�974-3635���j�4U�d�Fvm�g�@dd��mIBPB�=tig�	4�cF�BIND (Berk�]y�
N�D��H�;��DNS�>�I�4S�<)�t�*�Z�d����3�2(n�3d)��E�2
lv�$�sI��IP�G;��&r�S(ro��e�����>��i��fac����);�_�a@�=v�{8fy��a�����(�O#l�r/bi��
Cac�Ipo�P�;�$����u�+�K��RRs�g��)�G�w�{PRNG�;80�;R�exha�J	�Aia���O�|��KEY��H867�1�:����u�<��5454��hA�_�*�[����f���=Mn���
241�aCop�#a��L��W��I�!
t�#���3i�%�^���)��9��+��V�\G:�r6�U �cK�: ��tp�=�CAN��7 ��,��
in�0_rcv�2�C8�a�^so�[
q���imd-�p
p sha���d�WC,�WB�g4668�-Squ���san���ck��mb�� �@�
�Q�F7��Fv�,��be�Sen e���y/o�2�And��d�()&#38;�D��]767Ť��td�*��"�6��MMIO"���@72�	rx�j/�>aĢ�Oket �H�I-��I/O��J�G4�6�io_u�c:���T0we�{e��s�dul�����O��O06���Mm_�pc�Odd��F���_cl��0_�_�()�Np��0/�e��,d�2-�2����x-�U9ck�'�d�
�64��n��_�)_�6��50195�~�V�>�c���ha��lls�M29�o/rw�s�SNOWAIT���	O_DIR�]-���!�A
�[�#��a�C1�����eC�4�@��ir�%/v�K�dc��_queu����X�G11����QVMX: Bu�0��
l PT�_��J(�K/�]
�))�{)i��CONFIG_BROKEN�j3�xe�PX���JR�t�]��	�.�D���w#ve��	(�6�Advis��4�	%�s2�1�sRDMA/rxe�"�sqp��%�
�m*req�G2�&b����uaf��Erq�� it��V/s�	7��4r�G(�v4�#�/�
o�8��
rcu_��Ü16�N�!<af��do��Z�?��(����
������i�G6603�k-c��1�C��@�cg_un�_���	�H7���5����vm�kc�04R�7�)_�(_��T6�Tbpf���is���(g���5g/�Fh�RCU��av������Lj1939�_s�	on_��#(��dUk��
� c��x�X4�X�p��C�	� ����nl�8en�$�_do_�V�+el�j�6-���p�*�+iowq��kille��0f��:ƾ�3�Mrtc�H__�_�_��was��5E�%�Z��r�����'73�j��p�	���
'�)��T��is �5t�ade�O��	�\8�*ig��/�"	in�M����E�	gb�5����ul��2332�Zpv�B�\un�@i�Ged��5�`p_vs�����k�d��E�9et�k(�����,Z���maximum�-!�
�C	t�NT_MAX�Z�6�@�Z�2��Hk��8dd�g5����bulk �Nairn����s�a�	�D�fq�'wak��q����_spl�v���R3��z��L���K�T� ��B�9�~���lW��r�@	�9�����M�mm��swap:������3	�c�G5�	�hot�Qlug�c9�c��s�N���D� �is��!s��"��Y�����U����9�9d-wp�E/P��U�mr�(p�9�cpfifo_�
_en���Yrop�7D�
e��1�j->lim�== 0�U� �PL���|	��in�Zc�K�B�o
6��?*pc/xi�)�9ef���Jicp_opa��O4������:���N����d��3� u����9��papr�K<���<��{	s���'0'��d���:�_353�v�	���|������M�Y�J��!�@���N6�0
l�/d�<P�Vdi�/�H%0�L��	 DIM�D���	�\�s��><�������œ26���a�1�s%���>ra�J__m��	u��\î4��/�x���"�Omap ���>��B�Oe�>=D�
im�G
c�0s��UEFI�L�Foot��
T2�GW�
����8��'��ar�$ �>rdl�#�8����J
h�)�\��=�Ll�U�=�In�&:�^ap��-���^�a�n6��oG-th������Y�l4��NFS�^Q�L�#���4_shutdown_�b���F���Sen�: gna��� ��A	!p�m���72��p������_�:��_r�6��Y44�QB�="to���trt�K��NULL���up��	���	79�@��?brcms�#�T��
 ran��ct�l�{Ahy_iqc�}�!��
ms_n��d80�rRûbc�@��de�����_��_bo�H_�#Ǽ�q�=mlx5�P���k ODP���#�Ɵdrm/xe/���PTP_�Ek���495���Shid�����"�Q�����_��*d�*nd�	����j��rtw8�
�1��c�g+l_hw_s�-*����4&le�/	7�X�`mt76�925�g��ln�_ch�:��!���
���`�`b�'���x��
��F�h��OPP��i��x��]�:�Yid����$
f���u9�uı�a��+��tin�&_�[_�aD�to_v��i�����	�#$_�/�
�;�m��<th����H�bCu�U���su��&���`�r�7�7�s!s�_3���C�U
P�p���]�8���u�som�(�"�]� ����b�.�l5��E��we���\���E�2Ehe�e�������W����o���h�o��gM��&p���mu�|
�>�%�zeCo��]
���E:���g�re��D�d���?vrf:���A����l3m�l_l3_o�W��fte�
b��e�uEAM_OPTION_TYPE_STRI��]���]��Wh����'�<��
�
er��R�Z��F�3ūvxl�O
��_vni�� ��1����off��gE��load�c����}-��ip6��_�1mss�6�ASoC�OF�[	t�hda-dai�DAI�+ge��+�8��®�?��L�G @��T'�?b�,���ý�X�
let�.�[.���h&���{+s�<��Czero�L80���l��unu�h=�_buddy�v����
�4�颎pm�_p_�bw_*���
b���X��=���;�a6�1iw��mv�a����O��d�
c�?\t�p�"n�4�@�(��ac��I���1�up���STA��8�
�Ex�y	ly�e" �\��v�6�Z"���kv��	vcpu�7
8���Mnf_�xs����E�Is�Vof �)ld_le�Y�ke��J���O�Zs��p����so�
�
�H����.p�(@r�j�c�]��0��,-���%����bC� �v�uL�V�L�8�^
"��xe_�5nup+0x12c/�70 [rd��]"�
�u�a��d��DR6�Q�re�L�T0�e���|.��_��(()�.�S�f�*��_���&�� �! SQEs �M*�-�2�W��'�6�X�|��L
r�0_�u_�	�j64�Dg�� ���mibmv�n���l�&�	s�7�HVIOS�O�smb�
��:�a(�n��=_�h	i��M_�m�ed_�U��8�D �	�+h�.C����z���6x��m��!�8�h�E���-i�C��c� nul�f_i�msg_�	Ƕ�tc�Ad�T�"�N�q'�D��as�
urr�?ly�-dst�X6��d�s��<����9��]��Mt:�9 l�1�6��U���7mm/migr�X�i �S�;�
f�."o���� LRU�H	�5�p�I�X6���,�eH�wop�<8��6�Tfp�F�fp�!��rl���1��8�M�t_�m��Ngene��opt��Mc�K.�� on��ƨ20�����o���a�� �@head�l��	�8�	���c���v6������3��
������	��R1�4��j��r�$�ke_�k&�C$(�B$x�i�m�
LSM���[�c3�
��& �Y&A�=�]�js�p&�֤��n�\
�'�X��7�H�4�j�CHR�� No��e��7͑�W'zz�b��	�@2��,������ract�=�Yzip ��E�c���o�U��hi��(�!�t�@b�"/���X>.c�18-17��
�Cpodman �V4m��`s��
�3im���s�@p�%�,l�puod�M�U/i�/���f�v.�4���c�@p�/Kub�yt�
��r8/s�qns��E��R�|C��4�m�!��9�kub�+��;��+������N9��W�b�.�1-�8i�\FB� strings, hashe�list�se�and sorted�. For performance, Redis work�ith�2 in-memory data�9. You c��<s�a it e�.er b�&ump�� ��2 to �Zk eve�Io�m�X a whil�xo�9append�;each comm���;a log.  

Security Fix(es):�  * r��: Lua��bra�f�@s may lea�Jinteg��ov��low�potential RCE (CVE-2025-46817)�_R�_�Au�ޡ1ca�Nus��ex��te LUA scripts as��differ�2�,�b8�b �vulnerable��DoS vi�Npec��l��raf�~�l�X9�X�!Use-A�;r-Free�r��code��ion�V9844)


�=���etail��bout��s��issue(s),�vclu�ۢ impact,�CVSS���G�
cknowledgm�(��o�Wrel�iin����,�f����R�� pag�m���,�R�&e�rs���:.
AlmaLinux Id�ȡ�Man�?�z (IdM)��a c�raliz�Pa���i�:m�:���(oriz�'�tl�Ef��o�W�Qdi��q�/cloud-bas�den��prise�
viron�
����IPA:��m: Priv�Wg�Ascal��from hos��oma��dmin�'�?��7493��Squid��high-�� proxy��ch����v�f��web��i��supp�4�"FTP��HTTP��obj�k��s��-�he: �������&�
su�q���r��e�s�7��kag�Gerr��h��l����62168��QLite��C��that��le����(���I�=gine. A large��b�of�&92�N��ed�%�.�Kte�A�!tor���y�le��f�_. T��API�(design�*�Aconveni�ǫe�M�x��ippl��s�ĩ�k ag�������Mnjo��e�w�=�Jflexibil���Q����ٻ�is�ltive�sl�W�5���para���
�l��: I�OTrun��i�����965��zssh������ch��=SSH�_tocol. It��be���.�h���a�����: �A-of-�I��r����sftp_�e()�531�Vim (Vi IM�gved�n upd�h�z��� v�
�����Pvi e�o��vi�K�gpa��F�y�J906)�,i�-���Sy�&m �:S��i�&Da�?
�/
SSSD)��i�jvide�6�d�'s���<	�¡?��
dir�s�F	�7�T	�
mec��isms�`also�g��Name�� S���(NSS)�M�!Plugg�A�[Modu�*(PA�
�	fa��towar�<s��ia p�Jb��-e�ά#���n�ʣ�ultip�E�����t�&
ur�c�vssd: �]�<fa�M Kerberos�ffigur���"ows p�
�AD-joi�����@11561��N
�adv�	d key-value���Ai���m�to�
�-�Guct�	�si���I�
�}t�S���I�'t�� p�x�9���G�B�.f�\
�4s�^m�pu����Tagg�gIm�DFile�Rma��TIFF)��G	��:�
b�4�V��u�����A��Wr�
-W���er�
9900���C�>ol�ghtwe�, �_�5��
�z�	Op�hC�ꡃ��OC���
��c�$ru��me���):�4�p�K'masked�	'�muse�(��m�ra��:���31133)�`�ma�iou��^/dev/c�Role�k�����w�m525�-
�m�=d�a�,��
���marbit��� gadge� d�Vcfs���c	�{88�Virtu�Net�J�jmpu�/(VNC���h
spl�}�	��
�>	�U��view�2c�G��ktop� not�Wl�\��m�\e�R�i�c��n�?, b�M�any� �5�Rrne�#�!�^d��a�t��Yar�te�s�i�V���su��-������Ixorg: x�l�3:�a�f��}XP�t�HNo��y��!	c��6222�	�Xw�Xk� �a���v�O
�R30�R��V��	�^�RSet�atMap��H���N�/p�N�G�E
��o�f�YGNOME�t�a�O�eCookie Expi�D�YHa��"����4���[O��B��R���]�R�ަR��L��_1102��X�0��X�����T��� �8�W�2��X.Org�o�H	-�9�j	X Wind�����(��ic �>-l�l�la��
�	full-f�ݡ�graphic���F
�a�Q�up���xQt 3D�<�(�near-��l��!m�
on�^�&�~�12D���Vre��%�&�nC++��
Quick�)�^���2:�kAs�Im�x�#A�! Q3DLoa�|.cpp�~	�s�Mheap����[277�:Berkeley�
�AD�*(BIND�d�h�)�w�K(DN�o�	�p
�E���/ ���(n�8d);��)
�(ro�u�so�!����
whe�'��X�i�~;�8��=v�dfy�{a�����pe�� ���
ly�hbi�C���iso�att�µ�u�
���RR�"077�{�G��
w�� PRNG�;8�K�(�
�y��(�~�y,�
�}s�-!��eIP�?dre�Hs�y�����;R�oexhaus����<�O�|��KEY�� 86�mPy�n����#e�4,�ac�,�\"-�n�R���z	mm���gu�q����m�,��a��,�fcep��,�Vy�	# ��	dy���	�#type��d���l. ���s�¼m��<c�7�C�i��as�ll�to���"w�
�����p��-kdcp�#��	na�SSRF�HR�m?�\roll�O SRV�G5908���WR���unbo�L
d TCP��
�
eam��K��U9��/	SSL���ki���m#�=���ock�_Lay�L�:�bTrans�o	���(TL�� a�k�eng�ge�zl-purpo�Bcrypt�phy�y�8�!
�"�T���&!&�	�RFC 3211 KEK�[w�a��9���Mozilla�"�Eox��B�&br�er,��
�st�����m��������)��f��: M�mg��bypass��DOM:�4�uon�
�}30��N��
�KA��o/V�o�I4�IIn�	 �2����XJavaS�: Web�fmblЮ6�dS�^��gin�;�~y�Wo�	rs�U9���RTC:�20�QR��QG�
И2��poof��$�F���75�7�$C��&�MLω3�"x�x��	�[��1o�:�3L���
��Sert�Sl� S��l�gn-On�?�SA���٢2�Z�r��#��
�wh�Nlife-cycl���C�fed�"�����
i�!�K�#�Q	�
+�: Ty���u�X&�YE�n'ouve���-�#4715�`ha�&	�`�oi��,�k-n�lo�tbal���T	������)��: �v���HAP��mjso��%����podman�	�]'s���Him�����nis �,�'�f�*�<�1�p���u�	�f�v.����X
c�$pt��Kub���
{�%�Go P�?L���pgo�:�eve/tar�w
�
������5s�\GNU����p�O�f%�U2�ke�� �e�(S(����� S(���R(�(�.��o���-��o��se���Jke�'���o;�xr���{��i�%��; push�6��;�$	�"!�q�*�:,�L�,���'ce;�y(���dm�A���Ies�#nk��z��.��>������ev��t��ut�q�4����	`)�XDe���y�
���,��{)�7z)����,�t��+� to-�i���$�sla�
re�,��fa���bl��r��synchr��z�2�bo-�o�,����spli�F o�	th. O�f��"��e�a�=�oPub/Sub,�)�1)�,��,y���Hm��E��l����,s�5��ǭ!beh���� �y5��ƥ'�\#m���[s�i����*k��l�@���4�/�!,������c���7���K: m�2slub��vo�8w�.�-kswap���L_tr��_pr�6�*3�~3�	IMP (��2,M�L,�p�"	�m�!�s���e��V�,.�R�^a�o8�<m�^�box���2���cl�1s���c��ub-pixel�W�9�&a�-a�v
�w	�!v��la�T�*����!u�w��	i�7��DCM �P��	H�B��&�9C��E���=-1092��oIC��p�O�&�X-� i0�iWB��i��&�f3�fHDR�H@1�@LB�S���6q5�q�0/�=F4�dXWD�GF3�Z��T��uild-�	�rpm��	�m�f�"l�X%�i�R%�mGo�	 (�)���do�]��,nee�b��
��	���6�� roo�#g�
��-�,�6will pull�-�"A�|�on�
�os/�0�exp�e��/���
���	L�<*P�9in�3�_7��9���mah����b�~ ��F�0�iCI�]�!�>�9g��t��
s,�cen�'
s�
t�C�C�s�^
�R�N,�!
��sc����o�U
�'�l�
sta�>po�8;�V�$�K�l�W��n�gi�a��
ck�+�N;�<���o&����
��
~�e�����}.�s���
���XML�cu���]e�K:�E�	�w�^��@#�#2t�M��	�D!�X�s��C sm�	�� �Ts��	���³�937�F>�Vxml2����d�
op��0�����&�S"���h���{sl�ۢ���i��w�4��at��&Dyn��+Fu��*�*���"/��.�W971�*�nf��>��B�$_�-_l�d()��il�@in�+4_���#id_�-rm�-387�^
�dw����fg80�":�x�/�Acmp_�oC�L986�Le1000e�D�;,�#.���_eep��J98ʗmt76�N�'Fe��c� u��%�C91�Ctc�ACl�-�
_sk(sk)->��!_r��šdis����955�TB�to�l�GMT:�� �#si�5UAFs�?��?i�"u/vt-��Dis�K��Aty�9C�if�oh����lk�	0058�Xce�_adap��:��}Gxa�YK�| �� �F�]18�f�p������'����:����?mp�����V�v�k+V�7LSB �?��i2�=�;+�H�oH�'l�C �-	�
�)(us���O&�RD-Bus �;v��o�$r�_�uD,�if���de�4�#o�kD�fk�xs�e��n	��+�/
�cgro��'�]��+���t�usnapsho��Wre��q��Pst��, �,�r�)�;�
�
��
�����
 �bo�It�Eal���+��y�����rol�0��zH�2���2,-i��:c�H�Yysv�����5-����:�8= ��� 	 �cl�(	����EIa SUI�M2�E���K �'�
F�K�\�n�/�Fm�?85�8��%KitGTK�	�%�9)�L�M?�'r�(3��L �:�w�Bp�������L��):�?�7/ WPE��0)�����b8���l!���W�=�1350���zgtk:�s��1�??�f�Oon�)�1�V�3-43000�hA�s��	�Gex�
t�Z�y��s�&�b339�P��h4�>�/h����D�}�r���Yr7�_r�_X30�T431�_�2�CrSaf��
�q4�^�40�_r3���i�����48�_�2��e�b1�-�9��I�U��ag-�-��j1394�_L�y�Ur6628�f,�cI�: j1939:�c NETDEV_UNREGISTER���~,�x�8!���-�et/mlx5��<����	��O�J��J7�.4�T2�.saf�0Gbu��-�=�ɦ�ESR 140.6,��W��
bi��Q��)146���&���!
�a0��1�/a��.�U043�?�OJIT m��_&�P �S�2�.��,�X�\1S���e���}��2�2�:nvas��G��1�x�
2��\�Y�Imon�U�N8�;N�D3�!2Requ�(�F�Y3��Ҩ�v2���p�5 �
�?y�9`p�<Tomc�e�{le������V����/��+P�(JSP��N��Vno��
/t�w: ����'r�V��Re�D��(v�v165���L��D.a�P.�/�-c�U
��a�oDi�W��o$���	r�t����(55752�Rub��)t�c:�ꢦt��=��=,����_!�has�7+to�
t�Y �R�ɢ��^��+��P�
@1�@:��,��Y�� ge�2�5�u
re�&�E�>����876�
Gr�na���Y,�� r�	3metr�9d�bo�Z���<�f\��"�)�InfluxDB�8�j=TSDB�d ��My�`���(�P,�th�ed�a�g1�o��st�4�b�M� �3 (mysqld��>m��4J�������K�|�>un��8ed�<(CPU O�t	���_05���HInno�E�#K44�7K62�7K5�8��VP�KO�xm��gr�%N0�NC��s�^�$?9�;�2���wi�m
ha�p�a�,>p� F a�(y�4�>gc�!�	���X�nt�	f�q'�
Uo�M�u��V�������BUn�ia�nPo����W���1349���7l��Q�TPM �f �9ly ���
�5boot��e�� i�wn�!�] �/��m�ur��o�
���: K�Regi��j�#ws�ot��4o���du�8�$�e r�5���60��hUl�'_�df��_mn�:&: �9��	"�L����CAP_SYS_ADMIN��r�1`�n�7&8�H�m�7&f�4&F�d�t"du�!�$#��"�*e�gor�&66�Ptl�wai�;�~;a�;�D�kJi��f�*_�Ap_msg_�yDd�3&�%O�b�LPHP���OG-�=d�l	��[�J	���&�+�[���Lph�C$pg�!�Ion�`2�Jck����ps������73��RNULL�Der����SOAP��-�q�6L�-���GRsp�cP�8�o�f6491�f�JH�D<�)R N��2Cha��O�u�t42�6�*�!�Pc�qP: ���zip�E��f Ce�xv�i(EOC�WL��o��cor�*f�a@�)�_�f82�������F���,k��N��+l�"5�h6i�:
t���6���	��ge�+�G� �`=���s���9�_v�W��#�B�_
t���#�
���b�\r�?t� ������(���:��>��Y���+�bng�8�v�a�	a�	mil�.g�b�Embl��)��f�^�g�F�����J
�P�/l�U��H�1r�nm�A��mb�Y�����7)�copy�ѡ	����-l�y�3��,Ŧ��k<� files), ranlib (for generating an index �the contents of�archive�@eadelf�Adisplay�Adeta�cd�G�m�Vo�6bout binary��size�>lis�}�psec�2��uobj� �)��C�Btr�7s�Ep�table�from�v�p��card�4symbol�and addr2lin���ver� �ess��to�R�/�*).  

Security Fix(�o:�  *��utils: GNU B�
 Linker heap-bas�7o�jflow (CVE-2025-11083)


F��more�es�X�7�xissue(��inclu�ݢ impact�� CVSS sc�G�
cknow��gm��o�/r��lat����fer���R�� pag�m�}�,�R�&enc�'��.
Python���fterpre�4,�a�'v����-orien�Rprogramm��langu�q, which��emodu��, cla��, excep�y��Ry high level dynamic data type��d���l. ��suppor���fa�թmany�7��m call�C�Ura���Js well��.v�ou��`ow�s�;s�7p��: Invalid �ue��OpenSSL API��y��use Buf���E-���(en NPN�wu�`�W4-5642)�ec�f��HTMLPars�Iquad�c�mplex���6069�C�Kzip�(E�Yf C��ral Dir��or�LEOCD) Locato�w���*fset not check��5-8291�u�lQʦi�;s.path.exp��v��()��th�r-��rol���p����75�wT�b�pp�y�:s�Vvide��c���u����-ities�
��ipula�(�code�~�ߥ���It��Kar�, g��f, l�nm��copy�dump��n�5���������CH��	��to���le������Oby��numb�ff�.ux, UNIX��simila�p�U������ nec�W��Qbo���!��cl�
�_er����o�6ssh:�?: C���Ka�ier������c��l�/�H��ex�\��via ProxyComm��� 1984)�rNul�o�n�// URI�(o��ҩ
�u�0y���u� ��>�6be���{�.�  applic������c�urn���	ha�20 poly1305�@�ba��5987�Mozilla�.�Eox�$��-source��b brow�q, ��ign�S�2st���[s�ia�[, p�G������Rab�y��f��: Use-aft�fre�xWebT�&s�KChil�193�'�@A�boIPC St�TmD�
coul�Origg�8�^�d�$B�鲐��f0�fUn�qec�cGC dur��RegExp�0il��H��K4�KC��kj���reg��rP�H�Kl�bfo�r�h�r�W5�Wthu��
rbird: Mem�	safe�bu�7
ix�"�136, T�5��ESR 128.8���'�Č8ŌJIT�ru��YWASM i32���
�`n 64-bit CPU�3�P�15.21�%�7ŠInc�����o��r���XSLT so�w�
o �5-of-�Ends��2��d�Q%00�$	 fak�l�ps�g�Ta jar:�L��ng�jh���
��	���u6���FKitGTK���%�A���l��re�ᢹeng�o
�:�w�B�H�����Lkitgtk:�
��d��
��r�Q	 m���D����4352�
�PP�fma�J�l�/r�ed�ҭ��G�a�	�����5��r01�^r3�`r5�_r6�CrSaf�
�q41��C�����	����bon��a Alma����;����	Te�W
t�h�	�gi�`b.�T/�\r-��	: E�Deni���TS�
i�2	��un�vr�\��Ԣ;��o�
���z�6815�kThi����'
m�����x�5domain��o�i��virtu�Xhos�^S��ifi����%���ACME���utom��c�g�5te�
�wi�C����
b�figure��
��d���.�oirĜ�n���at�Iewal�%�'_md��pac��HTTP�Me�_� (���uni��d�V�����H�5575�G��Large�0�FS��a�(LFS)�X��/l�!�bsu�`a����
�;��os,��q���rp����D�0	��N�8s�9����ior���7n�#r�t�U���R-lf���FS��w�*�ar�
�.���M���l���2662�.��[�;�el�m�֣��Qsgroup��W���40.�"��F46���
��443�����]
RTC: S�]al�����O2���R
mis�.i��SJavaSc�:t���
�
�X�8S��b��e�?p�
n�
ect ����di�x�m�yG�W��a�ns��GL�x��Priv��ge�z��Netm���N8�;N9�me�gin�*icy�,pas��Req�t ����ҨDOM�ko��kΰ�p�5 ��6y4�~httpd�{�3����pow�+ul��ff���������R�|�?CGI���on�J������r���6508���Q��Udir+������Al�FO�[�I�f�d6200�d���DI�P�s �_��t�o #��cmd=...�g58098�[V�j
�work C�Fu�0(VNC)�%�}�!��oa���r�iew�2c�G�Yktop�%�on�jo��ma�!ne�jre��vrun�K,�Jt�!�.� �5I�L	ne��!�l	de�����Y�!t��ur��Ti����u�	�-������X.Org: Xwayl�4��ro��
o�T2659�xo�Fx�F��SyncI�QT�g��H6�F�HP��Re���Ev���K0�K���'��Mze���
�Y��Redi��W� �Y599�YO��
�PC�cteP�aBar��rC���X8�X�� �i�kbC�T�!OfKey�M7�MH���KW���CSyms�G�XەVModMaskT��I�I k��l����a�4�H�!,����q�+#�����K:��PI:�lo��� NULL��der���-"�{3-5260�
�Mvsock/�io�����d�`�	�coc���W��vsk->t�v�i�O#0264�iHID:�: zero-�w�U��#�M�I302�I��: bcm:�# UAF���_�@_sh���92�Am�;�
9in�c_p��_bulk_noprofš3113�XALSA:�Cb-�Z��po����e��Extigy��M�Ode�#s�m���8.NET��6�Aftwa��fr�5��!���b�%���C�-�%��seve�P%n������	 CLR�Za���aN�2�-i�4�f�bthat��(���]vul�'*� ��n������2
. �upd�9�U�'�VSDK 9.0.104���Ru�"me�3.�dot�(�
E�
V���n�-InM�mr.����h�As����8&�+24070�jBug����Enh��:(�T�BZ#23497�"�8��1���4����^$xml2���d�,op�O
tool�����'���b)XML�`#�?	�{�EA�EF�E���l617��7St�.�)���
�$Sn�q/fE�����[�`9�~�+% �I	�d
��p2�Q���z%�$�D�sl��p*��
�d���V�V��o����a������$1,�Ģz�&�¢K��
���s�%�ll�,5�r)�8
�)���%tyl�"eet���me�%is�9�
��������-s.c�:85��v�*��ip�V- � ,�"���]���. s,�a��c��0n�E4��cur�py��*��%us������: s�� � ��MP4�����3d�O"���O"�7347�d�Gr�Q&na���!. �!., f�u��r�m�Q%�S!d�x&bo�����j! ed�k��#t�=�luxDB &�%SDB��go�%-jwt/�: �-go���8�^%ve�����T�-h�i4r par�-�0��"�9jinja�

J��	� b��k���t
gh��%tr���Xse�T7�a�����s751��'Expa�Z	C�\	�B�	d�����e�N���I�,Res�;���I�SE�?�C���.D�jh���F�h817�k�3��E0B�2Spoof�8�non-BMP�3i�T5�7�_9)�Y��3e�8�/�-or�S�0_
7�_
��K
9�=�K
9Ì30��GI��(�5;Ima�M�<P�)�| n���!��#si� �������V.�R�#�J�)�<m�^�,��
��Z�z�ay�a�A#��s,�S-p��l�W�9�&a�F-a���:c��A��,�"�P
mul�)�u�>�g��: �"�6RCE�3-4��t�2PSD�22�2psp �g�33�3�c?-by-�C�-�����AU�0�s7 ���lc���?���gBin�%�1ok��/��/��592�W��(Tomc�R�2let�f#e�!�A�I+�	)����Z+�%Pa�#(JSP) t�,no�7#�Ct�w:���-TOCTOU�2���Q����+��"7�	�GP�"�Q��/o�<�,�Ilos��c�
<��O�LPUT�E
48�"��kX�H�84-�����rA�i�s���[ex�@ra�*�?ross�U/�n4467�T��ϳ��H�5455�[:Loa�*�� ��i� �Z����s��.�5t�C�208һ�?M:�r�D<�M:�q���Xq3042�L�`
o�F
�,L�,��en�\i�:gob:��f3l��(De�zr.��6mes����bs�6�>7y�M���wu�x-�W9��a��n�w�&s��exh��34�:A �S8�j�l�5Flirp�uVPNK�8��t�p��Go��$s �JJ�bn�/�7��gVi��Ji�M����.�
�ypod�	-�/�o:�s.�0ar�C���lKv�c-t��J�+�'i�Qa����:�cDNS�ue���J
��}w�1Q���|.�4-/x/crypto/�bG�=�t�-���B��A�`28�zN��j�	-1.�	&-��jdk pa�+4�J�K&�	�A&E�1���*S�r'D�w$�����@��.et��TLS�'n���J�15�H�7��i�.
����6��O�:�t&�e/�@�fha�67�98�7�17��+���21������+��d[3��1�9of��=s �~Ss�fin�5cl�B��15���2&(�GetInheri�HNsL�P)�554�	�^|*��=�HQ��r�a=�� (UI) Mis�_�<�h��|�o5�.B�XI�D��I/tmp �:<���28�'B�QL�D#�?ha�d �v<��ede�<��Fү��g�hc��	���i#�(�/��POSIX �$�4�p�),�Amath�%m)�ۢin���c�dae�K(nscd��<�pl�BK�s���Wi�����8�q����{n�Z@fun�`
c�NFl��"�/:��2�a� C�g�'s �Tr�=03�=PHP�J�_-e��-d�	L��s���ly���&O�jC�xphp�����h�m?�'���`i�ysqln�`89���bS���`by��Aver��`��c�c.quot�X8�c-d���'�Y112�vI�ZC��a��xy����X��xt��Fght�E*�
CRL�=j�

�2��[s�h4�hH�V*��f���ewr�Zer�%'es�]C���|Zl���*��1217� �F���K��*�
?��omit����Nh�"�V7�rR�Vs�W��f������i�C[�?����\l��f��W
ml���lon�I�M-�����r�GI��r�Be��N�@�)�J�)t�Dca��O�J �,��1�γ{�86�\5�N(��J��U�s;�E8��n�
�+i�Fe �EY�-XP��-408�V�? �b���H�
"���:"�`�Oin���Ts�w�0�Z��5�8�10���10Î�ݎȍ�o�n3� F�5Rub�����N��t�n'�a',��
�has�4��&�&!��	��ɢ���B�nt��I�@%re����oS�=��RE�����99�"�6r��k-�E���V��Bhav�
�'�X���Vw�B5sp��, >]��]>��4�
���#46� 633��K�~P�m&e�6�(�
:U�i#�WT�P@�7220�:�M�FC�((.�n�@�
�����I%fo�h"�m�?�f#j�I,�	me�.�2�
+Ō�
389�m�?(�vLDAP��D 3�ZY�v3)��	t� �%��� ����L�}we��jA�AP�[�^)�R����-��k�}
�%dminist�/����-ds��B: n�i�K�q$�"��9��$��gA�٪Q�^��cust�)�POS ��fa�>1�XVM �1�3OST�P��i�%�BGu��Kos�R_���hood.�M�>[s�q�M���x
l�;,��]�o�\Glo�.�*�
�to�ud�e#����+)� �w2e��oli�Sckp�c[��$R�U:�eE�$��	�H�V�M�,�0lf-�8����;�����Z�Y= �m�-4������(el��T���E����6e-�i��e��:�u]��mLi�H3�'ro�8�8��539��\�!�0��0�0���:e��_ure bra�Dn���Qb�A��0�+F�H��j�����Us�0�֤��n�Nc�'�Xi��V�O�D[��e�W�]es�-e�\X���q���sM�*�{T-�N-mid�[�.i�6Y�fyH�d�)�)is�K,��>6465�A�"Z����(R�nt��s��g �����g���*a�519���?Eetailed information �changes� this release, see�e AlmaLinuxR� Not�/link�Mfrom�&Referenc�sec�].
T�rsync utility enabl�#�2user�	o copy and �*hronize fi�'locally or across a network. S�.��with�o��fast becaus��on�Jsend��dif�����qover��f�stead of�:ing whol��. ��i��lso��d a��mirror�:tool.  

Secur�-Fix(es):�  *�K: Pa��trav�$al vulnerab�an�r(CVE-2024-12087)�A--safe-����p�"bypas�V�Ыzp�e�N8�NRace Co��I��H��l��Symbolic L�q�K74��

F��mor�y���bout�ms�issue(s),�aclu�o� impact,�LCVSS sc�G,�know��gments,�Fo�/r��at��,�f��o�R���g�m��s�,����Ad���)C�7���֤��\_Kerbe��q��au�0ntic��sy��m,��ich can�Jr���w��your�Eb��limin�E��n�-e prac�_e��W�8d�A un��rypt�ө. It ��ows cli���er������e�ea���ڻ�ahelp��a��u���drd��rty,�"�#key��stribu�c�]�L(KDC)��krb5:��f���Ien �cul�ulog b�k s���5-24528�A��ugnut�Ip�	a�h��id�[GNU Transport Lay����(GnuTLS��brary��hle�M ��ograph��algor�tm���htocol��u�6��SSL, �R��D�	�Q��: �� I���uIneffic� DER Deco�
�G��tasn1 L��N�mo�!DoS�r243�AwA�3�"at�rs Abst��tax�R��On�ASN.1,�(specifi��eX.680 ITU-T��comm�P�:)��s�����ct�}s man�B�}�n�H�&uish�WEn�/Ru��(�C�yp���l90) e�"�=d�_fun��s����:��P�f������13�C��I��m�DNS �f� A/A��n��n�c����wa���'quest�nfig��d ��ol�.�z�$�����%���`src/b����/mod.rs`�j��s/a��vark-dn�MTCP Que���}
Flaw�eA�(�|Den�y�,S����y841�B�Py�xn�
��m	pre��,��D
v�jobj�2-���	�^�xmm�Zla�����t�od��,�>
�y
�exce���v�high��vel dynam���Y�+
ype�����l. ��sup�6�t��	a�թ��wy�N�	l�C�i���ewell��.v�ous�
ndow�̤;�_p��: c�URL�	��1e�qua��br�M�� doma������
093��A s�!�buil�.c�`om��d OS �`if�:s,�
VM�N�
�.OSTr����
i�%�.use�Os�S�d�5��ho�
 Bes�J�q�M����>�.it���cpload�*dir��ly�loud�gis��p�=b��<�o��-�|��c�pit-����
o��-fips/openssl: Me��y�ck���e�r�Q���t�RSA�/y���4394)�d/�/con�d��:�y: C�7�EP�E�a "// +�1"�K tag����deep�"ne��exp��	s�[�U�/a��n�Tu�{sta��exhaus����34158���
��� FIPS z�ed���o�;9355�E��q�P� B���Google's�C��� ��.�3�*�Fe�d�? ��yet�:t���R����a flex�,�8�"�om��me��ism�����iz�|ā���: m��a���f�c����2-1941�E�rpm-o�ҢNo�rbi�oge��;PM�תLm��l��y���
bo��yile���^s����a�a�ab�d�Ath�������n�-�I��W���-�:���t���_��p�	�|���6
�/�sroll�G���-��
 �
 �:s��ct_n��_��� af�f�A��89�Bk	B�������X.Org���-s�]c�+�c��f�BX W�J
�>���� bas�	�"
-�
�a��full-f�o����4�U��
a��signed�W�>�kxorg-x11-��: tig�	�heap-ba�!��	�"priv�rg�
s�����_�
632�A
�4: Xw��-� se-��-���-r�5 ��so�M
��65�2��: x�F���; InitTrig��()�H601�HPlay�dEv���K0�K��uninit��e�	o���Y�KRe����Y599�YOu�f-���Yw�ף�Cre�uP�aBar��rC�r�X8�XB���TXkb�oT�zOfKey�M7�MH�?�KW���C�L s�G6�%ەVModMaskT��I5�B����X �frunn�;X���W�2�6��"�r
�,r1��_�+��7��a�O�*�$, �G���=	s��3t��operat�g�<�n�	���: EXIF�ta�'P�vI�
g��O�;�4453)�EAV1 V�
o�AS�����L0444�Er�o�
)�p����Cl�&r�!g��&C API��� c�'softw���|:����'orf_to�|_�'an_��!t'�30472�E�����upda���	���GS���
�V�&U��-plug�+-g�,��c����a�-��e�/�<-in�|�@�e����LGPL lice��+�s͘�	OB-rea��qtdemux_��_����754���Q�hh�L/n�b�5_avi_subtitle�kgab2_chunk�l774�l�[wav�Qs��Q7�%Qadt�Q8�Q�Jds64�D5�DFOURCC_SMI_�P����
�M�	u��e��0 ha�%�`JPEG �h(�h�^l�~�NULL-�tder�mĄ9Մ�
A�
F���Mat�ka���P��l�Z83�&cue���
0��P4/MOV �=�CENC�O�=4�$h�/WebM�m�_����sa�����
.���
��J
���R#_cc_�_�?�>�o����'�����^���42� 4�&g�4_��9�
�-��
����:�3f�:��5��N����%�d �5l��k�=�.D3v2�r���������j��n��SSA ����i1�i�,�M_�Gnel_m�[��0�^�	%LRCӼ83�C�i�4r�F� Storag��LF�4r�%�l�!�:�r'a�X�%�h�*����se�G�
s�!!�K����� ���*�!t�:h�0!���o��r�1����&�J5/��4p�U&�@7�c�x&�kpo����shake�#�pQUIC��n�,�L3-3932�K�il�	o�8��8t�L��

�o�S2�S��8:�+l��:�=1���.'i��0n�loop�22�38�O/�ip�
n�|'e�5eh��or�)Is�c�!+�"IPv4�:pp�(�6 add�'es�j9���b[http:](�)�0����)��'��r�� 100-���e��M�E�k�z�p�'O��f
�r  �r �6�K�H�F�����<+�Yi�
2000�'�	��gjpe��h�I�zin�%/��$o�lor.�>5682��I��/�%2/j2k�H�Bc>R�|��nt�?��Oe�
��"�2����KitGTK�ۢ%�@�!��Yweb re���Ke��:�	�Bp�.����Lkitgtk:�1.��
mal��e�k1cr�d�v�O��#2�a�!C�
��5sh�
419�
�rA�i�s�
�[ex�����Z�>G��gi�1�A67�T��ϳ���T
��T
�V551�VLo�}��i��Z����scri�83t���D�Fһ�=��r9�CrSaf��q16�Zq��K	��4ah��S+a�Tol���D�
&a�c�|6OCI�����_6. A��
g���ngs,�c��J�FG�\:��$�i�t�R�N�i�B��sc���ur�.��n�a���{5r���;�V�$�K�l�W���B6u�Li��Do�h9r�;�<"�.6��0����
��
go-jo��o JOSE�Q4�"V�w'l�u��?��71�"
389�C�7'�8��F�n	LDAP�	�t7 3���v3) �l'l�!t �^����^�d	�wL�D	twe��jAc��5�^)�R���s2�Le�Lie�j�%dminis�=������-d�]nu�c	�]��z	d��	�wsk�
o�i���
�ins�{�N���e�{g�z�
ge�+�G� l��H���`
��/a�Fto���d�cify�N���
x���G�i�7x�:P����HTTP��p�J,�la�Tcu�:�����p�sJ��5a�}����m�<<��<�����n<�&ru��O��ngx_�_mp4_�
��2-417��H�#M�:=s��M�H2�H��H�Q����L��2�4-734�Gr�^	na���, fe�� r�7��r�d�	boar�� e�\
��G��t�=InfluxDB & �TSDB���jwt/�: ����O��J
v�y��c�
du�!
he�&�"�+
204�i�&@a�!Pe��Hvi��rol�`���L"en�"�4/a�2=���<�'
�qS�	:�u�'��Ss�T�1��0�Iel, ��en���:�Q��	p�Qa�'�/os�4y�xexact�$�@le�!��his�/�n�2no�,l�w�C�C6���>o��=�En�)���)�Ǯ�ne��have��mis�p�/us�;���ir���G$����	bu�0Rs��k�	��s�Q>ȥ��no�R���D��gi����'b�a�A�Np���0'�/�ݢzt���in�A��J5� �Jxsl�$�Pt�dQ�d��XML�G�g�'
�ua�k
�����HTML,�e�z�&�¢K���e�,9� ���ly�A��)���-
�>O�CXSLT�
y��heet�����L@�9���\&���(�GetInheri�HNsL�P)�5549��
GIMP�@S�^SI�
M�Ep�U�UP�)�z�
�?i� �������K.�R����<m�^�box��	!�"�$�J	�"e�D�Fb-pixel�W�9�&a��-a�s
�?�:c�/�E,��Hmul�)�u�3�
Cm��d����RCE�3-444�"�2PSD�22�2psp�l�%�33�3�f-by-one�-��PHP���d-embedd�3�N�����l�ued�GBAp�ee�����ph�ZH�(	��f �:�#�p��r��Je�g�g�l���d	��J�S��\S�F���K�	���m�o�� b�0>�DY�"�V736�Vs�W��f������� inv�7d�K��n��l���f4�f�/ml�s�wr�N�-����""�sR�� r�8e�uR���)9�)t�:ca�H�J ��
�c1��U��V861�V�i��un�<n�_��_shut�R�"s�6�1123���
_�h_��id�}_�w�ID�2^�x	�\�G�X�hI��
�O�J�!�����&�n�:� P�
\�/�iO�
U 2.0��B���	���:���-OIDCP��r�lR�M��# P�F��
l�L�-����u314���.h�k%�s�����s�yr�P�1S�1��PDF�cu��.�P��	��s�4�Jt�|o�"tm�O"�}
s��a�C�)��G�
p�5d�/pr�R��>g��:��ng�1%�<=gdev�n�#_�Sr_��k���<�t67�.�V��9�U��X�{���O���g46952�YAr���C�Ex�滘in���Oex�j�}ern�-l� Sp�
b�eʿ�T�db��v�_,��l�
UTF-8��Z�`4�`�&c�[�0�Ϣ_�b;Ń�g3�g��>B��+D���h�J�rX���`�l6��k�el p���4��:�!�a����!��n�!�z�K�0o_u�3/sqp�m.:�u(�BTd->th�3-��ctx�4���T3��Mso��q�6�
��&void ��o�IL�[.��numb�;��58007�Ztpm:�!�dkv�b()�We�A�Ab/acpi��&8�;�Hrt��pcf85063:�lx�q�V]�).��'�PCF�$ NVMEM���Z69�Znvme-tcp�U��`�,_�,_����du��@� ��Usi_ibf�LF�_UBSAN shif�X�K/ar�*Di�h�._�xr�W	ow_�;,�f93�?�pU��N�k.js��>@ d�op�~��$�l�-k���*G���Nhppl�s�zJava�m	�(�Mc-ar�&&���2����F�_��	w����8�6x�8�C���Jem�o��E�
$NDEC VT����Tekt�mx 4014��^��y�V��'�3�nw�l��������:�Ye�	OSC 50�pu�� �
����H���Mozilla��Eo�G��P�Tbr��	$�O����?�"�-�(��(��J�.f��:���b�k�;&�K�Ҧ�U�B�h8��QUn�jn ��a��tX��s4�nΨ�'iso���n��"j��"�K^I �!*���(�`(s�w3�w�	�өTbugs�	���$138,�'�5��ESR 128.10���(�Î�M3ݎȍ�o�n�f�L��n�$v�d��m-�Zu����oft�Mfer��r�u-�'���!ince�I�]�����'ha�P����	�g7s�jC�. �\����Q���s-���9. Y�%$�wp�st�{	��'by�Om�
/��2�ΡZk�Gry o��i��'��7��/�9��o�;�$�
 �{�Fr��:���i�$�EO�J6un�i7e� owth�"
�P�����a�bby�,��od�X��6�7Y�pi�E�p���GNOME�ktop���to�5�;&�9�������q�i�e�x  �8�ra�/m�l��� fo���a�X�F�Z�*��Hk�4y���f�#���	5���9j�$L�O�#�����-"h�N:t�(zugh��b�YAmysql����n92��ingle���9�8���HO.quo�-���B-��H��N�3�ZC�*o�}�k*���̣�xt�s���&CRLF�(j�}�2�s�h��2�ز�JSQL�$�NI��>��72�_N�1�C�, a CVSS score�
cknowledgments�nd other related information,�f�to �"�HE page(s) lis�,�R�&ences sec�:.
Mozilla Thunderbir�/s��st�ualone mail��newsgroup cli��.  

Security Fix(es):�  *�s�R: Us��Interface (UI) Misrepres�J�� of attach�� URL (��-2025-3523)�XI�	 Disclosure�I/tmp dir��ory�ing�Q2830�QLeak�?hash�=Window cred��ials via�af�\ү2)


For mo��det�H�[bout��s�:issu��,��clud��� impact�iT�libs��p�x�9s provide�w HTTP�
����v�l�2ra�tf��GNOME�*�a��teg�?ov�(l�v��append_param_quo���f205�ŧEHeap buff�Isniff_un�>n()�E2�Es�Ffeed_or_html�K��kip_insig�!icant_sp���j3�jO��q�nds��ad�h�_h�
ers��se_request�Q906�QDen���T��ice�O��when���O��larg��m������l�|��ran��with R� ��Ņ7ƅouble fre����mess�E��get_co���-disposi�{��th�kgh "�7-�7-�7.c"��"�s" GH��Ta�ovalueĚ11ŚNULL poi� der���wݧ�M"filename" ��e�Ui�)��,�Gt�P no���fC�M-D�M�V1�.��d��ma���;����se�VAuthoriz�7�h�a�Cf����ost��be��e�@�rby��A��4642�ZMem�p�G����qual�_���ƫ���`0�GAvahi�Yn��le�r���6DNS S�����~y��Mult�M���#spec�]�<s�aZero�Mfigur�TNetwork�. It �ti�r�Ӣ��dd�don��oc�0n�7. ���~�	-aware�l�zal�Wyou�plug�r compu��n�]�R�K,�A�c­,�ew�zpeop��t�#hat�0�pr��s�n����fi�hare�l��Y�P��s��a��:��W��-A��rP�ct�[T�
sa�� IDs��4-52616�Redis��adva�d key-�st���Sis��t�*�m�x���Idata-struct��4si�^�Is c�[�Ka�ltr�����o	����se��sor���. �\p���O, ���a��an�.����9. Y���wp�	is��t ei�Bb�&um����2�ΡZk e�$�a��`, o�9��;e�
�lm����log�sr��:��DoS Vulnerab�����unlimi��|w���utp�S��aus�unauthent�����
1605�Vim (Vi IM�
ed)��upd�h�z��� v���jvi �q����vim: �W-��r-����fun����	_�\l�exp��4/v���p3-47�Z
�oExpa����������XML docu����e�N: �I��p��Re��^���SE�ʡC�n��Dep����F�817��t
G�	scrip�	u���0s ut�ie�re���P�1S�1��PDF��Pt����s�4cod�w��o�
itm�
�ӡ���a�C�)�Lb�Fplayed��d�����PDL���:��m�1���
�783�Q.NET�P�1�6d-s�O�f	f�B�	�h�/
�+sub����C�- APIs�2���	w���it�e��LR�
��N�2�/s�f�b��add�����]v���n���J	il�-	. ����U�'�VSDK 8.0.116���Ru��me�6.�Fdot�Z
:�4�=Visu��St��o Spoof���S�F6646�F9�-0�F�5�E�`xdg-�[s���V�'s�� �s���basic �kto�	����,	�an���F	D�*�'��:��	� �@�����UR���s�
pas�l���|me�Pnism�����
2-405�G���ope�r�-
fea�
�d	h ��s��shboar�5��ph� ���,�xluxDB & O�UTSDB���	�g����ross-s���n�.(XSS)�ʦ��
Cu�cm�'����Y����u�.
��%1��kernel��s�&�4Linux�!,�����X��%a�\sy�pm�b�K: vsock: Keep�Wbi���Cl ��d�u��O75�}�Mdm-fla��:�p ���rup�=i���	�h�_bio_byte���b96�b�ppp�dd�8�/eck����skb��on�'_sync_txmu�v�Y37749�8�SSL�Aolki�s��pp�A��˲6m���b�e�Xm�ines�o�;�5�\��only����r���1.��E�9�;d���=���T��viou��@s���	���ss�X.400�[typ��fu�{�;X.509 Ge��lNam�_3-028��WebKitGTK�f�%����	��web �2engi���:�w�Bp�����}�L�jgtk���=�������exf�rate��c��gi�E312��TProc����]ly�{�������n�e�S�Zri�4sh�q57��Fi�Eox��-���%br� 	er,����~��rd�em���P�]���;���f����-of-�s����V��olv�>P�&i��	bj��s��918)�P�Gmiz�Ql��ar��m�M������G��-r�Z��`��`����6����784����k�$�D�w�t�B��JOOB�9ad���(�@��I_m�O�Ht_��_���"����#��Sto�B�Jexi�Yp�Ú91���� U�u� ԉ�L�v��o�'i����48��Py�n������4,�a�'ve,�7�Ie�r��g�m�	� u�q,�c�,�modul�dcl�*�exce�
s,�y hi�1l�l dy������R���i�_���g	�!��$�4m�� c��C�.	,�2well��.v��C�v$�̤;�	�
nado: T��4�Z�1m-D���F�;728��gB
�s����8���0�,�Wa�M&gmax �l#�
��4�St�7me�
#�R(�
��m�a�pba���{���5
�������D$�;���g�Ver1-p�)-bad��a�
ll����1-�� �����&:�
 H265�dec P�S��-��B�JO�R��΢0���i���c38��
�)C�bkja�D�could� ve le�d��$�#a�apay�A��rd����"�'�yPo�,	��#�`e��V?Copy�#c�f*?��g �b4�b�%safe��bugş8�<�!e���!�7�ed��
����st���c6�cErr��h��l�W���v�wa�^�2�Vl��o���t��w3��;�<�cUs���=!�i��u_s�J)xt_�l��
��ni�(2-342����&�! RCU�_t���g�_�c_��0+2�% �^Var��h Cac�����
-���/l����"It��%s�.�n�k,m�o��r
s�n'�*v� re���A�@����g�X, giv�+���7��(��u�v��: �, smugg�"�,��79��$N�.j�' ��d�op���&buil��f�$*��s�D���|)�)�zJ�`���<
��n��j�&����S���%)its::D�fveB�(�����31��_��;o�:��P�4Go�c�
i�M����/[http:](�)�����)�pt��rinv�����2ed�|���Q�I��1��@�6��	�>��]���Z�ŠF�CGI P�q6�{ ��p�*-fcgi�s�:�&0.44 �0.82,���Z���
�=�.6�.���\2 (aka�
���L�0��6�'��!gs�fi�Cwn��hi�H/__udp_��.��192�"v�:���ce �=ly�de��� �A0�Axsk���v�:xp_�
_a�:as��_u�7
�[997���Xg�} ve���ng��.�g�H2�&�H�/4�I�����9�"��(���<�H��"8�Hw�
:�>
h12����u�m�in�"_��rx_h_�Vcap_n�@�b94�%g��c�
��1��"(�/��POSIX �w���p�),�Amath�%m)�ۢin�]�7c��dae�/(nsc��2��3�@�\�
�6����Wi������u���nn�;�+�����/:�L���uid���(dl�{(�!�s���LD_LIBRARY_PATH�V80��/�x�)���17���17�P/����0399�7�1�7�6�6ModS���) �
r��*de�����%+en���)�"�^�6���#��c��H��Po��
�
�<��	���B �1�`�	Co-Pilo�p����< ���se�
-pm�
����=��>�PCP��bpftr�I�c3�>da�,�,$��7����get��bnx�2��esiz��mb-xdp-��4cas�"11��
B�A�0�OL2CAP��
s��-��>�7)i�2��
�-F_cmd�]9�]��$���$3��cfg�
11:�c��wiphy_�3$ef�r���c��S7Ų���UUAF���?i����>md�<md�R uaf��it���m_�s�c�1�smb:��Ô�ary�!�1��
�6���77�J�$
��L�xJF�KS��ag��LF�6�Nl�F)�J��Esuch�fDu�9�p��)�os,��:Dg�4
c�D�p ��I��s����,����f���Ua�����;k�Dvpx�vVP8�Y
��+��9�en��xn����K�6��c,�o�4�<��'�2M�d�Y(��er���������L�(D�ԣ�e�5�yP�C�,N���QCN��Q���@�Vsis�Jf�q��J�����
ri�Q�)c�3J�n�n�k-���x�����=g�H numb�f�-ed�a. ���:c�s �elf��6�J�p�!n�v���I�l���#�?�y$�p�p��O�cis��l��.�8���podman �
9�s�s,�|m�������J�</�L��o��y�V0��>�!�Z�&�f�v.�*��)�npt��Kub�t�
�8�skop��le��N���8��j
� �/i�H�#ge�+�G� �F�end������.4�.'�v�fy��<��J%ah�;�:�^�����P���{%OCI��Pm�1��thi�N�c��Sb�
��P��@���~N�R�N,�\N�Xsc�!��0r u�
n�A�/O�<r���
;�V�$�K�l�W��n�?���ck�%�|;�0il�0?������
��6�A ��j��l�7lirp�uVPNK�{���FQi��Go��3�b�s� 9�PgVis��+�4Ka�~Q�`�v�-tap-��A�X1���t�zS���QT�_9����6�0@w�Vi��6�9�GIMP (GNU�N�M��.pul�P����P�%�s(�!X����/�,.�R��0�<m�^�box��[����)��e�4c��-pix�)�W���t�V�3��:�`�,���-�X9u��8�Sg��:��8le�\�G0�\
XCF�	se�X879�&&�@h��[TGA�G7�G�_ICO���5��;��5��
47��
Alma�S
I�^��M�K��(IdM�� centr�zed �T��i�:m�:���(�Z�('�B'�(��Q���%F�Wloud�P7e�
�mPs�vi�+H�
�T�;IPA:����SPr��
leg�A��|�b�[�1doma�@dmi�F�?�(40�H2�g��Q�Dd��i�_*�+V�
e�p)p�+#�18�=�Esc�a/fair�Lp�*�zHch�	_cfs_rq_on�\�`�+��bmv�4��4�)help���hex�BX�&/21��F�%of� ,y-��,��in�m_spliÊ31��`�C�g��x�3r�st �*K�9�3�@X.Org�
�):i���X�cS��I�I� �N����$a���full�J��e�>al���\�l��1�:upon��xorg-x11-�k	-Xwayl�7:�:�?g�	nc�H.B�H.�X�	��(��Exte�WAnim�zCur�	�T.7�'�"�����Big��	s���t6�(tUn�?����D�S
D�I
By�V�I��{8�0��)�u��d���9�<a�p�, Ro�_�e�#�> (R�
R)�y8�Virt�S�W��u�4PVNC�v��X��(�'���XC�B`��Gd�R�? �)��o���M�re�p#�Lunn��
��c�ny� �5�ne��5���v��t�7�Y�
)i��!�5�`#�����Y�-��7��7s�=t�bl�0���
�a�^��GOb���%o�Q��rQ�i��r�e�(�i �0����^��s� ��'�kbr�1��R��O����,LVM, Btrf�?LUKS�bMD RAID����G"PE���\_act��$�kro�%�<�Y:u�@c�60�M�>'_�_�
idc�
�-ID���&��4u�T Ap��/�?S���
�ban�!���@�9�nRe��2P�P�<h/o���i 2.0���?�p�
�����S��Emp�/��0T�&�	�OIDCPre��P�PE���89��K�7e�������8�:ai�d�����Ci�Eby��8imin�Z��n�-����H�%� �&wo�'G�A�/�Ji�Sn�\$�� 
�'	�Q�(�,���Lf���f�H�A!�	��&�.�r�r:r��"�#�X�	�Tb���9�L(KDC)�3rb5:�IRC4-HMAC-MD�yI�5�L;�*�r�M�UO��]�ţ8�Ji��5�Ed��`
v�!4��>�c�i��4�V*�n�K�K��s�������^pio��ISO �Y0 CD-ROM���L��is�#no�Vy��bsdtar��d���1\�?�%:��p�O-�񤄦�po���o���#��
l�R:��K�1/����P�iV�F�Qip�"`�(�[����#�Ji�S'����?Q�
|�o��=�k��
Time���u���uin���o�
7�P>���xy_��s�L�e���.�E�S��as�
a�cl�r�N
�%dž:ə�l����MC�T�t��4-1030��E���pow��ul�!��`�b�Fn�g&-�i���*�l����{A��J8���&(el�)�袪��-����e-�]C��e��:�	�j�C�	B�XL�r��ro �k�,�(q3�{=��Q�
��G�y_�k�G��3��qt5���D�G��
�q, xml����	�B�3Q�*�	��n:�6:�*C�nAs��	��F�v�K
�	V54�e�Edg�� �

�M�X (PA�����Lto �7up��po�^e�Z.�n��L�W�&H�v	�L��e�H�
{�\��1m:�g�
��|�I����b�0w s����%�;�=OS �6%fa� �
V�g
����/ �'i�%�)�
s�S�)B��hoo�+B��l�q�M���Fu�I,��>�~o��6�*���co���#��ble�<
��!e;#r-cli and cockpit-composer �ents.  

Security Fix(es):�  * net/[http:](�) Request smuggling due to acceptance of invali�whunked data��Q�I (CVE-2025-22871)


For more details about the s��issue(s),�Lclud��� impact, a CVSS sc�G,��knowledgm��,�
o�/r relat��information,�f��̢R�� pag�m lis�,�R�&e��s���:.
Comm�^�e util���Jcontrol osbuild��5xT��bc p�v�7s provide��t�{ard C �$rari� (�/��POSIX�&read�p��$�A��h�%m)�ۢinam�0rvi��cache�}emon (nscd) us��by multiple��grams o��sy��m. With��se�q,�$Linux�*�fnnot fun� �~r�ly���/: V�*o��g�fr overw�0e bug�t�W�25702�1kernel�2��a�4�a�!�s���]any�oper���Ӯ��	o�K: Squashfs: fix h��ɢ�san�9�5ck��mxattr_id��unt��3-52933�sudo����Iwhich allows��admin�e��ors����cer�Fu��s wi���Q��m�
�(�,ex�!t��ivileg��c�����ore��f�g�u� ��� pur���.��hav�^o lo�Aas root���: LPE via ho��op���z3246�{Open Virtual M�(�2Too�ˡע;o�"sourc��l�o�~��!VMw�,�6. �Vy�<a�kt�#g�-��`�viz�L�n���Tat enh�I�6���
�H�0�ie�i�I���s.��

*��-vm-t��:A�/licious a�}��non-��iv��a���u (VM)��jampe�M�loc�&f�As��rigg�in�$e��on�$���VM.�'247)�x��bl�dev�����Wy�}ppor�$GObj�1�H�	sp�<��m�pul���L �Mice�I���Vplugin-ba�5ar��t�E�pwhe�eac��echno�!y�Dk�qVM, Btrf�MD RAID, Swap,...)������para��q, �sibly��c�=�e.g.�Ϣ�v CLI or�7new�DB��API)���L: D�
�@w���hnt�_ct��sks�	�� "��_ac��"�io���oy be�ll�=s�Ԣ�pfull�[�)�etarget�I��6019��B�~t����coll����in���3�0
��ar (��c��
��,�dify�ext���from��ve�a�5a fami�]�fGNU�sem��r� g�wf�^��pla�Uca����
ph ��o��/ld (�ߢH�	�	�nm�A��mb���o�����+�copy�ѡ	�š�nsl���3dumpǦ��k�Q�Ӥ6gen�O��index�����H�'
�?�@�Fel��}����Ȧ�size����2��u���)��C�B�ngs�Epri��X���v��/c�
��nd�	dr2l���nve�K�ess�~���/�*)�
	b��:���L�( heap�^�f�;��1108�Poppl���Por��Docu�w
F�e (PDF) �<der����,�ha�Eic�su��
s Evi�m��p�: Out-of-B��R�&�����
365�wM�gaDB�w�B-�,���CSQL���� ���q�9	�8���Y
�����My�4�u�	vm�~db: ��:�-��
vul��Z��r�I�code����H�Or��	 p���d�/3699�U����Ja��"�(s������	��sNetwork G��ics�tNG)��c�C���/�P����
IB�?�^f����64720)�3��85018�8o��b������!_��_�_���R6�f�/�ysq�High P�
 Denial��S�1V�ռ�У\��j2149�!�/�,Cr�e�Emp�OB�q��	�k��I69�M�2�7�2�I��_di�_view_���K�̬'���n�
ifi��v�(CPU Apr �)�0722�NI����"K6���������UN�iP�p
��S��
(CUPS)��?�xp�*�-���y,�I��si�ar�����t:�� d������cupsd.�Af upd�p�n��os�(1915�*�9����b�Sun�	 l�k������	S ��a�P�S58436���p���HTTP�)���@���GNOME�^�a:�Du�
e H�NH��r Ha�qCau��-Par�
D��r�Unc�Fir� v�wa�Val�MW�=�"1452��ah������fac���i�0�OCI�k	er�	�A��g���Xg�¦cen��s you�\:�-e�b �i	�R�N, ei�B���at�������	�zs���o�:;�V�$�K�l�W��n�u�,
�F
D���v	�; B�� both����
��
�golang.org/x/crypto/ssh/ag��:�SSH�2pa�Y�	un�c��"_AGENT_SUCCE�W�4791��c�HID:�<
to�T���ub�j�s�<mt_�Y��_�*up(�g9806)�`a�gt�V��� ���_d�y_�L�X40�Xmm/me��y-f����dVM_BUG_ON_P�4(P�KPois�d(��))�n�`p� �D�k�w�ksctp��vo� NULL der�ǤN� � ���i�ng�02���q�c�3P�gre����������: t�b"n��
�E�I�
�p�0�+��u�N�S�r�>,�
���Ew�
ar���
28��podman���s��x������
is p���Wo�_"��i���nu�~�f�v.�D����#�#��Kub�ut�
��1w�b��n��v�'d�|-�q�+�]�N�4 ��(DBMS�	�CREATE STATISTICS do���#�3"� �
ma�+p�m�7)�����vsftpd����SVe�
��e���mT�"�mProtoc��(FTP)� ��E���H	���x�Tn����:����j����i�$���N,��!me�)p��424�&Mozilla Fi�Eox���6%�&web br�
��0igne�'�+�0�H	��,�%���U���f����po� ng�7��Downlo�Pa�x�>&�32���MUse-af��-fre�MJavaSc�c�[	GC�L6-0885�Kth��bir�SM�
safe���+s��
�p�OESR 140.7,�&'�;��)147�.�&�91ŏS�1b�<�#pe�
�d�, ��<ndi���T:��.sWebGL�78�SIP�H2�� Eng�� �N4�NI��.!los�s�V�G�Q�O3�OM�+g�Nbypas�5DOM: ���-����JC�I#&��s��Drag�D��^��^C��kja�,�b�g�	� �*ew�6����/h�-9�j��]8�,I�0�8��I-snm�v�b�%+�6�p1���E+�s%Si��(�M�	��SNMP��\����&en�a��,�hr�y3�:�qet�
���Q�S�<s�=�2&d��/�.t��c v�	o��,�sta�;�5���7��a Tk/Perl��B��
(MIB)�=����:�f ��`�B�b
y �f�ݪ�et�2��a�sh���I���q
686�(��&��a�-Gu�4(GnuPG�#GP�""s���;�B�O�������~"dig�Vl ��a�,,s,����t�i �3/PGP�7S/MIME�����:����Vpo�(�
a�t�����.4��97��g������5�mediat���t��GPS�,nso�)��>�c��1��u��by�U�r USB �'-fa�
ma�Bt�#-ta��,��
/c�se/ve��B�0�x�il� �4-�r�� �ETCP� 29��	�6�E1 Alma�b6�/�l���i�mi��.�e <�X8s://�.�B.�Z/�F/po�#y/�Y-�>�[�%���;:��@#��_1�e�uAVCOM��?
672�"�YA�	��~*��SNMEA2000�w���x�x�c�drm/xe�#k�;ma-f���4�G�
��ru���3870�m��#��:�!t �	v_done��//��_off�,�length�ir����3�['��q9�7��vmwgf�
V�$�s�h� �.aga� SVGA_CMD_MAX_DATASIZE�c�/��cusb�hwc3:�R �&�r
�(twe��Purr�F�+_�$v�(�s�\��/�h�"828�ol�6:ep��Wu�q
�/7e_�W_��_osd_ma��\�1I��	(�7I� M�R4P���6�� �s����e��ng�.�R�!l�2�<�4����chan���6�c�n%s�,!�
c�sub-p�Sl�W�9�&an�:)a�k�S�:c�/s�I, �(�4-level�o��i�~
��:�H�@'C�E�PNM �Q0���
�@144�(�\JP2�\���~+�f5�fXCF ��~$�A�F��Z4�Zs�J&ͱ��LB�=�j�"����V�4G�)<�Bm���(u�oi��0���x509�2��ex�z�3����c�!um��;���M
c�93f�&�172�
*���[�`��l�am�֣��8sgr�3(��|�j�n-17-�jdk�d�JDK 17�� Ru�2
me����@on����+Soft��AD�7
op�,Ki��A:�[���MX��n��s�219�	�1H���2�lI��=�
�=E�1BC�C��E�64�t��R6

B��G�%W��)�?- P11�NretK�?C���,���s�on�FI��m�r
���PKCS11��r�X-uld �`*���KR_ATTRIBUTE_VALUE_IN�ID erro�zis�?@s���]defa�=��figu��;!�4'�C=��KA_ENCRYPT=�-e�K1rib��E�Hkey���I��i�U+�1se���1��xe�"�R�N@���862, �81��#3�4�5�6�7��X�21�^��^�+�^0��76�7�8�9�(�S/�.8.0��8�/�*�.�366�7�8��.7�1�2�3�4�5��5���+�5p�eGL�vJ�R�#6�>�04 �;�rM�p$�/%�^4�te�jC�4�]�@J��.�-�-�=�d��� �ei�YN,�n��Q�A�vE�lJ�0c�@�� �p;�"�$������g_�_�;_�i�P�YA0�X�\�=i��b��"go-jo�#�v�W�4:�rJOSE�(�JSON W��.E��(JWE)���R349�OG���( ���/�U, fe�' r�(�1r�Yd�^(bo�o'���^P���or�t�=��lux�E&�_TSDB�
���:�D������0�����`��publ�9���{7���_dk� �2�	���w���k+ �>'�.*�&�s+�xI�'�'�&���#���T�F���\;��N��k�*'��NGTK+��.tt�
���:���� ��>�������)+JPEG���52���Y�-Co�O(��(VNC�+�
I�R�_��>�K�K)�'J�2c�G��kt�qe�;�x
on�T���Y�fWi�'run�9��t�Bny� �5�D�8=��d��v�B	t�_)�Y��Ws�
i�}���su�'�-��z?�T�hcx�r=: x�?Wl�3: X.Org X�H������	XKB�9a�L�|	m�,��3�&�B�~�t�@K��H�G�.���%�/B�Au��\��0�ڇ��r>�,d�Z7o�)���
(����ҡ�0vnc�v�����(�|%,Ѣi�U�%�^Ĝ35��7Py�_n����,pre�4,�ac�Y,�;or�2ed�S�#�9�s�1,�i�Xs,�r#�es,�)y h�{O�&dy�,E�t�%yp�&
��in�[���,�L
�-��m�*���)�C�x
,�well�����2wi�&w����Lp��:����,o��]���b�t)de� re�	a�q�t610�w��cߋ��
�*in�΢�t��9�2��	�
�a\�t47��
��:�|$�� L�C�� �NSS�&77�#�i�)�#6754�[�
#�<&�XNML�Z6Ӷ� �
RT��$���_O�y÷S��c�{de�&DB�Y�+Sι�i�K�c�q:��A�]yμ7���+6�W�'1��'��'50�,�'�‘�o�J3�Wid�`��coa�W9� WҨ4�
���Gini��	�0d�c	�t�)(2D΀9�.����
��W�hb��`�(�Z1�
��(�.�R�Z�
Iҵ���)^�U�
ZU��A�o/V�5
o�f�.�'��8�215.35,�G��+�'�)���
'���fDe�E��
�<4� ������t�cl�_�
*�	�Debu�h�X���6�5�/��^:�$7�
����4�>��'�"�url�R�k�Un�e�^���8i�k]�y5exh�B�j�Q5��b4�9c�a�
��n��i�_ly�P���I�K
�|���H�]���]�0`���mb�	g�\B�g�jfo�0���=]re�_a��s®��!441�6�V	B7jection in webbrowser.open() API (CVE-2026-4786)


For more details about the security issue(s),�Xcluding� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fforma��,�f�to�R�� pag�m lis�,�R�&ences���:.
LibRaw����library fo�ha��RAW fil�3ob��n�Nfrom digital pho�xcameras�RW/CR2, NEF,�<�DNG��s).  

S�Fix(es):�  * ��:�Arbit��code ex�8��via��speciall�raf��malicious���24450)�dheap-bas�[buf�ioverflow�Xloss�s JPEG�
�5�u1413�&Xwayl�_�(n X �v�M�*unn��X cli�� und�W�2��xorg: x�^: X.Or�J�_: Deni�fof S�ice��integ�b�h��XKB���*tibil�lmap h�Vl�33999)�~Use-�Wr-fre�{uln��^l�#s�P�c�h��pot���me��Wrrup�S��4001܇I����posu�I�id��*��Y-of-�an����acc�����+���-sourc��le�~�6�"�BX Wind�1Sy�Ym. It provides� ��ic �S-level fun�ia��that�ll-f�ݡ�graphic��us�ò�rfa��a�Qsig�5up���M
T�kernel p�w�8s�on��4Linux�!,����2any��Br����s�!�	��K:�Y�+�}de����p��due��rac��ndi�͡&zone�por����5-38�H)�r�{�q��ntpoll�E349�Edrm/xe:�� vm_b�_ioctl doub�A�ObuČ73ь: vsock�"ma�&���
5-40248�\mptcp:��x�2�_schedule_work�
�O5�OĬO�!w��?Blueto�� MGMT��	n����
scl�	�É94ĉnet: at��tic��fra�)�f	���RX ��h�U6830���: hci_��: Pr��A�I�et��t��������a5�P�Kit��D-Bu��stra�lay�]���S���ss�����an�F�`�sa��e w��us��a��-di�_ib�O,�arch�qct�2�U
�b��:���a������st�Ҵ��r��41651��Vim (Vi IM��ed)�	upd�h�z��� v�
�
�	vi e�Uor��vim:�_�dm�U�2
m�E
lin�3�box bypa�o982�o�5tiff�p�P�b�E
s�2
�3ipu����Tag�G
Im��F�F�� (TIFF)�~����:���or�(	�
�O
�����N�;c��D
4775��sudo�9	��A�hw��h�"�%	 admin��a�C��U cer�F�?�_i��Q�	mi�Y�,���`iv�h��[���o�Yu��A�u��.pur�e�.�b�xhav�^o���<��K��: S�P�� es�����	f����Wp�&drop c���553� f�-�3���(��a��ll�B�^cript����r�	��ower��$��s��-��sy�h�oed��un�cha�
no�o be�Acib�re��r���p����ݥe��	url�M3:�Un�#
e��	�]r���in�}��exha�i�"�L	641�
�a St��m�$�j��%�Ы<��highl�u�|��ata�]71�]�,l�����
mb�feguard�when�U�~��HTTP��dir���s®�r����c�6�get��zs�POSIX.1���|��� 6)��
 15 �M�	i���,:����TOCTOU�
�6_��_�(�4878�O��SSH��	�	�,to��sup�Ne�ա�numb��f�, UNIX��simila��s�$��l�B�8�ne��bo������+����6:���scp �acy����no��e������
�385)�q�����
is��.u�brized_key��ipals�=���k414�k���J�cun�	�rcrypto�l�gor��m��6
��7�mL��	��	�ݳ���
onfi��d�Mxy-�1multi�Nx�
�,s�m8�m�
�&shel�t����	�(	n�Q�g�m�Bc��:�2����k���l��{
�d�n�j���ü_s�var��s���, F��eLDAP������C���x��8�1��ooki��90��q�&�U`��	��eph OSD�v�G�t�.ar�(��stat�3136�	'��t��f��ro�h��_ct)���m�p��‹270�)fsd� ��NFSv4.0 LOCK �<lay�ch�@1�}�Q�Q:�Kif_a��-��v�
���o� �Wc�R3��	B��t����	����{i�[���(��	�Fe�&,�cify����W����ve��) a���n�GNU a��m�r� g�f�^��ТF�W�n �����/l���H���nm�A��mmbol�+ob��!�=�+�copy�ѡ	�š�ns��3dumpǦ��k�Q���6�H�ea�
dex�C�9�ts�=�?�@��el��~����Ȧ�s�����2��u��or��C�Btr�7s�E�	t�a
���vt���c�i
��nd�Gdr2�<��n��� ���
�d���/�*�S"b��:���L�(��!�T�1108�Py�
n�-�� �4,���ve,��-�Z
en�R�f�om����ge����ul�cla��,����y��Ry� �Ndyn��c�type��d���l. ����
�Vt�y��m�
�7	�as�%�-a�.�
	w��s���	7��nado-p��: T����:
g�1art�	die�,19�t�J�SC�5	at�-�_�&��� �c�6rgu�E�35���A��]!��or�il��c�^om�
�� ar�a�su�/s VM���	��OST��it��U�Kos�M�$��hoo��$�/�Inc��� �X	��IPv6�Dst l�V��ߥ3��5679��o��ync��C�C��Eng����C�;�!Alma�q
c�'softw����^:�h���l��l���>(UDP���,�I09�U�l�#�
join��s�v�Q$d�
�j��cd�(
����<n��""��Z(���$le�>�%V�7LSB �yt�m��%�[��v�ra��
���4�,�ps� �R����	or�/
���s,��f�o�?de���#�da�w��keeps�L
�] of���4e���group��n����, ���snaps�q+�0
��stor�q��P��
,�Ki�r�u��o�
poi��4�!�bor��
�	�'��p�ncy�1	����hic���/"�o �"�a�-���
c���v�����5:��	���spu�	IP�x�R�C�911��
�7go�D
�? �J/�-�U��c�p���S����(�581�A�F��,���|�B u�	�Bes�#�q�M���;�\���up�y�*�ly���Nud�*s��os�;���c�npit-��<.�"AD�dco��%n�#AP�R�E�~��-lik�-s,�'t�0r��r�����n min�ݳ����sm�DPOP3�t���e-m�Q�Bei��Ƣ�<�m�!$��� SQL�+i���he� (��plug-�zr�"��d�sub�k��d�/: M�lSi���	�
SASL�h�#�wp���AUTHENTICATE�~���b903�y�v��#��2� 
bef����78�O�Y�&3NOOPǬ�R7�~
�ت!pyasn1:� V�� ���3R�U��!���'s�U�n��!��G�2	GNOME���a:��������xt�Y�&o��s������S t�[5�4�$bl��~�511�A�"�c�Ex�J�����8�FDoS�vhttp.���1�
1���I��Quad��o �Qxml.dom.��(d��%�	�/12084�HP��HTML-e�L#d�E�?��]onl�/� �Ap��{��
#php��gsql�Ren�/does��"�J�R�err�x*�>�Vp��73��"�RNULL Po���$r����SO�E
E�q�L��XML Namesp�P�8��f64�+�f�JH���!Nu��C��!��� �+20�B��;array_�r&g��%�D4178Ĉ�
���&���q
()�-�H�=��-chunk�
�q7�q���:)�sequ�~DO��st��p�0ar�d����t80�[G��
�1Stor��(LFS) ��s��%�a��o�g,�l�z�
o��j�#����'�*0�+
p��e� �����h�����6 �2����
�[�j��/����/�(x: R�90Ch�L��- ��p!s�&���\5322��3�f�r#/t��nGo��/�( TLS 1.3 key��4�.s�r3�rx�W:��t�in��1if�e��.�6�w��c�����,L�^�Bolki��at����=�*��s�o�:(�:)��T�=�y��Y(�!)�t��*�ia�A�1ng���}%l-�:5�c-y����oB�F��,L�x7th��gh�PKCS#12���11��-�qR����S��d�$��iz�'V��or��CMS�:��546τ�k�c� d�cQUIC���B�o8�o�	�W��.�/�V`�+ dgst`���C#s�Wn�{�����o9���Qe�z	�[B�����>�;5�~6619�~o��?IO�C�v�a8160�a�1�;�	��S
�P�+l�'EOCB �ۺB�C/�_5�
���9�6�?��8�Y�I�p�Z�pal���^21�%^TimeS�\���S�Y0���
fu�b����2795���f7�I<a��?v�1�����l�&�+��i�png��E%�^@�/��m�k@Por�-Net�#G�l(PNG)��
����p�D
��	E�����~/��Ne�E�S7ett�pa��G336��*��!ipmi��n�Ute��<�� P�|�w��%��� (IPMI��
nsol�~�����]) �.���@��a���
��:�
��'��
�/-oem��55��2EXR��I�N�-�-r����I#��-�!�{�����7qua��"�����is�c�	.�Ms�M
a b�f��view�����?�Yl��!�.�b�
�Hre��	�
i�]m�!i�T��e�
�o&�����g�B�$:��
�����+���B
6�qF5�:�`Mozi��H����%bird�K�3ndal�?M�n#��news�S*����ir�p"��t�[��.����g?s��L�$��������#�677��i�_8�ZJavaS�w�6.�b�[�=�[Spo�06n�&Rsu�[DOM��-e &���Z6Ӷ� WebRTCκ�_O�H÷�q�{d�dDB�Y�D9ι���q:��A�7yμ7���+6�WM�k�C�u�i6ix�;F�1 ESR �9.10,�.��+150�1�'�‘�<�J3�Widg�BOC�Da�W9� WҨ4�
���@�ue��&�ƥt�
��a��s2D΀9�.����
���B�`�`�s�U1�
���g�P���W�rHa�-�Z�
Iҵ��e�4�U�
ZU��A�/V��f���,s��8�215.35,�G5�"������
'���fD�U�+�p64� ����A�`2fi�'�_�
*�	�De��g��6���6�5�/��^:�$7�
����4�9Ip���
�K�D�mea��maximum TCP��ndwidt�Z�Z)e�$Earamet�q.�8�ist��.�l�Xs�L, de�qBj�A/�.�-���`�vi�V�L� H��BB�IO����L.4�X�A!L�A�+�5�� �Zl�-�]bl��2����-��0�uC��]�]��@���-��+�E�-7��op���n��!�GE�A�G�y�@�0c��s�q��V�
�2��� L�����GV��an�o<er��E�y�OZ���;�]��E�^�W��G�4A�>E�A(Ca�E4��1451�2.�c�G� >��[��[qp���Fsta�3:��tc e�x9��X���L�=�aASoC���bytcr_rt5640�\� quirk�
p���]�W401�j�W�1�$�Yte�i�"�� ���[�&_�"_�	1_des�3:y�[2�Y�gC"Dir��"�n���s
���|L��7�c	���c	(LPE)�$Ư�B432�cF�:	RD��$ �G	�8d�f!Deskt�"P� (�<)��le�G��1�%l�v���6x�ard���n������'s�4(Mi�5]o�BS�ds���8n�x�J�V���%Box���4: �������	�c�259��\�:�Za�V�.�Z��h69��he�7Vs�D�X��n�jV_En�%
Ca�����1�k�"�*�&�-�&�m�{T�L_�C��OOB �I�m79�9[�dn��cADPCM ��Vd�)���L4��p�V��#/��p_�UJ�A�/0�F88Ӄ��vi�x-by-zeroɀ�;'`nB�eAl�`�N0�f4�����4+�F	�y���V���M��(�.	��o��P�`39��GIM�:�
=�j^M��P� �1`�h�8si� ��e���`�,.�R�i�!�<m�^�
��;�c��%�P���A�c�bs�� �X��>b-p��l�W�9�n�)�a��:c�*Ls�I,�%�*��)�&!u�>���:��:�Z���_;PCX��08��f�W�r��/e�UXPM��P��	��[�	�[ANI�[1�[�oJP�s$�
�T�4�N��
�o�e��R��41�ܬPSPѢ�j�C"�
(��33��e���x�
w��ip�Y�&
��%���m/���-�	a��cu�!�:&c��ur�py,�b���}���� �D.��>����GINX���qV��4�j�fRub�� a�n�99�'��t�(�(, �U1��|	fea�4���!�4�V�ɢ����#�V4k�}�K�?6RB�{d�N]�=����g��t�n���C�.���e�i�.RELATI�
OID�2�q�x4C����6�c�!�a�R�:Ko�2'Te��p�	��r8�f8�@2r�8gco�m���	�D2���$0172�GT�T-l�w��
�]����I�|2���\ ��(�da���/to�
. A�g��s���I�$e��f�
k��figu��@o�j'� �Pn��	"��:��d�H+���Qpw�;*�8��L�*�FV-���l�6c�80�uC�Ui1=�ses, exception�very high level dynamic data types and��ing. Python supports interfac�.to many system call�Clibrari��as well��.v�ou�indow�_�;s.  

Security Fix(es):�  * wheel:�Privilege Es�sa�� or Arbit�wy Cod�x�N�via��lic�{�E f�A unpack��(CVE-2026-24049)


F�Rmore detai��bout the s��issue(s),�clud�J� im�Xt�� CVSS sc�G�
cknowledgment��+o�/r re��ed�Fform��,�f��6�R�� pag�m�_s�,�R�&en�����:.
Brotli����generic-purpose lossless compr��$algo��hm�Sat��T� us��a�bin�sf a�"dern��ant���LZ77�R, Huff�+�>d�G��2��rd��co�Sxt�Jl�,�th�l��r�s�arab���bes��urr�Rly av�����al���Lme��d�uIt�"sim�4r�Pspe�Y�def�� bu�֩cs�n�N���	�Scrapy: p�I-s�b��:�`��\§b�m DoS��5-6176�FreeRDP��f���le�x�[�<mo��Desktop��otocol (�<)��leas�kund���1A�ڡ��. T�x�ardp client���nn������serv��such�Microsoft W�s�Achin��x�J�VirtualBox���: ��: Heap�Y�V ov�Qlow �̬�o�dial����̣op�nt�c��e��from������.��3530)͎D�nS�n�Quse-af�-��vul�obil��v884�v��`�������j3�j�ps� n�U�s���f�"�%GFX�t�Q upd�fs�%���1�8v�9-si�/h���z��� h�z2��k�U���8�n�ɤ4Linux�!,�����	�ope�2�b	���K: net:�:nvs�ch:�(	x ne��key��ng�v��d���set() ac�5-37789)�c½: irq�Wp/g�v2m�V�W81�WRDMA/�:�� "KASAN: s�-�UR�`��ib_reg��r_de��" probl��
�k8022�ãyrxeԼ����a���~4�~Me��@rrup��Squashf�	u�+	��o�$	��block��ze�cu�A�p415�pvs�3/vmc�C���k� ��ns���et�@�{�	�i��i��iz��it�f03���+��ATM CLIP�-
ul��x�fe r��s��59�f��
�<����inst���Gm�� io_�Kng/net�h�;�
�~7�v����-of-�n�
r��USB�figur���
s�p976�p��us�
st��_rcu����
k_��up_caps��F4017�Fipv6�GRCU�>p6_xmit�83�=Blueto�,: ISO��po��
�UAF ��so_�	_�9�N41ه�0pulj58�	zU�in��c_�mdi��N�+
�����ye�y�2.Å271Ѕ ALSA��a����cer�3�
�g disc��
ur�H�È6��hci_sync��r���cmd��queue_on�W318�t�soup�u�v�w�HTTP�@�"�~
��y f��GNOME�h�a: Signe�UUns�Con���Err�OL��St��-B���O�in��NTLM Auth�^c��6-07�3���WMulti�kt�;���P�ym�� r��u�1�Keylime�TPM b�3�Ply ���r�b�T attes����ru���B��g��m�ur� sol����	��: K���bypass ��unau�^r��d adm�&st�:v�.
�!
����mis�L�qTLS �C�P�"�+��GIMP (GNU Ima��Manip�	�vgram)��n���!�osi��edi�np�,.�R�@�4�age�<m�^�lbox�c�I���clay� ����c�sub-pix�)�W�9�&a��-�s	a�ͬ:c�[�K�����-�u���{g��:�
-�����@ci�`y��PSP�n�21505�8gola���1�4Go�
m���(u�:�r�n�Y:�"� 
ve/zi�}Exc���CPU��sum�
�mbuil�a�4 i�x��E��M2�"	�n�,
/url�Vexhaus�b�F����C�8�
��8�]6�]�D/cgo����smugg�2�<doc����R�5�R32�Rrypto/tls:�Cexp��e��0e��I�,�L8121�*.tb_hw_�+te�<
��shif��i�k�%_�6mw�y_�=��3-�3��sm�Wu�__pn�Df��_�_n���06�
<Oæwr�Fi�Pb�I�����,�30ӗI���1fo�Zglyph������NFSv4/p����
_INO_LAYOUTCOMMIT�Zpnfs_mark_��}_��eid_in��h3�T��vcrdma��
rc_���e�Gmemcpy��t��fs�`�K81�O
nvme-tc��NULL�^� der�2�vm�ucp_�*_pdu_i�c��2299��EDK (Embedd�)D��op�j
Kit���j�en�
UEFI�������	��Ris�i�h�Lsa�� 64-b���Hfirmwa�A�IQEMU��KVM�3�����&�RFC 3211 KEK�wra��92�y��N�&.js����Od��p�q�l�d�fas���*work appl��s�zJ�8�ip����n��j�N���	�A�V�U�j��551���A����1637�5�k9466�"55�5un����m�+	p���1�A���4����c���ndar����' (�/��POSIX�&�}	�p�),�A��h�%m)�ۢinam�0��c�#da���Vnscd)�d���p���s�%���Wi������&�s(�$�L
�(nno��
un����ly�����
t�
��in�k�ug��!� �X�E�+086�|�P�W����
��
zero-�D
u�
�1�y�V9��Ow�M'xp��WRDE_REUSE�y�APPEND��y�Jtu�'�@�1528�PH�h&��ML-e�
s�k�b�|on����I�V�T&����
�ph�(i�ray_merge���7��E���
*get�R���H���������chunk �-�q7��G�nana���@�urc��feat�/�+h�)���*shbo���g�:h�����G��f,�|luxDB�xO�UTSDB���lx509:�W���ue��������/&certif�7���f�]g�/�pkg/�ls/����-D�P�Sc�? B�E�s Cr�?�0��-�"7�\�����v�ng15���� 1.5�� ol�+��o��+�#.�y���=PNG (P��;N�	��cs)���6mat��
��hs�!ld�$.����if � �u�������c�I.©���	��#��IB��ha�(��(i�8g��%�	z�W564��-MUNGE (�U�
'N' G�Emp�u�J�Y�
�cre����o(ng�d�2al�/�o�M!����M���;�PC �-s����(iron��K�5���P���"UID��G�o�C�D�U'���M� �B�D�y��I!�1hos��hav���q��r�d�&����
�+���y���l�1��fi��by�#har�)�xg�)�5 .������t�'�Q�/�w�h�ue�s�>���U��r�� �s�;�ɡ��34�
� -� f���1�	X�B:��V�Qm�h�	��3���*a���ȪSg�Q2550�|�� ��plugin�P�.�`nce�i$-Pilot��e�
	ta�|s�-�<�"se��
�e0pm�
��Re�
,���PCP�\	�bpft�G&�g�>da�,�6sev�3 ���hd	�W_�c���_p�#�w� _�Gycle��_r�f�3����K�Dou��#.�[exFAT���	'382���6�6��-��2285��:glob��8�<8�<�w�%p�*���V�
�D�
+��Google'�  �S �'�u.�3�Ben��$truc�zd�? �f�]�my�� �:en�
/�R�����lex�,�8�"�
om�me��is�~��q1Ł���::� :�ܣ	�Y�s1dep�/�A�94�8389 Di�6�����LDAP�03 (�v3)��pl�=�B�q��y�	�wL�twe��jAc�F���^)�R���B�-l� �C,l����	�%�+o�a,��-ds�:��q�]?����2�
�7�w905�Q��-C�>ol�l��,�
�I���R�/����F�� (OCF) ��
�Qc�$�H.���%ah�O�,a����Z<���VOCI�Q�. A�g���%g�¦c� &s�<to:��( ��R�N�i�B��
��@t�:	o��'a�B/���8r�8/�';�V�$�K�l�W��n��i�Wa�lck�{�O;�i�
o�����
���Rpod�D�>m�C�
�,�.�����
5���o�5y��Dh�i��"���P�f�v.���ac�7pt��Kub�Vt����Mozilla�g�Eox��w-�0web��Fws���
�,"�H�#�p����:	��~vpx�pC�Ĥ�244�$f���c�.�9.���%Eng�a�5n�
�O785�O�usafety��g�m$x�T�3ESR 115.33,�40.8,�.�bird��)148�&�&�–93ŖUn�.e�o��DOM:�l��&�(!����<�8�#�OAu��</V�o�J4�JS��b���a1��@�.�,An�n7���mTe�\t��k�Ext���S�'À6��L��$�]NSS���a>�S: J�S1�$66�SS�,����de�fDB�O9�O�
���dL�������N����8���#�"�>mis�Kil�$�!k83�u�z���X!MP�\��M�Fg���4�{���M�;۪�::��:���^59��_�L>�(�.κ62�+��WebRe���P�v�"�A�VM�+�GS�_�S7���d4��Opo�	y�� i�{JAR�W90���j?�7�x�s�K����7����W�m���'�	�*'8���p8�pt�!�RTC:�x5���x����2�NP�[8ba�H���"*��7�(��A�3Smbl���y�,�p���
5��	���(���f�,c��+��V�(�����GC�K5��C���Q9��
��Bin�S���IDL)���1sk��m�ilet��ins�����l���*N�c0ge�+�G� �C������y,�H&�X%�fy �( ��s����*�n�T(CNI)���=��i�(��"�lE�ê(����g�(=���&-�=�c�@N�n�n��[���;#����l��Ynumb�	f�'>ed�a�N�Xc�vs��Oself�w+�=�p�!�c!����I�l���C)�)��'c�p��s� �O��)le�'��N�N[���pr�,�a�se�*b�N��
en���p9���[�rR�	la�]�`_pyasn1:��m��)�7���GRELATI�SO�-�@349�A��0�!� a���6�5�q��.��0��0�0NG��0��0��EF�N�r���si�fie�7r�{CAPI��280�s
ƀD�e�.	̖�4"-�u:i�51���Gish_�„695Ą��1�gH+�IU�	__�iV�}V�7�&Z��Vmc_cl�	Hrfx_m�2 ��U��^�VBUG�@pskb_�a�
Jh��h�c��p�dV�$����Qr�b710���b�I�a�ad�XY��hu��lb��li�UQg�W�09�s9Val�a1�ladv��'\�<�����oft�:�G�(�5����(�&e�!ince�I�O)���~
�"h�%0���s, s��
��s�
�. Y��
�=���So�u�PQo���5��Jke�en�a�դo;�x�S�{�����; push�6��; �Iu�3�-���:,�y=o�di��Y;��"�9�dme�h�8�X��d�/M�"�z��.���Ne���"e�4�(ut�n�4�a���vs����-���2�XDe���y�� �,�:�ap�(st��[�#b�1[mp�ʥM����k ��1y �IX���i	��*o�8�ea�	��Zo�3	���4o�8	t�D�,to-��Z�is���^��k!�_f���Cn�e�]�r�5st ��Xhr�wz�2�l+-re�on�
net�
li��Co�th. O��v<��	��)T��Na��VAub/Sub, Lu���>,��U�� limi����'��l�
�l��
�Ys�5�2
�ǭ!������nA��ƥ'��	os�yDs�i���H:��U]t�Le�h�q�P]null�T�e�K]in�!�����v�}��*�Nc�7bu��Le��18��!�g�9$�z!lon�Vil��news�8�1��l!�j �l!���0�0�i��xy������VO��p��:s�xfocu��]c�5�Ic�O3�30�-	�u�F����TGINX�inj���3�Z-���-midd��6�#��g�����<1642�@i��]�b8�3-�O�#pm�>�8to�2y�U�o��:�e�W (�)��+do�]�Sn�yt��I�B���Wa��P���H��-s��-�A�A�<ll p�Ti�?f���e�� ���G��e�*greSQL��X�q�+al���>�M7����(DBMS)���jsq��v�j�t�\��R�7b�H�t�Zs���rs�x0�?E�sint�S�|�G�inp��o�/l�1��"es�S�Xۈ4ӈpg��!���`1�tes arbitrary code (CVE-2026�05)


For more detail�1bout the security issue(s), including� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fformation,�f�to�R�� pag�m lis�,�R�&enc�ԡ��:.
A�rvice f��buil��customiz�=OS�tif����such as VM���fs��OSTree�!mmi�%that us�os�S und����hood. Besid��q�M��local�>��0t can also upload�*dir��ly��clou�UIt�j��p�ble with�o��-cli��cockpit-� ��i.  

S��Fix(es):�  * crypto/x509: golang: Deni��of S�Gdue��ex�hsive��sourc�nsump�y via�Paf��ce�_ic�ٷ_5-61729)�y�larch�Q/zip: E�`CPU�[when�X�4�dex��E�n8�nnet/url: Me��y��ha��b�Fque�paramet�C�	s��n�8�]6�]�Ftls: Unexp�ĩs�̡Y�-�ǡI�,�L8121�z��bin�^��~. U�	y���LsDel�
s��debugg�I�x�0Go prog�[m����u�Y. T�go��(�%j�Q�Ft�3vi�a s��l��full featur���g�ool�mGo. ��shou��be eas��invoke���H. Cha��ar��f you'�	u�����z��&n't���y�� way. W���%m�,Ĉstay ��of�5�om�w�.s�X�F��nPostgreSQL�s�{dv�ơpb�B-�q�+�\database man�a�� sy�bm (DBMS)�sp�jsq�;�vmis�"valid�j��mul�y�ch�Lc�Kleng�ex�a�
�	�V�sintarr�8�|type�inp��o�/l�1v��e���y��ۈ4ӈpg�\ heap�\f��overflow�`��
G�B
Large�3�
S�\ag��LFS)�Xpla�/l�!f�!�ea�Ʃ�a������o���se���0phics�k
text���ers����
 ��,�	�}s�}�f��1t� on�#r�t�Ur�����vnfs-ut��p�z��	�oda�wn�kernel Network���@N��U�����s����Ys�t���(��nce tha���(di�Linux �[�Z���y�ts�
rs�=se����
��a��mount.��, u����w���
�	�.: rpc.�;�d�Kr�llege�n���?1280�?��}�x���!,����;any�o���������K:�Y io_u������|�<����s��s�=
, ��d�����]-�r-f��381���macv�:�qx��	 UAF�?�_�ward_�()�30��r�	Pyth����&	pre�4,�a�z�����,	en�R�����es�du�	class���,�	�high�\ve��ynamic����d���l. ��support��	t���3
�m�+���l�Clib��i��a�
e�a�.v�ou�+
ndow�W�
zp��: IMAP ���ein�#�ǩp�m-��rolled�$�	1536�d	�PPOP3�*P7�Pem�����u�P�
unquo��newline�M6�v99���U
GIMP (GNU I� Manipu�GP��)��!�ii� ��e�C�ӵ�.�R�a��<m�^�box�c��i
�
���ay��#�h�b-pix�
�W�9�&anti-�a��:�vers�Va�����-�[u����g��:��:�H����������
�
-�g	d���ICNS�%�<�
4���iC�iE�iunin�s���Tm�i��GM�b4�b��-of-bou�Fw�e�aXWD�a5�aICO��P�JVuln��bil���X079�ǣv�X��8��C��c��
�����pon��Za Alma��
�Q�-OpenT�(���F�
�W,gnu���)�4�Trans���y�i��(GnuTLS�h��y�x����;���gor�9m�i�htocol�9SSL, �R��D�	�-��:����B�O��&_pkcs11_t�(n_���Fun���9820)�^���&��#du�����
�x1483�/���
n�
x�ީ�b��xy ���G��HTTP����,�@a�)cu���������p�K�F�����	��$�
���: NGINX�����Z-in-��-middl�t�G������i��&�6��642��.NET��m�d-softw�- f�T��&��a�����X�C�- API�"sev��l����i�C ����LR�Za����N�2�J�f�b� addr�m���]�s
��n�)av��a�s ��upd�9�U�'�VSDK 10.0.104���Ru��me�4.�e.�g	:�2���re�'�612�_asp�LASP��C�
�T���v��+���b30�	�tvpx��	VP8���1�
ws�en�A�Ȣ�de����6��fc,�onl�c����WebM��m�a �er�������: H�������4��b8�a25�a�25�a���^9�^1�^��u�����Aolkit��3�9���Cmm�}�s�\"wee�wh�V����
�^�\���^��/h�?�
��om�1.��E���Wd����a�h�����v��
r��as���	�o��ss�����!����D
�PKCS#12���r���
6941�(�c~"HID: �l�
c-hid�:�6�,or�>2�' ar��et�N��I2C��gs�'v�\"981�%1�\"lxsw: s�zrum_mr�b�"�1����	ca�%%rou��'�q�80�*My�l"�=�,�th��A�#�o"�{���|�c�v�b�M��&(my�g!d)������3���/�@�K���p�&r���������t3J����+$1��)�:N8�NInnoDB�$K36�:�6ĚDDL�%�7�HT��<#ol���$�4�ap�1,ne�C�'�,mb���	��
t�3�
becom����
ate�>m e�P��7�z4a��%ys�����Dng���&��ty���: C�	���tu�q,�;	heck��snpr�f �aur�L�1��Y���\skip�/��b��J�O(o���.‰7873��8���q9cre�4����Cdif�Tt���7�K��s���x��,�vio��ISO 9660 CD-RO��6.�������nota���bsd�K ��+�c,�=rip�P�h�Ңw�
�3��-�񤄦�po�Z �e*sktop��
�,�	��R�f�e��*�D�*��RAR5��
r����B_�d_����in���411�W�wVi�,Vi���k
ed�#���zim���
�Pvi�$o��2vim: V��m
��'help��'�6��]
�574�]
�.YMozilla���Eo�n��-���br�1
�X�igne�I�nd�+2�jB�:(�b�o���N�f��:���?bird:��?�@��J�MS� E���%�470�*�[�safe���;=s�3�2�ESR �.34,�40.9,�I�O��)149��&�£2ӣP��5���6��;�17�ZS��b���Xpe�� �pD�5
�Ac�O�V�v��vI�u���n�N7s�oG�O:��nvas2D��6�.kAu��:/V�6:��)c��95�Si҆�te�@�>��XPC��c9҆JIT��3�:i�3�9�,���'�,�U�k+��1�
�Ra�&�r,���J��Re�>�S4�mU�
fi�beha�1r�a�WTC���a�Q��5�_�/�1�b�:z68�/k�z��4�;�GM�&��9�Q�0�d���9�fidg�C�
a�_2�]7�6p��3�a�Vp9�
������
��<�6�M�0�
1�%C�
��0�,	C�Yut����/3�-�: T�B�uFo�K �o�
���`�<�P�3���n�
R�/�1�
���e�/��3�����'�d�A����RRespon�/D�
 M��`�
<�
�7�0ӏ�Ng�$bypas����Ci�V3� �*�p�8^70�
��!�q�U0������4�18�(�4�5�!�#����M���
�Hmd/g�w���I��"�-lic�l#pkg�0fig��S����53���46��6�IPv6��P�D!li�2l���/6��67��F�bRDP���o�'����8D��P�3 (�<)����$�RApac�l��n�kO�1x�ardp���������/�iMicro�(�	�33s��%, x�J�VirtualBox���L#�����TCo�n%RL�hlan���;�&h�!���
� v�-GDI �f�pipe�A3�p5��C�sbH�
A�
������ATM�)+�F�j3��%�%�Jdrm/s�
d��%po�M��dou�5H��
�'_�'_job_�+_��v_dep�gnc�(�h400��
��I� �����k�yDAMON�,fs�� �1!��=�1�c31�=�5�b� ng �7��au�;�67rash�	.!�~71�~scsi:�": i��+'in�t_��_��;_�_co�,�I1���'��Ierro��c�����Ic�"1_��6k�T2��T�X�c�:u32:���h"b_�D7_�L(_ca�Uul�Q�ALSA:�"�2 ��S9y���e�a-PCM�oMi�U��� �� ���]lo�0�8����sg�*)���O�p��rO�x�oOu�4�V�=�N�?I�2P43�Uijpoof�)���?�(�>38���;�u-xsl�ga�-y�`��M�d��XML ��b�@o���bua�g�3 (��HTML,�(�z�&�¢K�+cr��_�n�<.�fly�A�k.) �g�J�(+ XSLT�
y��heet����me��Sis��	�������/�+con��/y��
��n�qT�M4��
3�40��5�"�M�SM�C�1M-��>2�bM�e�..�#.���z�2eURL��345�?�FXGS�8:er���F:�J��<�T�'�wT�p��t�s�O�;e�"�;�!�n�Ver1-plug�>D�VTd�W
��6�XD�Q�W���e�1-��S�����&:�
�
<ASF���69��
�Z��X�UZJPEG�X	e�U3082�#mH�m��Urtpqdm2���n5�n�
7RIFF��l�h���
AVI�Xh��l�V1�#�O�] Of-B�
Wr�] ��3�#g�� ealM��Demux���2�:lDVB Subtit�?
�F�<	Squid��o-��j�<c��"g �9��q
�1x,�<FTP���D���3s������fJ�g"�
� ICP��3352��c�j�{�Mt�f�b�L27�]��L%�"����285�G�9�V-�s�:4�':2�:��F�BIGlyph�)���^373�^�AUDIN�< �Uego�h�1�i467�>a�l�~i��s_��Nr�N4��NNULL��;��
��r���dp_��_logo�/]fo_v2�"�=�aH̰p�_t�S<�84�!�urb_bulk_��I#b�W1�!Wa��k�I$nd_�
�W��Z3�Z6reeRDP has a heap-buffer-overflow in urb_select_int�ace (CVE-2026-24679)
  * f�Ordp: F�XH�Xuse-aft�[�%�W5�W: Arbitrary code execution via cr�hd Remote Desktop Protocol (�B) ser�� messages�y31806)


Fo�ore detail��bout the�=curity issue(s),��cluding� impact,��CVSS sc�G�
cknowledgments�nd o�/r rela��informa��,�f�to�R�� p���m lis�,�R�&enc��s�O�:.
G�ana���e open sourc��featu��rich�t�s dashboard��graph edit�f�G�it�=InfluxDB & O�UTSDB.   

S�Fix(es):���net/url:�:�r����rs�+of IPv6 host�ձa�h�ץ3�5�i�T���plug�+�_P��`nc�Qo-Pilot��e��ta��s�-scalable tim��ri�rom pm�
��R����live PCP��bpf�Bce�Kript�>da��s well�sev���&s����rsync �l��en��s�2u��s�Ycopy���*hronize fi�'lo��ly �acros�X�.work. S�.�� with�oi��a�fbeca�g�on�Jsend��dif�����q���f���ad���:�]whol��. ���zlso��d�Ca mirror��ool�A�K: R�O��y����array�	ce�	��neg��v�Ydex�A5-10158�A�iSSH���	p����le����suppor�Oby�$umb�u�:Linux, UNIX��similar�r�;��sy��m��I�{����ne�t�{�bo�j�!��cli���_�b���ssh:�?GSSAPI�6�9 ��clos��rdeni���rvic��ue�Vuninit��6d vari�c��497�Mkernel p�w�con�ɤ4��!,��0any������K:�Y (�mlx5�'U��	ECVF v��s��lo�8l�=����3810�O
�uK�Priv��g��	����Kf_t���in���We�* act�Lt�@
heck�q3111��:�O
�mS�m��ri�2���Z��di��u�VSI��build�s210�s������e�_addch�"()�y31�crun� OC�`un�	�	��1:��c��i����`-��r`�I�/�d0892�SPytho�Un �
pre�4,��@��obj�2-or��R��;mm��langu�q,�(�j�Rmodu��,�-ass�exce�H��Ey high�1ve�r
ynamic� type��d���l. ������U�sm��� �J	�Clibra�.,��
�.�=ous�J	ndow��	Vp��:��:��mm�g-line�)in�1�	�rbbrow�I.�
����URL�451�n��x�����i�4x�
�����HTTP����s,��
a�cus �J�.�n���py, p�P
����me�7y�'���
���: NGINX����C�|E�|speci���MP4�9	�"2647���_�f�=�2ifica�i���ngx_http_dav_�c��7654�t��-�up�x���b78�b�n��	�Mrequests�*e��m��_auth�ӥϱ7�;
d��1��Git Lar�	F�WS�ag�_LFS)�Xpl��l�!�Rsuch�s��o sa�$�[ideo��Pe��g��cs�<tex��	o�?�Fsid�it���}st��h�l�|
��na���w���$��N�O.js�softwa���
op��p�q�l��^������.��appl�4s�zJavaS���
�
��js�أ����163��b�&-expa�e�0
��!�ed�0�mn��6�5�Rm���c�m�
�`�glob��t�ns�`6996�`��ci�
��@un�2rol��re���sum�N2581�^�h�T�X�T��4 smuggl��vuln�Bb��]1527�]��
x�����WebSocket�k�`-def��compr��案�E������d�l��e��Vamet�)�Y229�YR�DS�D�Z��du�Re��-Leng����2��5�t����f������l�k�c8�cng�'2:��emal�B�g��/2�d�rf�6s��t�ein�n�h13���:��nI�h	�R�Dom��N���c�{��B712�o���G��`__�7__`�D�_0�_���d`fs.real�*h�.��ve()`�pa����r�Sr�h��Ć�V�_��P�����W ��I�K��
�I���p�:s�wn��hip�Y��let�fix.ŗ���U��D-�� c�����M���Unix��������1����ti��o�7�6n HMAC�s�'�d3�dM���k���TWINDOW_UPDATE�b�p�)	��v8�KV8 �?��ha�ǡme��nism�e�rd�`��$ c�}i��~�!C�>p�2�e�aad�s��GNU/���_�%���}��	 
o�Rs�=	��figur��log �%p�~,�pagn�
���, SE�k 
�u��hoo���N� a�/�r�*���Mc��: ws:�����	l�Zt�?h�I���Vn�{�[li�46�> 
�= 
�Mozilla�(�Go�[�
%-�r	��, �ign�S�Dst����"���B�/�<���U	���ipng:���&�"
����	334��a���d�E�=��-of-��	s�/writ�$Neo�D	��V	�g3363��th�!
��rd:�9�{�-safe��bugs�U����ESR 140.9.1,�O"�F��-149.0.2���,���5734�2�15.34ƒ�H�����ú�0���Gn�ls�Sg��&G��: T����on�@�y�Thi�f�A
��Bay��ce XML d�'����"s�;t��2*��$::P�/r::Ex��	����Z�����*�bJ�[C�k's�0��b��. Each��)o��S��ho�yre��gne���c�-Ȗ��t���r%��\��. �/�s�y�,�$d�'�0�c���]��d��%se�E��x�
ed�A�F�m�@�e������Hy�
n�+&��g�	n���ra �����Q�<�$�z��ca��y��r����Rt�ԣ����- ��erl-xml-p�s��>�de�y�����m��06�&00�]
�`�*l:�K-�g����)�w
�xinput�x�����Nt�UM�`c��
� b����+k�͡�k�r�v
�n790��M�%��B�J (Berk��&y�F�5�6�H)��
i�#*�oDNS (�kS�)�P. �d�#a�3�g�P�@d)���lv�$��\��IP �z&�Tes; a�&r� (routine��.�t���^����);�_�K,�=��y��a���is�(pr�l��b�#:����_
�+$��sSEC-���z���1��#�*�
}���8���~��NS���yX��)YVi�Vi IM�
�ߵBup��zim����K�Pvi�4�~vim: V��
L6OS� �'�in�M3w��3�]84�C�d���	�R�0���sw��	�N8421�a�7�����p(fun��`�U�
�8�
�-���
)8��������1Apache l��nse�2x�8�1���n������.�"Mi��3�
 W�g*�
ch�, x�J�VirtualBox���9��.� �&a�C9p�l�x+�9���r��
�s��9�o3�����jl���� ����sg��M�z\.NET��m��;ged-�|���9�P�n��ubse��8�X�C�- ��6s��s�g;�����i�7��LR���N�2�	s�f�b�
�
���]����n�vai����o	�U�'�VSDK 8�V126���R�x3�26.��dot�;	:�4: �&B���N�EV��26��)�V��ta��5���b22��GI�n�R����1XmlDecry�Tr���q��1�Q�eD�SM�C�	I��#H����M��A���8�"��17�:���war�	v����
�k	����S!�I��<t�#ea�7�K��s��� tar�4pio��ISO 9660 CD-ROM �dg��<L��i�dd�D�by��bsdt�a;�=, �k?���>���
�C4-�񤄦�popu�;d�9	�*�r��4�R:��-!h�A
���RAR�G��!���~442��x�
��f�������u51�
�pa��;��-���rpm �h#o��t��.���U���Go�n(go�)�\�does���v��t��p���T'ault�� r� : go-s��-m�@�>l��ull��9Go�j�w@����.��/gif�-�i���R����n�ri�O�+��	`�S:��0�D�"�l�et��-�k386�`AEXR�l�#"�B0-�l:-�h,f��>�u-�%2�������7qua�
C�����2�k	is� ��3
b�:f�vi��	����?��#ain�?�>;���	re�pf�;�
i�����j�X�,a�!�b��HF���g�L�&exr:�-� ����(��)762� �e�A�s�d:�0
ke�(	ke_en��,�	��=ur�~ET_XMIT_CN�p�1F�6_l�.)�
�A976�
�cscs�,qla2xx�JFix�r�^�u�p�Sx i���N6874�A �{o�h�4��+�Ha�4f��s,��	V�L
��OST��i�%��us�8s�u��>(d.�~s��q�M���2H��4,��b!�.o��	�*di����	ud�
#������s�3�.(���o(-���Jj�t-1.�4-�Ojdk�$�	�@�cJ�v� �lEnvi�I�9���*S�D�!Ki�T�@:�]h�s$��o�?gor�m�7��Z"��:I��E�Ho�:$den�G��20�d-�sPa�uF��o���Lux�66�6Zi�
�&	�28�2ce���1�$E �`���1�>Up�"�a�T�B 2.1��	5�qk�2ge�m	�c342�N	��7��17���+��TL�0���c�o.��82����21����+��Bug��W��DR�d�l*,�r���"�D�,_�)_���6� �G
��0�ms����G)l���I(�U�R���C,�v��. H�'-��
,�!��v�[I��r�b�� �pon�[,f EOPNOTSUPP (�
on���P)�
d���R�֢U����ǜ��r��fi�������6Alma�w
-169�b, �951�2�4�53�#5���:�gGTK�T�%�3��� 3��j3re����:��4�:�w�B�+���Lkitgtk:�9 �7�0%�v�j�
��.���o�M$n�@�š%S�Wri�4s�D;5-4�A��Xq4�\q457�Cq���r5�9�'r�"B �'n��sta�-1�x��'�r6299�Y�6�608�^r�8-�Yr6�^r4�#A �xG�-/acker�Ybe �}to��1������Z52�Z�s���R�>/�]:h�#�lF�f���~@s�b7�.0��=S�5+Ori�(Po�6y�&�D���6�.���C������2b�Ue��c�CĂ�A�y����fing��R���I���a9�.��W88���Ԣ���P�_@ʼn�ds�{s�!box�u�3Vis�q��,ˆ�� �\-�����p��!��
5��
5��
�+�j�
d��ena�E*c�,s�48�4�_T�����%�T�^��rd�r8ty�`�d��z�&�"��gb��3��a�*�\b�| fo�c,�ˡ��lb���u
�
a�	���O1���elf��R���%��LE��GCBToE�H�674��El�m�*���;�+� "5�"5���"939����L�'��:�if_a�I-��ver�.�T���T�14��D��h~��2�S4�f:�,oi���bd��*��?shar��skb��,g����#2�~�{�,�T��:�4
����m-�i�]rk���s�-t�o,�help���630�`bp��)�*Pi��CAP_SYS_PTRACE�ask��mn�&m�O33��