MOON
Server: Apache
System: Linux mail.espica.me 5.14.0-611.54.3.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu May 7 16:31:24 EDT 2026 x86_64
User: solaraatech (1010)
PHP: 8.2.31
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //var/cache/dnf/crb-updateinfo.solvx
SOLV	��0dnf1.01.2�f��ʐ'>;V�F}{��"`��}Z>t�9�x86_64cvebugzillai686noarch3finalpackager@almalinux.orgselfrhsa1ModerateImportantkernel-tools-libs-develcross-headersCopyright 2024 AlmaLinux OSlibperfCopyright 2025 AlmaLinux OS
3 AlmaLinux OSpython3-debugidletest1:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_0Copyright 2026 AlmaLinux OS5.14.0-70.17.1.el9_0
22.1.el9_0python3.11-debugidletest1:1.8.0.342.b07-1.el9_025.0.2.0.10-1.el9.alma.13.0.9-1.el9.alma.1python3.12-debugidletest0.8-22.el9_61:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.19.0.10-2.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.11.0.10-2.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.13:10.5.16-2.el9_0Copyright 2022 AlmaLinux OS4.17.5-102.el9	3.el9_2.alma8.6-100.el9	1.el9_3.alma.1python3-tkinterbind-devel1:2.06-27.el9_0.7.alma0.8-15.el920.el91:1.8.0.352.b08-2.el9_0	62.b09-2.el9_1	72.b07-1.el9_1	82.b05-2.el9	92.b08-3.el9402.b06-2.el9	12.b08-2.el9	22.b05-2.el9	32.b06-2.el9	52.b09-2.el9	62.b08-3.el9	72.b08-1.el9.alma.1	82.b08-1.el9.alma.1	92.b09-2.el9.alma.1python3.11
-tkinterxorg-x11-server-devel1:1.48.4-2.el9.almafreerdp-devellibgs-develwinpr-develjava-17-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug12.0.1-11.2.el92.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.74.16.4-101.el9	3.el9_1dotnet-sdk-6.0-source-built-artifactsjava-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebug21.01.0-21.el9	3.el9_7bind-docdotnet-sdk-8.0-source-built-artifactspython3.12
-tkinter3.11.11-2.el9
_6.123-5.1.el9_7
2.el9_7
3.el9_7
el9_72-2.el9_2.125-1.el9_37-1.el9_4.13569-7.el9_5.1232.1-4.el9_4.342-1.el9_74.el9_7.1235-2.el9_5.1239-1.el9_6.129.14-1.el9_1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9_5.121-1.el9_52.el9_6.125-2.el9_73.el9_7.12321.01.0-13.el9	4.el96.0.8-1.el9_013.18-1.el9_520-1.el9_52-1.el9_63-1.el9_72.el9_7edk2-aarch64tools-docglibc-nss-develstaticlibsmbclient-develwbclient-develnss_dbhesiodsamba-develunbound-develxorg-x11-server-sourcedotnet-sdk-7.0-source-built-artifactsLow13.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_43.0.21-37.el940.el9_4bind-libsjava-21-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebugglib2-staticstreamer1-plugins-bad-free-develxorg-x11-server-Xwayland-develjava-11-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebuglibtiff-toolspostgresql-docsprivate-develserver-develtatictestupgrade-devel3.14.0-13.el96.el97.el9_7python3-ipatests3.9.10-3.el9_0edk2-tools9.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6bind9.18-develflatpak-devellibnetapi-develghttp2-develvpx-developenexr-develpoppler-cpp-develdevelglib-develqt5-develython3-samba-develqt5-qtbase-staticvarnish-develedk2-ovmfghostscript-tools-fontsprintingsamba-pidl6.0.108-1.el9_09.0.0-10.2.el9_25.0-7.el9_3.alma.1libvirt-devel	ocsmysql-develtest1.12.8-1.el99-1.el9_43.el9_4
58.1-3.el94.el9_49.3-2.el9_03.5.3-2.el9_0LibRaw-develavahi-compat-howl-devel
libdns_sd-develdevelglib-develdovecot-develfontforgelua-develpostgresql-test-rpm-macrosrotobuf-compiler	devel	lite-develwireshark-devel1.3.3-13.el91.5.0-5.el9_5.alma.12.0.90-6.el9_17.el937.4-21.el9_74.0-7.el98.el9:2.11.2-1.el97-1.el9_7.1235674.1-5.el932:9.16.23-11.el9_2.124.el9_3.48.el9_4.1624.el9_5.334.el9_7.125.el9_18.29-1.el9_5.14.el9_6.25.el9_7.244.0.2-11.el9_7dotnet-sdk-9.0-source-built-artifactsglibc-benchtestslibreoffice-sdk-docsamba-test
-libs20230524-3.el9	4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.31.2.12-2.el90.0.0-6.2.el9_4.alma.1	6.el9_4.alma.1	el9_4.alma.15.0-7.el9_5.alma.1:1.9.1-12.el9_52.70.1-2.el98.0-1.el96-1.el92.el9389-ds-base-devel:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6
3.el9_75.14.0-427.13.1.el9_46.1.el9_48.1.el9_420.1.el9_44.1.el9_46.1.el9_48.1.el9_431.1.el9_43.1.el9_45.1.el9_47.1.el9_440.1.el9_42.1.el9_4503.14.1.el9_55.1.el9_56.1.el9_59.1.el9_521.1.el9_52.1.el9_53.2.el9_56.1.el9_531.1.el9_58.1.el9_570.16.1.el9_67.1.el9_68.1.el9_69.1.el9_621.1.el9_62.1.el9_63.1.el9_64.1.el9_65.1.el9_66.1.el9_68.1.el9_630.1.el9_62.1.el9_63.2.el9_65.1.el9_67.1.el9_69.1.el9_641.1.el9_62.2.el9_64.1.el9_66.1.el9_69.1.el9_651.1.el9_62.1.el9_65.1.el9_660.1.el9_62.1.el9_6611.11.1.el9_73.1.el9_76.1.el9_720.1.el9_74.1.el9_76.1.el9_77.1.el9_730.1.el9_74.1.el9_75.1.el9_76.1.el9_78.1.el9_741.1.el9_75.1.el9_77.1.el9_79.1.el9_72.el9_75.1.el9_74.1.el9_73.el9_76.el9_75.1.el9_78.0.30-3.el9_02-1.el9_26-1.el9_341-2.el9_53-1.el9_65.0-7.el9_1bind9.18-doclibvirt-daemon-plugin-sanlockmariadb-develembedded-develtestingw32-glib2
-static64-glib2
-staticysql-libsnginx-mod-develruby-docxorg-x11-server-Xwayland1.3.3-10.el9_2.143.0-5.el9_2.1
3.1
4.36.el9_7.1:2.3.16-11.el9_4.1
5.el9_7.1	7.el923.2.7-1.el93.el9_64.el9_65.el9_76.el9_75.4.2-4.el9_0.34-2.el9_13.el9NetworkManager-libnm-develcups-filters-develdevice-mapper-multipath-develflac-develjq-devellibarchive-develksba-develnbd-develsndfile-develss_nss_idmap-developencryptoki-develjpeg2-devel
toolsrepokey:type:idshadow-utils-subid-develturbojpeg	-develzziplib-devel1.20.11-11.el9	7.el9	9.el924.el9	6.el9	8.el9_631.el9_6	2.el9_7	3.el9_7:0.9.72-5.el920221207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_59:20200406-26.el9_2bind9.18-libsflatpak-session-helpernghttp2python3-samba-testyajl-devel15.6-1.el9.alma:7.1.8.1-11.el9.alma2.el9_3.alma4.alma.13.el9_4.alma.14.el9_4.alma.1
8.el9_1.alma2.41-3.el932:9.16.23-1.el9_0.15.14.0-162.12.1.el9_18.1.el9_122.2.el9_13.1.el9_16.1.el9_1284.11.1.el9_225.1.el9_270.26.1.el9_0
30.1.el9_08.0.44-1.el9_75-1.el9_7dovecotlua0.11.0-7.el93.71-11.el9_4	2.el920.2-6.el91.1-1.el92.el9_730.0-6.el91.1-65.el95.13-14.el9_78.7-20.el97.el9_0.11.0.31-8.el9_5.216.2-19.el9_6.12.el93.el9_3.158.el9_5.12.0-11.el96-2.el9_72.1-2.el9_34.el92-3.el94.el9_65.el9_78.7-11.el9_2.17.el9_43.3-0.el92.9-1.el9_55.1-5.el9_06.el9_16-17.el9_6.29.el9_7.0.2.17-1.el9_79.0-10.el9_77.el9_2.alma.18.el9_59.el9_64-1.el9:1.42.0-2.el9_48.10-2.el9_5.alma.1
5.el9_52.5.4-38.el9_7.33.4.10-4.el9	6.el9	8.el9_7.12.0.15-32.el9_532-5.el9_41.0-22.el95.2-1.el968.4-11.el94.el9_4.16.el9_6.28.el9_7.127.0-11.el9_7.39.4-11.el9_6.16.el9_47-4.el9_7.10201107-6.el9	7.el9_7	8.el9_7:4.9-15.el98.el90.3-2.el9_6.13.1.1-2.el9_4.15.13.el9_7.122.2-2.el93-5.el91.0-9.el9_3.alma.15.0-4.el9_7.23.17-13.el95.3-4.el95.15.9-10.el9_41.el9_67.el99.el92.1-9.el9_7.139-16.el94.0-5.el972-2.el96.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.1OpenIPMI-develPackageKit-glib-develautotracevahi-gobject
-develbluez-libs-develcapstone-develfile-develreeipmi-develgcc-plugin-develiflib-devellasso-develibfdisk-develinput-develjose-develldb-develmicrohttpd-develnfsidmap-develrabbitmq-develsmartcols-develtdc++-statictirpc-develudisks2-develv-develmpg123-develunge-develpmix-pmi-develrocps-ng-develtobuf-c-compilerdevelraptor2-develepokey:type:strspeex-develtexlive-lib-develpm2-tss-develwavpack-develyelp-devel0.42.2-3.el91:0.36.2-8.el92.0.7-6.el9bpftoolcorosync-vqsimflacreeradius-mysqlperlostgresqlrestsqliteunixODBCjava-25-openjdk-crypto-adapter-fastdebugslowdebugdemo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebugkernel-abi-stablelistscoredebug-core
devel-matched
modules-extra	vel-matchedocheadersmodules-extratools-libslibvirt-client-qemulock-sanlockocaml-libnbd-develperfoppler-glib-docython3-perf.12-setuptools-wheelqt5-devel0.99.9-5.el91.0.9-1.el92.0-7.el9_211-32.el9_08.10-2.el9.alma0.0.104-1.el9_7:0.82-6.1.el9_61.20.1-14.el9_2.1.alma.13.2.7b-11.el9_74.04-1.el9_62.0.2-4.el91.0-21.el94.5-8.el9_49.el9_45.2-9.el9_56.1-8.el9_67.0-10.el9_752-32.el9_4.alma.1:1.20.1-22.el9_6.2.alma.1
4.el9_7.1.alma.12.alma.13.alma.13.1.9-2.el9_67.124.31-5.el94.4.0-10.el92.el9_4.13.el9_6.25.el9_7.232.el95.el9_17.el98.el9_25.1.8-6.el9_14.0-284.18.1.el9_230.1.el9_26.0.109-1.el9_010-1.el9_03-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.100-2.el9_31-1.el9_32-2.el9_33-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_44-1.el9_56-1.el9_67-1.el9_621-1.el9_65-1.el9_76-1.el9_72.0-18.el9_7.29.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_65-1.el9_7aspnetcore-runtime-6.0targeting-pack-6.0bash-develcc-develsdtardotnet-apphost-pack-6.0hostfxr-6.0runtime-6.0sdk-10.0-source-built-artifacts6.0targeting-pack-6.0emplates-6.0xygen-doxywizardlatexfwupd-develgolang-github-cpuguy83-md2manrub2-efi-x64
-cdbootpctools-efi
xtraminimaltk3-devel-docsjava-1.8.0-openjdk-demovelheadlesssrc1-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs7-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsmclibarchivefastjson-develguestfs-develgobject-develinput-utilswebp-toolsua-guestfsmariadb-backupcommonembedded	rrmsggssapi-serveroqgraph-enginepamserver-galerautilsingw32-binutilscppgcc-c++libgcc64-binutilscppgcc-c++libgccnetstandard-targeting-pack-2.1ocaml-libguestfs-develperl-JSON-XSYAML-LibYAMLhp-libguestfsython3-capstoneqatzip-develrepokey:type:flexarrayuby-libguestfsshim-unsigned-x64x64ystemd-boot-unsignedtransfigzlib-static0.34-19.1.el9_641.2-3.el9_7.11.30-6.el99.4-10.el9_63.0.4-160.el9_07-162.el9_43.el9_56.el9_74.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_42.2-1.el9_5.34.el9_6.1522.el9_7.15.15.3-1.el99-1.el968.2.2-3.el9_4.15.el9_6apache-commons-beanutilsbcc-doccapstone-javagrub2-commonefi-aa64-modules
x64-modulespc-modulespc64le-modulesjava-1.8.0-openjdk-javadoc-ziplibguestfs-man-pages-jaukmicrohttpd-docmingw32-pixmanzlib-static64-pixmanzlib-staticperl-File-Find-RuleModule-ScanDepsython3-wheel
-wheel.12-wheel-wheeltexlive-gnu-freefontvirt-v2v-man-pages-jauk2Criticalpatch:ALBA-2022:8256SA-2022:5099249527695709369486003435218590610763913997007139018531482399586870980032262878139519420782152673178534001582034936433:00771942021030243440626951371068470693703879809092127656248596132640703458987519328299262134235815925661711452340576099158778325776424504869143621445369625396849708113344953838924624266533040369409316982945081844516675621312596785705712328446725357784914:014151262496567466805748951771027475918589397883111121932742418623930910427691750898182258213747698499204836647687992535377944336351225851607175884233306395016197548357895999407783494395056378738362374955676679928355192231334635338392899614663799735646452967757997734686798037117214762374446761780091435908893122867814790231771413394295016854386058275:00593123477422657891436101364889379585837627731140411849612627468343294660296244208785007101894296617406086398597018180708416237742760814951281815214911340958493050205185983892854660111101462240586531094224132342627689363148455259374244491697771079386357820130950954022233075869860090381428333376435581379080114884302330462517877806:012637445917005293927832361074574949136098843504227135656738574081078819588797161720648269380293991339203948212722768630346679518948873094066416582164457546759828985599603600415328563004057062876670026689158075457698598892196836993A00259repokey:type:relidarray
numsitory:solvablessolvable:arch	buildtime	conflicts	description	evr	name	patchcategory
rovides	summary	vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatus�M�M�Q�Q�U�U�H�H�J�J�N�N�O�O�,�,�K�K�L�L�E�E�R�R�Z�Z�T�T�S�S�\�\�G�G�I�I�f�f�8�8�u�u�k�k�l�l���[�[�z�z���Z�Z�{�{�X�X���|�|�V�V�����Y�Y�T�T�x�x�y�y�~�~�U�U�������}�}�W�W�S�S�	�	�����R�R�P�P�N�N���Q�Q�������O�O�
�
����kkxx�a�a�c�c�d�dttmm�\�\nnppssllrr�_�_ww�^�^qq�b�b�]�]uuoo�`�`vv�v�v�x�x�p�p�y�y�o�o�t�t�u�u�r�r�s�s�V�V�T�T�q�q�U�U�w�w�5�5���?�?�;�;�<�<���4�4�@�@�>�>�:�:�9�9�fQ�+�*�^ed���
�
�������	�	�*�)�+�\�\�����V�V�u�[�[�3�3�2�2������L�L�F�F�G�G�J�J�I�I�K�K�H�H��P���RR�f�v�v�v�r�r�r��PQ�E�E�+�E�h�h�	�	�i�i�
�
���n�n�j�j���G�G�H�H�I�I�H�G�I�$�$�$�W�W�1�1�0�0�[�[�[R�s�s�s�.�.�'�'�'�$�$�!�!�"�"�$�!�"�#�#�#���|�|�{�{�{�|�C�C�C�*fff���n�n�m�m�Z�Z�V�V�Z�W�W�V�W�������������}�}�{�{�~�~���|�|�]�]�'�'�'�k�k�l�l�6�6���������3�3�0�0�2�2�4�4�1�1�/�/hhjjjh�J�J�J�D�D�%�%������%����E�E�q�q�qed�%�%�%�m�m�T�T�U�U�X�X�T�Y�Y�Y�X�U�j�jii�*�+�)i���������<�<�<�&�&�&�S�S�g�g�������������!�!� � �!� �u�u�u�~�~�~�&�&�&����A�A�?�?�>�>�?�>�A�@�@�B�B�B�=�=�=�@�m�m�s�s�j�j�i�i�l�l�t�t�g�g�o�o�q�q�n�n�r�r�h�h�k�k�p�p���v�v�v##%%$$�$#%��x�x�x����z�z�z����w�w�Y�Y�w�X�X���z�z�������y�y�y��������� � � �^�w�w�w����M�M�7�7�p�p�p�	�	�	�D�D�D�i�i�"�"�"�t�t�t�B�B�A�A�C�C�
�
�
����������������-�-�(�(�(�����������e�e�:�:�;�;�6�6�=�=�9�9�A�A�B�B�@�@�8�8�5�5�D�D�>�>�C�C�7�7�?�?�<�<�������������������=�=�
�
�
�
�
����C�z�{�|�}�F�~��������P����	�
���
������������������� �!�E�"�;�#�;�$�;�%�;�&�;�'�;�F�(�:�)�:�*�:�+�:�,�:�-�:�G�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�H�. �\ �] �^ �_ �` �a �b �c �d �e �f �g �h �i �j �k �l �m �n �o �p �q �r �s �t �u �v �w �/ �x �y �I�z�{�|�}�~�����������	�
���
������������������� �!�"�#�$�%�&�'�J�(J�)J�*J�+J�,J�-J�.J�/J�0J�1J�2J�3J�4J�5J�6J�7J�8J�9J�:J�;J�<J�=J�>J�?J�@J�AJ�BJ�CJ�K���z�{�P�|�}�������������������F�
���
����	�~������ �!�L�D�L�E�L�F�-�G�-�H�L�I�L�J�L�K�L�L�L�M�L�N�-�O�-�P�L�Q�L�R�-�S�-�T�-�U�-�V�L�W�L�X�L�Y�L�M�N�O�P�Q�Z��R�S�T�U�V�Y�Z�[��[�\�m�\�]�^�_�`�a�b�c�Z�c�d�e�f�g�h�i�]�g�j�k�l�m�n�[�4�p�u�[�5�v�w�x�y�z�{�|�}�~��[�6��\�n�������	�
���
���Z�Z����������\�o�����_��`�� �!�[�7�"�#�$�%�&�'�(�)�Z�[�*�+�,�-�.�/�0�1�2�3�4�5�6�7�`��_��8�m��n��o��9�[�8�:�;�<�Z�\�=�>�?�@�A�B�C�E�F�G�A�m��n��o��H�R�o�(�o�I�J�K�L�M�N�O�P�_��`��Q�R�r�4�s�4�S�m��n��o��T�U�V�W�Y�[�9�[�\�_�m��n��o��a�b�c�e�f�g�h�i�j�k�l�m�n�o�p�q�[�:�r�s�t�u�v�w�x�(�p�R�p�y�z�{�|�t�/�u�/�}�[�A�~�`�$�_�$��(�s�R�s�������	�
��Z�]��
����������������_��`����� �!�"�#�$�Z�^�'�(�)�*�+�,�-�.�0�1�2�3�4�r�5�s�5�5�o��n��m��6�`��_��7�[�;�8�9�:�;�<�=�>�?�@�A�(�q�R�q�B�C�D�E�_��`��F�[�<�G�H�I�J�Z�_�K�L�M�N�O�P�Q�t�&�u�&�R�[�=�S�`� �_� �T�o��m��n��U�s�6�r�6�V�W�]�e�X�Y�Z�[�\�]�^�_�`�a�b�c�d�`�!�_�!�e�[�>�f�t�'�u�'�g�h�i�j�R�r�(�r�k�l�^�h�m�n�o�p�q�r�s�t�-�u�-�t�`�"�_�"�u�v�[�?�w�x�s�7�r�7�{�_�#�`�#�|�u�.�t�.�}�[�@�~�����������	�
�[�C��_��`��
�u�2�t�2����������������� �!�u�3�t�3�"�`��_��#�$�%�[�D�&�'�(�)�y�P�z�P�*�+�,��d�-�.�Z�`�/�0�1�3�4�5�6�7�8�9�:�;�<�=�>�?��e�@�A�C�D�E�F�^�k�G�H�Z�a�I��f�J�K�L�M�N�O�P�t�(�u�(�Q�[�E�R�S�T�U�u�0�t�0�V�_�%�`�%�W�X�Y�Z�[�\�]�[�B�^�u�1�t�1�_�_��`��`�a�b�^�i�c�d�e�f�h�i�m��o��n��j�k�l�m�n��m��o��n�o�p�q�r�s�t�u�v�w�x�y�z�|�}�~�^�j�����������
����u�,�t�,��_��`���[�I���^�l��������]�f��t�)�u�)��_��`���[�F�� �!�"�#�$�%�'�(�)�*�,�-�.�(�t�R�t�/�0�1�2�3�4�5�6�7�8�9�t�*�u�*�:�[�G�;�_��`��<�=�>�?�@�A�B�C�D�F�G�t�+�u�+�H�_��`��I�J�K�L�[�H�N�O��g�Q�Z�b�R�S�T�U�V�W�X�Y�Z�[�\�]�^�����S�S�S�S�S�	S�
S�S�S�
S�+S�*S�-S�S�S�S�S�,S�����)S�D�W�X���o��4�q��5����6���7��8�D�X�Z��9�]�^�d��:��A��/��;��<��=��>��?��@��C���D�B��E��B��I��F�&��G�E��H�P��`��`�x�;��:�F��G��]��}�L�~�L�y�L�z�L�{�L�|�L��&��&��&��&�������F��G��:�:�":�#:�&:�':�:�:�:�:�:�
:�:�:�:�:�z:�{:�:�:�|:�}:� :�!:�
:�:�:�:�hV�iV�\V�]V�nV�oV�pV�qV�`V�aV�tV�uV�xV�yV�^V�_V�vV�wV�lV�mV�:'�;'�2'�3'�R'�S'�L'�M'�P'�Q'�J'�K'�T'�U'�V'�W'�B'�C'�6'�7'�<'�='�@'�A'�H'�I'�0'�1'��J��J��J��6��6� �6�!�b�"�b��'��'��'��'�#��$��%��&��'��(��)��*��+�m�,�m�-�m�.�m�/g�0g�1g�2g�3g�4g�5g�6g�7g�8g�9g�:g�;g�<g�1g�0g�=g�>g�@�+�?�+�?�
�@�
�A�
�B�
�C�
�D�
�E�
�F�
�G�
�H�?�I�?�J�?�K�Q�L�Q�M�Q�N�Q�O�Q�P�Q�^�"�Q�:�R�:�S�:��c��c�T�c��c��c�U�_�V�_�W�_�X�_�Y�_�Z�~�[�~�\�~�]�J�^�J�_�J�`�J�a�J�b�J�c�J�d�J�e�J�f�J�g�J�h�J�i�~�j�~�k�P�l�P�m�P�n�P�o�P�p�P�q�g�r�g�s�g�t�g�\��u��v��w��x�j�y�j��#��#��#��#�z��{��|��}��~������������������,���^��^�	�^�'�4�(�4�$�4�%�4�&�4�)�4�*�4�
�4��4��4�#�4�
�H��H��H�y�y�y�y�y�y�y�y�y�y�y�y�y�y�y�y�r�Z�{�W�{�Y�{�X�{�s�7�u�4�u�8�u�5�u�t� ��!���5�%�5�'�5�(�5��5�*�5�#�5�&�5�
�5�)�5�$�5�"��#��$��F��G��;�;�
;�;�;�;�;�;�;�;�z;�{;�;�;�&;�';�|;�};� ;�!;�;�;�;�;�;�
;�";�#;�<(�=(�2(�3(�0(�1(�V(�W(�6(�7(�:(�;(�H(�I(�B(�C(�J(�K(�P(�Q(�T(�U(�L(�M(�R(�S(�@(�A(�tW�uW�xW�yW�vW�wW�^W�_W�`W�aW�hW�iW�pW�qW�\W�]W�nW�oW�lW�mW�i��j��%��&��'��(����������)��*���K��K��K�� �� �� �� �
�6�(�6�'�6�&�6�$�6�%�6��6�*�6�#�6��6�)�6�+�n�,�n�.�n�-�n�+�M�,�M�-�M�.�M�/�M�0�M��!��!��!��!�k�_�l�_�a�_�b�_�g�_�h�_�c�_�d�_�i�_�j�_�e�_�f�_��"��"��"��"�<�<�
<�<�<�<�<�<�<�<�<�<� <�!<�"<�#<�&<�'<�<�
<�|<�}<�<�<�z<�{<�<�<�J)�K)�<)�=)�T)�U)�L)�M)�V)�W)�B)�C)�P)�Q)�@)�A)�H)�I)�R)�S)�:)�;)�2)�3)�6)�7)�0)�1)�nX�oX�tX�uX�lX�mX�hX�iX�\X�]X�pX�qX�`X�aX�^X�_X�xX�yX�vX�wX�����|��}������������z��{��~����,��R��1��2��S��3�d�4�d�5�d�6�d�7�d�8�d�9�d�:�d�;�d�<�d�=�d�>�d�\��u��v��w��c�K�^�K�]�K�e�K�b�K�d�K�`�K�_�K�a�K�f�K�g�K�h�K��Z�T�Z��Z��Z��Z�?�Y�@�Y�A�Y�B�Y�C�Y�D�Y�i��j��S�;�R�;�Q�;�E�X�F�X�G�X��$��$��$��$� �5��5��5�H�c�I�c�~L�L�L�L�,L�zL�{L�JL�KL�L�LL�ML�NL�OL�L�L�L�PL�L�|L�}L�QL�&�w�'�w�x�w�-�o�.�o�,�o�+�o�R�3�S�3�T�3��U�i�V�i��}�M�~�M�{�M�|�M�y�M�z�M�W�F�X�F�Y�F�F��G��Z��[��\��]��^��_��`��a��b��c��d�� ��!��'�7�(�7�$�7�%�7�)�7�*�7��7��7�
�7�&�7�#�7�>��e��f��g��i��j��e�`�f�`�i�`�j�`�k�`�l�`�a�`�b�`�g�`�h�`�c�`�d�`�K�.�L�.�O�.�P�.�M�.�N�.�v�.�w�.����� ��!��F�	�G�	�T�[��[��[��[��[�@*�A*�0*�1*�R*�S*�6*�7*�T*�U*�H*�I*�V*�W*�<*�=*�L*�M*�:*�;*�2*�3*�J*�K*�P*�Q*�B*�C*�=�=� =�!=�z=�{=�=�=�
=�=�=�=�=�=�"=�#=�|=�}=�=�
=�=�=�=�=�&=�'=�=�=�hY�iY�xY�yY�tY�uY�vY�wY�^Y�_Y�lY�mY�nY�oY�`Y�aY�pY�qY�\Y�]Y�M�M�M�M�LM�MM�JM�KM�QM�M�,M�|M�}M�zM�{M�PM�NM�OM�M�M�M�~M��%��%��%��%� ��!��F�
�G�
�X�`�Y�`�U�`�V�`�W�`�����F��G�� ��!��h�a�i�a�j�k�l�m�n�o�p�q�r�s�t�u�v�w�Z��[��^��_��c��d��`��]��b��\��a��x��y��z��{��|��}��&�8�'�8�(�8��8�*�8��8�%�8�)�8�
�8�$�8�#�8�~�P��P��P�:��;��@��A��<��=���\��\��\��\�T�\�F��G��p�f�q�f�nZ�oZ�tZ�uZ�pZ�qZ�\Z�]Z�vZ�wZ�lZ�mZ�hZ�iZ�xZ�yZ�^Z�_Z�`Z�aZ�:+�;+�J+�K+�2+�3+�<+�=+�V+�W+�H+�I+�@+�A+�0+�1+�B+�C+�L+�M+�T+�U+�P+�Q+�6+�7+�R+�S+� ��!��>�>�
>�>�>�
>�|>�}>�>�>� >�!>�>�>�>�>�>�>�>�>�&>�'>�">�#>�>�>�z>�{>��a��a��a��a��a�"��#��$��F�
�G�
� ��!��|��x��y��}��{��z��1�o�2�o�S�o�w��v��\��u���/��/��/�^�#�	�z�
�z��z�v�/�w�/�O�/�P�/�M�/�N�/��/�
�/��_��_�G�Y�F�Y�E�Y��,��,��,�a��[��^��_��d��c��b��\��]��`��Z��%��&��'��(���4��4��4��4��4�z��}��y��|��{��x���]�y�]�x�]�������2��i�x�j�x��K��K��K��K� �K�!�K�"�_�#�_�$�_�%�l�&�l�'�l�$�9�%�9�)�9�*�9��9��9�#�9�'�9�(�9�
�9�&�9�NN�ON�PN�MN�N�N�N�N�N�N�,N�JN�KN�zN�{N�QN�|N�}N�N�N�~N�LN�(�r�)�r�*�r�+�v�,�v�-�v�.T�/T�0T�1T�2T�3T�4T�5T�6T�7T�8T�9T�:T�;T�<T�=T�>T�?T�<�*�;�*�`�x��y��{��z��|��}��@?�A?�B?�C?�D?�E?�F?�G?�H?�I?�J?�K?�L?�M?�N?�O?�P?�Q?�R?�S?�T?�U?�V?�W?�X?�Y?�Z?�[?�O�O�O�O�LO�MO�NO�OO�|O�}O�PO�O�,O�zO�{O�~O�O�JO�KO�QO�O�O��b��b��b��b��b�\��]�� ��!��F��G��k�a�l�a�a�a�b�a�i�a�j�a�e�a�f�a�g�a�h�a�c�a�d�a�^�A�_�A�`�A��� ��!��\� �]� �F��G��NB�OB�FB�GB�@B�AB�DB�EB�JB�KB�ZB�[B�RB�SB�HB�IB�XB�YB�BB�CB�VB�WB�PB�QB�LB�MB�TB�UB�^[�_[�v[�w[�\[�][�p[�q[�h[�i[�l[�m[�t[�u[�x[�y[�`[�a[�n[�o[�@,�A,�L,�M,�P,�Q,�H,�I,�6,�7,�0,�1,�:,�;,�V,�W,�J,�K,�2,�3,�<,�=,�T,�U,�R,�S,�B,�C,�0�0�"0�#0�z0�{0�0�
0�0�0� 0�!0�0�0�0�0�
0�0�|0�}0�&0�'0�0�0�0�0�0�0�
�:�(�:�&�:�'�:��:�%�:�$�:�)�:�*�:�#�:��:� ��!��F��G��\�!�]�!�i�b�j�b�g�b�h�b�k�b�l�b�e�b�f�b�c�b�d�b�a�b�b�b�Q�<�R�<�S�<�a��b����������1�p�2�p�S�p�g�M�h�M�e�M�f�M�a�M�b�M�F�M�c�M�d�M�i�M�j�M�k�M�l�M�]����������a��b��c�/�d�/�e�/�f�/�g�/�h�/�i�/�j�/�k�/�l�/�m�/�&�A��A�*�A�$�A�%�A�
�A�(�A�#�A�'�A�)�A��A�a�$�[�$�c�$�_�$�^�$�`�$�]�$�\�$�b�$�d�$�Z�$�S�s�1�s�2�s�Q�>�R�>�S�>��n�8�o�8�p�8��q�I�r�I�s�I�{�N�|�N�}�N�~�N�y�N�z�N�a��b����������t�t�u�t�v�t� ��!��\�"�]�"�%��&��'��(��$��#��"��S�=�R�=�Q�=�T�]��]��]��]��]�l\�m\�n\�o\�^\�_\�\\�]\�v\�w\�p\�q\�h\�i\�`\�a\�t\�u\�x\�y\�P-�Q-�0-�1-�6-�7-�<-�=-�R-�S-�H-�I-�B-�C-�:-�;-�V-�W-�L-�M-�2-�3-�T-�U-�J-�K-�@-�A-�1�1�1�1�z1�{1�1�
1� 1�!1�&1�'1�1�1�
1�1�"1�#1�1�1�|1�}1�1�1�1�1�1�1�NC�OC�HC�IC�XC�YC�PC�QC�FC�GC�DC�EC�VC�WC�JC�KC�BC�CC�@C�AC�TC�UC�LC�MC�ZC�[C�RC�SC��0��0��0���\��u��v��w��n�7�o�7�p�7�w�s�x�s�y�s�z�8�{�8�|�8�}�8�~�8��8��8�C�R�B�R�A�R�?�R�@�R�D�R�O�x�P�x�M�x�N�x��x�
�x�R�
�1�
�2�
�S�
��{�
�{�	�{�`�B�_�B�^�B�i�y�j�y�`��]��d��Z��[��\��c��_��b��a��^��-�N�.�N�0�N�,�N�/�N�+�N����������-��-��-�a��b����������6U�/U�;U�:U�4U�1U�7U�8U�<U�=U�.U�0U�>U�2U�3U�5U�?U�9U��p��p��}�	�}�
�}�3�)�6�)�%�Z�|�Y�|�W�|�X�|�&��^��^��^�T�^��^�O�v�P�v�M�v�N�v��v�
�v��f��f�
�f�����a��b������\�#�]�#� ��!��a��b����������vz�wz�nz�oz�uz�mz�lz�pz�kz�sz�rz�qz�tz�jz��c��c��c��c��c�a��b������������%��&��'��(���k��k�]���5��5��5��5��5�|��x��y��z��}��{��`��]��\��b��a��[��d��c��_��^��Z��
�;�(�;��;�*�;�&�;�)�;�$�;�%�;�#�;�'�;��;�����a��b������F��G��\�$�]�$�`]�a]�t]�u]�l]�m]�x]�y]�\]�]]�^]�_]�n]�o]�v]�w]�h]�i]�p]�q]�V.�W.�@.�A.�0.�1.�L.�M.�<.�=.�H.�I.�R.�S.�B.�C.�:.�;.�T.�U.�P.�Q.�J.�K.�6.�7.�2.�3.�2�2� 2�!2�
2�2�2�2�2�2�2�2�&2�'2�z2�{2�"2�#2�|2�}2�2�2�2�2�2�
2�2�2�XD�YD�@D�AD�HD�ID�JD�KD�LD�MD�ZD�[D�ND�OD�BD�CD�FD�GD�TD�UD�RD�SD�VD�WD�PD�QD�DD�ED��	��	��	��	�a�	�b�	��x�
�x�	�x�S�q�1�q�2�q�'��(��%��&���T��T��T�O�w�P�w��w�
�w�M�w�N�w�c��_��\��]��`��Z��[��^��a��b��d���<�%�<�
�<�(�<�$�<�)�<�*�<�#�<�&�<��<�'�<�a�
�b�
��
��
��
��
�7�e�8�e�=�e�>�e�3�e�4�e�5�e�6�e�9�e�:�e�;�e�<�e��l��l��_��_�T�_��_��_�\�%�]�%�a��b����������]�$�'��(��%��&������a��b������k�c�l�c�g�c�h�c�i�c�j�c�a�c�b�c�e�c�f�c�c�c�d�c�e�&�f�&�k�&�d�&�l�&�i�&�g�&�h�&�j�&�m�&�c�&�&�=�#�=�'�=�(�=�)�=�*�=��=�$�=�%�=�
�=��=�c� �_� �\� �]� �a� �[� �Z� �d� �`� �^� �b� �}��y��{��x��z��|���6��6��6��6��6�$�`�#�`�"�`�s�e�r�e�t�e�q�e�a�
�b�
��
��
��
��
�~�9�{�9�|�9�}�9��9��9�z�9�����a��b������Y�G�X�G�W�G�F��G��\�&�]�&��\��\��\�^^�_^�t^�u^�h^�i^�v^�w^�\^�]^�x^�y^�l^�m^�n^�o^�`^�a^�p^�q^�P/�Q/�:/�;/�6/�7/�H/�I/�V/�W/�T/�U/�L/�M/�B/�C/�@/�A/�2/�3/�</�=/�0/�1/�R/�S/�J/�K/�3�3�3�3�3�3� 3�!3�z3�{3�&3�'3�3�3�3�3�3�
3�"3�#3�3�3�|3�}3�
3�3�3�3�@E�AE�FE�GE�RE�SE�ZE�[E�JE�KE�DE�EE�NE�OE�PE�QE�LE�ME�BE�CE�HE�IE�XE�YE�VE�WE�TE�UE���������a��b��b�!�d�!�^�!�_�!�a�!�[�!�c�!�\�!�]�!�Z�!�`�!��>�*�>�'�>�(�>�
�>�)�>�$�>�%�>�&�>�#�>��>�e�'�f�'�l�'�g�'�h�'�k�'�d�'�i�'�j�'�m�'�c�'�a��b�����������n��n��n�i�z�j�z�1�r�2�r�S�r�R��1��2��S���h��h��h��h�\��u��v��w��M�y�N�y��y�
�y�O�y�P�y�f�
�g�
�h�
�_�
�`�
�]�
�^�
�e�
�b�
�[�
�c�
�d�
�a�
��S��S��S� �w�!�w�"�2�#�2�'�2�l�-�f�-�k�-�d�-�g�-�h�-�i�-�m�-�e�-�c�-�j�-�`�"�]�"�d�"�a�"�[�"�c�"�_�"�b�"�^�"�\�"�Z�"�$�U�%�U�&�U�&�?�'�?�(�?�
�?�$�?�%�?��?��?�*�?�#�?�)�?�'��(��)��*�h�+�h�,�h�y�Z�}�W�}�X�}�Y�}�z��7��7��7��7��7�`�#�]�#�a�#�[�#�Z�#�^�#�_�#�\�#�b�#�c�#�d�#�e�.�f�.�i�.�k�.�d�.�j�.�h�.�c�.�l�.�g�.�m�.��@�*�@�'�@�(�@�$�@�%�@�)�@�&�@�#�@��@�
�@�-�.�.�.��o��o��o���������a��b��~�Q��Q��Q���������a��b��/�[�0�[�1�[���&�V�%�V�$�V�&4�'4�4�4�4�4�4�4�4�4�4�4�"4�#4�
4�4�4�4�z4�{4�|4�}4�4�4� 4�!4�4�
4�TF�UF�@F�AF�HF�IF�JF�KF�RF�SF�BF�CF�LF�MF�FF�GF�VF�WF�DF�EF�PF�QF�XF�YF�ZF�[F�NF�OF���������a��b��:��;��@��A��<��=��W�~�X�~�Z�~�Y�~��)�C�*�C��C�
�C�(�C�#�C�$�C�%�C��C�&�C�'�C�c��_��b��`��]��\��^��Z��[��d��a��e�2�f�2�k�2�d�2�i�2�l�2�g�2�h�2�m�2�j�2�c�2��#��#�a�#�b�#��#��#�2�L�3�L�4�L��$��$��$��$�a�$�b�$�n`�o`�x`�y`�``�a`�l`�m`�p`�q`�\`�]`�^`�_`�t`�u`�h`�i`�v`�w`�6�6�6�6�6�
6�6�6�z6�{6�6�6�&6�'6�6�6�"6�#6� 6�!6�6�6�
6�6�6�6�|6�}6�HH�IH�@H�AH�DH�EH�XH�YH�TH�UH�BH�CH�RH�SH�LH�MH�PH�QH�NH�OH�FH�GH�VH�WH�JH�KH�ZH�[H�"�a�#�a�$�a��%��%�a�%�b�%��%��%�S�9�R�9�Q�9�a�&�b�&��&��&��&��&���������a��b��a�'�b�'��'��'��'��'�]�%�5�z�6�z�7�z�8�z�9�z�:�z��;�L�<�L�=�L�>�L�?�L�@�L�a�(�b�(��(��(��(��(��)��)��)��)�a�)�b�)��*��*��*��*�a�*�b�*�c�O�d�O�g�O�h�O�a�O�b�O�F�O�e�O�f�O�k�O�l�O�i�O�j�O�l�3�f�3�k�3�d�3�i�3�e�3�c�3�j�3�h�3�g�3�m�3�^��_��d��`��]��a��[��\��c��Z��b���+��+��+��+�a�+�b�+�A�e�B�e�C�e��D�%�D�'�D�(�D�&�D�$�D�
�D�#�D��D�*�D�)�D��,��,��,��,�a�,�b�,��-��-��-��-�a�-�b�-�a�.�b�.��.��.��.��.�}�P�~�P�{�P�|�P�a�/�b�/��/��/��/��/�����a��b������D�d�E�d�R�d�F�d�G�d�}�O�~�O�y�O�z�O�{�O�|�O��`��`��`�T�`��`��0��0�a�0�b�0��0��0�� �H�h�I�h�2��1��1��1��1�a�1�b�1�k�N�l�N�F�N�a�N�b�N�i�N�j�N�c�N�d�N�e�N�f�N�g�N�h�N��2��2�a�2�b�2��2��2�\�*�]�*�-�2�.�2��3��3��3��3�a�3�b�3�pa�qa�xa�ya�ta�ua�ha�ia�la�ma�`a�aa�na�oa�\a�]a�va�wa�^a�_a�"7�#7�7�7�7�7�z7�{7�
7�7�7�7�7�
7�|7�}7�&7�'7� 7�!7�7�7�7�7�7�7�7�7�RI�SI�LI�MI�@I�AI�TI�UI�PI�QI�JI�KI�VI�WI�FI�GI�HI�II�DI�EI�BI�CI�XI�YI�NI�OI�ZI�[I�i�{�j�{��4��4��4��4�a�4�b�4�@��A��:��;��<��=���5��5��5��5�a�5�b�5�D�e�E�e�R�e�G�e�F�e�a�G�b�G��G��G��G��G�%�k�&�k�'�k��.��.��.��!�
�g��g��g�i�|�j�|��k��k��k��k�w�	�v�	�\�	�u�	�T�a��a��a��a��a�F�f�E�f�G�f�R�f�D�f�J�d�K�d�L�d��6��6��6��6�a�6�b�6��7��7��7��7�a�7�b�7�{�(�|�(�}�(�~�(�E�Z�F�Z�G�Z��8��8��8��8�a�8�b�8�g�(�h�(�m�(�i�(�l�(�f�(�j�(�e�(�c�(�d�(�k�(��E�*�E�'�E�(�E�&�E�$�E�%�E�)�E�
�E��E�#�E�a��b����������-�/�.�/�\�'�]�'�m�0�g�0�h�0�k�0�d�0�i�0�e�0�f�0�j�0�c�0�l�0�^�%�_�%�c�%�`�%�]�%�Z�%�[�%�d�%�\�%�a�%�b�%�x_�y_�h_�i_�n_�o_�^_�__�`_�a_�p_�q_�\_�]_�v_�w_�l_�m_�t_�u_�
5�5�z5�{5�5�5�&5�'5�5�5�5�
5�|5�}5�"5�#5�5�5�5�5�5�5� 5�!5�5�5�5�5�PG�QG�TG�UG�FG�GG�HG�IG�NG�OG�RG�SG�LG�MG�BG�CG�DG�EG�XG�YG�ZG�[G�@G�AG�JG�KG�VG�WG���������a��b��p{�k{�v{�w{�n{�o{�u{�m{�l{�q{�r{�j{�t{�s{��m��m�
�B�(�B�$�B�%�B�'�B��B�*�B�&�B�)�B�#�B��B�k�1�d�1�i�1�j�1�h�1�e�1�f�1�m�1�c�1�g�1�l�1�Z��[��`��]��b��a��c��_��\��d��^��C��D��F��@��E��B��A��?��G��\��w��v��u���i��i��i��i�`�C�_�C�^�C�M�u�N�u�p�Q�l�Q�o�Q�n�Q�m�Q�k�Q�:��g��n��n�p�q�q�q�z��x��y��}��{��|��a��b����������O�m�P�m�Q�m�.&�/&�<&�=&�9&�:&�4&�1&�7&�8&�R&�S&�0&�T&�>&�U&�V&�?&�;&�5&�3&�W&�6&�2&�{��}��y��z��|��x��\�(�]�(�-�0�.�0���������a��b��a��b����������`�D�_�D�^�D�����a��b������"��#��$����������a��b��n|�o|�s|�r|�v|�w|�u|�m|�p|�k|�l|�q|�t|�j|�\�)�]�)�-�1�.�1�� �� �� �� �a� �b� �&��{��R��R�~�R���a�!�b�!��!��!��!��!��j��j��j�w��v��\���j�u��X�e�Y�e���y�
�y�	�y�9���v}�w}�u}�m}�t}�o}�l}�n}�s}�r}�j}�k}�p}�q}�a�"�b�"��"��"��"��"�d��`��_��[��c��^��e��b��]��a��h��g��f��<��=��@��A��:��;��a�9�b�9��9��9��9��9�e�P�f�P�i�P�j�P�c�P�d�P�k�P�l�P�F�P�a�P�b�P�g�P�h�P�Z�g�[�g�	�\�-�]�-�
�a�:�b�:��:��:��:��:�"8�#8�8�8�
8�8�z8�{8� 8�!8�&8�'8�8�8�8�8�8�8�8�8�8�8�8�8�|8�}8�8�
8�@@�A@�R@�S@�J@�K@�N@�O@�Z@�[@�V@�W@�L@�M@�B@�C@�H@�I@�D@�E@�T@�U@�P@�Q@�F@�G@�X@�Y@�lb�mb�xb�yb�vb�wb�pb�qb�`b�ab�tb�ub�^b�_b�\b�]b�nb�ob�hb�ib�^!�_!�`!�a!�b!�c!�d!�e!�f!�g!�h!�i!�j!�k!�l!�m!�n!�o!�p!�q!�r!�s!�t!�u!�v!�w!�x!�y!�z!�{!�|!�}!�$�b�#�b�"�b�j�,�h�,�c�,�d�,�k�,�g�,�e�,�f�,�l�,�i�,�m�,�^��_��Z��[��`��]��d��\��a��b��c��&�I�)�I�*�I�
�I�(�I��I�%�I�$�I�'�I��I�#�I��1��1��1��l��l��l��l�w�
�v�
�\�
�u�
��;��;��;��;�a�;�b�;�~�@��@��@�i�}�j�}�a�H�b�H��H��H��H��H�M�v�N�v�s�f�r�f�q�f�t�f�c�)�d�)�i�)�e�)�f�)�m�)�g�)�h�)�l�)�j�)�k�)�a��[��\��]��d��`��c��_��b��Z��^���F�%�F�#�F��F�*�F�
�F�(�F�$�F�&�F�)�F�'�F��N��N��N��q��q��q�$�c�#�c�"�c�a�<�b�<��<��<��<��<��K��K�a�K�b�K��K��K�C�X�B�X�?�X�@�X�A�X�D�X�4�M�3�M�2�M�p�t�q�t�]���O��O��O��O��O�	�O�=��,�i�+�i�*�i�+�D�S�@�S�A�S�B�S�C�S�?�S�a�=�b�=��=��=��=��=��>��>��>��>�a�>�b�>�S�t�1�t�2�t�u~�m~�v~�w~�p~�k~�t~�o~�s~�r~�j~�n~�l~�q~�
�4��4��4��?��?�a�?�b�?��?��?�D�T�@�T�A�T�B�T�?�T�C�T�E��B��G��D��?��@��C��A��F���o��o�a�@�b�@��@��@��@��@�g�Q�h�Q�k�Q�l�Q�F�Q�i�Q�j�Q�c�Q�d�Q�e�Q�f�Q�a�Q�b�Q�
�W��W��W��A��A�a�A�b�A��A��A�i�*�l�*�f�*�j�*�h�*�c�*�d�*�m�*�g�*�e�*�k�*��G�%�G�
�G�(�G�)�G�*�G��G�#�G�$�G�&�G�'�G�^��_��a��[��c��`��]��b��Z��d��\���d��d�~�O��O��O�\�+�]�+�-�3�.�3��B��B��B��B�a�B�b�B�{�)�|�)�}�)�~�)��h��h��h��h��h�(�h�p�r�q�r�v�u�u�u�t�u�C�U�B�U�?�U�@�U�A�U�D�U��C��C��C��C�a�C�b�C�i�+�e�+�f�+�g�+�h�+�j�+�l�+�k�+�d�+�c�+�m�+�^��_��Z��[��a��b��`��]��c��d��\��`�E�_�E�^�E�A�V�B�V�?�V�@�V�D�V�C�V�a�D�b�D��D��D��D��D�*�j�+�j�,�j�M�)�H�*�H��H�%�H��H�$�H�'�H�(�H�#�H�&�H�
�H�p�s�q�s��d��d��d��d��d�D�g�E�g�G�g�R�g�F�g�T�b��b��b��b��b�C�W�B�W�D�W�@�W�?�W�A�W�\�,�]�,��|��|��|��p��p��p��E��E��E��E�a�E�b�E�^c�_c�xc�yc�pc�qc�`c�ac�\c�]c�lc�mc�nc�oc�tc�uc�vc�wc�hc�ic�9�9�9�
9�"9�#9�9�9�9�9�&9�'9� 9�!9�9�9�9�9�z9�{9�9�9�|9�}9�
9�9�9�9�ZA�[A�RA�SA�VA�WA�BA�CA�FA�GA�TA�UA�@A�AA�PA�QA�XA�YA�JA�KA�HA�IA�LA�MA�NA�OA�DA�EA�t"�u"�b"�c"�d"�e"�`"�a"�r"�s"�|"�}"�z"�{"�h"�i"�x"�y"�n"�o"�v"�w"�l"�m"�^"�_"�j"�k"�p"�q"�f"�g"��F��F��F��F�a�F�b�F��I��I�a�I�b�I��I��I��J��J�a�J�b�J��J��J�g�}�b�}�f�}�k�}�i�_�8�d�_�b�a��h�#�y�}�j�#�w�}�x�}�e�#��*�s�#�t�#�u�#�v�}�r��p�}�n�}�m�}�o�#�l��q��c�` NOPSTUABCDEFHIJKLMRWX�N��T��C	��}bugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256
��`qatzip-devel-1.0.9-1.el9.x86_64.rpm��`qatzip-devel-1.0.9-1.el9.x86_64.rpm����|�D	��zBBBBBBBBBBBBBBBBBBBBBsecurityImportant: grub2, mokutil, shim, and shim-unsigned-x64 security updateKy�|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099
��shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm�LSgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm�FSgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm�GSgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm�JSgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm�ISgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm�+Sgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm�*Sgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm�-Sgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm�KSgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm�HSgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm�,Sgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm��shim-x64-15.6-1.el9.alma.x86_64.rpm�)Sgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm��shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm�LSgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm�FSgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm�GSgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm�JSgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm�ISgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm�+Sgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm�*Sgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm�-Sgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm�KSgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm�HSgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm�,Sgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm��shim-x64-15.6-1.el9.alma.x86_64.rpm�)Sgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm����1�E	��\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix updateK�u�
https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249
�Mkernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�Qkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�Fkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm�Ukernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm�Hkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm�Jkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�Pkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�Nkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�Okernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�,bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm�Kkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�Lkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�Ekernel-5.14.0-70.17.1.el9_0.x86_64.rpm�Rkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�Zperf-5.14.0-70.17.1.el9_0.x86_64.rpm�Tkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm�Skernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�\python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm�Gkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm�Ikernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm�Mkernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�Qkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�Fkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm�Ukernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm�Hkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm�Jkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�Pkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�Nkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�Okernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�,bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm�Kkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm�Lkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�Ekernel-5.14.0-70.17.1.el9_0.x86_64.rpm�Rkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�Zperf-5.14.0-70.17.1.el9_0.x86_64.rpm�Tkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm�Skernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�\python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm�Gkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm�Ikernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm�����F	�
�GBBBBB�4securityModerate: libarchive security updateK
�
�Xhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252
�f�;libarchive-3.5.3-2.el9_0.x86_64.rpm�8�;bsdtar-3.5.3-2.el9_0.x86_64.rpm�u�;libarchive-devel-3.5.3-2.el9_0.i686.rpm�u�;libarchive-devel-3.5.3-2.el9_0.x86_64.rpm�f�;libarchive-3.5.3-2.el9_0.x86_64.rpm�8�;bsdtar-3.5.3-2.el9_0.x86_64.rpm�u�;libarchive-devel-3.5.3-2.el9_0.i686.rpm�u�;libarchive-devel-3.5.3-2.el9_0.x86_64.rpm���
�G	��NBBBBB�.securityModerate: libinput security updateK
�b�3https://access.redhat.com/errata/RHSA-2022:5257RHSA-2022:5257RHSA-2022:5257https://access.redhat.com/security/cve/CVE-2022-1215CVE-2022-1215CVE-2022-1215https://bugzilla.redhat.com/20749522074952https://errata.almalinux.org/9/ALSA-2022-5257.htmlALSA-2022:5257ALSA-2022:5257
�k�:libinput-1.19.3-2.el9_0.x86_64.rpm�l�:libinput-utils-1.19.3-2.el9_0.x86_64.rpm��:libinput-devel-1.19.3-2.el9_0.i686.rpm��:libinput-devel-1.19.3-2.el9_0.x86_64.rpm�k�:libinput-1.19.3-2.el9_0.x86_64.rpm�l�:libinput-utils-1.19.3-2.el9_0.x86_64.rpm��:libinput-devel-1.19.3-2.el9_0.i686.rpm��:libinput-devel-1.19.3-2.el9_0.x86_64.rpm����H	��UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security, bug fix, and enhancement updateK��+https://access.redhat.com/errata/RHSA-2022:5695RHSA-2022:5695RHSA-2022:5695https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5695.htmlALSA-2022:5695ALSA-2022:5695
�[java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm�zjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Zjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm�{java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Xjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�|java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Vjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Yjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm�Tjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm�xjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�yjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�~java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Ujava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�}java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Wjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm�Sjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm�[java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm�zjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Zjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm�{java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Xjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�|java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Vjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Yjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm�Tjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm�xjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�yjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�~java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Ujava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�}java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm�Wjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm�Sjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm�����I	�$�DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security, bug fix, and enhancement updateK�@�.https://access.redhat.com/errata/RHSA-2022:5709RHSA-2022:5709RHSA-2022:5709https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5709.htmlALSA-2022:5709ALSA-2022:5709
�. java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm�	 java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�R java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm�P java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm�N java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Q java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�O java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm�
 java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�/ java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm� java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�. java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm�	 java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�R java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm�P java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm�N java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�Q java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�O java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm�
 java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm� java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�/ java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm� java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm�����J	��eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security, bug fix, and enhancement updateK�n�e
https://access.redhat.com/errata/RHSA-2022:5736RHSA-2022:5736RHSA-2022:5736https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-21549CVE-2022-21549CVE-2022-21549https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085472108547https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5736.htmlALSA-2022:5736ALSA-2022:5736
kjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmxjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�ajava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm�cjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm�djava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmmjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�\java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmnjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmljava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�_java-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmwjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�^java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�bjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm�]java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmujava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�`java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmvjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmkjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmxjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�ajava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm�cjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm�djava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmmjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�\java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmnjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmljava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�_java-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmwjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�^java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�bjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm�]java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmujava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�`java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmvjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm�����K	�0�TBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement updateK
�S�iJhttps://access.redhat.com/errata/RHSA-2022:5948RHSA-2022:5948RHSA-2022:5948https://access.redhat.com/security/cve/CVE-2021-46659CVE-2021-46659CVE-2021-46659https://access.redhat.com/security/cve/CVE-2021-46661CVE-2021-46661CVE-2021-46661https://access.redhat.com/security/cve/CVE-2021-46663CVE-2021-46663CVE-2021-46663https://access.redhat.com/security/cve/CVE-2021-46664CVE-2021-46664CVE-2021-46664https://access.redhat.com/security/cve/CVE-2021-46665CVE-2021-46665CVE-2021-46665https://access.redhat.com/security/cve/CVE-2021-46668CVE-2021-46668CVE-2021-46668https://access.redhat.com/security/cve/CVE-2021-46669CVE-2021-46669CVE-2021-46669https://access.redhat.com/security/cve/CVE-2022-24048CVE-2022-24048CVE-2022-24048https://access.redhat.com/security/cve/CVE-2022-24050CVE-2022-24050CVE-2022-24050https://access.redhat.com/security/cve/CVE-2022-24051CVE-2022-24051CVE-2022-24051https://access.redhat.com/security/cve/CVE-2022-24052CVE-2022-24052CVE-2022-24052https://access.redhat.com/security/cve/CVE-2022-27376CVE-2022-27376CVE-2022-27376https://access.redhat.com/security/cve/CVE-2022-27377CVE-2022-27377CVE-2022-27377https://access.redhat.com/security/cve/CVE-2022-27378CVE-2022-27378CVE-2022-27378https://access.redhat.com/security/cve/CVE-2022-27379CVE-2022-27379CVE-2022-27379https://access.redhat.com/security/cve/CVE-2022-27380CVE-2022-27380CVE-2022-27380https://access.redhat.com/security/cve/CVE-2022-27381CVE-2022-27381CVE-2022-27381https://access.redhat.com/security/cve/CVE-2022-27382CVE-2022-27382CVE-2022-27382https://access.redhat.com/security/cve/CVE-2022-27383CVE-2022-27383CVE-2022-27383https://access.redhat.com/security/cve/CVE-2022-27384CVE-2022-27384CVE-2022-27384https://access.redhat.com/security/cve/CVE-2022-27386CVE-2022-27386CVE-2022-27386https://access.redhat.com/security/cve/CVE-2022-27387CVE-2022-27387CVE-2022-27387https://access.redhat.com/security/cve/CVE-2022-27444CVE-2022-27444CVE-2022-27444https://access.redhat.com/security/cve/CVE-2022-27445CVE-2022-27445CVE-2022-27445https://access.redhat.com/security/cve/CVE-2022-27446CVE-2022-27446CVE-2022-27446https://access.redhat.com/security/cve/CVE-2022-27447CVE-2022-27447CVE-2022-27447https://access.redhat.com/security/cve/CVE-2022-27448CVE-2022-27448CVE-2022-27448https://access.redhat.com/security/cve/CVE-2022-27449CVE-2022-27449CVE-2022-27449https://access.redhat.com/security/cve/CVE-2022-27451CVE-2022-27451CVE-2022-27451https://access.redhat.com/security/cve/CVE-2022-27452CVE-2022-27452CVE-2022-27452https://access.redhat.com/security/cve/CVE-2022-27455CVE-2022-27455CVE-2022-27455https://access.redhat.com/security/cve/CVE-2022-27456CVE-2022-27456CVE-2022-27456https://access.redhat.com/security/cve/CVE-2022-27457CVE-2022-27457CVE-2022-27457https://access.redhat.com/security/cve/CVE-2022-27458CVE-2022-27458CVE-2022-27458https://access.redhat.com/security/cve/CVE-2022-31622CVE-2022-31622CVE-2022-31622https://access.redhat.com/security/cve/CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/20493022049302https://bugzilla.redhat.com/20500172050017https://bugzilla.redhat.com/20500222050022https://bugzilla.redhat.com/20500242050024https://bugzilla.redhat.com/20500262050026https://bugzilla.redhat.com/20500322050032https://bugzilla.redhat.com/20500342050034https://bugzilla.redhat.com/20682112068211https://bugzilla.redhat.com/20682332068233https://bugzilla.redhat.com/20682342068234https://bugzilla.redhat.com/20698332069833https://bugzilla.redhat.com/20748172074817https://bugzilla.redhat.com/20749472074947https://bugzilla.redhat.com/20749492074949https://bugzilla.redhat.com/20749512074951https://bugzilla.redhat.com/20749662074966https://bugzilla.redhat.com/20749812074981https://bugzilla.redhat.com/20749872074987https://bugzilla.redhat.com/20749962074996https://bugzilla.redhat.com/20749992074999https://bugzilla.redhat.com/20750052075005https://bugzilla.redhat.com/20750062075006https://bugzilla.redhat.com/20756912075691https://bugzilla.redhat.com/20756922075692https://bugzilla.redhat.com/20756932075693https://bugzilla.redhat.com/20756942075694https://bugzilla.redhat.com/20756952075695https://bugzilla.redhat.com/20756962075696https://bugzilla.redhat.com/20756972075697https://bugzilla.redhat.com/20756992075699https://bugzilla.redhat.com/20757002075700https://bugzilla.redhat.com/20757012075701https://bugzilla.redhat.com/20761442076144https://bugzilla.redhat.com/20761452076145https://bugzilla.redhat.com/20923542092354https://bugzilla.redhat.com/20923602092360https://errata.almalinux.org/9/ALSA-2022-5948.htmlALSA-2022:5948ALSA-2022:5948
�vJmariadb-pam-10.5.16-2.el9_0.x86_64.rpm�xJmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm�pJmariadb-backup-10.5.16-2.el9_0.x86_64.rpm�yJmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm�oJmariadb-10.5.16-2.el9_0.x86_64.rpm�tJmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm�uJmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm�rJmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm�sJmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm�VJmariadb-test-10.5.16-2.el9_0.x86_64.rpm�TJmariadb-devel-10.5.16-2.el9_0.x86_64.rpm�qJmariadb-common-10.5.16-2.el9_0.x86_64.rpm�UJmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm�wJmariadb-server-10.5.16-2.el9_0.x86_64.rpm�vJmariadb-pam-10.5.16-2.el9_0.x86_64.rpm�xJmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm�pJmariadb-backup-10.5.16-2.el9_0.x86_64.rpm�yJmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm�oJmariadb-10.5.16-2.el9_0.x86_64.rpm�tJmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm�uJmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm�rJmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm�sJmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm�VJmariadb-test-10.5.16-2.el9_0.x86_64.rpm�TJmariadb-devel-10.5.16-2.el9_0.x86_64.rpm�qJmariadb-common-10.5.16-2.el9_0.x86_64.rpm�UJmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm�wJmariadb-server-10.5.16-2.el9_0.x86_64.rpm��ͯo�L	��qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement updateK
�<�qhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003
�Tkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm�Mkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�Pkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm�Qkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�Rkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�Gkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm�Zperf-5.14.0-70.22.1.el9_0.x86_64.rpm�Ekernel-5.14.0-70.22.1.el9_0.x86_64.rpm�Hkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm�Kkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�Skernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�Fkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm�Okernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�,bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm�Lkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�Nkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�Ukernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm�\python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm�Jkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�Ikernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm�Tkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm�Mkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�Pkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm�Qkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�Rkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�Gkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm�Zperf-5.14.0-70.22.1.el9_0.x86_64.rpm�Ekernel-5.14.0-70.22.1.el9_0.x86_64.rpm�Hkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm�Kkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�Skernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�Fkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm�Okernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�,bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm�Lkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�Nkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�Ukernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm�\python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm�Jkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm�Ikernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm����B�M	�2�\BBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement updateK
�-�Jhttps://access.redhat.com/errata/RHSA-2022:6043RHSA-2022:6043RHSA-2022:6043https://access.redhat.com/security/cve/CVE-2022-34716CVE-2022-34716CVE-2022-34716https://bugzilla.redhat.com/21151832115183https://errata.almalinux.org/9/ALSA-2022-6043.htmlALSA-2022:6043ALSA-2022:6043
�5�Laspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm��-dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm�?�Ldotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm�;�Ldotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm�<�Ldotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm��-netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm�4�Laspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm�@�-dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm�>�-dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm�:�Ldotnet-host-6.0.8-1.el9_0.x86_64.rpm�9�Ldotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm�5�Laspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm��-dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm�?�Ldotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm�;�Ldotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm�<�Ldotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm��-netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm�4�Laspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm�@�-dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm�>�-dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm�:�Ldotnet-host-6.0.8-1.el9_0.x86_64.rpm�9�Ldotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm��нi�N	�3�AsecurityModerate: .NET 6.0 security and bugfix updateK
�w�xhttps://access.redhat.com/errata/RHSA-2022:6521RHSA-2022:6521RHSA-2022:6521https://access.redhat.com/security/cve/CVE-2022-38013CVE-2022-38013CVE-2022-38013https://bugzilla.redhat.com/21251242125124https://errata.almalinux.org/9/ALSA-2022-6521.htmlALSA-2022:6521ALSA-2022:6521
��dotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm�����O	�4�securityModerate: ruby security, bug fix, and enhancement updateK
�o�Mhttps://access.redhat.com/errata/RHSA-2022:6585RHSA-2022:6585RHSA-2022:6585https://access.redhat.com/security/cve/CVE-2022-28738CVE-2022-28738CVE-2022-28738https://access.redhat.com/security/cve/CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/20756852075685https://bugzilla.redhat.com/20756872075687https://errata.almalinux.org/9/ALSA-2022-6585.htmlALSA-2022:6585ALSA-2022:6585
�]�ruby-doc-3.0.4-160.el9_0.noarch.rpm�]�ruby-doc-3.0.4-160.el9_0.noarch.rpm�����P	�5�DBBBBsecurityModerate: mysql security, bug fix, and enhancement updateK
�<�eZhttps://access.redhat.com/errata/RHSA-2022:6590RHSA-2022:6590RHSA-2022:6590https://access.redhat.com/security/cve/CVE-2022-21412CVE-2022-21412CVE-2022-21412https://access.redhat.com/security/cve/CVE-2022-21413CVE-2022-21413CVE-2022-21413https://access.redhat.com/security/cve/CVE-2022-21414CVE-2022-21414CVE-2022-21414https://access.redhat.com/security/cve/CVE-2022-21415CVE-2022-21415CVE-2022-21415https://access.redhat.com/security/cve/CVE-2022-21417CVE-2022-21417CVE-2022-21417https://access.redhat.com/security/cve/CVE-2022-21418CVE-2022-21418CVE-2022-21418https://access.redhat.com/security/cve/CVE-2022-21423CVE-2022-21423CVE-2022-21423https://access.redhat.com/security/cve/CVE-2022-21425CVE-2022-21425CVE-2022-21425https://access.redhat.com/security/cve/CVE-2022-21427CVE-2022-21427CVE-2022-21427https://access.redhat.com/security/cve/CVE-2022-21435CVE-2022-21435CVE-2022-21435https://access.redhat.com/security/cve/CVE-2022-21436CVE-2022-21436CVE-2022-21436https://access.redhat.com/security/cve/CVE-2022-21437CVE-2022-21437CVE-2022-21437https://access.redhat.com/security/cve/CVE-2022-21438CVE-2022-21438CVE-2022-21438https://access.redhat.com/security/cve/CVE-2022-21440CVE-2022-21440CVE-2022-21440https://access.redhat.com/security/cve/CVE-2022-21444CVE-2022-21444CVE-2022-21444https://access.redhat.com/security/cve/CVE-2022-21451CVE-2022-21451CVE-2022-21451https://access.redhat.com/security/cve/CVE-2022-21452CVE-2022-21452CVE-2022-21452https://access.redhat.com/security/cve/CVE-2022-21454CVE-2022-21454CVE-2022-21454https://access.redhat.com/security/cve/CVE-2022-21455CVE-2022-21455CVE-2022-21455https://access.redhat.com/security/cve/CVE-2022-21457CVE-2022-21457CVE-2022-21457https://access.redhat.com/security/cve/CVE-2022-21459CVE-2022-21459CVE-2022-21459https://access.redhat.com/security/cve/CVE-2022-21460CVE-2022-21460CVE-2022-21460https://access.redhat.com/security/cve/CVE-2022-21462CVE-2022-21462CVE-2022-21462https://access.redhat.com/security/cve/CVE-2022-21478CVE-2022-21478CVE-2022-21478https://access.redhat.com/security/cve/CVE-2022-21479CVE-2022-21479CVE-2022-21479https://access.redhat.com/security/cve/CVE-2022-21509CVE-2022-21509CVE-2022-21509https://access.redhat.com/security/cve/CVE-2022-21515CVE-2022-21515CVE-2022-21515https://access.redhat.com/security/cve/CVE-2022-21517CVE-2022-21517CVE-2022-21517https://access.redhat.com/security/cve/CVE-2022-21522CVE-2022-21522CVE-2022-21522https://access.redhat.com/security/cve/CVE-2022-21525CVE-2022-21525CVE-2022-21525https://access.redhat.com/security/cve/CVE-2022-21526CVE-2022-21526CVE-2022-21526https://access.redhat.com/security/cve/CVE-2022-21527CVE-2022-21527CVE-2022-21527https://access.redhat.com/security/cve/CVE-2022-21528CVE-2022-21528CVE-2022-21528https://access.redhat.com/security/cve/CVE-2022-21529CVE-2022-21529CVE-2022-21529https://access.redhat.com/security/cve/CVE-2022-21530CVE-2022-21530CVE-2022-21530https://access.redhat.com/security/cve/CVE-2022-21531CVE-2022-21531CVE-2022-21531https://access.redhat.com/security/cve/CVE-2022-21534CVE-2022-21534CVE-2022-21534https://access.redhat.com/security/cve/CVE-2022-21537CVE-2022-21537CVE-2022-21537https://access.redhat.com/security/cve/CVE-2022-21538CVE-2022-21538CVE-2022-21538https://access.redhat.com/security/cve/CVE-2022-21539CVE-2022-21539CVE-2022-21539https://access.redhat.com/security/cve/CVE-2022-21547CVE-2022-21547CVE-2022-21547https://access.redhat.com/security/cve/CVE-2022-21553CVE-2022-21553CVE-2022-21553https://access.redhat.com/security/cve/CVE-2022-21556CVE-2022-21556CVE-2022-21556https://access.redhat.com/security/cve/CVE-2022-21569CVE-2022-21569CVE-2022-21569https://bugzilla.redhat.com/20826362082636https://bugzilla.redhat.com/20826372082637https://bugzilla.redhat.com/20826382082638https://bugzilla.redhat.com/20826392082639https://bugzilla.redhat.com/20826402082640https://bugzilla.redhat.com/20826412082641https://bugzilla.redhat.com/20826422082642https://bugzilla.redhat.com/20826432082643https://bugzilla.redhat.com/20826442082644https://bugzilla.redhat.com/20826452082645https://bugzilla.redhat.com/20826462082646https://bugzilla.redhat.com/20826472082647https://bugzilla.redhat.com/20826482082648https://bugzilla.redhat.com/20826492082649https://bugzilla.redhat.com/20826502082650https://bugzilla.redhat.com/20826512082651https://bugzilla.redhat.com/20826522082652https://bugzilla.redhat.com/20826532082653https://bugzilla.redhat.com/20826542082654https://bugzilla.redhat.com/20826552082655https://bugzilla.redhat.com/20826562082656https://bugzilla.redhat.com/20826572082657https://bugzilla.redhat.com/20826582082658https://bugzilla.redhat.com/20826592082659https://bugzilla.redhat.com/21152822115282https://bugzilla.redhat.com/21152832115283https://bugzilla.redhat.com/21152842115284https://bugzilla.redhat.com/21152852115285https://bugzilla.redhat.com/21152862115286https://bugzilla.redhat.com/21152872115287https://bugzilla.redhat.com/21152882115288https://bugzilla.redhat.com/21152892115289https://bugzilla.redhat.com/21152902115290https://bugzilla.redhat.com/21152912115291https://bugzilla.redhat.com/21152922115292https://bugzilla.redhat.com/21152932115293https://bugzilla.redhat.com/21152942115294https://bugzilla.redhat.com/21152952115295https://bugzilla.redhat.com/21152962115296https://bugzilla.redhat.com/21152972115297https://bugzilla.redhat.com/21152982115298https://bugzilla.redhat.com/21152992115299https://bugzilla.redhat.com/21153002115300https://bugzilla.redhat.com/21153012115301https://errata.almalinux.org/9/ALSA-2022-6590.htmlALSA-2022:6590ALSA-2022:6590
�2�Lmysql-devel-8.0.30-3.el9_0.x86_64.rpm�[�Lmysql-libs-8.0.30-3.el9_0.x86_64.rpm�3�Lmysql-test-8.0.30-3.el9_0.x86_64.rpm�2�Lmysql-devel-8.0.30-3.el9_0.x86_64.rpm�[�Lmysql-libs-8.0.30-3.el9_0.x86_64.rpm�3�Lmysql-test-8.0.30-3.el9_0.x86_64.rpm����O�Q	�6�JBBsecurityImportant: kernel security, bug fix, and enhancement updateK��!�=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610
�&kernel-tools-libs-devel-5.14.0-70.26.1.el9_0.x86_64.rpm�&kernel-cross-headers-5.14.0-70.26.1.el9_0.x86_64.rpm�&kernel-tools-libs-devel-5.14.0-70.26.1.el9_0.x86_64.rpm�&kernel-cross-headers-5.14.0-70.26.1.el9_0.x86_64.rpm�����R	�8�w�XBsecurityImportant: bind security updateK��^�https://access.redhat.com/errata/RHSA-2022:6763RHSA-2022:6763RHSA-2022:6763https://access.redhat.com/security/cve/CVE-2022-3080CVE-2022-3080CVE-2022-3080https://access.redhat.com/security/cve/CVE-2022-38177CVE-2022-38177CVE-2022-38177https://access.redhat.com/security/cve/CVE-2022-38178CVE-2022-38178CVE-2022-38178https://bugzilla.redhat.com/21286002128600https://bugzilla.redhat.com/21286012128601https://bugzilla.redhat.com/21286022128602https://errata.almalinux.org/9/ALSA-2022-6763.htmlALSA-2022:6763ALSA-2022:6763
R�bind-devel-9.16.23-1.el9_0.1.i686.rpm�f�bind-libs-9.16.23-1.el9_0.1.i686.rpmR�bind-devel-9.16.23-1.el9_0.1.i686.rpm�f�bind-libs-9.16.23-1.el9_0.1.i686.rpm����~�S	�9�QsecurityModerate: .NET 6.0 security and bugfix updateK
��d�Vhttps://access.redhat.com/errata/RHSA-2022:6913RHSA-2022:6913RHSA-2022:6913https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-6913.htmlALSA-2022:6913ALSA-2022:6913
��dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0.x86_64.rpm����3�T	�:�SBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix updateK
��:�
https://access.redhat.com/errata/RHSA-2022:6999RHSA-2022:6999RHSA-2022:6999https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-6999.htmlALSA-2022:6999ALSA-2022:6999
t:java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmo:java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmv:java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmq:java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmr:java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmp:java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmm:java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpms:java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmk:java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpml:java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmx:java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmu:java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmn:java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmw:java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmt:java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmo:java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmv:java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmq:java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmr:java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmp:java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmm:java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpms:java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmk:java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpml:java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmx:java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmu:java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpmn:java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpmw:java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm�����U	�;�oBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updateK
��D�_
https://access.redhat.com/errata/RHSA-2022:7007RHSA-2022:7007RHSA-2022:7007https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://errata.almalinux.org/9/ALSA-2022-7007.htmlALSA-2022:7007ALSA-2022:7007

�Vjava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�	Vjava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�
Vjava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm
�Vjava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�	Vjava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�
Vjava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm�Vjava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm��ɷ�V	�<�CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix updateK
��#�https://access.redhat.com/errata/RHSA-2022:7013RHSA-2022:7013RHSA-2022:7013https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-7013.htmlALSA-2022:7013ALSA-2022:7013
�'java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�~'java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�y'java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�}'java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�{'java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�|'java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�x'java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�z'java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�~'java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�y'java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�}'java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�{'java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�|'java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�'java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�x'java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�z'java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm�����W	��_BsecurityImportant: libksba security updateK��.�Yhttps://access.redhat.com/errata/RHSA-2022:7090RHSA-2022:7090RHSA-2022:7090https://access.redhat.com/security/cve/CVE-2022-3515CVE-2022-3515CVE-2022-3515https://bugzilla.redhat.com/21356102135610https://errata.almalinux.org/9/ALSA-2022-7090.htmlALSA-2022:7090ALSA-2022:7090
�v�Jlibksba-devel-1.5.1-5.el9_0.i686.rpm�v�Jlibksba-devel-1.5.1-5.el9_0.x86_64.rpm�v�Jlibksba-devel-1.5.1-5.el9_0.i686.rpm�v�Jlibksba-devel-1.5.1-5.el9_0.x86_64.rpm����_�X	��bBsecurityImportant: device-mapper-multipath security updateK���chttps://access.redhat.com/errata/RHSA-2022:7185RHSA-2022:7185RHSA-2022:7185https://access.redhat.com/security/cve/CVE-2022-41974CVE-2022-41974CVE-2022-41974https://bugzilla.redhat.com/21339882133988https://errata.almalinux.org/9/ALSA-2022-7185.htmlALSA-2022:7185ALSA-2022:7185
�r�6device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpm�r�6device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpm�r�6device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpm�r�6device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpm����h�Y	�=�esecurityModerate: zlib security updateK
��j�Ohttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314
��bzlib-static-1.2.11-32.el9_0.i686.rpm��bzlib-static-1.2.11-32.el9_0.i686.rpm����S�Z	�>�gBBsecurityImportant: kernel security, bug fix, and enhancement updateK��9�https://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318
�'kernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpm�'kernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpm�'kernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpm�'kernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpm����S�[	���V�XBBBBBBsecurityModerate: python3.9 security updateK
��<�nhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323
P�python3-3.9.10-3.el9_0.i686.rpm�python3-debug-3.9.10-3.el9_0.x86_64.rpmQ�python3-tkinter-3.9.10-3.el9_0.i686.rpm�python3-idle-3.9.10-3.el9_0.x86_64.rpm�python3-test-3.9.10-3.el9_0.i686.rpmP�python3-3.9.10-3.el9_0.i686.rpm�python3-debug-3.9.10-3.el9_0.x86_64.rpmQ�python3-tkinter-3.9.10-3.el9_0.i686.rpm�python3-idle-3.9.10-3.el9_0.x86_64.rpm�python3-test-3.9.10-3.el9_0.i686.rpm�����\	��A�sBBsecurityModerate: lua security updateK
��*�https://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329
�E�mlua-devel-5.4.2-4.el9_0.3.i686.rpm�+�mlua-5.4.2-4.el9_0.3.i686.rpm�E�mlua-devel-5.4.2-4.el9_0.3.x86_64.rpm�E�mlua-devel-5.4.2-4.el9_0.3.i686.rpm�+�mlua-5.4.2-4.el9_0.3.i686.rpm�E�mlua-devel-5.4.2-4.el9_0.3.x86_64.rpm����t�]	��wBBBBBBBBBBBBBBBBsecurityLow: libguestfs security, bug fix, and enhancement updateK�^��<�https://access.redhat.com/errata/RHSA-2022:7958RHSA-2022:7958RHSA-2022:7958https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7958.htmlALSA-2022:7958ALSA-2022:7958

�hglibguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm�	gphp-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�iglibguestfs-gobject-1.48.4-2.el9.alma.x86_64.rpm�
gruby-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�gocaml-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�nglua-guestfs-1.48.4-2.el9.alma.x86_64.rpm�jglibguestfs-gobject-devel-1.48.4-2.el9.alma.x86_64.rpm�1glibguestfs-man-pages-uk-1.48.4-2.el9.alma.noarch.rpm�0glibguestfs-man-pages-ja-1.48.4-2.el9.alma.noarch.rpm�gocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm
�hglibguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm�	gphp-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�iglibguestfs-gobject-1.48.4-2.el9.alma.x86_64.rpm�
gruby-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�gocaml-libguestfs-1.48.4-2.el9.alma.x86_64.rpm�nglua-guestfs-1.48.4-2.el9.alma.x86_64.rpm�jglibguestfs-gobject-devel-1.48.4-2.el9.alma.x86_64.rpm�1glibguestfs-man-pages-uk-1.48.4-2.el9.alma.noarch.rpm�0glibguestfs-man-pages-ja-1.48.4-2.el9.alma.noarch.rpm�gocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm��ܵh�^	��IsecurityLow: virt-v2v security, bug fix, and enhancement updateK�^��L�lhttps://access.redhat.com/errata/RHSA-2022:7968RHSA-2022:7968RHSA-2022:7968https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7968.htmlALSA-2022:7968ALSA-2022:7968
�@�+virt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpm�?�+virt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpm�@�+virt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpm�?�+virt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpm��ܲ�_	��KBBBBBBBsecurityModerate: protobuf security updateK
��8�Nhttps://access.redhat.com/errata/RHSA-2022:7970RHSA-2022:7970RHSA-2022:7970https://access.redhat.com/security/cve/CVE-2021-22570CVE-2021-22570CVE-2021-22570https://bugzilla.redhat.com/20494292049429https://errata.almalinux.org/9/ALSA-2022-7970.htmlALSA-2022:7970ALSA-2022:7970
�G�
protobuf-compiler-3.14.0-13.el9.x86_64.rpm�H�
protobuf-devel-3.14.0-13.el9.x86_64.rpm�I�
protobuf-lite-devel-3.14.0-13.el9.x86_64.rpm�H�
protobuf-devel-3.14.0-13.el9.i686.rpm�G�
protobuf-compiler-3.14.0-13.el9.i686.rpm�I�
protobuf-lite-devel-3.14.0-13.el9.i686.rpm�G�
protobuf-compiler-3.14.0-13.el9.x86_64.rpm�H�
protobuf-devel-3.14.0-13.el9.x86_64.rpm�I�
protobuf-lite-devel-3.14.0-13.el9.x86_64.rpm�H�
protobuf-devel-3.14.0-13.el9.i686.rpm�G�
protobuf-compiler-3.14.0-13.el9.i686.rpm�I�
protobuf-lite-devel-3.14.0-13.el9.i686.rpm��ނv�`	��TBsecurityLow: speex security updateK�^���8https://access.redhat.com/errata/RHSA-2022:7979RHSA-2022:7979RHSA-2022:7979https://access.redhat.com/security/cve/CVE-2020-23903CVE-2020-23903CVE-2020-23903https://bugzilla.redhat.com/20242502024250https://errata.almalinux.org/9/ALSA-2022-7979.htmlALSA-2022:7979ALSA-2022:7979
�$�?speex-devel-1.2.0-11.el9.x86_64.rpm�$�?speex-devel-1.2.0-11.el9.i686.rpm�$�?speex-devel-1.2.0-11.el9.x86_64.rpm�$�?speex-devel-1.2.0-11.el9.i686.rpm��ރ�a	��WBBBBsecurityLow: libvirt security, bug fix, and enhancement updateK�^��>�https://access.redhat.com/errata/RHSA-2022:8003RHSA-2022:8003RHSA-2022:8003https://access.redhat.com/security/cve/CVE-2022-0897CVE-2022-0897CVE-2022-0897https://bugzilla.redhat.com/20638832063883https://errata.almalinux.org/9/ALSA-2022-8003.htmlALSA-2022:8003ALSA-2022:8003
�W�Qlibvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm�1�Qlibvirt-docs-8.5.0-7.el9_1.x86_64.rpm�0�Qlibvirt-devel-8.5.0-7.el9_1.x86_64.rpm�W�Qlibvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm�1�Qlibvirt-docs-8.5.0-7.el9_1.x86_64.rpm�0�Qlibvirt-devel-8.5.0-7.el9_1.x86_64.rpm��ܩK�b	��securityModerate: qt5 security and bug fix updateK
��N�9https://access.redhat.com/errata/RHSA-2022:8022RHSA-2022:8022RHSA-2022:8022https://access.redhat.com/security/cve/CVE-2022-25255CVE-2022-25255CVE-2022-25255https://bugzilla.redhat.com/20555052055505https://errata.almalinux.org/9/ALSA-2022-8022.htmlALSA-2022:8022ALSA-2022:8022
�^�"qt5-devel-5.15.3-1.el9.noarch.rpm�^�"qt5-devel-5.15.3-1.el9.noarch.rpm��ܣP�c	�	�^BsecurityModerate: unbound security, bug fix, and enhancement updateK
���5https://access.redhat.com/errata/RHSA-2022:8062RHSA-2022:8062RHSA-2022:8062https://access.redhat.com/security/cve/CVE-2022-30698CVE-2022-30698CVE-2022-30698https://access.redhat.com/security/cve/CVE-2022-30699CVE-2022-30699CVE-2022-30699https://bugzilla.redhat.com/21167252116725https://bugzilla.redhat.com/21167292116729https://errata.almalinux.org/9/ALSA-2022-8062.htmlALSA-2022:8062ALSA-2022:8062
�[�:unbound-devel-1.16.2-2.el9.i686.rpm�[�:unbound-devel-1.16.2-2.el9.x86_64.rpm�[�:unbound-devel-1.16.2-2.el9.i686.rpm�[�:unbound-devel-1.16.2-2.el9.x86_64.rpm��ބ{�d	��J�XBBBsecurityModerate: bind security updateK
��<�
https://access.redhat.com/errata/RHSA-2022:8068RHSA-2022:8068RHSA-2022:8068https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://access.redhat.com/security/cve/CVE-2022-0396CVE-2022-0396CVE-2022-0396https://bugzilla.redhat.com/20645122064512https://bugzilla.redhat.com/20645132064513https://errata.almalinux.org/9/ALSA-2022-8068.htmlALSA-2022:8068ALSA-2022:8068
�f�cbind-libs-9.16.23-5.el9_1.i686.rpm��cbind-doc-9.16.23-5.el9_1.noarch.rpmR�cbind-devel-9.16.23-5.el9_1.x86_64.rpmR�cbind-devel-9.16.23-5.el9_1.i686.rpm�f�cbind-libs-9.16.23-5.el9_1.i686.rpm��cbind-doc-9.16.23-5.el9_1.noarch.rpmR�cbind-devel-9.16.23-5.el9_1.x86_64.rpmR�cbind-devel-9.16.23-5.el9_1.i686.rpm��ކ�e	��fBBBsecurityModerate: flac security updateK
��I�jhttps://access.redhat.com/errata/RHSA-2022:8078RHSA-2022:8078RHSA-2022:8078https://access.redhat.com/security/cve/CVE-2021-0561CVE-2021-0561CVE-2021-0561https://bugzilla.redhat.com/20577762057776https://errata.almalinux.org/9/ALSA-2022-8078.htmlALSA-2022:8078ALSA-2022:8078
�s�_flac-devel-1.3.3-10.el9.i686.rpm�s�_flac-devel-1.3.3-10.el9.x86_64.rpm�.�_flac-1.3.3-10.el9.x86_64.rpm�s�_flac-devel-1.3.3-10.el9.i686.rpm�s�_flac-devel-1.3.3-10.el9.x86_64.rpm�.�_flac-1.3.3-10.el9.x86_64.rpm��ކG�f	�
�kBsecurityLow: wavpack security updateK�^��3�2https://access.redhat.com/errata/RHSA-2022:8139RHSA-2022:8139RHSA-2022:8139https://access.redhat.com/security/cve/CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/20644572064457https://errata.almalinux.org/9/ALSA-2022-8139.htmlALSA-2022:8139ALSA-2022:8139
�'�~wavpack-devel-5.4.0-5.el9.x86_64.rpm�'�~wavpack-devel-5.4.0-5.el9.i686.rpm�'�~wavpack-devel-5.4.0-5.el9.x86_64.rpm�'�~wavpack-devel-5.4.0-5.el9.i686.rpm��އC�g	��nBBBBBBBBBBsecurityModerate: poppler security and bug fix updateK
��e�(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151
�$�Jpoppler-qt5-devel-21.01.0-13.el9.x86_64.rpm�!�Jpoppler-cpp-devel-21.01.0-13.el9.x86_64.rpm�"�Jpoppler-devel-21.01.0-13.el9.i686.rpm�$�Jpoppler-qt5-devel-21.01.0-13.el9.i686.rpm�!�Jpoppler-cpp-devel-21.01.0-13.el9.i686.rpm�"�Jpoppler-devel-21.01.0-13.el9.x86_64.rpm�#�Jpoppler-glib-devel-21.01.0-13.el9.i686.rpm�#�Jpoppler-glib-devel-21.01.0-13.el9.x86_64.rpm�$�Jpoppler-qt5-devel-21.01.0-13.el9.x86_64.rpm�!�Jpoppler-cpp-devel-21.01.0-13.el9.x86_64.rpm�"�Jpoppler-devel-21.01.0-13.el9.i686.rpm�$�Jpoppler-qt5-devel-21.01.0-13.el9.i686.rpm�!�Jpoppler-cpp-devel-21.01.0-13.el9.i686.rpm�"�Jpoppler-devel-21.01.0-13.el9.x86_64.rpm�#�Jpoppler-glib-devel-21.01.0-13.el9.i686.rpm�#�Jpoppler-glib-devel-21.01.0-13.el9.x86_64.rpm��އc�h	��zsecurityModerate: libtiff security updateK
��
�@https://access.redhat.com/errata/RHSA-2022:8194RHSA-2022:8194RHSA-2022:8194https://access.redhat.com/security/cve/CVE-2022-0561CVE-2022-0561CVE-2022-0561https://access.redhat.com/security/cve/CVE-2022-0562CVE-2022-0562CVE-2022-0562https://access.redhat.com/security/cve/CVE-2022-0865CVE-2022-0865CVE-2022-0865https://access.redhat.com/security/cve/CVE-2022-0891CVE-2022-0891CVE-2022-0891https://access.redhat.com/security/cve/CVE-2022-0908CVE-2022-0908CVE-2022-0908https://access.redhat.com/security/cve/CVE-2022-0909CVE-2022-0909CVE-2022-0909https://access.redhat.com/security/cve/CVE-2022-0924CVE-2022-0924CVE-2022-0924https://access.redhat.com/security/cve/CVE-2022-1354CVE-2022-1354CVE-2022-1354https://access.redhat.com/security/cve/CVE-2022-1355CVE-2022-1355CVE-2022-1355https://access.redhat.com/security/cve/CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/20426032042603https://bugzilla.redhat.com/20544942054494https://bugzilla.redhat.com/20544952054495https://bugzilla.redhat.com/20641452064145https://bugzilla.redhat.com/20641462064146https://bugzilla.redhat.com/20641482064148https://bugzilla.redhat.com/20644062064406https://bugzilla.redhat.com/20644112064411https://bugzilla.redhat.com/20744042074404https://bugzilla.redhat.com/20744152074415https://errata.almalinux.org/9/ALSA-2022-8194.htmlALSA-2022:8194ALSA-2022:8194
��~libtiff-tools-4.4.0-2.el9.x86_64.rpm��~libtiff-tools-4.4.0-2.el9.x86_64.rpm��܀Z�i	��|BBBBsecurityLow: openjpeg2 security updateK�^��M�https://access.redhat.com/errata/RHSA-2022:8207RHSA-2022:8207RHSA-2022:8207https://access.redhat.com/security/cve/CVE-2022-1122CVE-2022-1122CVE-2022-1122https://bugzilla.redhat.com/20670522067052https://errata.almalinux.org/9/ALSA-2022-8207.htmlALSA-2022:8207ALSA-2022:8207
�|�Popenjpeg2-tools-2.4.0-7.el9.x86_64.rpm�{�Popenjpeg2-devel-2.4.0-7.el9.i686.rpm�{�Popenjpeg2-devel-2.4.0-7.el9.x86_64.rpm�|�Popenjpeg2-tools-2.4.0-7.el9.i686.rpm�|�Popenjpeg2-tools-2.4.0-7.el9.x86_64.rpm�{�Popenjpeg2-devel-2.4.0-7.el9.i686.rpm�{�Popenjpeg2-devel-2.4.0-7.el9.x86_64.rpm�|�Popenjpeg2-tools-2.4.0-7.el9.i686.rpm��ވ`�j	��Q�rBBsecurityModerate: dovecot security and enhancement updateK
��h�Zhttps://access.redhat.com/errata/RHSA-2022:8208RHSA-2022:8208RHSA-2022:8208https://access.redhat.com/security/cve/CVE-2022-30550CVE-2022-30550CVE-2022-30550https://bugzilla.redhat.com/21050702105070https://errata.almalinux.org/9/ALSA-2022-8208.htmlALSA-2022:8208ALSA-2022:8208
�C�gdovecot-devel-2.3.16-7.el9.x86_64.rpm�C�gdovecot-devel-2.3.16-7.el9.i686.rpm�*�gdovecot-2.3.16-7.el9.i686.rpm�C�gdovecot-devel-2.3.16-7.el9.x86_64.rpm�C�gdovecot-devel-2.3.16-7.el9.i686.rpm�*�gdovecot-2.3.16-7.el9.i686.rpm��ވo�k	��FBBsecurityModerate: xorg-x11-server security and bug fix updateK
��B�Zhttps://access.redhat.com/errata/RHSA-2022:8221RHSA-2022:8221RHSA-2022:8221https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8221.htmlALSA-2022:8221ALSA-2022:8221
�\�xorg-x11-server-source-1.20.11-11.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-11.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-11.el9.i686.rpm�\�xorg-x11-server-source-1.20.11-11.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-11.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-11.el9.i686.rpm��މ(�l	��JsecurityModerate: yajl security updateK
���Uhttps://access.redhat.com/errata/RHSA-2022:8252RHSA-2022:8252RHSA-2022:8252https://access.redhat.com/security/cve/CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/20729122072912https://errata.almalinux.org/9/ALSA-2022-8252.htmlALSA-2022:8252ALSA-2022:8252
��jyajl-devel-2.1.0-21.el9.x86_64.rpm��jyajl-devel-2.1.0-21.el9.x86_64.rpm����3�m	��LBBsecurityModerate: kernel security, bug fix, and enhancement updateK
��q�?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267
�#kernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpm�#kernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm�#kernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpm�#kernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm��۰E�n	��PBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement updateK
��t�mhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317
	�n�samba-test-libs-4.16.4-101.el9.x86_64.rpm�m�samba-test-4.16.4-101.el9.x86_64.rpm�Z�samba-devel-4.16.4-101.el9.x86_64.rpm�V�libsmbclient-devel-4.16.4-101.el9.x86_64.rpm�Z�samba-devel-4.16.4-101.el9.i686.rpm�W�libwbclient-devel-4.16.4-101.el9.x86_64.rpm�V�libsmbclient-devel-4.16.4-101.el9.i686.rpm�W�libwbclient-devel-4.16.4-101.el9.i686.rpm�,�samba-pidl-4.16.4-101.el9.noarch.rpm	�n�samba-test-libs-4.16.4-101.el9.x86_64.rpm�m�samba-test-4.16.4-101.el9.x86_64.rpm�Z�samba-devel-4.16.4-101.el9.x86_64.rpm�V�libsmbclient-devel-4.16.4-101.el9.x86_64.rpm�Z�samba-devel-4.16.4-101.el9.i686.rpm�W�libwbclient-devel-4.16.4-101.el9.x86_64.rpm�V�libsmbclient-devel-4.16.4-101.el9.i686.rpm�W�libwbclient-devel-4.16.4-101.el9.i686.rpm�,�samba-pidl-4.16.4-101.el9.noarch.rpm��ދr�o	��^BsecurityModerate: libldb security, bug fix, and enhancement updateK
��a�Lhttps://access.redhat.com/errata/RHSA-2022:8318RHSA-2022:8318RHSA-2022:8318https://access.redhat.com/security/cve/CVE-2022-32746CVE-2022-32746CVE-2022-32746https://bugzilla.redhat.com/21082152108215https://errata.almalinux.org/9/ALSA-2022-8318.htmlALSA-2022:8318ALSA-2022:8318
��^libldb-devel-2.5.2-1.el9.x86_64.rpm��^libldb-devel-2.5.2-1.el9.i686.rpm��^libldb-devel-2.5.2-1.el9.x86_64.rpm��^libldb-devel-2.5.2-1.el9.i686.rpm��ތ�p	��W�@�LBBBBBBBBBsecurityModerate: python3.9 security, bug fix, and enhancement updateK
��-�5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353
�4python3-idle-3.9.14-1.el9.x86_64.rpm�4python3-debug-3.9.14-1.el9.x86_64.rpmQ�4python3-tkinter-3.9.14-1.el9.i686.rpm�4python3-test-3.9.14-1.el9.i686.rpm�4python3-idle-3.9.14-1.el9.i686.rpm�4python3-test-3.9.14-1.el9.x86_64.rpm�4python3-debug-3.9.14-1.el9.i686.rpmP�4python3-3.9.14-1.el9.i686.rpm�4python3-idle-3.9.14-1.el9.x86_64.rpm�4python3-debug-3.9.14-1.el9.x86_64.rpmQ�4python3-tkinter-3.9.14-1.el9.i686.rpm�4python3-test-3.9.14-1.el9.i686.rpm�4python3-idle-3.9.14-1.el9.i686.rpm�4python3-test-3.9.14-1.el9.x86_64.rpm�4python3-debug-3.9.14-1.el9.i686.rpmP�4python3-3.9.14-1.el9.i686.rpm��ތ[�q	��lBsecurityModerate: libtirpc security updateK
��b�{https://access.redhat.com/errata/RHSA-2022:8400RHSA-2022:8400RHSA-2022:8400https://access.redhat.com/security/cve/CVE-2021-46828CVE-2021-46828CVE-2021-46828https://bugzilla.redhat.com/21093522109352https://errata.almalinux.org/9/ALSA-2022-8400.htmlALSA-2022:8400ALSA-2022:8400
��Hlibtirpc-devel-1.3.3-0.el9.i686.rpm��Hlibtirpc-devel-1.3.3-0.el9.x86_64.rpm��Hlibtirpc-devel-1.3.3-0.el9.i686.rpm��Hlibtirpc-devel-1.3.3-0.el9.x86_64.rpm��ލW�r	�?�oBBBBBBBBBBBBBBsecurityLow: mingw-gcc security and bug fix updateK�^��]�.https://access.redhat.com/errata/RHSA-2022:8415RHSA-2022:8415RHSA-2022:8415https://access.redhat.com/security/cve/CVE-2021-46195CVE-2021-46195CVE-2021-46195https://bugzilla.redhat.com/20463002046300https://errata.almalinux.org/9/ALSA-2022-8415.htmlALSA-2022:8415ALSA-2022:8415
�ymingw64-gcc-12.0.1-11.2.el9.x86_64.rpm�ymingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm�ymingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm�}ymingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm�{ymingw32-cpp-12.0.1-11.2.el9.x86_64.rpm�~ymingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm�ymingw64-cpp-12.0.1-11.2.el9.x86_64.rpm�|ymingw32-gcc-12.0.1-11.2.el9.x86_64.rpm�ymingw64-gcc-12.0.1-11.2.el9.x86_64.rpm�ymingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm�ymingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm�}ymingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm�{ymingw32-cpp-12.0.1-11.2.el9.x86_64.rpm�~ymingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm�ymingw64-cpp-12.0.1-11.2.el9.x86_64.rpm�|ymingw32-gcc-12.0.1-11.2.el9.x86_64.rpm����x�s	��@BBsecurityLow: mingw-glib2 security and bug fix updateK�^���Yhttps://access.redhat.com/errata/RHSA-2022:8418RHSA-2022:8418RHSA-2022:8418https://access.redhat.com/security/cve/CVE-2021-28153CVE-2021-28153CVE-2021-28153https://bugzilla.redhat.com/19382911938291https://errata.almalinux.org/9/ALSA-2022-8418.htmlALSA-2022:8418ALSA-2022:8418
�Z�{mingw64-glib2-static-2.70.1-2.el9.noarch.rpm�W�{mingw32-glib2-2.70.1-2.el9.noarch.rpm�Y�{mingw64-glib2-2.70.1-2.el9.noarch.rpm�X�{mingw32-glib2-static-2.70.1-2.el9.noarch.rpm�Z�{mingw64-glib2-static-2.70.1-2.el9.noarch.rpm�W�{mingw32-glib2-2.70.1-2.el9.noarch.rpm�Y�{mingw64-glib2-2.70.1-2.el9.noarch.rpm�X�{mingw32-glib2-static-2.70.1-2.el9.noarch.rpm���� �t	�	�EBBsecurityImportant: mingw-zlib security updateK��d�:https://access.redhat.com/errata/RHSA-2022:8420RHSA-2022:8420RHSA-2022:8420https://access.redhat.com/security/cve/CVE-2018-25032CVE-2018-25032CVE-2018-25032https://bugzilla.redhat.com/20679452067945https://errata.almalinux.org/9/ALSA-2022-8420.htmlALSA-2022:8420ALSA-2022:8420
�7�umingw64-zlib-1.2.12-2.el9.noarch.rpm�4�umingw32-zlib-1.2.12-2.el9.noarch.rpm�8�umingw64-zlib-static-1.2.12-2.el9.noarch.rpm�5�umingw32-zlib-static-1.2.12-2.el9.noarch.rpm�7�umingw64-zlib-1.2.12-2.el9.noarch.rpm�4�umingw32-zlib-1.2.12-2.el9.noarch.rpm�8�umingw64-zlib-static-1.2.12-2.el9.noarch.rpm�5�umingw32-zlib-static-1.2.12-2.el9.noarch.rpm����@�u	��JsecurityModerate: dotnet7.0 security, bug fix, and enhancement updateK
���Ihttps://access.redhat.com/errata/RHSA-2022:8434RHSA-2022:8434RHSA-2022:8434https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-8434.htmlALSA-2022:8434ALSA-2022:8434
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpm����Z�v	��Z��uBBBBBBBBBsecurityImportant: python3.9 security updateK��g�Qhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493
�5python3-debug-3.9.14-1.el9_1.1.i686.rpm�5python3-idle-3.9.14-1.el9_1.1.x86_64.rpm�5python3-test-3.9.14-1.el9_1.1.x86_64.rpmP�5python3-3.9.14-1.el9_1.1.i686.rpmQ�5python3-tkinter-3.9.14-1.el9_1.1.i686.rpm�5python3-idle-3.9.14-1.el9_1.1.i686.rpm�5python3-test-3.9.14-1.el9_1.1.i686.rpm�5python3-debug-3.9.14-1.el9_1.1.x86_64.rpm�5python3-debug-3.9.14-1.el9_1.1.i686.rpm�5python3-idle-3.9.14-1.el9_1.1.x86_64.rpm�5python3-test-3.9.14-1.el9_1.1.x86_64.rpmP�5python3-3.9.14-1.el9_1.1.i686.rpmQ�5python3-tkinter-3.9.14-1.el9_1.1.i686.rpm�5python3-idle-3.9.14-1.el9_1.1.i686.rpm�5python3-test-3.9.14-1.el9_1.1.i686.rpm�5python3-debug-3.9.14-1.el9_1.1.x86_64.rpm����}�w	��WBsecurityImportant: varnish security updateK��8�Vhttps://access.redhat.com/errata/RHSA-2022:8643RHSA-2022:8643RHSA-2022:8643https://access.redhat.com/security/cve/CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/21418442141844https://errata.almalinux.org/9/ALSA-2022-8643.htmlALSA-2022:8643ALSA-2022:8643
�'�varnish-devel-6.6.2-2.el9_1.1.i686.rpm�'�varnish-devel-6.6.2-2.el9_1.1.x86_64.rpm�'�varnish-devel-6.6.2-2.el9_1.1.i686.rpm�'�varnish-devel-6.6.2-2.el9_1.1.x86_64.rpm�����x	��ZsecurityModerate: .NET 6.0 security, bug fix, and enhancement update
���`https://access.redhat.com/errata/RHSA-2023:0077RHSA-2023:0077RHSA-2023:0077https://access.redhat.com/security/cve/CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/21583422158342https://errata.almalinux.org/9/ALSA-2023-0077.htmlALSA-2023:0077ALSA-2023:0077
��dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm�����y	��\BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update
��n�Hhttps://access.redhat.com/errata/RHSA-2023:0194RHSA-2023:0194RHSA-2023:0194https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0194.htmlALSA-2023:0194ALSA-2023:0194
m;java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmn;java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpms;java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmr;java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpml;java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmk;java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmw;java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmv;java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmx;java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmu;java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmt;java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmq;java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmp;java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmo;java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmm;java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmn;java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpms;java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmr;java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpml;java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmk;java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmw;java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmv;java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmx;java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmu;java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmt;java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmq;java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmp;java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmo;java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm�����z	��xBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update
��6�lhttps://access.redhat.com/errata/RHSA-2023:0202RHSA-2023:0202RHSA-2023:0202https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0202.htmlALSA-2023:0202ALSA-2023:0202
�|(java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�z(java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�}(java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�{(java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�x(java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�y(java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�~(java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�|(java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�z(java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�}(java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�{(java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�x(java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�y(java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�~(java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�(java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm�����{	� �TBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update
��"�xhttps://access.redhat.com/errata/RHSA-2023:0210RHSA-2023:0210RHSA-2023:0210https://access.redhat.com/security/cve/CVE-2023-21830CVE-2023-21830CVE-2023-21830https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604752160475https://bugzilla.redhat.com/21604902160490https://errata.almalinux.org/9/ALSA-2023-0210.htmlALSA-2023:0210ALSA-2023:0210

�
Wjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�	Wjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm
�
Wjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�	Wjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�Wjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm�����|	�!�hsecurityModerate: libtiff security update
���{https://access.redhat.com/errata/RHSA-2023:0302RHSA-2023:0302RHSA-2023:0302https://access.redhat.com/security/cve/CVE-2022-2056CVE-2022-2056CVE-2022-2056https://access.redhat.com/security/cve/CVE-2022-2057CVE-2022-2057CVE-2022-2057https://access.redhat.com/security/cve/CVE-2022-2058CVE-2022-2058CVE-2022-2058https://access.redhat.com/security/cve/CVE-2022-2519CVE-2022-2519CVE-2022-2519https://access.redhat.com/security/cve/CVE-2022-2520CVE-2022-2520CVE-2022-2520https://access.redhat.com/security/cve/CVE-2022-2521CVE-2022-2521CVE-2022-2521https://access.redhat.com/security/cve/CVE-2022-2953CVE-2022-2953CVE-2022-2953https://bugzilla.redhat.com/21032222103222https://bugzilla.redhat.com/21227892122789https://bugzilla.redhat.com/21227922122792https://bugzilla.redhat.com/21227992122799https://bugzilla.redhat.com/21344322134432https://errata.almalinux.org/9/ALSA-2023-0302.htmlALSA-2023:0302ALSA-2023:0302
��libtiff-tools-4.4.0-5.el9_1.x86_64.rpm��libtiff-tools-4.4.0-5.el9_1.x86_64.rpm����K�}	�"�jBBsecurityModerate: libreoffice security update
���z
https://access.redhat.com/errata/RHSA-2023:0304RHSA-2023:0304RHSA-2023:0304https://access.redhat.com/security/cve/CVE-2022-26305CVE-2022-26305CVE-2022-26305https://access.redhat.com/security/cve/CVE-2022-26306CVE-2022-26306CVE-2022-26306https://access.redhat.com/security/cve/CVE-2022-26307CVE-2022-26307CVE-2022-26307https://access.redhat.com/security/cve/CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/21186102118610https://bugzilla.redhat.com/21186112118611https://bugzilla.redhat.com/21186132118613https://bugzilla.redhat.com/21346972134697https://errata.almalinux.org/9/ALSA-2023-0304.htmlALSA-2023:0304ALSA-2023:0304
�k�libreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpm����Y�~	�#�nBBsecurityImportant: kernel security and bug fix update���;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334
�kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm�kernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm�kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm�kernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm����M�	��rsecurityModerate: bash security update
��J�}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340
�6�bash-devel-5.1.8-6.el9_1.x86_64.rpm�6�bash-devel-5.1.8-6.el9_1.x86_64.rpm�����	��tBsecurityImportant: libksba security update��G�Jhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626
�v�Klibksba-devel-1.5.1-6.el9_1.i686.rpm�v�Klibksba-devel-1.5.1-6.el9_1.x86_64.rpm�v�Klibksba-devel-1.5.1-6.el9_1.i686.rpm�v�Klibksba-devel-1.5.1-6.el9_1.x86_64.rpm����x�	�$�wBBsecurityImportant: kernel security and bug fix update���~https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951
� kernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpm� kernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpm� kernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpm� kernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpm�����	�&�e�w�aBBBBBBBBBsecurityModerate: python3.9 security update
���9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953
�6python3-idle-3.9.14-1.el9_1.2.i686.rpm�6python3-idle-3.9.14-1.el9_1.2.x86_64.rpmQ�6python3-tkinter-3.9.14-1.el9_1.2.i686.rpm�6python3-debug-3.9.14-1.el9_1.2.x86_64.rpm�6python3-test-3.9.14-1.el9_1.2.x86_64.rpmP�6python3-3.9.14-1.el9_1.2.i686.rpm�6python3-debug-3.9.14-1.el9_1.2.i686.rpm�6python3-test-3.9.14-1.el9_1.2.i686.rpm�6python3-idle-3.9.14-1.el9_1.2.i686.rpm�6python3-idle-3.9.14-1.el9_1.2.x86_64.rpmQ�6python3-tkinter-3.9.14-1.el9_1.2.i686.rpm�6python3-debug-3.9.14-1.el9_1.2.x86_64.rpm�6python3-test-3.9.14-1.el9_1.2.x86_64.rpmP�6python3-3.9.14-1.el9_1.2.i686.rpm�6python3-debug-3.9.14-1.el9_1.2.i686.rpm�6python3-test-3.9.14-1.el9_1.2.i686.rpm����E�	�(�g�`BBsecurityModerate: lua security update
��H�8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957
�E�nlua-devel-5.4.4-2.el9_1.i686.rpm�E�nlua-devel-5.4.4-2.el9_1.x86_64.rpm�+�nlua-5.4.4-2.el9_1.i686.rpm�E�nlua-devel-5.4.4-2.el9_1.i686.rpm�E�nlua-devel-5.4.4-2.el9_1.x86_64.rpm�+�nlua-5.4.4-2.el9_1.i686.rpm����Z�	�)�JBBBBsecurityModerate: libjpeg-turbo security update
���.https://access.redhat.com/errata/RHSA-2023:1068RHSA-2023:1068RHSA-2023:1068https://access.redhat.com/security/cve/CVE-2021-46822CVE-2021-46822CVE-2021-46822https://bugzilla.redhat.com/21000442100044https://errata.almalinux.org/9/ALSA-2023-1068.htmlALSA-2023:1068ALSA-2023:1068
��Mturbojpeg-2.0.90-6.el9_1.x86_64.rpm��Mturbojpeg-devel-2.0.90-6.el9_1.x86_64.rpm��Mturbojpeg-devel-2.0.90-6.el9_1.i686.rpm��Mturbojpeg-2.0.90-6.el9_1.i686.rpm��Mturbojpeg-2.0.90-6.el9_1.x86_64.rpm��Mturbojpeg-devel-2.0.90-6.el9_1.x86_64.rpm��Mturbojpeg-devel-2.0.90-6.el9_1.i686.rpm��Mturbojpeg-2.0.90-6.el9_1.i686.rpm�����	�*�PBBsecurityImportant: kernel security, bug fix, and enhancement update��.�Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470
�!kernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpm�!kernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm�!kernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpm�!kernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm����8�	�+�TBBBBBBBBBBsecurityModerate: postgresql security update
���jhttps://access.redhat.com/errata/RHSA-2023:1693RHSA-2023:1693RHSA-2023:1693https://access.redhat.com/security/cve/CVE-2022-2625CVE-2022-2625CVE-2022-2625https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21138252113825https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-1693.htmlALSA-2023:1693ALSA-2023:1693
�	�_postgresql-server-devel-13.10-1.el9_1.x86_64.rpm��_postgresql-private-devel-13.10-1.el9_1.x86_64.rpm��_postgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm�
�_postgresql-static-13.10-1.el9_1.x86_64.rpm��_postgresql-test-13.10-1.el9_1.x86_64.rpm��_postgresql-docs-13.10-1.el9_1.x86_64.rpm�	�_postgresql-server-devel-13.10-1.el9_1.x86_64.rpm��_postgresql-private-devel-13.10-1.el9_1.x86_64.rpm��_postgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm�
�_postgresql-static-13.10-1.el9_1.x86_64.rpm��_postgresql-test-13.10-1.el9_1.x86_64.rpm��_postgresql-docs-13.10-1.el9_1.x86_64.rpm�����	�,�`BBsecurityImportant: kernel security and bug fix update��q�4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703
�"kernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpm�"kernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpm�"kernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpm�"kernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpm�����	�-�dBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update��%�https://access.redhat.com/errata/RHSA-2023:1879RHSA-2023:1879RHSA-2023:1879https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1879.htmlALSA-2023:1879ALSA-2023:1879
w<java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn<java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq<java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpms<java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpml<java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt<java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmu<java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo<java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmv<java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp<java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmx<java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr<java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmk<java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmm<java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmw<java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn<java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq<java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpms<java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpml<java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt<java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmu<java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo<java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmv<java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp<java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmx<java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr<java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmk<java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmm<java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm�����		�.�@BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update��A�2https://access.redhat.com/errata/RHSA-2023:1880RHSA-2023:1880RHSA-2023:1880https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1880.htmlALSA-2023:1880ALSA-2023:1880
�y)java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�|)java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�~)java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�})java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�x)java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�{)java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�z)java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�y)java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�|)java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�~)java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�})java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�x)java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�)java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�{)java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm�z)java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm����w�
	�/�\BBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix update��s�Thttps://access.redhat.com/errata/RHSA-2023:1909RHSA-2023:1909RHSA-2023:1909https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1909.htmlALSA-2023:1909ALSA-2023:1909

�Xjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�
Xjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�	Xjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm
�Xjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�
Xjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�	Xjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm�Xjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm��ƷI�	�0�pBBBBBBBBBBBBsecurityImportant: samba security update��G�https://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127
	�V�libsmbclient-devel-4.16.4-103.el9_1.i686.rpm�m�samba-test-4.16.4-103.el9_1.x86_64.rpm�V�libsmbclient-devel-4.16.4-103.el9_1.x86_64.rpm�Z�samba-devel-4.16.4-103.el9_1.i686.rpm�W�libwbclient-devel-4.16.4-103.el9_1.x86_64.rpm�n�samba-test-libs-4.16.4-103.el9_1.x86_64.rpm�Z�samba-devel-4.16.4-103.el9_1.x86_64.rpm�W�libwbclient-devel-4.16.4-103.el9_1.i686.rpm�,�samba-pidl-4.16.4-103.el9_1.noarch.rpm	�V�libsmbclient-devel-4.16.4-103.el9_1.i686.rpm�m�samba-test-4.16.4-103.el9_1.x86_64.rpm�V�libsmbclient-devel-4.16.4-103.el9_1.x86_64.rpm�Z�samba-devel-4.16.4-103.el9_1.i686.rpm�W�libwbclient-devel-4.16.4-103.el9_1.x86_64.rpm�n�samba-test-libs-4.16.4-103.el9_1.x86_64.rpm�Z�samba-devel-4.16.4-103.el9_1.x86_64.rpm�W�libwbclient-devel-4.16.4-103.el9_1.i686.rpm�,�samba-pidl-4.16.4-103.el9_1.noarch.rpm��ӿ(�	�1�~BBsecurityImportant: edk2 security, bug fix, and enhancement update��[�https://access.redhat.com/errata/RHSA-2023:2165RHSA-2023:2165RHSA-2023:2165https://access.redhat.com/security/cve/CVE-2021-38578CVE-2021-38578CVE-2021-38578https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/19603211960321https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://errata.almalinux.org/9/ALSA-2023-2165.htmlALSA-2023:2165ALSA-2023:2165
�R�edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm��edk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm�S�edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm�R�edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm��edk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm�S�edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm�����
	�2�BBBBBBBBBBBsecurityModerate: freeradius security and bug fix update
��j�fhttps://access.redhat.com/errata/RHSA-2023:2166RHSA-2023:2166RHSA-2023:2166https://access.redhat.com/security/cve/CVE-2022-41859CVE-2022-41859CVE-2022-41859https://access.redhat.com/security/cve/CVE-2022-41860CVE-2022-41860CVE-2022-41860https://access.redhat.com/security/cve/CVE-2022-41861CVE-2022-41861CVE-2022-41861https://bugzilla.redhat.com/20784832078483https://bugzilla.redhat.com/20784852078485https://bugzilla.redhat.com/20784872078487https://errata.almalinux.org/9/ALSA-2023-2166.htmlALSA-2023:2166ALSA-2023:2166
�3�dfreeradius-sqlite-3.0.21-37.el9.x86_64.rpm�0�dfreeradius-perl-3.0.21-37.el9.x86_64.rpm�2�dfreeradius-rest-3.0.21-37.el9.x86_64.rpm�4�dfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpm�1�dfreeradius-postgresql-3.0.21-37.el9.x86_64.rpm�/�dfreeradius-mysql-3.0.21-37.el9.x86_64.rpm�3�dfreeradius-sqlite-3.0.21-37.el9.x86_64.rpm�0�dfreeradius-perl-3.0.21-37.el9.x86_64.rpm�2�dfreeradius-rest-3.0.21-37.el9.x86_64.rpm�4�dfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpm�1�dfreeradius-postgresql-3.0.21-37.el9.x86_64.rpm�/�dfreeradius-mysql-3.0.21-37.el9.x86_64.rpm����:�	�3�NBBsecurityModerate: xorg-x11-server security and bug fix update
��P�Ohttps://access.redhat.com/errata/RHSA-2023:2248RHSA-2023:2248RHSA-2023:2248https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2248.htmlALSA-2023:2248ALSA-2023:2248
�\�xorg-x11-server-source-1.20.11-17.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-17.el9.i686.rpm�\�xorg-x11-server-source-1.20.11-17.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-17.el9.i686.rpm����>�	�4�RBBBBBBBBBBsecurityModerate: poppler security and bug fix update
���https://access.redhat.com/errata/RHSA-2023:2259RHSA-2023:2259RHSA-2023:2259https://access.redhat.com/security/cve/CVE-2022-38784CVE-2022-38784CVE-2022-38784https://bugzilla.redhat.com/21245272124527https://errata.almalinux.org/9/ALSA-2023-2259.htmlALSA-2023:2259ALSA-2023:2259
�$�Kpoppler-qt5-devel-21.01.0-14.el9.i686.rpm�$�Kpoppler-qt5-devel-21.01.0-14.el9.x86_64.rpm�"�Kpoppler-devel-21.01.0-14.el9.x86_64.rpm�!�Kpoppler-cpp-devel-21.01.0-14.el9.i686.rpm�!�Kpoppler-cpp-devel-21.01.0-14.el9.x86_64.rpm�"�Kpoppler-devel-21.01.0-14.el9.i686.rpm�#�Kpoppler-glib-devel-21.01.0-14.el9.i686.rpm�#�Kpoppler-glib-devel-21.01.0-14.el9.x86_64.rpm�$�Kpoppler-qt5-devel-21.01.0-14.el9.i686.rpm�$�Kpoppler-qt5-devel-21.01.0-14.el9.x86_64.rpm�"�Kpoppler-devel-21.01.0-14.el9.x86_64.rpm�!�Kpoppler-cpp-devel-21.01.0-14.el9.i686.rpm�!�Kpoppler-cpp-devel-21.01.0-14.el9.x86_64.rpm�"�Kpoppler-devel-21.01.0-14.el9.i686.rpm�#�Kpoppler-glib-devel-21.01.0-14.el9.i686.rpm�#�Kpoppler-glib-devel-21.01.0-14.el9.x86_64.rpm����S�	�6�u�jBBBsecurityModerate: bind security and bug fix update
��8�J
https://access.redhat.com/errata/RHSA-2023:2261RHSA-2023:2261RHSA-2023:2261https://access.redhat.com/security/cve/CVE-2022-2795CVE-2022-2795CVE-2022-2795https://access.redhat.com/security/cve/CVE-2022-3094CVE-2022-3094CVE-2022-3094https://access.redhat.com/security/cve/CVE-2022-3736CVE-2022-3736CVE-2022-3736https://access.redhat.com/security/cve/CVE-2022-3924CVE-2022-3924CVE-2022-3924https://bugzilla.redhat.com/21285842128584https://bugzilla.redhat.com/21640322164032https://bugzilla.redhat.com/21640382164038https://bugzilla.redhat.com/21640392164039https://errata.almalinux.org/9/ALSA-2023-2261.htmlALSA-2023:2261ALSA-2023:2261
�f�Zbind-libs-9.16.23-11.el9.i686.rpmR�Zbind-devel-9.16.23-11.el9.x86_64.rpm��Zbind-doc-9.16.23-11.el9.noarch.rpmR�Zbind-devel-9.16.23-11.el9.i686.rpm�f�Zbind-libs-9.16.23-11.el9.i686.rpmR�Zbind-devel-9.16.23-11.el9.x86_64.rpm��Zbind-doc-9.16.23-11.el9.noarch.rpmR�Zbind-devel-9.16.23-11.el9.i686.rpm����[�	�7�cBBBBsecurityModerate: freerdp security update
���fhttps://access.redhat.com/errata/RHSA-2023:2326RHSA-2023:2326RHSA-2023:2326https://access.redhat.com/security/cve/CVE-2022-39282CVE-2022-39282CVE-2022-39282https://access.redhat.com/security/cve/CVE-2022-39283CVE-2022-39283CVE-2022-39283https://access.redhat.com/security/cve/CVE-2022-39316CVE-2022-39316CVE-2022-39316https://access.redhat.com/security/cve/CVE-2022-39317CVE-2022-39317CVE-2022-39317https://access.redhat.com/security/cve/CVE-2022-39318CVE-2022-39318CVE-2022-39318https://access.redhat.com/security/cve/CVE-2022-39319CVE-2022-39319CVE-2022-39319https://access.redhat.com/security/cve/CVE-2022-39320CVE-2022-39320CVE-2022-39320https://access.redhat.com/security/cve/CVE-2022-39347CVE-2022-39347CVE-2022-39347https://access.redhat.com/security/cve/CVE-2022-41877CVE-2022-41877CVE-2022-41877https://bugzilla.redhat.com/21347132134713https://bugzilla.redhat.com/21347172134717https://bugzilla.redhat.com/21436422143642https://bugzilla.redhat.com/21436432143643https://bugzilla.redhat.com/21436442143644https://bugzilla.redhat.com/21436452143645https://bugzilla.redhat.com/21436462143646https://bugzilla.redhat.com/21436472143647https://bugzilla.redhat.com/21436482143648https://errata.almalinux.org/9/ALSA-2023-2326.htmlALSA-2023:2326ALSA-2023:2326
h�Yfreerdp-devel-2.4.1-5.el9.x86_64.rpmj�Ylibwinpr-devel-2.4.1-5.el9.x86_64.rpmj�Ylibwinpr-devel-2.4.1-5.el9.i686.rpmh�Yfreerdp-devel-2.4.1-5.el9.i686.rpmh�Yfreerdp-devel-2.4.1-5.el9.x86_64.rpmj�Ylibwinpr-devel-2.4.1-5.el9.x86_64.rpmj�Ylibwinpr-devel-2.4.1-5.el9.i686.rpmh�Yfreerdp-devel-2.4.1-5.el9.i686.rpm����%�	�8�isecurityModerate: libtiff security update
��h�>https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340
��libtiff-tools-4.4.0-7.el9.x86_64.rpm��libtiff-tools-4.4.0-7.el9.x86_64.rpm����4�	�9�kBsecurityModerate: unbound security update
��&�9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370
�[�;unbound-devel-1.16.2-3.el9.x86_64.rpm�[�;unbound-devel-1.16.2-3.el9.i686.rpm�[�;unbound-devel-1.16.2-3.el9.x86_64.rpm�[�;unbound-devel-1.16.2-3.el9.i686.rpm����E�	�:�nBsecurityModerate: wireshark security and bug fix update
��_�4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373
�J�Xwireshark-devel-3.4.10-4.el9.i686.rpm�J�Xwireshark-devel-3.4.10-4.el9.x86_64.rpm�J�Xwireshark-devel-3.4.10-4.el9.i686.rpm�J�Xwireshark-devel-3.4.10-4.el9.x86_64.rpm�����	�;�qBBsecurityImportant: kernel security, bug fix, and enhancement update���SRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458
�$kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm�$kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm�$kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm�$kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm����C�	��uBsecurityModerate: device-mapper-multipath security and bug fix update
��f�]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459
�r�5device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm�r�5device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm�r�5device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm�r�5device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm�����	�<�xsecurityModerate: fwupd security and bug fix update
��C�M
https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487
�D�cfwupd-devel-1.8.10-2.el9.alma.x86_64.rpm�D�cfwupd-devel-1.8.10-2.el9.alma.x86_64.rpm����}�	�=�zBBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update�^���https://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519
�ZLsamba-devel-4.17.5-102.el9.x86_64.rpm�WLlibwbclient-devel-4.17.5-102.el9.i686.rpm�,Lsamba-pidl-4.17.5-102.el9.noarch.rpm�nLsamba-test-libs-4.17.5-102.el9.x86_64.rpm�%Lpython3-samba-devel-4.17.5-102.el9.i686.rpm�ZLsamba-devel-4.17.5-102.el9.i686.rpm�Llibnetapi-devel-4.17.5-102.el9.x86_64.rpm�Lpython3-samba-test-4.17.5-102.el9.x86_64.rpm�VLlibsmbclient-devel-4.17.5-102.el9.x86_64.rpm�VLlibsmbclient-devel-4.17.5-102.el9.i686.rpm�Llibnetapi-devel-4.17.5-102.el9.i686.rpm�WLlibwbclient-devel-4.17.5-102.el9.x86_64.rpm�mLsamba-test-4.17.5-102.el9.x86_64.rpm�%Lpython3-samba-devel-4.17.5-102.el9.x86_64.rpm�ZLsamba-devel-4.17.5-102.el9.x86_64.rpm�WLlibwbclient-devel-4.17.5-102.el9.i686.rpm�,Lsamba-pidl-4.17.5-102.el9.noarch.rpm�nLsamba-test-libs-4.17.5-102.el9.x86_64.rpm�%Lpython3-samba-devel-4.17.5-102.el9.i686.rpm�ZLsamba-devel-4.17.5-102.el9.i686.rpm�Llibnetapi-devel-4.17.5-102.el9.x86_64.rpm�Lpython3-samba-test-4.17.5-102.el9.x86_64.rpm�VLlibsmbclient-devel-4.17.5-102.el9.x86_64.rpm�VLlibsmbclient-devel-4.17.5-102.el9.i686.rpm�Llibnetapi-devel-4.17.5-102.el9.i686.rpm�WLlibwbclient-devel-4.17.5-102.el9.x86_64.rpm�mLsamba-test-4.17.5-102.el9.x86_64.rpm�%Lpython3-samba-devel-4.17.5-102.el9.x86_64.rpm����f�	�>�PBsecurityLow: libarchive security update�^���Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532
�u�wlibarchive-devel-3.5.3-4.el9.x86_64.rpm�u�wlibarchive-devel-3.5.3-4.el9.i686.rpm�u�wlibarchive-devel-3.5.3-4.el9.x86_64.rpm�u�wlibarchive-devel-3.5.3-4.el9.i686.rpm�����	���UBBsecurityLow: lua security update�^��m�Rhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582
�+�olua-5.4.4-3.el9.i686.rpm�E�olua-devel-5.4.4-3.el9.x86_64.rpm�E�olua-devel-5.4.4-3.el9.i686.rpm�+�olua-5.4.4-3.el9.i686.rpm�E�olua-devel-5.4.4-3.el9.x86_64.rpm�E�olua-devel-5.4.4-3.el9.i686.rpm����o�	��WBsecurityModerate: autotrace security update
��?�yhttps://access.redhat.com/errata/RHSA-2023:2589RHSA-2023:2589RHSA-2023:2589https://access.redhat.com/security/cve/CVE-2022-32323CVE-2022-32323CVE-2022-32323https://bugzilla.redhat.com/21074712107471https://errata.almalinux.org/9/ALSA-2023-2589.htmlALSA-2023:2589ALSA-2023:2589
��3autotrace-0.31.1-65.el9.x86_64.rpm��3autotrace-0.31.1-65.el9.i686.rpm��3autotrace-0.31.1-65.el9.x86_64.rpm��3autotrace-0.31.1-65.el9.i686.rpm����`�	��[securityModerate: golang-github-cpuguy83-md2man security, bug fix, and enhancement update
��8�chttps://access.redhat.com/errata/RHSA-2023:2592RHSA-2023:2592RHSA-2023:2592https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-2592.htmlALSA-2023:2592ALSA-2023:2592
�E�igolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpm�E�igolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpm����o�	��^BBBBsecurityImportant: mysql security update���Lhttps://access.redhat.com/errata/RHSA-2023:2621RHSA-2023:2621RHSA-2023:2621https://access.redhat.com/security/cve/CVE-2022-21594CVE-2022-21594CVE-2022-21594https://access.redhat.com/security/cve/CVE-2022-21599CVE-2022-21599CVE-2022-21599https://access.redhat.com/security/cve/CVE-2022-21604CVE-2022-21604CVE-2022-21604https://access.redhat.com/security/cve/CVE-2022-21608CVE-2022-21608CVE-2022-21608https://access.redhat.com/security/cve/CVE-2022-21611CVE-2022-21611CVE-2022-21611https://access.redhat.com/security/cve/CVE-2022-21617CVE-2022-21617CVE-2022-21617https://access.redhat.com/security/cve/CVE-2022-21625CVE-2022-21625CVE-2022-21625https://access.redhat.com/security/cve/CVE-2022-21632CVE-2022-21632CVE-2022-21632https://access.redhat.com/security/cve/CVE-2022-21633CVE-2022-21633CVE-2022-21633https://access.redhat.com/security/cve/CVE-2022-21637CVE-2022-21637CVE-2022-21637https://access.redhat.com/security/cve/CVE-2022-21640CVE-2022-21640CVE-2022-21640https://access.redhat.com/security/cve/CVE-2022-39400CVE-2022-39400CVE-2022-39400https://access.redhat.com/security/cve/CVE-2022-39408CVE-2022-39408CVE-2022-39408https://access.redhat.com/security/cve/CVE-2022-39410CVE-2022-39410CVE-2022-39410https://access.redhat.com/security/cve/CVE-2023-21836CVE-2023-21836CVE-2023-21836https://access.redhat.com/security/cve/CVE-2023-21863CVE-2023-21863CVE-2023-21863https://access.redhat.com/security/cve/CVE-2023-21864CVE-2023-21864CVE-2023-21864https://access.redhat.com/security/cve/CVE-2023-21865CVE-2023-21865CVE-2023-21865https://access.redhat.com/security/cve/CVE-2023-21867CVE-2023-21867CVE-2023-21867https://access.redhat.com/security/cve/CVE-2023-21868CVE-2023-21868CVE-2023-21868https://access.redhat.com/security/cve/CVE-2023-21869CVE-2023-21869CVE-2023-21869https://access.redhat.com/security/cve/CVE-2023-21870CVE-2023-21870CVE-2023-21870https://access.redhat.com/security/cve/CVE-2023-21871CVE-2023-21871CVE-2023-21871https://access.redhat.com/security/cve/CVE-2023-21873CVE-2023-21873CVE-2023-21873https://access.redhat.com/security/cve/CVE-2023-21874CVE-2023-21874CVE-2023-21874https://access.redhat.com/security/cve/CVE-2023-21875CVE-2023-21875CVE-2023-21875https://access.redhat.com/security/cve/CVE-2023-21876CVE-2023-21876CVE-2023-21876https://access.redhat.com/security/cve/CVE-2023-21877CVE-2023-21877CVE-2023-21877https://access.redhat.com/security/cve/CVE-2023-21878CVE-2023-21878CVE-2023-21878https://access.redhat.com/security/cve/CVE-2023-21879CVE-2023-21879CVE-2023-21879https://access.redhat.com/security/cve/CVE-2023-21880CVE-2023-21880CVE-2023-21880https://access.redhat.com/security/cve/CVE-2023-21881CVE-2023-21881CVE-2023-21881https://access.redhat.com/security/cve/CVE-2023-21882CVE-2023-21882CVE-2023-21882https://access.redhat.com/security/cve/CVE-2023-21883CVE-2023-21883CVE-2023-21883https://access.redhat.com/security/cve/CVE-2023-21887CVE-2023-21887CVE-2023-21887https://access.redhat.com/security/cve/CVE-2023-21912CVE-2023-21912CVE-2023-21912https://access.redhat.com/security/cve/CVE-2023-21917CVE-2023-21917CVE-2023-21917https://bugzilla.redhat.com/21428612142861https://bugzilla.redhat.com/21428632142863https://bugzilla.redhat.com/21428652142865https://bugzilla.redhat.com/21428682142868https://bugzilla.redhat.com/21428692142869https://bugzilla.redhat.com/21428702142870https://bugzilla.redhat.com/21428712142871https://bugzilla.redhat.com/21428722142872https://bugzilla.redhat.com/21428732142873https://bugzilla.redhat.com/21428752142875https://bugzilla.redhat.com/21428772142877https://bugzilla.redhat.com/21428792142879https://bugzilla.redhat.com/21428802142880https://bugzilla.redhat.com/21428812142881https://bugzilla.redhat.com/21622682162268https://bugzilla.redhat.com/21622702162270https://bugzilla.redhat.com/21622712162271https://bugzilla.redhat.com/21622722162272https://bugzilla.redhat.com/21622742162274https://bugzilla.redhat.com/21622752162275https://bugzilla.redhat.com/21622762162276https://bugzilla.redhat.com/21622772162277https://bugzilla.redhat.com/21622782162278https://bugzilla.redhat.com/21622802162280https://bugzilla.redhat.com/21622812162281https://bugzilla.redhat.com/21622822162282https://bugzilla.redhat.com/21622832162283https://bugzilla.redhat.com/21622842162284https://bugzilla.redhat.com/21622852162285https://bugzilla.redhat.com/21622862162286https://bugzilla.redhat.com/21622872162287https://bugzilla.redhat.com/21622882162288https://bugzilla.redhat.com/21622892162289https://bugzilla.redhat.com/21622902162290https://bugzilla.redhat.com/21622912162291https://bugzilla.redhat.com/21881102188110https://bugzilla.redhat.com/21881122188112https://errata.almalinux.org/9/ALSA-2023-2621.htmlALSA-2023:2621ALSA-2023:2621
�2�Mmysql-devel-8.0.32-1.el9_2.x86_64.rpm�3�Mmysql-test-8.0.32-1.el9_2.x86_64.rpm�[�Mmysql-libs-8.0.32-1.el9_2.x86_64.rpm�2�Mmysql-devel-8.0.32-1.el9_2.x86_64.rpm�3�Mmysql-test-8.0.32-1.el9_2.x86_64.rpm�[�Mmysql-libs-8.0.32-1.el9_2.x86_64.rpm����h�	��dBsecurityImportant: cups-filters security update���ihttps://access.redhat.com/errata/RHSA-2023:3423RHSA-2023:3423RHSA-2023:3423https://access.redhat.com/security/cve/CVE-2023-24805CVE-2023-24805CVE-2023-24805https://bugzilla.redhat.com/22030512203051https://errata.almalinux.org/9/ALSA-2023-3423.htmlALSA-2023:3423ALSA-2023:3423
�q�Fcups-filters-devel-1.28.7-11.el9_2.1.i686.rpm�q�Fcups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm�q�Fcups-filters-devel-1.28.7-11.el9_2.1.i686.rpm�q�Fcups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm�����	��gsecurityImportant: .NET 6.0 security, bug fix, and enhancement update���
https://access.redhat.com/errata/RHSA-2023:3581RHSA-2023:3581RHSA-2023:3581https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3581.htmlALSA-2023:3581ALSA-2023:3581
��dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm����.� 	��DB�eBBBBBBBBBsecurityImportant: python3.11 security update���yhttps://access.redhat.com/errata/RHSA-2023:3585RHSA-2023:3585RHSA-2023:3585https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3585.htmlALSA-2023:3585ALSA-2023:3585
�python3.11-idle-3.11.2-2.el9_2.1.i686.rpm�python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm�python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm�python3.11-test-3.11.2-2.el9_2.1.i686.rpm�python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpme�python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm�python3.11-debug-3.11.2-2.el9_2.1.i686.rpmd�python3.11-3.11.2-2.el9_2.1.i686.rpm�python3.11-idle-3.11.2-2.el9_2.1.i686.rpm�python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm�python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm�python3.11-test-3.11.2-2.el9_2.1.i686.rpm�python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpme�python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm�python3.11-debug-3.11.2-2.el9_2.1.i686.rpmd�python3.11-3.11.2-2.el9_2.1.i686.rpm�����!	��tsecurityImportant: .NET 7.0 security, bug fix, and enhancement update���https://access.redhat.com/errata/RHSA-2023:3592RHSA-2023:3592RHSA-2023:3592https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-32032CVE-2023-32032CVE-2023-32032https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126152212615https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3592.htmlALSA-2023:3592ALSA-2023:3592
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm�����"	�	�H�V�ZBBBBBBBBBsecurityImportant: python3.9 security update���+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595
�7python3-idle-3.9.16-1.el9_2.1.x86_64.rpm�7python3-debug-3.9.16-1.el9_2.1.x86_64.rpm�7python3-test-3.9.16-1.el9_2.1.i686.rpm�7python3-test-3.9.16-1.el9_2.1.x86_64.rpm�7python3-debug-3.9.16-1.el9_2.1.i686.rpm�7python3-idle-3.9.16-1.el9_2.1.i686.rpmQ�7python3-tkinter-3.9.16-1.el9_2.1.i686.rpmP�7python3-3.9.16-1.el9_2.1.i686.rpm�7python3-idle-3.9.16-1.el9_2.1.x86_64.rpm�7python3-debug-3.9.16-1.el9_2.1.x86_64.rpm�7python3-test-3.9.16-1.el9_2.1.i686.rpm�7python3-test-3.9.16-1.el9_2.1.x86_64.rpm�7python3-debug-3.9.16-1.el9_2.1.i686.rpm�7python3-idle-3.9.16-1.el9_2.1.i686.rpmQ�7python3-tkinter-3.9.16-1.el9_2.1.i686.rpmP�7python3-3.9.16-1.el9_2.1.i686.rpm����x�#	�
�ABBsecurityImportant: texlive security update��A�
https://access.redhat.com/errata/RHSA-2023:3661RHSA-2023:3661RHSA-2023:3661https://access.redhat.com/security/cve/CVE-2023-32700CVE-2023-32700CVE-2023-32700https://bugzilla.redhat.com/22089432208943https://errata.almalinux.org/9/ALSA-2023-3661.htmlALSA-2023:3661ALSA-2023:3661
�>�texlive-gnu-freefont-20200406-26.el9_2.noarch.rpm�%�texlive-lib-devel-20200406-26.el9_2.x86_64.rpm�%�texlive-lib-devel-20200406-26.el9_2.i686.rpm�>�texlive-gnu-freefont-20200406-26.el9_2.noarch.rpm�%�texlive-lib-devel-20200406-26.el9_2.x86_64.rpm�%�texlive-lib-devel-20200406-26.el9_2.i686.rpm��׺y�$	��EsecurityModerate: libtiff security update
��N�phttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711
��libtiff-tools-4.4.0-8.el9_2.x86_64.rpm��libtiff-tools-4.4.0-8.el9_2.x86_64.rpm���i�%	��GBBBBBBBBBBsecurityModerate: postgresql security update
��>�Shttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714
��`postgresql-docs-13.11-1.el9_2.x86_64.rpm��`postgresql-test-13.11-1.el9_2.x86_64.rpm�	�`postgresql-server-devel-13.11-1.el9_2.x86_64.rpm��`postgresql-private-devel-13.11-1.el9_2.x86_64.rpm��`postgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm�
�`postgresql-static-13.11-1.el9_2.x86_64.rpm��`postgresql-docs-13.11-1.el9_2.x86_64.rpm��`postgresql-test-13.11-1.el9_2.x86_64.rpm�	�`postgresql-server-devel-13.11-1.el9_2.x86_64.rpm��`postgresql-private-devel-13.11-1.el9_2.x86_64.rpm��`postgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm�
�`postgresql-static-13.11-1.el9_2.x86_64.rpm�����&	�
�SBBBBBBsecurityModerate: libvirt security update
���}https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715
�W�.libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm�0�.libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm�1�.libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm�V�.libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm�W�.libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm�0�.libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm�1�.libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm�V�.libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm�����'	��[securityImportant: kernel security and bug fix update���https://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723
�kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm�kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm����V�(	��]securityImportant: .NET 7.0 security, bug fix, and enhancement update���Ehttps://access.redhat.com/errata/RHSA-2023:4057RHSA-2023:4057RHSA-2023:4057https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4057.htmlALSA-2023:4057ALSA-2023:4057
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpm����B�)	��_securityImportant: .NET 6.0 security, bug fix, and enhancement update��a�Fhttps://access.redhat.com/errata/RHSA-2023:4060RHSA-2023:4060RHSA-2023:4060https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4060.htmlALSA-2023:4060ALSA-2023:4060
��	dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm��	dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm����9�*	��Q�QBBBsecurityImportant: bind security update��'�Nhttps://access.redhat.com/errata/RHSA-2023:4099RHSA-2023:4099RHSA-2023:4099https://access.redhat.com/security/cve/CVE-2023-2828CVE-2023-2828CVE-2023-2828https://bugzilla.redhat.com/22162272216227https://errata.almalinux.org/9/ALSA-2023-4099.htmlALSA-2023:4099ALSA-2023:4099
R�[bind-devel-9.16.23-11.el9_2.1.x86_64.rpm��[bind-doc-9.16.23-11.el9_2.1.noarch.rpm�f�[bind-libs-9.16.23-11.el9_2.1.i686.rpmR�[bind-devel-9.16.23-11.el9_2.1.i686.rpmR�[bind-devel-9.16.23-11.el9_2.1.x86_64.rpm��[bind-doc-9.16.23-11.el9_2.1.noarch.rpm�f�[bind-libs-9.16.23-11.el9_2.1.i686.rpmR�[bind-devel-9.16.23-11.el9_2.1.i686.rpm��ٟ
�+	��fBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update
��u�"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158
�*java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�z*java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�{*java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�x*java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�}*java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�|*java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�~*java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�y*java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�z*java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�{*java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�x*java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�}*java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�|*java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�~*java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm�y*java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm�*java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm��� �,	��BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update
���Nhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177
l=java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmu=java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmk=java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmr=java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn=java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms=java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmw=java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmo=java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmx=java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmp=java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmt=java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmq=java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmv=java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmm=java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpml=java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmu=java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmk=java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmr=java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn=java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms=java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmw=java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmo=java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmx=java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmp=java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmt=java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmq=java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmv=java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmm=java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm���{�-	��^BBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update
��e�yhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178

�Yjava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�
Yjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�	Yjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm
�Yjava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�
Yjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm�Yjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm�	Yjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm���-�.	��rBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update
��^�https://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325
�WMlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpm�VMlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm�Mlibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm�%Mpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm�%Mpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpm�WMlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm�,Msamba-pidl-4.17.5-103.el9_2.alma.noarch.rpm�mMsamba-test-4.17.5-103.el9_2.alma.x86_64.rpm�nMsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm�Mlibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm�Mpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpm�VMlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm�ZMsamba-devel-4.17.5-103.el9_2.alma.i686.rpm�ZMsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm�WMlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpm�VMlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm�Mlibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm�%Mpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm�%Mpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpm�WMlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm�,Msamba-pidl-4.17.5-103.el9_2.alma.noarch.rpm�mMsamba-test-4.17.5-103.el9_2.alma.x86_64.rpm�nMsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm�Mlibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm�Mpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpm�VMlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm�ZMsamba-devel-4.17.5-103.el9_2.alma.i686.rpm�ZMsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm����<�/	��HBBsecurityImportant: kernel security, bug fix, and enhancement update��f�0https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377
�%kernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm�%kernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm�%kernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm�%kernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm���0�0	��LsecurityImportant: .NET 7.0 security, bug fix, and enhancement update���https://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm����1	��NsecurityImportant: .NET 6.0 security, bug fix, and enhancement update��-�https://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644
��
dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm��
dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm����/�2	��PBBBsecurityImportant: flac security update��D�whttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048
�.�`flac-1.3.3-10.el9_2.1.x86_64.rpm�s�`flac-devel-1.3.3-10.el9_2.1.i686.rpm�s�`flac-devel-1.3.3-10.el9_2.1.x86_64.rpm�.�`flac-1.3.3-10.el9_2.1.x86_64.rpm�s�`flac-devel-1.3.3-10.el9_2.1.i686.rpm�s�`flac-devel-1.3.3-10.el9_2.1.x86_64.rpm����5�3	��UsecurityImportant: kernel security, bug fix, and enhancement update��;�_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069
�kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm�kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm����x�4	��WsecurityModerate: .NET 6.0 security update
���Rhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143
��dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm����}�5	��YsecurityModerate: .NET 7.0 security update
��l�Rhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpm����n�6	��[securityImportant: libwebp security update��>�-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214
�m�alibwebp-tools-1.2.0-7.el9_2.x86_64.rpm�m�alibwebp-tools-1.2.0-7.el9_2.x86_64.rpm����]�7	��]BBBBBBBBBBBBsecurityImportant: glibc security update��k�
https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453
	�Tglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpm�Uglibc-static-2.34-60.el9_2.7.i686.rpm�Xnss_db-2.34-60.el9_2.7.i686.rpm�Tglibc-nss-devel-2.34-60.el9_2.7.i686.rpm�Ynss_hesiod-2.34-60.el9_2.7.x86_64.rpm�Ynss_hesiod-2.34-60.el9_2.7.i686.rpm�Xnss_db-2.34-60.el9_2.7.x86_64.rpm�Uglibc-static-2.34-60.el9_2.7.x86_64.rpm�jglibc-benchtests-2.34-60.el9_2.7.x86_64.rpm	�Tglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpm�Uglibc-static-2.34-60.el9_2.7.i686.rpm�Xnss_db-2.34-60.el9_2.7.i686.rpm�Tglibc-nss-devel-2.34-60.el9_2.7.i686.rpm�Ynss_hesiod-2.34-60.el9_2.7.x86_64.rpm�Ynss_hesiod-2.34-60.el9_2.7.i686.rpm�Xnss_db-2.34-60.el9_2.7.x86_64.rpm�Uglibc-static-2.34-60.el9_2.7.x86_64.rpm�jglibc-benchtests-2.34-60.el9_2.7.x86_64.rpm����m�8	�"�`B�KBBBBBBBBBsecurityImportant: python3.11 security update��w�ihttps://access.redhat.com/errata/RHSA-2023:5456RHSA-2023:5456RHSA-2023:5456https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5456.htmlALSA-2023:5456ALSA-2023:5456
�python3.11-idle-3.11.2-2.el9_2.2.i686.rpm�python3.11-debug-3.11.2-2.el9_2.2.x86_64.rpm�python3.11-debug-3.11.2-2.el9_2.2.i686.rpmd�python3.11-3.11.2-2.el9_2.2.i686.rpm�python3.11-test-3.11.2-2.el9_2.2.i686.rpme�python3.11-tkinter-3.11.2-2.el9_2.2.i686.rpm�python3.11-test-3.11.2-2.el9_2.2.x86_64.rpm�python3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm�python3.11-idle-3.11.2-2.el9_2.2.i686.rpm�python3.11-debug-3.11.2-2.el9_2.2.x86_64.rpm�python3.11-debug-3.11.2-2.el9_2.2.i686.rpmd�python3.11-3.11.2-2.el9_2.2.i686.rpm�python3.11-test-3.11.2-2.el9_2.2.i686.rpme�python3.11-tkinter-3.11.2-2.el9_2.2.i686.rpm�python3.11-test-3.11.2-2.el9_2.2.x86_64.rpm�python3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm����=�9	�&�cBB�RBBBBsecurityImportant: ghostscript security update��`�https://access.redhat.com/errata/RHSA-2023:5459RHSA-2023:5459RHSA-2023:5459https://access.redhat.com/security/cve/CVE-2023-36664CVE-2023-36664CVE-2023-36664https://bugzilla.redhat.com/22177982217798https://errata.almalinux.org/9/ALSA-2023-5459.htmlALSA-2023:5459ALSA-2023:5459
i�libgs-devel-9.54.0-10.el9_2.i686.rpm�*�ghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm�+�ghostscript-tools-printing-9.54.0-10.el9_2.i686.rpm�)�ghostscript-9.54.0-10.el9_2.i686.rpmi�libgs-devel-9.54.0-10.el9_2.x86_64.rpmi�libgs-devel-9.54.0-10.el9_2.i686.rpm�*�ghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm�+�ghostscript-tools-printing-9.54.0-10.el9_2.i686.rpm�)�ghostscript-9.54.0-10.el9_2.i686.rpmi�libgs-devel-9.54.0-10.el9_2.x86_64.rpm����\�:	�(�g�x�_BBBBBBBBBsecurityImportant: python3.9 security update��q�https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462
Q�8python3-tkinter-3.9.16-1.el9_2.2.i686.rpm�8python3-idle-3.9.16-1.el9_2.2.x86_64.rpm�8python3-test-3.9.16-1.el9_2.2.x86_64.rpm�8python3-debug-3.9.16-1.el9_2.2.i686.rpm�8python3-test-3.9.16-1.el9_2.2.i686.rpm�8python3-idle-3.9.16-1.el9_2.2.i686.rpm�8python3-debug-3.9.16-1.el9_2.2.x86_64.rpmP�8python3-3.9.16-1.el9_2.2.i686.rpmQ�8python3-tkinter-3.9.16-1.el9_2.2.i686.rpm�8python3-idle-3.9.16-1.el9_2.2.x86_64.rpm�8python3-test-3.9.16-1.el9_2.2.x86_64.rpm�8python3-debug-3.9.16-1.el9_2.2.i686.rpm�8python3-test-3.9.16-1.el9_2.2.i686.rpm�8python3-idle-3.9.16-1.el9_2.2.i686.rpm�8python3-debug-3.9.16-1.el9_2.2.x86_64.rpmP�8python3-3.9.16-1.el9_2.2.i686.rpm����I�;	�)�GBsecurityImportant: libvpx security update���https://access.redhat.com/errata/RHSA-2023:5539RHSA-2023:5539RHSA-2023:5539https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22411912241191https://bugzilla.redhat.com/22418062241806https://errata.almalinux.org/9/ALSA-2023-5539.htmlALSA-2023:5539ALSA-2023:5539
��Plibvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm��Plibvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpm��Plibvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm��Plibvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpm����x�<	�*�JBBBBsecurityImportant: galera and mariadb security update���Uhttps://access.redhat.com/errata/RHSA-2023:5684RHSA-2023:5684RHSA-2023:5684https://access.redhat.com/security/cve/CVE-2022-32081CVE-2022-32081CVE-2022-32081https://access.redhat.com/security/cve/CVE-2022-32082CVE-2022-32082CVE-2022-32082https://access.redhat.com/security/cve/CVE-2022-32084CVE-2022-32084CVE-2022-32084https://access.redhat.com/security/cve/CVE-2022-32089CVE-2022-32089CVE-2022-32089https://access.redhat.com/security/cve/CVE-2022-32091CVE-2022-32091CVE-2022-32091https://access.redhat.com/security/cve/CVE-2022-38791CVE-2022-38791CVE-2022-38791https://access.redhat.com/security/cve/CVE-2022-47015CVE-2022-47015CVE-2022-47015https://access.redhat.com/security/cve/CVE-2023-5157CVE-2023-5157CVE-2023-5157https://bugzilla.redhat.com/21060282106028https://bugzilla.redhat.com/21060302106030https://bugzilla.redhat.com/21060342106034https://bugzilla.redhat.com/21060352106035https://bugzilla.redhat.com/21060422106042https://bugzilla.redhat.com/21301052130105https://bugzilla.redhat.com/21636092163609https://bugzilla.redhat.com/22402462240246https://errata.almalinux.org/9/ALSA-2023-5684.htmlALSA-2023:5684ALSA-2023:5684
�V�mariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm�U�mariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm�T�mariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm�V�mariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm�U�mariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm�T�mariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm����0�=	�,�k�fBBBsecurityImportant: bind security update��e�Ehttps://access.redhat.com/errata/RHSA-2023:5689RHSA-2023:5689RHSA-2023:5689https://access.redhat.com/security/cve/CVE-2023-3341CVE-2023-3341CVE-2023-3341https://bugzilla.redhat.com/22396212239621https://errata.almalinux.org/9/ALSA-2023-5689.htmlALSA-2023:5689ALSA-2023:5689
R�\bind-devel-9.16.23-11.el9_2.2.i686.rpm�f�\bind-libs-9.16.23-11.el9_2.2.i686.rpm��\bind-doc-9.16.23-11.el9_2.2.noarch.rpmR�\bind-devel-9.16.23-11.el9_2.2.x86_64.rpmR�\bind-devel-9.16.23-11.el9_2.2.i686.rpm�f�\bind-libs-9.16.23-11.el9_2.2.i686.rpm��\bind-doc-9.16.23-11.el9_2.2.noarch.rpmR�\bind-devel-9.16.23-11.el9_2.2.x86_64.rpm����~�>	�-�UsecurityImportant: dotnet6.0 security update��*�ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708
��dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpm����p�?	�.�WsecurityModerate: nginx security update
���Qhttps://access.redhat.com/errata/RHSA-2023:5711RHSA-2023:5711RHSA-2023:5711https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5711.htmlALSA-2023:5711ALSA-2023:5711
�\�fnginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm�\�fnginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm����;�@	�/�YBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update
��j�Ehttps://access.redhat.com/errata/RHSA-2023:5733RHSA-2023:5733RHSA-2023:5733https://access.redhat.com/security/cve/CVE-2022-40433CVE-2022-40433CVE-2022-40433https://access.redhat.com/security/cve/CVE-2023-22067CVE-2023-22067CVE-2023-22067https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22377092237709https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22436372243637https://errata.almalinux.org/9/ALSA-2023-5733.htmlALSA-2023:5733ALSA-2023:5733

�Zjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�
Zjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�	Zjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm
�Zjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�
Zjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�	Zjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm�Zjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm����A	�0�mBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update
��/�&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744
�+java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�y+java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�|+java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�}+java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�x+java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�z+java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�~+java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�{+java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�y+java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�|+java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�}+java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�x+java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�z+java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm�~+java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�{+java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm�+java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm��˶
�B	�1�IsecurityImportant: .NET 7.0 security update��U�ohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm�����C	�2�KBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update
��D�<https://access.redhat.com/errata/RHSA-2023:5753RHSA-2023:5753RHSA-2023:5753https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-5753.htmlALSA-2023:5753ALSA-2023:5753
w>java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmn>java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmp>java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmx>java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpms>java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmu>java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmq>java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmm>java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpml>java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmr>java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmv>java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmo>java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt>java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmk>java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmw>java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmn>java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmp>java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmx>java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpms>java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmu>java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmq>java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmm>java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpml>java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmr>java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmv>java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmo>java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt>java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmk>java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm��˩n�D	��gBBBsecurityImportant: nghttp2 security update���-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838
��anghttp2-1.43.0-5.el9_2.1.x86_64.rpm��alibnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm��alibnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm��anghttp2-1.43.0-5.el9_2.1.x86_64.rpm��alibnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm��alibnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm��Ù1�E	�3�lBsecurityImportant: varnish security update��-�https://access.redhat.com/errata/RHSA-2023:5924RHSA-2023:5924RHSA-2023:5924https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5924.htmlALSA-2023:5924ALSA-2023:5924
�'�varnish-devel-6.6.2-3.el9_2.1.i686.rpm�'�varnish-devel-6.6.2-3.el9_2.1.x86_64.rpm�'�varnish-devel-6.6.2-3.el9_2.1.i686.rpm�'�varnish-devel-6.6.2-3.el9_2.1.x86_64.rpm����z�F	�4�osecurityModerate: .NET 6.0 security update
��=�Qhttps://access.redhat.com/errata/RHSA-2023:6242RHSA-2023:6242RHSA-2023:6242https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6242.htmlALSA-2023:6242ALSA-2023:6242
��
dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm��
dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm�����G�A	�5�qsecurityModerate: .NET 7.0 security update
���Qhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpm����I�H	�9�vBB�|BBBBsecurityImportant: ghostscript security update��_�https://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265
�)�ghostscript-9.54.0-11.el9_2.i686.rpmi�libgs-devel-9.54.0-11.el9_2.i686.rpmi�libgs-devel-9.54.0-11.el9_2.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm�*�ghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm�)�ghostscript-9.54.0-11.el9_2.i686.rpmi�libgs-devel-9.54.0-11.el9_2.i686.rpmi�libgs-devel-9.54.0-11.el9_2.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm�*�ghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm����~�I	�<�zB�BsecurityModerate: edk2 security, bug fix, and enhancement update
��`�Bhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330
��oedk2-tools-20230524-3.el9.x86_64.rpm�R�oedk2-aarch64-20230524-3.el9.noarch.rpm�S�oedk2-tools-doc-20230524-3.el9.noarch.rpm�(�oedk2-ovmf-20230524-3.el9.noarch.rpm��oedk2-tools-20230524-3.el9.x86_64.rpm�R�oedk2-aarch64-20230524-3.el9.noarch.rpm�S�oedk2-tools-doc-20230524-3.el9.noarch.rpm�(�oedk2-ovmf-20230524-3.el9.noarch.rpm����J	�=�|BBsecurityModerate: xorg-x11-server security and bug fix update
��"�https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340
f�xorg-x11-server-devel-1.20.11-19.el9.i686.rpm�\�xorg-x11-server-source-1.20.11-19.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-19.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-19.el9.i686.rpm�\�xorg-x11-server-source-1.20.11-19.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-19.el9.x86_64.rpm����P�K	�>�@BsecurityModerate: LibRaw security update
��&�Ghttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343
�<�/LibRaw-devel-0.20.2-6.el9.x86_64.rpm�<�/LibRaw-devel-0.20.2-6.el9.i686.rpm�<�/LibRaw-devel-0.20.2-6.el9.x86_64.rpm�<�/LibRaw-devel-0.20.2-6.el9.i686.rpm�����L	�?�CBBsecurityModerate: qt5 security and bug fix update
��m�https://access.redhat.com/errata/RHSA-2023:6369RHSA-2023:6369RHSA-2023:6369https://access.redhat.com/security/cve/CVE-2023-32573CVE-2023-32573CVE-2023-32573https://access.redhat.com/security/cve/CVE-2023-33285CVE-2023-33285CVE-2023-33285https://access.redhat.com/security/cve/CVE-2023-34410CVE-2023-34410CVE-2023-34410https://access.redhat.com/security/cve/CVE-2023-37369CVE-2023-37369CVE-2023-37369https://access.redhat.com/security/cve/CVE-2023-38197CVE-2023-38197CVE-2023-38197https://bugzilla.redhat.com/22081352208135https://bugzilla.redhat.com/22094882209488https://bugzilla.redhat.com/22127472212747https://bugzilla.redhat.com/22227672222767https://bugzilla.redhat.com/22321732232173https://errata.almalinux.org/9/ALSA-2023-6369.htmlALSA-2023:6369ALSA-2023:6369
�^�#qt5-devel-5.15.9-1.el9.noarch.rpm�&�zqt5-qtbase-static-5.15.9-7.el9.x86_64.rpm�&�zqt5-qtbase-static-5.15.9-7.el9.i686.rpm�^�#qt5-devel-5.15.9-1.el9.noarch.rpm�&�zqt5-qtbase-static-5.15.9-7.el9.x86_64.rpm�&�zqt5-qtbase-static-5.15.9-7.el9.i686.rpm����]�M	��GBBBBBBsecurityModerate: libvirt security, bug fix, and enhancement update
��
�https://access.redhat.com/errata/RHSA-2023:6409RHSA-2023:6409RHSA-2023:6409https://access.redhat.com/security/cve/CVE-2023-3750CVE-2023-3750CVE-2023-3750https://bugzilla.redhat.com/22222102222210https://errata.almalinux.org/9/ALSA-2023-6409.htmlALSA-2023:6409ALSA-2023:6409
�V�/libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm�0�/libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm�1�/libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm�S�/libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpm�V�/libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm�0�/libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm�1�/libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm�S�/libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpm����O�N	��OsecurityModerate: libfastjson security update
���[https://access.redhat.com/errata/RHSA-2023:6431RHSA-2023:6431RHSA-2023:6431https://access.redhat.com/security/cve/CVE-2020-12762CVE-2020-12762CVE-2020-12762https://bugzilla.redhat.com/18352531835253https://errata.almalinux.org/9/ALSA-2023-6431.htmlALSA-2023:6431ALSA-2023:6431
�g�_libfastjson-devel-0.99.9-5.el9.x86_64.rpm�g�_libfastjson-devel-0.99.9-5.el9.x86_64.rpm����v�O	��QBsecurityModerate: wireshark security update
��t�Ghttps://access.redhat.com/errata/RHSA-2023:6469RHSA-2023:6469RHSA-2023:6469https://access.redhat.com/security/cve/CVE-2023-0666CVE-2023-0666CVE-2023-0666https://access.redhat.com/security/cve/CVE-2023-0668CVE-2023-0668CVE-2023-0668https://access.redhat.com/security/cve/CVE-2023-2855CVE-2023-2855CVE-2023-2855https://access.redhat.com/security/cve/CVE-2023-2856CVE-2023-2856CVE-2023-2856https://access.redhat.com/security/cve/CVE-2023-2858CVE-2023-2858CVE-2023-2858https://access.redhat.com/security/cve/CVE-2023-2952CVE-2023-2952CVE-2023-2952https://bugzilla.redhat.com/22108222210822https://bugzilla.redhat.com/22108242210824https://bugzilla.redhat.com/22108292210829https://bugzilla.redhat.com/22108322210832https://bugzilla.redhat.com/22108352210835https://bugzilla.redhat.com/22114062211406https://errata.almalinux.org/9/ALSA-2023-6469.htmlALSA-2023:6469ALSA-2023:6469
�J�Ywireshark-devel-3.4.10-6.el9.x86_64.rpm�J�Ywireshark-devel-3.4.10-6.el9.i686.rpm�J�Ywireshark-devel-3.4.10-6.el9.x86_64.rpm�J�Ywireshark-devel-3.4.10-6.el9.i686.rpm�����P	��TBsecurityModerate: librabbitmq security update
��;�Whttps://access.redhat.com/errata/RHSA-2023:6482RHSA-2023:6482RHSA-2023:6482https://access.redhat.com/security/cve/CVE-2023-35789CVE-2023-35789CVE-2023-35789https://bugzilla.redhat.com/22157622215762https://errata.almalinux.org/9/ALSA-2023-6482.htmlALSA-2023:6482ALSA-2023:6482
��,librabbitmq-devel-0.11.0-7.el9.i686.rpm��,librabbitmq-devel-0.11.0-7.el9.x86_64.rpm��,librabbitmq-devel-0.11.0-7.el9.i686.rpm��,librabbitmq-devel-0.11.0-7.el9.x86_64.rpm�����Q	��DB�SBBBBBBBBBsecurityModerate: python3.11 security update
���bhttps://access.redhat.com/errata/RHSA-2023:6494RHSA-2023:6494RHSA-2023:6494https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://access.redhat.com/security/cve/CVE-2023-41105CVE-2023-41105CVE-2023-41105https://bugzilla.redhat.com/22357952235795https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6494.htmlALSA-2023:6494ALSA-2023:6494
�python3.11-idle-3.11.5-1.el9_3.x86_64.rpm�python3.11-debug-3.11.5-1.el9_3.x86_64.rpmd�python3.11-3.11.5-1.el9_3.i686.rpm�python3.11-debug-3.11.5-1.el9_3.i686.rpme�python3.11-tkinter-3.11.5-1.el9_3.i686.rpm�python3.11-test-3.11.5-1.el9_3.x86_64.rpm�python3.11-test-3.11.5-1.el9_3.i686.rpm�python3.11-idle-3.11.5-1.el9_3.i686.rpm�python3.11-idle-3.11.5-1.el9_3.x86_64.rpm�python3.11-debug-3.11.5-1.el9_3.x86_64.rpmd�python3.11-3.11.5-1.el9_3.i686.rpm�python3.11-debug-3.11.5-1.el9_3.i686.rpme�python3.11-tkinter-3.11.5-1.el9_3.i686.rpm�python3.11-test-3.11.5-1.el9_3.x86_64.rpm�python3.11-test-3.11.5-1.el9_3.i686.rpm�python3.11-idle-3.11.5-1.el9_3.i686.rpm����?�R	��bBBsecurityModerate: libreoffice security update
��t�/
https://access.redhat.com/errata/RHSA-2023:6508RHSA-2023:6508RHSA-2023:6508https://access.redhat.com/security/cve/CVE-2022-38745CVE-2022-38745CVE-2022-38745https://access.redhat.com/security/cve/CVE-2023-0950CVE-2023-0950CVE-2023-0950https://access.redhat.com/security/cve/CVE-2023-1183CVE-2023-1183CVE-2023-1183https://access.redhat.com/security/cve/CVE-2023-2255CVE-2023-2255CVE-2023-2255https://bugzilla.redhat.com/21820442182044https://bugzilla.redhat.com/22085062208506https://bugzilla.redhat.com/22101852210185https://bugzilla.redhat.com/22101862210186https://errata.almalinux.org/9/ALSA-2023-6508.htmlALSA-2023:6508ALSA-2023:6508
�k�libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm�����S	�
�HB�^BBBsecurityModerate: flatpak security, bug fix, and enhancement update
��#�whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518
��4flatpak-devel-1.12.8-1.el9.i686.rpm��4flatpak-1.12.8-1.el9.i686.rpm��4flatpak-session-helper-1.12.8-1.el9.i686.rpm��4flatpak-devel-1.12.8-1.el9.x86_64.rpm��4flatpak-devel-1.12.8-1.el9.i686.rpm��4flatpak-1.12.8-1.el9.i686.rpm��4flatpak-session-helper-1.12.8-1.el9.i686.rpm��4flatpak-devel-1.12.8-1.el9.x86_64.rpm����T�T	��KBB�_BBBBsecurityModerate: ghostscript security and bug fix update
���rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544
�*�ghostscript-tools-fonts-9.54.0-13.el9.i686.rpmi�libgs-devel-9.54.0-13.el9.x86_64.rpm�)�ghostscript-9.54.0-13.el9.i686.rpm�+�ghostscript-tools-printing-9.54.0-13.el9.i686.rpmi�libgs-devel-9.54.0-13.el9.i686.rpm�*�ghostscript-tools-fonts-9.54.0-13.el9.i686.rpmi�libgs-devel-9.54.0-13.el9.x86_64.rpm�)�ghostscript-9.54.0-13.el9.i686.rpm�+�ghostscript-tools-printing-9.54.0-13.el9.i686.rpmi�libgs-devel-9.54.0-13.el9.i686.rpm�����U	��qBsecurityModerate: yajl security update
���,https://access.redhat.com/errata/RHSA-2023:6551RHSA-2023:6551RHSA-2023:6551https://access.redhat.com/security/cve/CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/22212492221249https://errata.almalinux.org/9/ALSA-2023-6551.htmlALSA-2023:6551ALSA-2023:6551
��]yajl-devel-2.1.0-22.el9.i686.rpm��]yajl-devel-2.1.0-22.el9.x86_64.rpm��]yajl-devel-2.1.0-22.el9.i686.rpm��]yajl-devel-2.1.0-22.el9.x86_64.rpm�����V	��tBBsecurityModerate: libmicrohttpd security update
��8�~https://access.redhat.com/errata/RHSA-2023:6566RHSA-2023:6566RHSA-2023:6566https://access.redhat.com/security/cve/CVE-2023-27371CVE-2023-27371CVE-2023-27371https://bugzilla.redhat.com/21743132174313https://errata.almalinux.org/9/ALSA-2023-6566.htmlALSA-2023:6566ALSA-2023:6566
��libmicrohttpd-devel-0.9.72-5.el9.i686.rpm��libmicrohttpd-devel-0.9.72-5.el9.x86_64.rpm�2�libmicrohttpd-doc-0.9.72-5.el9.noarch.rpm��libmicrohttpd-devel-0.9.72-5.el9.i686.rpm��libmicrohttpd-devel-0.9.72-5.el9.x86_64.rpm�2�libmicrohttpd-doc-0.9.72-5.el9.noarch.rpm����V�W	��xsecurityModerate: libtiff security update
��6�Nhttps://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575
��xlibtiff-tools-4.4.0-10.el9.x86_64.rpm��xlibtiff-tools-4.4.0-10.el9.x86_64.rpm����}�X	� �zBBBBsecurityModerate: protobuf-c security update
���}https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621
�!�Kprotobuf-c-devel-1.3.3-13.el9.i686.rpm� �Kprotobuf-c-compiler-1.3.3-13.el9.x86_64.rpm�!�Kprotobuf-c-devel-1.3.3-13.el9.x86_64.rpm� �Kprotobuf-c-compiler-1.3.3-13.el9.i686.rpm�!�Kprotobuf-c-devel-1.3.3-13.el9.i686.rpm� �Kprotobuf-c-compiler-1.3.3-13.el9.x86_64.rpm�!�Kprotobuf-c-devel-1.3.3-13.el9.x86_64.rpm� �Kprotobuf-c-compiler-1.3.3-13.el9.i686.rpm����_�Y	��@BsecurityLow: glib2 security and bug fix update�^���ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631
�u�_glib2-static-2.68.4-11.el9.x86_64.rpm�u�_glib2-static-2.68.4-11.el9.i686.rpm�u�_glib2-static-2.68.4-11.el9.x86_64.rpm�u�_glib2-static-2.68.4-11.el9.i686.rpm�����Z	�!�CBsecurityLow: shadow-utils security and bug fix update�^��p�Yhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632
�~�lshadow-utils-subid-devel-4.9-8.el9.i686.rpm�~�lshadow-utils-subid-devel-4.9-8.el9.x86_64.rpm�~�lshadow-utils-subid-devel-4.9-8.el9.i686.rpm�~�lshadow-utils-subid-devel-4.9-8.el9.x86_64.rpm�����[	��S�P�eBBBBBBBBBsecurityModerate: python3.9 security update
��I� https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659
�9python3-debug-3.9.18-1.el9_3.x86_64.rpm�9python3-test-3.9.18-1.el9_3.i686.rpm�9python3-test-3.9.18-1.el9_3.x86_64.rpm�9python3-debug-3.9.18-1.el9_3.i686.rpmP�9python3-3.9.18-1.el9_3.i686.rpm�9python3-idle-3.9.18-1.el9_3.x86_64.rpm�9python3-idle-3.9.18-1.el9_3.i686.rpmQ�9python3-tkinter-3.9.18-1.el9_3.i686.rpm�9python3-debug-3.9.18-1.el9_3.x86_64.rpm�9python3-test-3.9.18-1.el9_3.i686.rpm�9python3-test-3.9.18-1.el9_3.x86_64.rpm�9python3-debug-3.9.18-1.el9_3.i686.rpmP�9python3-3.9.18-1.el9_3.i686.rpm�9python3-idle-3.9.18-1.el9_3.x86_64.rpm�9python3-idle-3.9.18-1.el9_3.i686.rpmQ�9python3-tkinter-3.9.18-1.el9_3.i686.rpm����E�\	��QBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update
��i�K
https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667
�Npython3-samba-test-4.18.6-100.el9.x86_64.rpm�Nlibnetapi-devel-4.18.6-100.el9.i686.rpm�VNlibsmbclient-devel-4.18.6-100.el9.x86_64.rpm�ZNsamba-devel-4.18.6-100.el9.i686.rpm�WNlibwbclient-devel-4.18.6-100.el9.i686.rpm�,Nsamba-pidl-4.18.6-100.el9.noarch.rpm�%Npython3-samba-devel-4.18.6-100.el9.i686.rpm�nNsamba-test-libs-4.18.6-100.el9.x86_64.rpm�%Npython3-samba-devel-4.18.6-100.el9.x86_64.rpm�mNsamba-test-4.18.6-100.el9.x86_64.rpm�VNlibsmbclient-devel-4.18.6-100.el9.i686.rpm�WNlibwbclient-devel-4.18.6-100.el9.x86_64.rpm�ZNsamba-devel-4.18.6-100.el9.x86_64.rpm�Nlibnetapi-devel-4.18.6-100.el9.x86_64.rpm�Npython3-samba-test-4.18.6-100.el9.x86_64.rpm�Nlibnetapi-devel-4.18.6-100.el9.i686.rpm�VNlibsmbclient-devel-4.18.6-100.el9.x86_64.rpm�ZNsamba-devel-4.18.6-100.el9.i686.rpm�WNlibwbclient-devel-4.18.6-100.el9.i686.rpm�,Nsamba-pidl-4.18.6-100.el9.noarch.rpm�%Npython3-samba-devel-4.18.6-100.el9.i686.rpm�nNsamba-test-libs-4.18.6-100.el9.x86_64.rpm�%Npython3-samba-devel-4.18.6-100.el9.x86_64.rpm�mNsamba-test-4.18.6-100.el9.x86_64.rpm�VNlibsmbclient-devel-4.18.6-100.el9.i686.rpm�WNlibwbclient-devel-4.18.6-100.el9.x86_64.rpm�ZNsamba-devel-4.18.6-100.el9.x86_64.rpm�Nlibnetapi-devel-4.18.6-100.el9.x86_64.rpm����0�]	�#�gBsecurityLow: tpm2-tss security and enhancement update�^��4�Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685
�&�rtpm2-tss-devel-3.2.2-2.el9.i686.rpm�&�rtpm2-tss-devel-3.2.2-2.el9.x86_64.rpm�&�rtpm2-tss-devel-3.2.2-2.el9.i686.rpm�&�rtpm2-tss-devel-3.2.2-2.el9.x86_64.rpm���� �^	�$�jBsecurityLow: procps-ng security and bug fix update�^���Hhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705
��vprocps-ng-devel-3.3.17-13.el9.x86_64.rpm��vprocps-ng-devel-3.3.17-13.el9.i686.rpm��vprocps-ng-devel-3.3.17-13.el9.x86_64.rpm��vprocps-ng-devel-3.3.17-13.el9.i686.rpm����#�_	��mBBBBBBBBBBBBBBBBsecurityModerate: avahi security update
��N�https://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707
�ATavahi-devel-0.8-15.el9.x86_64.rpm�?Tavahi-compat-libdns_sd-0.8-15.el9.i686.rpm�>Tavahi-compat-howl-devel-0.8-15.el9.i686.rpm�?Tavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm�>Tavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm�ATavahi-devel-0.8-15.el9.i686.rpm�@Tavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm�BTavahi-glib-devel-0.8-15.el9.i686.rpm�BTavahi-glib-devel-0.8-15.el9.x86_64.rpm�=Tavahi-compat-howl-0.8-15.el9.i686.rpm�=Tavahi-compat-howl-0.8-15.el9.x86_64.rpm�@Tavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm�ATavahi-devel-0.8-15.el9.x86_64.rpm�?Tavahi-compat-libdns_sd-0.8-15.el9.i686.rpm�>Tavahi-compat-howl-devel-0.8-15.el9.i686.rpm�?Tavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm�>Tavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm�ATavahi-devel-0.8-15.el9.i686.rpm�@Tavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm�BTavahi-glib-devel-0.8-15.el9.i686.rpm�BTavahi-glib-devel-0.8-15.el9.x86_64.rpm�=Tavahi-compat-howl-0.8-15.el9.i686.rpm�=Tavahi-compat-howl-0.8-15.el9.x86_64.rpm�@Tavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm�����`	��securityModerate: python-wheel security update
��_�?https://access.redhat.com/errata/RHSA-2023:6712RHSA-2023:6712RHSA-2023:6712https://access.redhat.com/security/cve/CVE-2022-40898CVE-2022-40898CVE-2022-40898https://bugzilla.redhat.com/21658642165864https://errata.almalinux.org/9/ALSA-2023-6712.htmlALSA-2023:6712ALSA-2023:6712
�<�*python3-wheel-wheel-0.36.2-8.el9.noarch.rpm�;�*python3-wheel-0.36.2-8.el9.noarch.rpm�<�*python3-wheel-wheel-0.36.2-8.el9.noarch.rpm�;�*python3-wheel-0.36.2-8.el9.noarch.rpm����&�a	��WBB�jBBBBsecurityImportant: ghostscript security update���https://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732
i�libgs-devel-9.54.0-14.el9_3.i686.rpm�+�ghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm�*�ghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm�)�ghostscript-9.54.0-14.el9_3.i686.rpmi�libgs-devel-9.54.0-14.el9_3.x86_64.rpmi�libgs-devel-9.54.0-14.el9_3.i686.rpm�+�ghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm�*�ghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm�)�ghostscript-9.54.0-14.el9_3.i686.rpmi�libgs-devel-9.54.0-14.el9_3.x86_64.rpm�����b	��HBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security and bug fix update
���https://access.redhat.com/errata/RHSA-2023:6738RHSA-2023:6738RHSA-2023:6738https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-6738.htmlALSA-2023:6738ALSA-2023:6738
�m?java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�s?java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�j?java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�i?java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�l?java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�t?java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�g?java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�o?java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�q?java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�n?java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�r?java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�h?java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�k?java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�p?java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�m?java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�s?java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�j?java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�i?java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�l?java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�t?java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�g?java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�o?java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�q?java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�n?java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�r?java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�h?java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�k?java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�p?java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm�����c	��dBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security update
��9�Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744
�VOlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm�WOlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�Olibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�Opython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm�mOsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm�Olibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpm�WOlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm�,Osamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpm�nOsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�ZOsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�%Opython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm�%Opython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�ZOsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpm�VOlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�VOlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm�WOlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�Olibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�Opython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm�mOsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm�Olibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpm�WOlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm�,Osamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpm�nOsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�ZOsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�%Opython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm�%Opython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�ZOsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpm�VOlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm�����d	�%�zBBBsecurityImportant: nghttp2 security update���-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746
��bnghttp2-1.43.0-5.el9_3.1.x86_64.rpm��blibnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm��blibnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm��bnghttp2-1.43.0-5.el9_3.1.x86_64.rpm��blibnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm��blibnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm����l�e	��securityModerate: dotnet8.0 security update
��?�https://access.redhat.com/errata/RHSA-2023:7253RHSA-2023:7253RHSA-2023:7253https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7253.htmlALSA-2023:7253ALSA-2023:7253
��dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpm��dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpm��ٍ�f	��AsecurityModerate: dotnet7.0 security update
��[�1https://access.redhat.com/errata/RHSA-2023:7255RHSA-2023:7255RHSA-2023:7255https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7255.htmlALSA-2023:7255ALSA-2023:7255
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpm����r�g	��CsecurityModerate: dotnet6.0 security update
���.https://access.redhat.com/errata/RHSA-2023:7257RHSA-2023:7257RHSA-2023:7257https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7257.htmlALSA-2023:7257ALSA-2023:7257
��dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpm��و9�h	� �EBBBBBBBBBBsecurityImportant: postgresql security update��:�
https://access.redhat.com/errata/RHSA-2023:7784RHSA-2023:7784RHSA-2023:7784https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7784.htmlALSA-2023:7784ALSA-2023:7784
�	�apostgresql-server-devel-13.13-1.el9_3.x86_64.rpm��apostgresql-private-devel-13.13-1.el9_3.x86_64.rpm��apostgresql-test-13.13-1.el9_3.x86_64.rpm��apostgresql-docs-13.13-1.el9_3.x86_64.rpm��apostgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm�
�apostgresql-static-13.13-1.el9_3.x86_64.rpm�	�apostgresql-server-devel-13.13-1.el9_3.x86_64.rpm��apostgresql-private-devel-13.13-1.el9_3.x86_64.rpm��apostgresql-test-13.13-1.el9_3.x86_64.rpm��apostgresql-docs-13.13-1.el9_3.x86_64.rpm��apostgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm�
�apostgresql-static-13.13-1.el9_3.x86_64.rpm����b�i	�!�QBsecurityImportant: gstreamer1-plugins-bad-free security update��@�https://access.redhat.com/errata/RHSA-2023:7791RHSA-2023:7791RHSA-2023:7791https://access.redhat.com/security/cve/CVE-2023-44429CVE-2023-44429CVE-2023-44429https://access.redhat.com/security/cve/CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/22502472250247https://bugzilla.redhat.com/22502492250249https://errata.almalinux.org/9/ALSA-2023-7791.htmlALSA-2023:7791ALSA-2023:7791
�v�Agstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm�v�Agstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm�v�Agstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm�v�Agstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm���M�j	�"�securityModerate: ipa security update
��]�4https://access.redhat.com/errata/RHSA-2024:0141RHSA-2024:0141RHSA-2024:0141https://access.redhat.com/security/cve/CVE-2023-5455CVE-2023-5455CVE-2023-5455https://bugzilla.redhat.com/22428282242828https://errata.almalinux.org/9/ALSA-2024-0141.htmlALSA-2024:0141ALSA-2024:0141
��python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm��python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm����[�k	�#�UsecurityImportant: .NET 7.0 security update���ghttps://access.redhat.com/errata/RHSA-2024:0151RHSA-2024:0151RHSA-2024:0151https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0151.htmlALSA-2024:0151ALSA-2024:0151
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpm����S�l	�$�WsecurityImportant: .NET 8.0 security update��x�fhttps://access.redhat.com/errata/RHSA-2024:0152RHSA-2024:0152RHSA-2024:0152https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0152.htmlALSA-2024:0152ALSA-2024:0152
�� dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm�� dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm�����m	�%�YsecurityImportant: .NET 6.0 security update��^�ghttps://access.redhat.com/errata/RHSA-2024:0156RHSA-2024:0156RHSA-2024:0156https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0156.htmlALSA-2024:0156ALSA-2024:0156
��dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpm����v�n	�&�[BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��E�!https://access.redhat.com/errata/RHSA-2024:0249RHSA-2024:0249RHSA-2024:0249https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0249.htmlALSA-2024:0249ALSA-2024:0249
�oBjava-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�iBjava-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�mBjava-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�jBjava-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�tBjava-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�pBjava-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�nBjava-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�lBjava-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�kBjava-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�sBjava-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�hBjava-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�qBjava-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�gBjava-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�rBjava-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�oBjava-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�iBjava-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�mBjava-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�jBjava-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�tBjava-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�pBjava-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�nBjava-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�lBjava-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�kBjava-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�sBjava-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�hBjava-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�qBjava-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�gBjava-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�rBjava-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm�����o	�'�wBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix update��f�1https://access.redhat.com/errata/RHSA-2024:0265RHSA-2024:0265RHSA-2024:0265https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0265.htmlALSA-2024:0265ALSA-2024:0265

�[java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�	[java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�
[java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm
�[java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�	[java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�
[java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm�[java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm�����p	�(�KBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update���phttps://access.redhat.com/errata/RHSA-2024:0266RHSA-2024:0266RHSA-2024:0266https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0266.htmlALSA-2024:0266ALSA-2024:0266
�,java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�~,java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�x,java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�{,java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�z,java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�},java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�y,java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�|,java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�~,java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�x,java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�{,java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�z,java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�},java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�y,java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�|,java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm�,java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm����C�q	�)�gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update���*https://access.redhat.com/errata/RHSA-2024:0267RHSA-2024:0267RHSA-2024:0267https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20932CVE-2024-20932CVE-2024-20932https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577202257720https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0267.htmlALSA-2024:0267ALSA-2024:0267
q0java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmo0java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmk0java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp0java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmw0java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmu0java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmm0java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmt0java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmn0java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmx0java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmv0java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr0java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms0java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpml0java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmq0java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmo0java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmk0java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp0java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmw0java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmu0java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmm0java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmt0java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmn0java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmx0java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmv0java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr0java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms0java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpml0java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm����3�r	�+�j�}�^BBBBBBBBBsecurityModerate: python3.9 security update
��1�chttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466
�:python3-idle-3.9.18-1.el9_3.1.i686.rpmQ�:python3-tkinter-3.9.18-1.el9_3.1.i686.rpm�:python3-idle-3.9.18-1.el9_3.1.x86_64.rpm�:python3-debug-3.9.18-1.el9_3.1.i686.rpm�:python3-debug-3.9.18-1.el9_3.1.x86_64.rpm�:python3-test-3.9.18-1.el9_3.1.i686.rpmP�:python3-3.9.18-1.el9_3.1.i686.rpm�:python3-test-3.9.18-1.el9_3.1.x86_64.rpm�:python3-idle-3.9.18-1.el9_3.1.i686.rpmQ�:python3-tkinter-3.9.18-1.el9_3.1.i686.rpm�:python3-idle-3.9.18-1.el9_3.1.x86_64.rpm�:python3-debug-3.9.18-1.el9_3.1.i686.rpm�:python3-debug-3.9.18-1.el9_3.1.x86_64.rpm�:python3-test-3.9.18-1.el9_3.1.i686.rpmP�:python3-3.9.18-1.el9_3.1.i686.rpm�:python3-test-3.9.18-1.el9_3.1.x86_64.rpm��ˤ�s	�,�NsecurityImportant: dotnet7.0 security update���xhttps://access.redhat.com/errata/RHSA-2024:0805RHSA-2024:0805RHSA-2024:0805https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0805.htmlALSA-2024:0805ALSA-2024:0805
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm����@�t	�-�PsecurityImportant: dotnet6.0 security update���xhttps://access.redhat.com/errata/RHSA-2024:0807RHSA-2024:0807RHSA-2024:0807https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0807.htmlALSA-2024:0807ALSA-2024:0807
��dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm����2�u	�.�RsecurityImportant: .NET 8.0 security update���whttps://access.redhat.com/errata/RHSA-2024:0848RHSA-2024:0848RHSA-2024:0848https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0848.htmlALSA-2024:0848ALSA-2024:0848
��!dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm��!dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm����
�v	�/�TBBBBBBBBBBsecurityImportant: postgresql security update��{�	https://access.redhat.com/errata/RHSA-2024:0951RHSA-2024:0951RHSA-2024:0951https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0951.htmlALSA-2024:0951ALSA-2024:0951
��bpostgresql-test-13.14-1.el9_3.x86_64.rpm��bpostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm�	�bpostgresql-server-devel-13.14-1.el9_3.x86_64.rpm��bpostgresql-docs-13.14-1.el9_3.x86_64.rpm�
�bpostgresql-static-13.14-1.el9_3.x86_64.rpm��bpostgresql-private-devel-13.14-1.el9_3.x86_64.rpm��bpostgresql-test-13.14-1.el9_3.x86_64.rpm��bpostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm�	�bpostgresql-server-devel-13.14-1.el9_3.x86_64.rpm��bpostgresql-docs-13.14-1.el9_3.x86_64.rpm�
�bpostgresql-static-13.14-1.el9_3.x86_64.rpm��bpostgresql-private-devel-13.14-1.el9_3.x86_64.rpm�����w	�0�`BsecurityImportant: unbound security update���[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977
�[�<unbound-devel-1.16.2-3.el9_3.1.i686.rpm�[�<unbound-devel-1.16.2-3.el9_3.1.x86_64.rpm�[�<unbound-devel-1.16.2-3.el9_3.1.i686.rpm�[�<unbound-devel-1.16.2-3.el9_3.1.x86_64.rpm�����x	�1�cBBBBsecurityModerate: kernel security update
��_�https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274
�libperf-5.14.0-503.15.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpm�libperf-5.14.0-503.15.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpm����n�y	�4�rB�wBsecurityImportant: edk2 security update��~�6https://access.redhat.com/errata/RHSA-2024:1075RHSA-2024:1075RHSA-2024:1075https://access.redhat.com/security/cve/CVE-2023-45230CVE-2023-45230CVE-2023-45230https://access.redhat.com/security/cve/CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/22586852258685https://bugzilla.redhat.com/22586972258697https://errata.almalinux.org/9/ALSA-2024-1075.htmlALSA-2024:1075ALSA-2024:1075
��pedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm�(�pedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm�S�pedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm�R�pedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm��pedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm�(�pedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm�S�pedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm�R�pedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm����O�z	�5�lBBBBBBBBBBBsecurityImportant: postgresql security update��4�`https://access.redhat.com/errata/RHSA-2024:10791RHSA-2024:10791RHSA-2024:10791https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10791.htmlALSA-2024:10791ALSA-2024:10791
��Mpostgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpm��Mpostgresql-docs-13.18-1.el9_5.x86_64.rpm��Mpostgresql-private-devel-13.18-1.el9_5.x86_64.rpm�F�Mpostgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm�
�Mpostgresql-static-13.18-1.el9_5.x86_64.rpm��Mpostgresql-test-13.18-1.el9_5.x86_64.rpm�	�Mpostgresql-server-devel-13.18-1.el9_5.x86_64.rpm��Mpostgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpm��Mpostgresql-docs-13.18-1.el9_5.x86_64.rpm��Mpostgresql-private-devel-13.18-1.el9_5.x86_64.rpm�F�Mpostgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm�
�Mpostgresql-static-13.18-1.el9_5.x86_64.rpm��Mpostgresql-test-13.18-1.el9_5.x86_64.rpm�	�Mpostgresql-server-devel-13.18-1.el9_5.x86_64.rpm����y�{	�6�9securityImportant: ruby security update���%https://access.redhat.com/errata/RHSA-2024:10858RHSA-2024:10858RHSA-2024:10858https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10858.htmlALSA-2024:10858ALSA-2024:10858
�]�ruby-doc-3.0.7-163.el9_5.noarch.rpm�]�ruby-doc-3.0.7-163.el9_5.noarch.rpm���
�|	�7�zBBBBsecurityModerate: kernel security update
��9�Ahttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939
�kernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpm�libperf-5.14.0-503.16.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpm�libperf-5.14.0-503.16.1.el9_5.x86_64.rpm����(�}	�:�xB�HBBBBBBBBBsecurityImportant: python3.12 security update��z�-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978
#�/python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm%�/python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm$�/python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm��/python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm$�/python3.12-idle-3.12.5-2.el9_5.2.i686.rpm#�/python3.12-debug-3.12.5-2.el9_5.2.i686.rpm%�/python3.12-test-3.12.5-2.el9_5.2.i686.rpm��/python3.12-3.12.5-2.el9_5.2.i686.rpm#�/python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm%�/python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm$�/python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm��/python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm$�/python3.12-idle-3.12.5-2.el9_5.2.i686.rpm#�/python3.12-debug-3.12.5-2.el9_5.2.i686.rpm%�/python3.12-test-3.12.5-2.el9_5.2.i686.rpm��/python3.12-3.12.5-2.el9_5.2.i686.rpm�����~	�<�{�m�eBBBBBBBBBsecurityModerate: python3.9:3.9.21 security update
��'�https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983
Q�Apython3-tkinter-3.9.21-1.el9_5.i686.rpm�Apython3-test-3.9.21-1.el9_5.x86_64.rpm�Apython3-debug-3.9.21-1.el9_5.x86_64.rpm�Apython3-idle-3.9.21-1.el9_5.i686.rpmP�Apython3-3.9.21-1.el9_5.i686.rpm�Apython3-idle-3.9.21-1.el9_5.x86_64.rpm�Apython3-test-3.9.21-1.el9_5.i686.rpm�Apython3-debug-3.9.21-1.el9_5.i686.rpmQ�Apython3-tkinter-3.9.21-1.el9_5.i686.rpm�Apython3-test-3.9.21-1.el9_5.x86_64.rpm�Apython3-debug-3.9.21-1.el9_5.x86_64.rpm�Apython3-idle-3.9.21-1.el9_5.i686.rpmP�Apython3-3.9.21-1.el9_5.i686.rpm�Apython3-idle-3.9.21-1.el9_5.x86_64.rpm�Apython3-test-3.9.21-1.el9_5.i686.rpm�Apython3-debug-3.9.21-1.el9_5.i686.rpm����I�	�?�}B�YBBBBBBBBBsecurityModerate: python3.11 security update
��E�Mhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111
�$python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm�$python3.11-debug-3.11.9-7.el9_5.2.i686.rpm�$python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm�$python3.11-test-3.11.9-7.el9_5.2.i686.rpm�$python3.11-test-3.11.9-7.el9_5.2.x86_64.rpme�$python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmd�$python3.11-3.11.9-7.el9_5.2.i686.rpm�$python3.11-idle-3.11.9-7.el9_5.2.i686.rpm�$python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm�$python3.11-debug-3.11.9-7.el9_5.2.i686.rpm�$python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm�$python3.11-test-3.11.9-7.el9_5.2.i686.rpm�$python3.11-test-3.11.9-7.el9_5.2.x86_64.rpme�$python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmd�$python3.11-3.11.9-7.el9_5.2.i686.rpm�$python3.11-idle-3.11.9-7.el9_5.2.i686.rpm����}�	��@B�aBsecurityModerate: edk2:20240524 security update
���Bhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219
�S�sedk2-tools-doc-20240524-6.el9_5.3.noarch.rpm�(�sedk2-ovmf-20240524-6.el9_5.3.noarch.rpm�R�sedk2-aarch64-20240524-6.el9_5.3.noarch.rpm��sedk2-tools-20240524-6.el9_5.3.x86_64.rpm�S�sedk2-tools-doc-20240524-6.el9_5.3.noarch.rpm�(�sedk2-ovmf-20240524-6.el9_5.3.noarch.rpm�R�sedk2-aarch64-20240524-6.el9_5.3.noarch.rpm��sedk2-tools-20240524-6.el9_5.3.x86_64.rpm����V�	�'�dBsecurityModerate: unbound:1.16.2 security update
��T�https://access.redhat.com/errata/RHSA-2024:11232RHSA-2024:11232RHSA-2024:11232https://access.redhat.com/security/cve/CVE-2024-8508CVE-2024-8508CVE-2024-8508https://bugzilla.redhat.com/23163212316321https://errata.almalinux.org/9/ALSA-2024-11232.htmlALSA-2024:11232ALSA-2024:11232
�[�>unbound-devel-1.16.2-8.el9_5.1.i686.rpm�[�>unbound-devel-1.16.2-8.el9_5.1.x86_64.rpm�[�>unbound-devel-1.16.2-8.el9_5.1.i686.rpm�[�>unbound-devel-1.16.2-8.el9_5.1.x86_64.rpm����~�	�+�hBsecurityModerate: libsndfile:1.0.31 security update
��_�+https://access.redhat.com/errata/RHSA-2024:11237RHSA-2024:11237RHSA-2024:11237https://access.redhat.com/security/cve/CVE-2024-50612CVE-2024-50612CVE-2024-50612https://bugzilla.redhat.com/23220572322057https://errata.almalinux.org/9/ALSA-2024-11237.htmlALSA-2024:11237ALSA-2024:11237
�x�8libsndfile-devel-1.0.31-8.el9_5.2.i686.rpm�x�8libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm�x�8libsndfile-devel-1.0.31-8.el9_5.2.i686.rpm�x�8libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm����:�	��lBsecurityModerate: mpg123:1.32.9 security update
��
�qhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242
��Impg123-devel-1.32.9-1.el9_5.i686.rpm��Impg123-devel-1.32.9-1.el9_5.x86_64.rpm��Impg123-devel-1.32.9-1.el9_5.i686.rpm��Impg123-devel-1.32.9-1.el9_5.x86_64.rpm�����	��oBBBBsecurityModerate: mysql security update
��{�t�https://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141
�3�Nmysql-test-8.0.36-1.el9_3.x86_64.rpm�2�Nmysql-devel-8.0.36-1.el9_3.x86_64.rpm�[�Nmysql-libs-8.0.36-1.el9_3.x86_64.rpm�3�Nmysql-test-8.0.36-1.el9_3.x86_64.rpm�2�Nmysql-devel-8.0.36-1.el9_3.x86_64.rpm�[�Nmysql-libs-8.0.36-1.el9_3.x86_64.rpm����y�	��uBBBBsecurityModerate: kernel security update
��o�c$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486
�libperf-5.14.0-503.19.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpm�libperf-5.14.0-503.19.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpm����a�	�(�{BsecurityModerate: opencryptoki security update
��R�Whttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239
�z�topencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm�z�topencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpm�z�topencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm�z�topencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpm����D�	��~securityModerate: .NET 7.0 security update
��)�Fhttps://access.redhat.com/errata/RHSA-2024:1309RHSA-2024:1309RHSA-2024:1309https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1309.htmlALSA-2024:1309ALSA-2024:1309
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm��˥s�	��@securityModerate: .NET 8.0 security update
��o�Ehttps://access.redhat.com/errata/RHSA-2024:1310RHSA-2024:1310RHSA-2024:1310https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1310.htmlALSA-2024:1310ALSA-2024:1310
��"dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpm��"dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpm����e�		��BBBsecurityImportant: libreoffice security update��4�https://access.redhat.com/errata/RHSA-2024:1427RHSA-2024:1427RHSA-2024:1427https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-1427.htmlALSA-2024:1427ALSA-2024:1427
�k�libreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpm����z�
	�	�FBsecurityImportant: varnish security update��G�thttps://access.redhat.com/errata/RHSA-2024:1691RHSA-2024:1691RHSA-2024:1691https://access.redhat.com/security/cve/CVE-2024-30156CVE-2024-30156CVE-2024-30156https://bugzilla.redhat.com/22714862271486https://errata.almalinux.org/9/ALSA-2024-1691.htmlALSA-2024:1691ALSA-2024:1691
�'�varnish-devel-6.6.2-4.el9_3.1.x86_64.rpm�'�varnish-devel-6.6.2-4.el9_3.1.i686.rpm�'�varnish-devel-6.6.2-4.el9_3.1.x86_64.rpm�'�varnish-devel-6.6.2-4.el9_3.1.i686.rpm����=�	�
�IBsecurityImportant: unbound security update��;�6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750
�[�=unbound-devel-1.16.2-3.el9_3.5.x86_64.rpm�[�=unbound-devel-1.16.2-3.el9_3.5.i686.rpm�[�=unbound-devel-1.16.2-3.el9_3.5.x86_64.rpm�[�=unbound-devel-1.16.2-3.el9_3.5.i686.rpm���F�	��K�BBBBsecurityImportant: bind security update��q�Ghttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789
R�]bind-devel-9.16.23-14.el9_3.4.x86_64.rpm��]bind-doc-9.16.23-14.el9_3.4.noarch.rpmR�]bind-devel-9.16.23-14.el9_3.4.i686.rpm�f�]bind-libs-9.16.23-14.el9_3.4.i686.rpmR�]bind-devel-9.16.23-14.el9_3.4.x86_64.rpm��]bind-doc-9.16.23-14.el9_3.4.noarch.rpmR�]bind-devel-9.16.23-14.el9_3.4.i686.rpm�f�]bind-libs-9.16.23-14.el9_3.4.i686.rpm�����
	�
�QBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update
��8�
https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818

�\java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�	\java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�
\java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm
�\java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�	\java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�
\java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm�\java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm����h�	��eBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update
��W�nhttps://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822
�-java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�z-java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�{-java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�|-java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�x-java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�}-java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�~-java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�y-java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�z-java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�{-java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�|-java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�x-java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�}-java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�~-java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�y-java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm�-java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm����Q�	��ABBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update
��E�$
https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825
m1java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmw1java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmk1java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmp1java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmu1java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmv1java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpms1java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmn1java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo1java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmr1java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmx1java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmt1java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmq1java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpml1java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmm1java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmw1java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmk1java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmp1java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmu1java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmv1java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpms1java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmn1java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo1java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmr1java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmx1java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmt1java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmq1java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpml1java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm����(�	��]BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update
��i�Hhttps://access.redhat.com/errata/RHSA-2024:1828RHSA-2024:1828RHSA-2024:1828https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://errata.almalinux.org/9/ALSA-2024-1828.htmlALSA-2024:1828ALSA-2024:1828
�oCjava-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�lCjava-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�kCjava-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�qCjava-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�iCjava-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�jCjava-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�hCjava-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�tCjava-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�sCjava-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�mCjava-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�rCjava-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�gCjava-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�pCjava-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�nCjava-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�oCjava-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�lCjava-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�kCjava-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�qCjava-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�iCjava-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�jCjava-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�hCjava-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�tCjava-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�sCjava-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�mCjava-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�rCjava-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�gCjava-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�pCjava-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm�nCjava-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm����V�	��yBsecurityLow: LibRaw security update�^��1�https://access.redhat.com/errata/RHSA-2024:2137RHSA-2024:2137RHSA-2024:2137https://access.redhat.com/security/cve/CVE-2023-1729CVE-2023-1729CVE-2023-1729https://bugzilla.redhat.com/21882402188240https://errata.almalinux.org/9/ALSA-2024-2137.htmlALSA-2024:2137ALSA-2024:2137
�<�0LibRaw-devel-0.21.1-1.el9.i686.rpm�<�0LibRaw-devel-0.21.1-1.el9.x86_64.rpm�<�0LibRaw-devel-0.21.1-1.el9.i686.rpm�<�0LibRaw-devel-0.21.1-1.el9.x86_64.rpm���I�	��<securityModerate: ipa security update
��I�uhttps://access.redhat.com/errata/RHSA-2024:2147RHSA-2024:2147RHSA-2024:2147https://access.redhat.com/security/cve/CVE-2024-1481CVE-2024-1481CVE-2024-1481https://bugzilla.redhat.com/22621692262169https://errata.almalinux.org/9/ALSA-2024-2147.htmlALSA-2024:2147ALSA-2024:2147
��python3-ipatests-4.11.0-9.el9_4.noarch.rpm��python3-ipatests-4.11.0-9.el9_4.noarch.rpm����	��}BBsecurityModerate: xorg-x11-server security update
��>�https://access.redhat.com/errata/RHSA-2024:2169RHSA-2024:2169RHSA-2024:2169https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22447362244736https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2169.htmlALSA-2024:2169ALSA-2024:2169
�\�xorg-x11-server-source-1.20.11-24.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-24.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-24.el9.i686.rpm�\�xorg-x11-server-source-1.20.11-24.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-24.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-24.el9.i686.rpm���$�	��ABsecurityModerate: libsndfile security update
��>�&https://access.redhat.com/errata/RHSA-2024:2184RHSA-2024:2184RHSA-2024:2184https://access.redhat.com/security/cve/CVE-2022-33065CVE-2022-33065CVE-2022-33065https://bugzilla.redhat.com/22389342238934https://errata.almalinux.org/9/ALSA-2024-2184.htmlALSA-2024:2184ALSA-2024:2184
�x�7libsndfile-devel-1.0.31-8.el9.i686.rpm�x�7libsndfile-devel-1.0.31-8.el9.x86_64.rpm�x�7libsndfile-devel-1.0.31-8.el9.i686.rpm�x�7libsndfile-devel-1.0.31-8.el9.x86_64.rpm���S�	��DBsecurityImportant: pmix security update��d�:https://access.redhat.com/errata/RHSA-2024:2199RHSA-2024:2199RHSA-2024:2199https://access.redhat.com/security/cve/CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/22388982238898https://errata.almalinux.org/9/ALSA-2024-2199.htmlALSA-2024:2199ALSA-2024:2199
��spmix-pmi-devel-3.2.3-5.el9.i686.rpm��spmix-pmi-devel-3.2.3-5.el9.x86_64.rpm��spmix-pmi-devel-3.2.3-5.el9.i686.rpm��spmix-pmi-devel-3.2.3-5.el9.x86_64.rpm���W�	��GBBBBBsecurityModerate: libnbd security update
���<https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204
�w�8libnbd-devel-1.18.1-3.el9.x86_64.rpm�Y�8ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpm�w�8libnbd-devel-1.18.1-3.el9.i686.rpm�X�8ocaml-libnbd-1.18.1-3.el9.x86_64.rpm�w�8libnbd-devel-1.18.1-3.el9.x86_64.rpm�Y�8ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpm�w�8libnbd-devel-1.18.1-3.el9.i686.rpm�X�8ocaml-libnbd-1.18.1-3.el9.x86_64.rpm���L�	��NBBBBsecurityModerate: freerdp security update
��Z�ihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208
j�Rlibwinpr-devel-2.11.2-1.el9.i686.rpmj�Rlibwinpr-devel-2.11.2-1.el9.x86_64.rpmh�Rfreerdp-devel-2.11.2-1.el9.x86_64.rpmh�Rfreerdp-devel-2.11.2-1.el9.i686.rpmj�Rlibwinpr-devel-2.11.2-1.el9.i686.rpmj�Rlibwinpr-devel-2.11.2-1.el9.x86_64.rpmh�Rfreerdp-devel-2.11.2-1.el9.x86_64.rpmh�Rfreerdp-devel-2.11.2-1.el9.i686.rpm����	��TBBBBsecurityModerate: libvirt security update
��C�https://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236
�0�xlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm�1�xlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm�S�xlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm�0�xlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm�1�xlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm�S�xlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm���i�	��ZBBsecurityImportant: edk2 security update��Y�jhttps://access.redhat.com/errata/RHSA-2024:2264RHSA-2024:2264RHSA-2024:2264https://access.redhat.com/security/cve/CVE-2022-36763CVE-2022-36763CVE-2022-36763https://access.redhat.com/security/cve/CVE-2022-36764CVE-2022-36764CVE-2022-36764https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-45229CVE-2023-45229CVE-2023-45229https://access.redhat.com/security/cve/CVE-2023-45231CVE-2023-45231CVE-2023-45231https://access.redhat.com/security/cve/CVE-2023-45232CVE-2023-45232CVE-2023-45232https://access.redhat.com/security/cve/CVE-2023-45233CVE-2023-45233CVE-2023-45233https://access.redhat.com/security/cve/CVE-2023-45235CVE-2023-45235CVE-2023-45235https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22575822257582https://bugzilla.redhat.com/22575832257583https://bugzilla.redhat.com/22586772258677https://bugzilla.redhat.com/22586882258688https://bugzilla.redhat.com/22586912258691https://bugzilla.redhat.com/22586942258694https://bugzilla.redhat.com/22587002258700https://errata.almalinux.org/9/ALSA-2024-2264.htmlALSA-2024:2264ALSA-2024:2264
�R�
edk2-aarch64-20231122-6.el9.noarch.rpm��
edk2-tools-20231122-6.el9.x86_64.rpm�S�
edk2-tools-doc-20231122-6.el9.noarch.rpm�R�
edk2-aarch64-20231122-6.el9.noarch.rpm��
edk2-tools-20231122-6.el9.x86_64.rpm�S�
edk2-tools-doc-20231122-6.el9.noarch.rpm���h�	��^BsecurityModerate: qt5-qtbase security update
��C�shttps://access.redhat.com/errata/RHSA-2024:2276RHSA-2024:2276RHSA-2024:2276https://access.redhat.com/security/cve/CVE-2023-51714CVE-2023-51714CVE-2023-51714https://access.redhat.com/security/cve/CVE-2024-25580CVE-2024-25580CVE-2024-25580https://bugzilla.redhat.com/22558562255856https://bugzilla.redhat.com/22644232264423https://errata.almalinux.org/9/ALSA-2024-2276.htmlALSA-2024:2276ALSA-2024:2276
�&�{qt5-qtbase-static-5.15.9-9.el9.i686.rpm�&�{qt5-qtbase-static-5.15.9-9.el9.x86_64.rpm�&�{qt5-qtbase-static-5.15.9-9.el9.i686.rpm�&�{qt5-qtbase-static-5.15.9-9.el9.x86_64.rpm���e�	��aBsecurityModerate: gstreamer1-plugins-bad-free security update
��6�P
https://access.redhat.com/errata/RHSA-2024:2287RHSA-2024:2287RHSA-2024:2287https://access.redhat.com/security/cve/CVE-2023-40474CVE-2023-40474CVE-2023-40474https://access.redhat.com/security/cve/CVE-2023-40475CVE-2023-40475CVE-2023-40475https://access.redhat.com/security/cve/CVE-2023-40476CVE-2023-40476CVE-2023-40476https://access.redhat.com/security/cve/CVE-2023-50186CVE-2023-50186CVE-2023-50186https://bugzilla.redhat.com/22545872254587https://bugzilla.redhat.com/22545882254588https://bugzilla.redhat.com/22545892254589https://bugzilla.redhat.com/22556392255639https://errata.almalinux.org/9/ALSA-2024-2287.htmlALSA-2024:2287ALSA-2024:2287
�v�Bgstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm�v�Bgstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm�v�Bgstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm�v�Bgstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm���k�	��dsecurityModerate: libtiff security update
���:https://access.redhat.com/errata/RHSA-2024:2289RHSA-2024:2289RHSA-2024:2289https://access.redhat.com/security/cve/CVE-2022-40090CVE-2022-40090CVE-2022-40090https://access.redhat.com/security/cve/CVE-2023-3618CVE-2023-3618CVE-2023-3618https://access.redhat.com/security/cve/CVE-2023-40745CVE-2023-40745CVE-2023-40745https://access.redhat.com/security/cve/CVE-2023-41175CVE-2023-41175CVE-2023-41175https://access.redhat.com/security/cve/CVE-2023-6228CVE-2023-6228CVE-2023-6228https://bugzilla.redhat.com/22158652215865https://bugzilla.redhat.com/22349702234970https://bugzilla.redhat.com/22352642235264https://bugzilla.redhat.com/22352652235265https://bugzilla.redhat.com/22409952240995https://errata.almalinux.org/9/ALSA-2024-2289.htmlALSA-2024:2289ALSA-2024:2289
��ylibtiff-tools-4.4.0-12.el9.x86_64.rpm��ylibtiff-tools-4.4.0-12.el9.x86_64.rpm����	��]B�IBBBBBBBBBsecurityModerate: python3.11 security update
��@�rhttps://access.redhat.com/errata/RHSA-2024:2292RHSA-2024:2292RHSA-2024:2292https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-2292.htmlALSA-2024:2292ALSA-2024:2292
�python3.11-test-3.11.7-1.el9.i686.rpmd�python3.11-3.11.7-1.el9.i686.rpm�python3.11-idle-3.11.7-1.el9.i686.rpm�python3.11-test-3.11.7-1.el9.x86_64.rpm�python3.11-debug-3.11.7-1.el9.i686.rpme�python3.11-tkinter-3.11.7-1.el9.i686.rpm�python3.11-idle-3.11.7-1.el9.x86_64.rpm�python3.11-debug-3.11.7-1.el9.x86_64.rpm�python3.11-test-3.11.7-1.el9.i686.rpmd�python3.11-3.11.7-1.el9.i686.rpm�python3.11-idle-3.11.7-1.el9.i686.rpm�python3.11-test-3.11.7-1.el9.x86_64.rpm�python3.11-debug-3.11.7-1.el9.i686.rpme�python3.11-tkinter-3.11.7-1.el9.i686.rpm�python3.11-idle-3.11.7-1.el9.x86_64.rpm�python3.11-debug-3.11.7-1.el9.x86_64.rpm���9�	� �qBBBBsecurityModerate: libjpeg-turbo security update
��2�Rhttps://access.redhat.com/errata/RHSA-2024:2295RHSA-2024:2295RHSA-2024:2295https://access.redhat.com/security/cve/CVE-2021-29390CVE-2021-29390CVE-2021-29390https://bugzilla.redhat.com/22355212235521https://errata.almalinux.org/9/ALSA-2024-2295.htmlALSA-2024:2295ALSA-2024:2295
��Nturbojpeg-devel-2.0.90-7.el9.x86_64.rpm��Nturbojpeg-2.0.90-7.el9.i686.rpm��Nturbojpeg-devel-2.0.90-7.el9.i686.rpm��Nturbojpeg-2.0.90-7.el9.x86_64.rpm��Nturbojpeg-devel-2.0.90-7.el9.x86_64.rpm��Nturbojpeg-2.0.90-7.el9.i686.rpm��Nturbojpeg-devel-2.0.90-7.el9.i686.rpm��Nturbojpeg-2.0.90-7.el9.x86_64.rpm����	�!�wBBsecurityModerate: mingw components security update
���Bhttps://access.redhat.com/errata/RHSA-2024:2353RHSA-2024:2353RHSA-2024:2353https://access.redhat.com/security/cve/CVE-2023-1579CVE-2023-1579CVE-2023-1579https://bugzilla.redhat.com/21809052180905https://errata.almalinux.org/9/ALSA-2024-2353.htmlALSA-2024:2353ALSA-2024:2353
��mingw64-binutils-2.41-3.el9.x86_64.rpm�z�mingw32-binutils-2.41-3.el9.x86_64.rpm��mingw64-binutils-2.41-3.el9.x86_64.rpm�z�mingw32-binutils-2.41-3.el9.x86_64.rpm���/� 	�"�{BsecurityModerate: zziplib security update
��F�https://access.redhat.com/errata/RHSA-2024:2377RHSA-2024:2377RHSA-2024:2377https://access.redhat.com/security/cve/CVE-2020-18770CVE-2020-18770CVE-2020-18770https://bugzilla.redhat.com/22469072246907https://errata.almalinux.org/9/ALSA-2024-2377.htmlALSA-2024:2377ALSA-2024:2377
��-zziplib-devel-0.13.71-11.el9_4.x86_64.rpm��-zziplib-devel-0.13.71-11.el9_4.i686.rpm��-zziplib-devel-0.13.71-11.el9_4.x86_64.rpm��-zziplib-devel-0.13.71-11.el9_4.i686.rpm���/�!	�#�~BBBBsecurityImportant: kernel security, bug fix, and enhancement update��T�%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394
https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671�libperf-5.14.0-427.13.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm�libperf-5.14.0-427.13.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm�����"	�$�DBBBBBBBBBBBBBBBBsecurityModerate: avahi security update
��y�Ohttps://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433
�AUavahi-devel-0.8-20.el9.i686.rpm�BUavahi-glib-devel-0.8-20.el9.x86_64.rpm�?Uavahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm�@Uavahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm�=Uavahi-compat-howl-0.8-20.el9.i686.rpm�AUavahi-devel-0.8-20.el9.x86_64.rpm�?Uavahi-compat-libdns_sd-0.8-20.el9.i686.rpm�=Uavahi-compat-howl-0.8-20.el9.x86_64.rpm�>Uavahi-compat-howl-devel-0.8-20.el9.i686.rpm�>Uavahi-compat-howl-devel-0.8-20.el9.x86_64.rpm�@Uavahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm�BUavahi-glib-devel-0.8-20.el9.i686.rpm�AUavahi-devel-0.8-20.el9.i686.rpm�BUavahi-glib-devel-0.8-20.el9.x86_64.rpm�?Uavahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm�@Uavahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm�=Uavahi-compat-howl-0.8-20.el9.i686.rpm�AUavahi-devel-0.8-20.el9.x86_64.rpm�?Uavahi-compat-libdns_sd-0.8-20.el9.i686.rpm�=Uavahi-compat-howl-0.8-20.el9.x86_64.rpm�>Uavahi-compat-howl-devel-0.8-20.el9.i686.rpm�>Uavahi-compat-howl-devel-0.8-20.el9.x86_64.rpm�@Uavahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm�BUavahi-glib-devel-0.8-20.el9.i686.rpm���t�#	�%�VsecurityModerate: systemd security update
��H�https://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463
��psystemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpm��psystemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpm����$	�&�XBsecurityLow: file security update�^��I�Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512
��}file-devel-5.39-16.el9.i686.rpm��}file-devel-5.39-16.el9.x86_64.rpm��}file-devel-5.39-16.el9.i686.rpm��}file-devel-5.39-16.el9.x86_64.rpm����%	��[securityModerate: mingw-pixman security update
���https://access.redhat.com/errata/RHSA-2024:2525RHSA-2024:2525RHSA-2024:2525https://access.redhat.com/security/cve/CVE-2022-44638CVE-2022-44638CVE-2022-44638https://bugzilla.redhat.com/21399882139988https://errata.almalinux.org/9/ALSA-2024-2525.htmlALSA-2024:2525ALSA-2024:2525
�3�)mingw32-pixman-0.42.2-3.el9.noarch.rpm�6�)mingw64-pixman-0.42.2-3.el9.noarch.rpm�3�)mingw32-pixman-0.42.2-3.el9.noarch.rpm�6�)mingw64-pixman-0.42.2-3.el9.noarch.rpm���u�&	�"�^BBsecurityLow: mingw-glib2 security update�^���%
https://access.redhat.com/errata/RHSA-2024:2528RHSA-2024:2528RHSA-2024:2528https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32636CVE-2023-32636CVE-2023-32636https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://bugzilla.redhat.com/22118332211833https://errata.almalinux.org/9/ALSA-2024-2528.htmlALSA-2024:2528ALSA-2024:2528
�Z�|mingw64-glib2-static-2.78.0-1.el9.noarch.rpm�Y�|mingw64-glib2-2.78.0-1.el9.noarch.rpm�W�|mingw32-glib2-2.78.0-1.el9.noarch.rpm�X�|mingw32-glib2-static-2.78.0-1.el9.noarch.rpm�Z�|mingw64-glib2-static-2.78.0-1.el9.noarch.rpm�Y�|mingw64-glib2-2.78.0-1.el9.noarch.rpm�W�|mingw32-glib2-2.78.0-1.el9.noarch.rpm�X�|mingw32-glib2-static-2.78.0-1.el9.noarch.rpm���T�'	�(�g�}BBBsecurityImportant: bind security update��D�https://access.redhat.com/errata/RHSA-2024:2551RHSA-2024:2551RHSA-2024:2551https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-2551.htmlALSA-2024:2551ALSA-2024:2551
�f�^bind-libs-9.16.23-18.el9_4.1.i686.rpmR�^bind-devel-9.16.23-18.el9_4.1.i686.rpmR�^bind-devel-9.16.23-18.el9_4.1.x86_64.rpm��^bind-doc-9.16.23-18.el9_4.1.noarch.rpm�f�^bind-libs-9.16.23-18.el9_4.1.i686.rpmR�^bind-devel-9.16.23-18.el9_4.1.i686.rpmR�^bind-devel-9.16.23-18.el9_4.1.x86_64.rpm��^bind-doc-9.16.23-18.el9_4.1.noarch.rpm���)�(	�)�hBBBBsecurityModerate: libvirt security and bug fix update
��R�2https://access.redhat.com/errata/RHSA-2024:2560RHSA-2024:2560RHSA-2024:2560https://access.redhat.com/security/cve/CVE-2024-1441CVE-2024-1441CVE-2024-1441https://access.redhat.com/security/cve/CVE-2024-2494CVE-2024-2494CVE-2024-2494https://bugzilla.redhat.com/22638412263841https://bugzilla.redhat.com/22701152270115https://errata.almalinux.org/9/ALSA-2024-2560.htmlALSA-2024:2560ALSA-2024:2560
�0�vlibvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�1�vlibvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�S�vlibvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�0�vlibvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�1�vlibvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm�S�vlibvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm���!�)	�*�nBsecurityModerate: sssd security and bug fix update
���Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571
�y�flibsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpm�y�flibsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpm�y�flibsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpm�y�flibsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpm���C�*	�+�qBBBBsecurityModerate: kernel security and bug fix update
��L�&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758
https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743�kernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpm�libperf-5.14.0-427.16.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpm�libperf-5.14.0-427.16.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpm����h�+	�,�wsecurityImportant: .NET 8.0 security update��r�"https://access.redhat.com/errata/RHSA-2024:2842RHSA-2024:2842RHSA-2024:2842https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2842.htmlALSA-2024:2842ALSA-2024:2842
��#dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpm��#dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpm����C�,	�-�ysecurityImportant: .NET 7.0 security update���#https://access.redhat.com/errata/RHSA-2024:2843RHSA-2024:2843RHSA-2024:2843https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2843.htmlALSA-2024:2843ALSA-2024:2843
�]�dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpm�]�dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpm����l�-	�.�{BBBBsecurityModerate: kernel security and bug fix update
��7�xhttps://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306
https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890�libperf-5.14.0-427.18.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpm�libperf-5.14.0-427.18.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpm�����.	�/�ABBBBBBBBBBBBsecurityImportant: glibc security update��/�https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339
	�jzglibc-benchtests-2.34-100.el9_4.2.x86_64.rpm�Xznss_db-2.34-100.el9_4.2.i686.rpm�Uzglibc-static-2.34-100.el9_4.2.x86_64.rpm�Uzglibc-static-2.34-100.el9_4.2.i686.rpm�Tzglibc-nss-devel-2.34-100.el9_4.2.i686.rpm�Yznss_hesiod-2.34-100.el9_4.2.i686.rpm�Yznss_hesiod-2.34-100.el9_4.2.x86_64.rpm�Xznss_db-2.34-100.el9_4.2.x86_64.rpm�Tzglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm	�jzglibc-benchtests-2.34-100.el9_4.2.x86_64.rpm�Xznss_db-2.34-100.el9_4.2.i686.rpm�Uzglibc-static-2.34-100.el9_4.2.x86_64.rpm�Uzglibc-static-2.34-100.el9_4.2.i686.rpm�Tzglibc-nss-devel-2.34-100.el9_4.2.i686.rpm�Yznss_hesiod-2.34-100.el9_4.2.i686.rpm�Yznss_hesiod-2.34-100.el9_4.2.x86_64.rpm�Xznss_db-2.34-100.el9_4.2.x86_64.rpm�Tzglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm����t�/	�)�OBBBsecurityModerate: nghttp2 security update
��?�mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501
��clibnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm��cnghttp2-1.43.0-5.el9_4.3.x86_64.rpm��clibnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm��clibnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm��cnghttp2-1.43.0-5.el9_4.3.x86_64.rpm��clibnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm���>�0	�0�TBBBBsecurityModerate: kernel security and bug fix update
��,�bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619
�libperf-5.14.0-427.20.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpm�libperf-5.14.0-427.20.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpm����F�1	�1�securityImportant: ipa security update���whttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754
��python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpm��python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpm��ѧm�2	�2�[BBsecurityImportant: libreoffice security update���Xhttps://access.redhat.com/errata/RHSA-2024:3835RHSA-2024:3835RHSA-2024:3835https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-3835.htmlALSA-2024:3835ALSA-2024:3835
�k�libreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm�����3	�3�_securityImportant: 389-ds-base security update��]�mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837
��k389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm��k389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm�����4	�4�!securityModerate: ruby security update
��J�Xhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838
�]�ruby-doc-3.0.7-162.el9_4.noarch.rpm�]�ruby-doc-3.0.7-162.el9_4.noarch.rpm�����5	�7�uB�mBBBsecurityImportant: flatpak security update��"�|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959
��5flatpak-1.12.9-1.el9_4.i686.rpm��5flatpak-devel-1.12.9-1.el9_4.x86_64.rpm��5flatpak-session-helper-1.12.9-1.el9_4.i686.rpm��5flatpak-devel-1.12.9-1.el9_4.i686.rpm��5flatpak-1.12.9-1.el9_4.i686.rpm��5flatpak-devel-1.12.9-1.el9_4.x86_64.rpm��5flatpak-session-helper-1.12.9-1.el9_4.i686.rpm��5flatpak-devel-1.12.9-1.el9_4.i686.rpm����@�6	�;�xBB�nBBBBsecurityImportant: ghostscript security update���qhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999
�)�ghostscript-9.54.0-16.el9_4.i686.rpmi�libgs-devel-9.54.0-16.el9_4.i686.rpm�*�ghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpmi�libgs-devel-9.54.0-16.el9_4.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm�)�ghostscript-9.54.0-16.el9_4.i686.rpmi�libgs-devel-9.54.0-16.el9_4.i686.rpm�*�ghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpmi�libgs-devel-9.54.0-16.el9_4.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm���7	�>�|B�qBBBBBBBBBsecurityImportant: python3.11 security update���0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077
�python3.11-test-3.11.7-1.el9_4.1.i686.rpm�python3.11-test-3.11.7-1.el9_4.1.x86_64.rpme�python3.11-tkinter-3.11.7-1.el9_4.1.i686.rpm�python3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmd�python3.11-3.11.7-1.el9_4.1.i686.rpm�python3.11-debug-3.11.7-1.el9_4.1.i686.rpm�python3.11-debug-3.11.7-1.el9_4.1.x86_64.rpm�python3.11-idle-3.11.7-1.el9_4.1.i686.rpm�python3.11-test-3.11.7-1.el9_4.1.i686.rpm�python3.11-test-3.11.7-1.el9_4.1.x86_64.rpme�python3.11-tkinter-3.11.7-1.el9_4.1.i686.rpm�python3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmd�python3.11-3.11.7-1.el9_4.1.i686.rpm�python3.11-debug-3.11.7-1.el9_4.1.i686.rpm�python3.11-debug-3.11.7-1.el9_4.1.x86_64.rpm�python3.11-idle-3.11.7-1.el9_4.1.i686.rpm���I�8	���l�OBBBBBBBBBsecurityImportant: python3.9 security update��?�https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078
�;python3-idle-3.9.18-3.el9_4.1.i686.rpm�;python3-test-3.9.18-3.el9_4.1.x86_64.rpmQ�;python3-tkinter-3.9.18-3.el9_4.1.i686.rpm�;python3-test-3.9.18-3.el9_4.1.i686.rpm�;python3-debug-3.9.18-3.el9_4.1.x86_64.rpmP�;python3-3.9.18-3.el9_4.1.i686.rpm�;python3-idle-3.9.18-3.el9_4.1.x86_64.rpm�;python3-debug-3.9.18-3.el9_4.1.i686.rpm�;python3-idle-3.9.18-3.el9_4.1.i686.rpm�;python3-test-3.9.18-3.el9_4.1.x86_64.rpmQ�;python3-tkinter-3.9.18-3.el9_4.1.i686.rpm�;python3-test-3.9.18-3.el9_4.1.i686.rpm�;python3-debug-3.9.18-3.el9_4.1.x86_64.rpmP�;python3-3.9.18-3.el9_4.1.i686.rpm�;python3-idle-3.9.18-3.el9_4.1.x86_64.rpm�;python3-debug-3.9.18-3.el9_4.1.i686.rpm���#�9	��CBBBBsecurityModerate: kernel security and bug fix update
��T�https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349
�kernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpm�libperf-5.14.0-427.24.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpm�libperf-5.14.0-427.24.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpm����r�:	��IsecurityModerate: dotnet6.0 security update
��b�Jhttps://access.redhat.com/errata/RHSA-2024:4439RHSA-2024:4439RHSA-2024:4439https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4439.htmlALSA-2024:4439ALSA-2024:4439
��dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpm����I�;	��KsecurityImportant: dotnet8.0 security update��,�&https://access.redhat.com/errata/RHSA-2024:4450RHSA-2024:4450RHSA-2024:4450https://access.redhat.com/security/cve/CVE-2024-30105CVE-2024-30105CVE-2024-30105https://access.redhat.com/security/cve/CVE-2024-35264CVE-2024-35264CVE-2024-35264https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953202295320https://bugzilla.redhat.com/22953212295321https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4450.htmlALSA-2024:4450ALSA-2024:4450
��$dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm��$dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm�����<	��MBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update��R�Phttps://access.redhat.com/errata/RHSA-2024:4563RHSA-2024:4563RHSA-2024:4563https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4563.htmlALSA-2024:4563ALSA-2024:4563

�]java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�
]java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�	]java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm
�]java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�
]java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�	]java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm�]java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm����+�=	��aBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update��"�Ohttps://access.redhat.com/errata/RHSA-2024:4567RHSA-2024:4567RHSA-2024:4567https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4567.htmlALSA-2024:4567ALSA-2024:4567
�}.java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�z.java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�~.java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�|.java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�x.java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�y.java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�{.java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�}.java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�z.java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�~.java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�|.java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�x.java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�y.java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�{.java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm�.java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm����w�>	��}BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update��q�ihttps://access.redhat.com/errata/RHSA-2024:4568RHSA-2024:4568RHSA-2024:4568https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4568.htmlALSA-2024:4568ALSA-2024:4568
l2java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmu2java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmn2java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmt2java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpms2java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmr2java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmv2java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmk2java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmo2java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmx2java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmm2java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmw2java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmp2java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmq2java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpml2java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmu2java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmn2java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmt2java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpms2java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmr2java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmv2java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmk2java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmo2java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmx2java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmm2java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmw2java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmp2java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmq2java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm����n�?	��YBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��Z�ihttps://access.redhat.com/errata/RHSA-2024:4573RHSA-2024:4573RHSA-2024:4573https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4573.htmlALSA-2024:4573ALSA-2024:4573
�kDjava-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�mDjava-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�lDjava-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�tDjava-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�gDjava-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�pDjava-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�oDjava-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�sDjava-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�iDjava-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�rDjava-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�nDjava-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�hDjava-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�qDjava-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�jDjava-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�kDjava-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�mDjava-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�lDjava-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�tDjava-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�gDjava-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�pDjava-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�oDjava-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�sDjava-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�iDjava-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�rDjava-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�nDjava-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�hDjava-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�qDjava-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�jDjava-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm�����@	��uBBBBsecurityImportant: kernel security update��C�$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583
�	kernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpm�	kernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpm�	libperf-5.14.0-427.26.1.el9_4.x86_64.rpm�	kernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpm�	kernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpm�	libperf-5.14.0-427.26.1.el9_4.x86_64.rpm�����A	�	�{BsecurityImportant: qt5-qtbase security update��]�@https://access.redhat.com/errata/RHSA-2024:4623RHSA-2024:4623RHSA-2024:4623https://access.redhat.com/security/cve/CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/22958672295867https://errata.almalinux.org/9/ALSA-2024-4623.htmlALSA-2024:4623ALSA-2024:4623
�&�xqt5-qtbase-static-5.15.9-10.el9_4.i686.rpm�&�xqt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm�&�xqt5-qtbase-static-5.15.9-10.el9_4.i686.rpm�&�xqt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm����B	��JB�tBsecurityModerate: edk2 security update
���Lhttps://access.redhat.com/errata/RHSA-2024:4749RHSA-2024:4749RHSA-2024:4749https://access.redhat.com/security/cve/CVE-2022-36765CVE-2022-36765CVE-2022-36765https://access.redhat.com/security/cve/CVE-2023-45236CVE-2023-45236CVE-2023-45236https://access.redhat.com/security/cve/CVE-2023-45237CVE-2023-45237CVE-2023-45237https://bugzilla.redhat.com/22575842257584https://bugzilla.redhat.com/22587032258703https://bugzilla.redhat.com/22587062258706https://errata.almalinux.org/9/ALSA-2024-4749.htmlALSA-2024:4749ALSA-2024:4749
�(�qedk2-ovmf-20231122-6.el9_4.2.noarch.rpm�R�qedk2-aarch64-20231122-6.el9_4.2.noarch.rpm�S�qedk2-tools-doc-20231122-6.el9_4.2.noarch.rpm��qedk2-tools-20231122-6.el9_4.2.x86_64.rpm�(�qedk2-ovmf-20231122-6.el9_4.2.noarch.rpm�R�qedk2-aarch64-20231122-6.el9_4.2.noarch.rpm�S�qedk2-tools-doc-20231122-6.el9_4.2.noarch.rpm��qedk2-tools-20231122-6.el9_4.2.x86_64.rpm����K�C	�
�ABBsecurityModerate: libreoffice security update
��i�https://access.redhat.com/errata/RHSA-2024:4755RHSA-2024:4755RHSA-2024:4755https://access.redhat.com/security/cve/CVE-2024-3044CVE-2024-3044CVE-2024-3044https://bugzilla.redhat.com/22805422280542https://errata.almalinux.org/9/ALSA-2024-4755.htmlALSA-2024:4755ALSA-2024:4755
�l�libreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm����%�D	��EBsecurityModerate: libuv security update
���whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756
��Tlibuv-devel-1.42.0-2.el9_4.x86_64.rpm��Tlibuv-devel-1.42.0-2.el9_4.i686.rpm��Tlibuv-devel-1.42.0-2.el9_4.x86_64.rpm��Tlibuv-devel-1.42.0-2.el9_4.i686.rpm����5�E	��HBBBBsecurityModerate: libvirt security update
��w�\https://access.redhat.com/errata/RHSA-2024:4757RHSA-2024:4757RHSA-2024:4757https://access.redhat.com/security/cve/CVE-2024-4418CVE-2024-4418CVE-2024-4418https://bugzilla.redhat.com/22786162278616https://errata.almalinux.org/9/ALSA-2024-4757.htmlALSA-2024:4757ALSA-2024:4757
�0�wlibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�S�wlibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�1�wlibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�0�wlibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�S�wlibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�1�wlibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm�����F	��PB�~BBBBBBBBBsecurityLow: python3 security update�^��S�,https://access.redhat.com/errata/RHSA-2024:4766RHSA-2024:4766RHSA-2024:4766https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4766.htmlALSA-2024:4766ALSA-2024:4766
�python3.11-debug-3.11.7-1.el9_4.3.i686.rpm�python3.11-test-3.11.7-1.el9_4.3.x86_64.rpm�python3.11-test-3.11.7-1.el9_4.3.i686.rpm�python3.11-idle-3.11.7-1.el9_4.3.i686.rpm�python3.11-debug-3.11.7-1.el9_4.3.x86_64.rpm�python3.11-idle-3.11.7-1.el9_4.3.x86_64.rpme�python3.11-tkinter-3.11.7-1.el9_4.3.i686.rpmd�python3.11-3.11.7-1.el9_4.3.i686.rpm�python3.11-debug-3.11.7-1.el9_4.3.i686.rpm�python3.11-test-3.11.7-1.el9_4.3.x86_64.rpm�python3.11-test-3.11.7-1.el9_4.3.i686.rpm�python3.11-idle-3.11.7-1.el9_4.3.i686.rpm�python3.11-debug-3.11.7-1.el9_4.3.x86_64.rpm�python3.11-idle-3.11.7-1.el9_4.3.x86_64.rpme�python3.11-tkinter-3.11.7-1.el9_4.3.i686.rpmd�python3.11-3.11.7-1.el9_4.3.i686.rpm�����G	��S�Y�oBBBBBBBBBsecurityLow: python3 security update�^���,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779
�<python3-debug-3.9.18-3.el9_4.3.i686.rpm�<python3-idle-3.9.18-3.el9_4.3.i686.rpm�<python3-debug-3.9.18-3.el9_4.3.x86_64.rpm�<python3-test-3.9.18-3.el9_4.3.i686.rpmP�<python3-3.9.18-3.el9_4.3.i686.rpmQ�<python3-tkinter-3.9.18-3.el9_4.3.i686.rpm�<python3-test-3.9.18-3.el9_4.3.x86_64.rpm�<python3-idle-3.9.18-3.el9_4.3.x86_64.rpm�<python3-debug-3.9.18-3.el9_4.3.i686.rpm�<python3-idle-3.9.18-3.el9_4.3.i686.rpm�<python3-debug-3.9.18-3.el9_4.3.x86_64.rpm�<python3-test-3.9.18-3.el9_4.3.i686.rpmP�<python3-3.9.18-3.el9_4.3.i686.rpmQ�<python3-tkinter-3.9.18-3.el9_4.3.i686.rpm�<python3-test-3.9.18-3.el9_4.3.x86_64.rpm�<python3-idle-3.9.18-3.el9_4.3.x86_64.rpm�����H	��dBBBBsecurityModerate: kernel security update
��+�1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928
�
libperf-5.14.0-427.28.1.el9_4.x86_64.rpm�
kernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpm�
kernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpm�
libperf-5.14.0-427.28.1.el9_4.x86_64.rpm�
kernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpm�
kernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpm����G�I	��jBBBBBBBBBBsecurityImportant: freeradius security update��\�Ghttps://access.redhat.com/errata/RHSA-2024:4935RHSA-2024:4935RHSA-2024:4935https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-4935.htmlALSA-2024:4935ALSA-2024:4935
�2�efreeradius-rest-3.0.21-40.el9_4.x86_64.rpm�/�efreeradius-mysql-3.0.21-40.el9_4.x86_64.rpm�3�efreeradius-sqlite-3.0.21-40.el9_4.x86_64.rpm�0�efreeradius-perl-3.0.21-40.el9_4.x86_64.rpm�4�efreeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpm�1�efreeradius-postgresql-3.0.21-40.el9_4.x86_64.rpm�2�efreeradius-rest-3.0.21-40.el9_4.x86_64.rpm�/�efreeradius-mysql-3.0.21-40.el9_4.x86_64.rpm�3�efreeradius-sqlite-3.0.21-40.el9_4.x86_64.rpm�0�efreeradius-perl-3.0.21-40.el9_4.x86_64.rpm�4�efreeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpm�1�efreeradius-postgresql-3.0.21-40.el9_4.x86_64.rpm��ʚN�J	��vsecurityModerate: 389-ds-base security update
��#�jhttps://access.redhat.com/errata/RHSA-2024:5192RHSA-2024:5192RHSA-2024:5192https://access.redhat.com/security/cve/CVE-2024-5953CVE-2024-5953CVE-2024-5953https://access.redhat.com/security/cve/CVE-2024-6237CVE-2024-6237CVE-2024-6237https://bugzilla.redhat.com/22921042292104https://bugzilla.redhat.com/22935792293579https://errata.almalinux.org/9/ALSA-2024-5192.htmlALSA-2024:5192ALSA-2024:5192
��l389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm��l389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm���2�K	��X�aBBBsecurityImportant: bind and bind-dyndb-ldap security update��
�"https://access.redhat.com/errata/RHSA-2024:5231RHSA-2024:5231RHSA-2024:5231https://access.redhat.com/security/cve/CVE-2024-1737CVE-2024-1737CVE-2024-1737https://access.redhat.com/security/cve/CVE-2024-1975CVE-2024-1975CVE-2024-1975https://access.redhat.com/security/cve/CVE-2024-4076CVE-2024-4076CVE-2024-4076https://bugzilla.redhat.com/22988932298893https://bugzilla.redhat.com/22989012298901https://bugzilla.redhat.com/22989042298904https://errata.almalinux.org/9/ALSA-2024-5231.htmlALSA-2024:5231ALSA-2024:5231
R�_bind-devel-9.16.23-18.el9_4.6.i686.rpmR�_bind-devel-9.16.23-18.el9_4.6.x86_64.rpm�f�_bind-libs-9.16.23-18.el9_4.6.i686.rpm��_bind-doc-9.16.23-18.el9_4.6.noarch.rpmR�_bind-devel-9.16.23-18.el9_4.6.i686.rpmR�_bind-devel-9.16.23-18.el9_4.6.x86_64.rpm�f�_bind-libs-9.16.23-18.el9_4.6.i686.rpm��_bind-doc-9.16.23-18.el9_4.6.noarch.rpm����n�L	��}securityModerate: .NET 8.0 security update
��/�}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334
��%dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpm��%dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpm����R�M	��BBBBsecurityImportant: kernel security update��,�4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363
�libperf-5.14.0-427.31.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpm�libperf-5.14.0-427.31.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpm����s�N	��securityImportant: python3.12-setuptools security update��`�https://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533
�]�$python3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm�]�$python3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm����_�O	��FBBsecurityModerate: libreoffice security update
��w�{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583
�l�libreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�l�libreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm�k�libreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm����W�P	��JBBBBsecurityImportant: kernel security update��r�Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928
�kernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpm�libperf-5.14.0-427.33.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpm�libperf-5.14.0-427.33.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm���� �Q	��PBBBBBBBBBBsecurityImportant: postgresql security update��
�https://access.redhat.com/errata/RHSA-2024:5999RHSA-2024:5999RHSA-2024:5999https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5999.htmlALSA-2024:5999ALSA-2024:5999
�	�cpostgresql-server-devel-13.16-1.el9_4.x86_64.rpm��cpostgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm��cpostgresql-test-13.16-1.el9_4.x86_64.rpm��cpostgresql-private-devel-13.16-1.el9_4.x86_64.rpm��cpostgresql-docs-13.16-1.el9_4.x86_64.rpm�
�cpostgresql-static-13.16-1.el9_4.x86_64.rpm�	�cpostgresql-server-devel-13.16-1.el9_4.x86_64.rpm��cpostgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm��cpostgresql-test-13.16-1.el9_4.x86_64.rpm��cpostgresql-private-devel-13.16-1.el9_4.x86_64.rpm��cpostgresql-docs-13.16-1.el9_4.x86_64.rpm�
�cpostgresql-static-13.16-1.el9_4.x86_64.rpm����y�R	�"�`B�|BBBBBBBBBsecurityModerate: python3.12 security update
���https://access.redhat.com/errata/RHSA-2024:6146RHSA-2024:6146RHSA-2024:6146https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6146.htmlALSA-2024:6146ALSA-2024:6146
%�&python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm#�&python3.12-debug-3.12.1-4.el9_4.3.i686.rpm%�&python3.12-test-3.12.1-4.el9_4.3.i686.rpm��&python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm$�&python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm$�&python3.12-idle-3.12.1-4.el9_4.3.i686.rpm��&python3.12-3.12.1-4.el9_4.3.i686.rpm#�&python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm%�&python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm#�&python3.12-debug-3.12.1-4.el9_4.3.i686.rpm%�&python3.12-test-3.12.1-4.el9_4.3.i686.rpm��&python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm$�&python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm$�&python3.12-idle-3.12.1-4.el9_4.3.i686.rpm��&python3.12-3.12.1-4.el9_4.3.i686.rpm#�&python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm���'�S	�$�c�J�|BBBBBBBBBsecurityModerate: python3.9 security update
��+�hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163
Q�=python3-tkinter-3.9.18-3.el9_4.5.i686.rpmP�=python3-3.9.18-3.el9_4.5.i686.rpm�=python3-idle-3.9.18-3.el9_4.5.x86_64.rpm�=python3-test-3.9.18-3.el9_4.5.i686.rpm�=python3-test-3.9.18-3.el9_4.5.x86_64.rpm�=python3-debug-3.9.18-3.el9_4.5.x86_64.rpm�=python3-idle-3.9.18-3.el9_4.5.i686.rpm�=python3-debug-3.9.18-3.el9_4.5.i686.rpmQ�=python3-tkinter-3.9.18-3.el9_4.5.i686.rpmP�=python3-3.9.18-3.el9_4.5.i686.rpm�=python3-idle-3.9.18-3.el9_4.5.x86_64.rpm�=python3-test-3.9.18-3.el9_4.5.i686.rpm�=python3-test-3.9.18-3.el9_4.5.x86_64.rpm�=python3-debug-3.9.18-3.el9_4.5.x86_64.rpm�=python3-idle-3.9.18-3.el9_4.5.i686.rpm�=python3-debug-3.9.18-3.el9_4.5.i686.rpm����T	�'�eB�MBBBBBBBBBsecurityModerate: python3.11 security update
���hhttps://access.redhat.com/errata/RHSA-2024:6179RHSA-2024:6179RHSA-2024:6179https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6179.htmlALSA-2024:6179ALSA-2024:6179
� python3.11-debug-3.11.7-1.el9_4.5.i686.rpm� python3.11-test-3.11.7-1.el9_4.5.x86_64.rpm� python3.11-idle-3.11.7-1.el9_4.5.x86_64.rpm� python3.11-idle-3.11.7-1.el9_4.5.i686.rpmd� python3.11-3.11.7-1.el9_4.5.i686.rpm� python3.11-test-3.11.7-1.el9_4.5.i686.rpm� python3.11-debug-3.11.7-1.el9_4.5.x86_64.rpme� python3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm� python3.11-debug-3.11.7-1.el9_4.5.i686.rpm� python3.11-test-3.11.7-1.el9_4.5.x86_64.rpm� python3.11-idle-3.11.7-1.el9_4.5.x86_64.rpm� python3.11-idle-3.11.7-1.el9_4.5.i686.rpmd� python3.11-3.11.7-1.el9_4.5.i686.rpm� python3.11-test-3.11.7-1.el9_4.5.i686.rpm� python3.11-debug-3.11.7-1.el9_4.5.x86_64.rpme� python3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm���8�U	�+�hBB�TBBBBsecurityModerate: ghostscript security update
��{�Mhttps://access.redhat.com/errata/RHSA-2024:6197RHSA-2024:6197RHSA-2024:6197https://access.redhat.com/security/cve/CVE-2024-29510CVE-2024-29510CVE-2024-29510https://access.redhat.com/security/cve/CVE-2024-33869CVE-2024-33869CVE-2024-33869https://access.redhat.com/security/cve/CVE-2024-33870CVE-2024-33870CVE-2024-33870https://bugzilla.redhat.com/22939502293950https://bugzilla.redhat.com/22939582293958https://bugzilla.redhat.com/22939592293959https://errata.almalinux.org/9/ALSA-2024-6197.htmlALSA-2024:6197ALSA-2024:6197
i�libgs-devel-9.54.0-17.el9_4.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-17.el9_4.i686.rpmi�libgs-devel-9.54.0-17.el9_4.i686.rpm�*�ghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm�)�ghostscript-9.54.0-17.el9_4.i686.rpmi�libgs-devel-9.54.0-17.el9_4.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-17.el9_4.i686.rpmi�libgs-devel-9.54.0-17.el9_4.i686.rpm�*�ghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm�)�ghostscript-9.54.0-17.el9_4.i686.rpm���/�V	�.�lB�WBBBsecurityImportant: bubblewrap and flatpak security update��H�Jhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356
��6flatpak-session-helper-1.12.9-3.el9_4.i686.rpm��6flatpak-devel-1.12.9-3.el9_4.x86_64.rpm��6flatpak-devel-1.12.9-3.el9_4.i686.rpm��6flatpak-1.12.9-3.el9_4.i686.rpm��6flatpak-session-helper-1.12.9-3.el9_4.i686.rpm��6flatpak-devel-1.12.9-3.el9_4.x86_64.rpm��6flatpak-devel-1.12.9-3.el9_4.i686.rpm��6flatpak-1.12.9-3.el9_4.i686.rpm���c�W	�/�HBsecurityModerate: glib2 security update
���
https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464
�u�`glib2-static-2.68.4-14.el9_4.1.i686.rpm�u�`glib2-static-2.68.4-14.el9_4.1.x86_64.rpm�u�`glib2-static-2.68.4-14.el9_4.1.i686.rpm�u�`glib2-static-2.68.4-14.el9_4.1.x86_64.rpm����0�X	�1�p�\BBsecurityModerate: dovecot security update
���,https://access.redhat.com/errata/RHSA-2024:6529RHSA-2024:6529RHSA-2024:6529https://access.redhat.com/security/cve/CVE-2024-23184CVE-2024-23184CVE-2024-23184https://access.redhat.com/security/cve/CVE-2024-23185CVE-2024-23185CVE-2024-23185https://bugzilla.redhat.com/23059092305909https://bugzilla.redhat.com/23059102305910https://errata.almalinux.org/9/ALSA-2024-6529.htmlALSA-2024:6529ALSA-2024:6529
�C�edovecot-devel-2.3.16-11.el9_4.1.i686.rpm�*�edovecot-2.3.16-11.el9_4.1.i686.rpm�C�edovecot-devel-2.3.16-11.el9_4.1.x86_64.rpm�C�edovecot-devel-2.3.16-11.el9_4.1.i686.rpm�*�edovecot-2.3.16-11.el9_4.1.i686.rpm�C�edovecot-devel-2.3.16-11.el9_4.1.x86_64.rpm����Z�Y	�2�OBBBBsecurityModerate: kernel security update
��K�l8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567
�
libperf-5.14.0-427.35.1.el9_4.x86_64.rpm�
kernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpm�
kernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpm�
libperf-5.14.0-427.35.1.el9_4.x86_64.rpm�
kernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpm�
kernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpm����O�Z	�3�UBBBBBsecurityModerate: libnbd security update
��7�Qhttps://access.redhat.com/errata/RHSA-2024:6757RHSA-2024:6757RHSA-2024:6757https://access.redhat.com/security/cve/CVE-2024-7383CVE-2024-7383CVE-2024-7383https://bugzilla.redhat.com/23028652302865https://errata.almalinux.org/9/ALSA-2024-6757.htmlALSA-2024:6757ALSA-2024:6757
�w�9libnbd-devel-1.18.1-4.el9_4.i686.rpm�Y�9ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm�X�9ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpm�w�9libnbd-devel-1.18.1-4.el9_4.x86_64.rpm�w�9libnbd-devel-1.18.1-4.el9_4.i686.rpm�Y�9ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm�X�9ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpm�w�9libnbd-devel-1.18.1-4.el9_4.x86_64.rpm����|�[	�4�\BBBBsecurityImportant: kernel security update���+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997
�kernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpm�libperf-5.14.0-427.37.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpm�libperf-5.14.0-427.37.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpm����}�\	�5�bBsecurityImportant: cups-filters security update���Lhttps://access.redhat.com/errata/RHSA-2024:7346RHSA-2024:7346RHSA-2024:7346https://access.redhat.com/security/cve/CVE-2024-47076CVE-2024-47076CVE-2024-47076https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://access.redhat.com/security/cve/CVE-2024-47176CVE-2024-47176CVE-2024-47176https://bugzilla.redhat.com/23142522314252https://bugzilla.redhat.com/23142532314253https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-7346.htmlALSA-2024:7346ALSA-2024:7346
�q�Gcups-filters-devel-1.28.7-17.el9_4.x86_64.rpm�q�Gcups-filters-devel-1.28.7-17.el9_4.i686.rpm�q�Gcups-filters-devel-1.28.7-17.el9_4.x86_64.rpm�q�Gcups-filters-devel-1.28.7-17.el9_4.i686.rpm��߷*�]	�6�esecurityImportant: .NET 6.0 security update��i�"https://access.redhat.com/errata/RHSA-2024:7867RHSA-2024:7867RHSA-2024:7867https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://errata.almalinux.org/9/ALSA-2024-7867.htmlALSA-2024:7867ALSA-2024:7867
��dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpm��dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpm����2�^	�7�gsecurityImportant: .NET 8.0 security update���
https://access.redhat.com/errata/RHSA-2024:7869RHSA-2024:7869RHSA-2024:7869https://access.redhat.com/security/cve/CVE-2024-38229CVE-2024-38229CVE-2024-38229https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://bugzilla.redhat.com/23161612316161https://errata.almalinux.org/9/ALSA-2024-7869.htmlALSA-2024:7869ALSA-2024:7869
��&dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpm��&dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpm����M�_	�8�iBsecurityModerate: OpenIPMI security update
��!�:https://access.redhat.com/errata/RHSA-2024:8037RHSA-2024:8037RHSA-2024:8037https://access.redhat.com/security/cve/CVE-2024-42934CVE-2024-42934CVE-2024-42934https://bugzilla.redhat.com/23083752308375https://errata.almalinux.org/9/ALSA-2024-8037.htmlALSA-2024:8037ALSA-2024:8037
��\OpenIPMI-devel-2.0.32-5.el9_4.i686.rpm��\OpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpm��\OpenIPMI-devel-2.0.32-5.el9_4.i686.rpm��\OpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpm����]�`	�9�lBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update
��[�rhttps://access.redhat.com/errata/RHSA-2024:8117RHSA-2024:8117RHSA-2024:8117https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8117.htmlALSA-2024:8117ALSA-2024:8117

�^java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�
^java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�	^java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm
�^java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�
^java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�	^java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm�^java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm����k�a	�:�@BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update
��M�qhttps://access.redhat.com/errata/RHSA-2024:8121RHSA-2024:8121RHSA-2024:8121https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8121.htmlALSA-2024:8121ALSA-2024:8121
�/java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�{/java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�x/java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�}/java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�~/java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�|/java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�z/java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�y/java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�{/java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�x/java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�}/java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�~/java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�|/java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�z/java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm�/java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm�y/java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm����h�b	�;�\BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update
��>�qhttps://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124
m3java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq3java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt3java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmu3java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmk3java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmv3java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms3java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr3java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmp3java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo3java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpml3java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmx3java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn3java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmw3java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmm3java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq3java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt3java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmu3java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmk3java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmv3java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms3java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr3java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmp3java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo3java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpml3java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmx3java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn3java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmw3java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm����n�c	�<�xBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update
��/�https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127
�mEjava-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�iEjava-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�nEjava-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�pEjava-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�tEjava-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�jEjava-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�oEjava-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�qEjava-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�gEjava-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�sEjava-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�lEjava-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�kEjava-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�hEjava-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�rEjava-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�mEjava-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�iEjava-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�nEjava-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�pEjava-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�tEjava-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�jEjava-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�oEjava-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�qEjava-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�gEjava-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�sEjava-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�lEjava-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�kEjava-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�hEjava-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm�rEjava-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm����_�d	�=�TBBBBsecurityModerate: kernel security update
��E�<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162
�kernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm�libperf-5.14.0-427.40.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm�libperf-5.14.0-427.40.1.el9_4.x86_64.rpm���{�e	��~B�\BBBBBBBBBsecurityModerate: python3.11 security update
���Thttps://access.redhat.com/errata/RHSA-2024:8374RHSA-2024:8374RHSA-2024:8374https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8374.htmlALSA-2024:8374ALSA-2024:8374
e�!python3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmd�!python3.11-3.11.7-1.el9_4.6.i686.rpm�!python3.11-debug-3.11.7-1.el9_4.6.x86_64.rpm�!python3.11-idle-3.11.7-1.el9_4.6.x86_64.rpm�!python3.11-debug-3.11.7-1.el9_4.6.i686.rpm�!python3.11-test-3.11.7-1.el9_4.6.x86_64.rpm�!python3.11-idle-3.11.7-1.el9_4.6.i686.rpm�!python3.11-test-3.11.7-1.el9_4.6.i686.rpme�!python3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmd�!python3.11-3.11.7-1.el9_4.6.i686.rpm�!python3.11-debug-3.11.7-1.el9_4.6.x86_64.rpm�!python3.11-idle-3.11.7-1.el9_4.6.x86_64.rpm�!python3.11-debug-3.11.7-1.el9_4.6.i686.rpm�!python3.11-test-3.11.7-1.el9_4.6.x86_64.rpm�!python3.11-idle-3.11.7-1.el9_4.6.i686.rpm�!python3.11-test-3.11.7-1.el9_4.6.i686.rpm����w�f	��A�m�yBBBBBBBBBsecurityModerate: python3.9 security update
��U�\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446
�>python3-test-3.9.18-3.el9_4.6.x86_64.rpm�>python3-idle-3.9.18-3.el9_4.6.x86_64.rpm�>python3-idle-3.9.18-3.el9_4.6.i686.rpm�>python3-test-3.9.18-3.el9_4.6.i686.rpm�>python3-debug-3.9.18-3.el9_4.6.x86_64.rpmQ�>python3-tkinter-3.9.18-3.el9_4.6.i686.rpmP�>python3-3.9.18-3.el9_4.6.i686.rpm�>python3-debug-3.9.18-3.el9_4.6.i686.rpm�>python3-test-3.9.18-3.el9_4.6.x86_64.rpm�>python3-idle-3.9.18-3.el9_4.6.x86_64.rpm�>python3-idle-3.9.18-3.el9_4.6.i686.rpm�>python3-test-3.9.18-3.el9_4.6.i686.rpm�>python3-debug-3.9.18-3.el9_4.6.x86_64.rpmQ�>python3-tkinter-3.9.18-3.el9_4.6.i686.rpmP�>python3-3.9.18-3.el9_4.6.i686.rpm�>python3-debug-3.9.18-3.el9_4.6.i686.rpm����g	��CB�mBBBBBBBBBsecurityModerate: python3.12 security update
��1�
https://access.redhat.com/errata/RHSA-2024:8447RHSA-2024:8447RHSA-2024:8447https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8447.htmlALSA-2024:8447ALSA-2024:8447
%�'python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm%�'python3.12-test-3.12.1-4.el9_4.4.i686.rpm$�'python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm#�'python3.12-debug-3.12.1-4.el9_4.4.i686.rpm��'python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm$�'python3.12-idle-3.12.1-4.el9_4.4.i686.rpm��'python3.12-3.12.1-4.el9_4.4.i686.rpm#�'python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm%�'python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm%�'python3.12-test-3.12.1-4.el9_4.4.i686.rpm$�'python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm#�'python3.12-debug-3.12.1-4.el9_4.4.i686.rpm��'python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm$�'python3.12-idle-3.12.1-4.el9_4.4.i686.rpm��'python3.12-3.12.1-4.el9_4.4.i686.rpm#�'python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm���	�h	��{BBBBsecurityModerate: kernel security update
��>�>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617
�libperf-5.14.0-427.42.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm�libperf-5.14.0-427.42.1.el9_4.x86_64.rpm�kernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm�kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm����<�i	��ABsecurityImportant: openexr security update��|�:https://access.redhat.com/errata/RHSA-2024:8800RHSA-2024:8800RHSA-2024:8800https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-8800.htmlALSA-2024:8800ALSA-2024:8800
� �nopenexr-devel-3.1.1-2.el9_4.1.x86_64.rpm� �nopenexr-devel-3.1.1-2.el9_4.1.i686.rpm� �nopenexr-devel-3.1.1-2.el9_4.1.x86_64.rpm� �nopenexr-devel-3.1.1-2.el9_4.1.i686.rpm�����j	��DsecurityModerate: libtiff security update
��6�https://access.redhat.com/errata/RHSA-2024:8914RHSA-2024:8914RHSA-2024:8914https://access.redhat.com/security/cve/CVE-2024-7006CVE-2024-7006CVE-2024-7006https://bugzilla.redhat.com/23029962302996https://errata.almalinux.org/9/ALSA-2024-8914.htmlALSA-2024:8914ALSA-2024:8914
��zlibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm��zlibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm�����k	��IB�}BsecurityModerate: edk2 security update
��A�Ehttps://access.redhat.com/errata/RHSA-2024:8935RHSA-2024:8935RHSA-2024:8935https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-8935.htmlALSA-2024:8935ALSA-2024:8935
�R�redk2-aarch64-20231122-6.el9_4.4.noarch.rpm��redk2-tools-20231122-6.el9_4.4.x86_64.rpm�S�redk2-tools-doc-20231122-6.el9_4.4.noarch.rpm�(�redk2-ovmf-20231122-6.el9_4.4.noarch.rpm�R�redk2-aarch64-20231122-6.el9_4.4.noarch.rpm��redk2-tools-20231122-6.el9_4.4.x86_64.rpm�S�redk2-tools-doc-20231122-6.el9_4.4.noarch.rpm�(�redk2-ovmf-20231122-6.el9_4.4.noarch.rpm����w�l	��IBBsecurityModerate: edk2 security update
���=
https://access.redhat.com/errata/RHSA-2024:9088RHSA-2024:9088RHSA-2024:9088https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://access.redhat.com/security/cve/CVE-2024-1298CVE-2024-1298CVE-2024-1298https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://bugzilla.redhat.com/22842432284243https://errata.almalinux.org/9/ALSA-2024-9088.htmlALSA-2024:9088ALSA-2024:9088
�R�edk2-aarch64-20240524-6.el9_5.noarch.rpm��edk2-tools-20240524-6.el9_5.x86_64.rpm�S�edk2-tools-doc-20240524-6.el9_5.noarch.rpm�R�edk2-aarch64-20240524-6.el9_5.noarch.rpm��edk2-tools-20240524-6.el9_5.x86_64.rpm�S�edk2-tools-doc-20240524-6.el9_5.noarch.rpm����6�m	��M�ABBsecurityModerate: xorg-x11-server-Xwayland security update
��C�:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093
�^�hxorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm�w�hxorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm�w�hxorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm�^�hxorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm�w�hxorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm�w�hxorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm����]�n	��QBBsecurityModerate: xorg-x11-server security update
��}�)https://access.redhat.com/errata/RHSA-2024:9122RHSA-2024:9122RHSA-2024:9122https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9122.htmlALSA-2024:9122ALSA-2024:9122
�\�xorg-x11-server-source-1.20.11-26.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-26.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-26.el9.i686.rpm�\�xorg-x11-server-source-1.20.11-26.el9.noarch.rpmf�xorg-x11-server-devel-1.20.11-26.el9.x86_64.rpmf�xorg-x11-server-devel-1.20.11-26.el9.i686.rpm����
�o	��UBBBBsecurityModerate: libvirt security update
��&�|https://access.redhat.com/errata/RHSA-2024:9128RHSA-2024:9128RHSA-2024:9128https://access.redhat.com/security/cve/CVE-2024-8235CVE-2024-8235CVE-2024-8235https://bugzilla.redhat.com/23086802308680https://errata.almalinux.org/9/ALSA-2024-9128.htmlALSA-2024:9128ALSA-2024:9128
�1�ylibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm�S�ylibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm�0�ylibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm�1�ylibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm�S�ylibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm�0�ylibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm����`�p	��[BBBBBBBBBBBsecurityModerate: poppler security update
��"�+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167
	�#�
poppler-glib-devel-21.01.0-21.el9.i686.rpm�#�
poppler-glib-devel-21.01.0-21.el9.x86_64.rpm�!�
poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm�$�
poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm�"�
poppler-devel-21.01.0-21.el9.x86_64.rpm�[�
poppler-glib-doc-21.01.0-21.el9.noarch.rpm�$�
poppler-qt5-devel-21.01.0-21.el9.i686.rpm�!�
poppler-cpp-devel-21.01.0-21.el9.i686.rpm�"�
poppler-devel-21.01.0-21.el9.i686.rpm	�#�
poppler-glib-devel-21.01.0-21.el9.i686.rpm�#�
poppler-glib-devel-21.01.0-21.el9.x86_64.rpm�!�
poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm�$�
poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm�"�
poppler-devel-21.01.0-21.el9.x86_64.rpm�[�
poppler-glib-doc-21.01.0-21.el9.noarch.rpm�$�
poppler-qt5-devel-21.01.0-21.el9.i686.rpm�!�
poppler-cpp-devel-21.01.0-21.el9.i686.rpm�"�
poppler-devel-21.01.0-21.el9.i686.rpm����V�q	��hBsecurityModerate: jose security update
��M�Rhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181
��Slibjose-devel-14-1.el9.x86_64.rpm��Slibjose-devel-14-1.el9.i686.rpm��Slibjose-devel-14-1.el9.x86_64.rpm��Slibjose-devel-14-1.el9.i686.rpm����@�r	��ksecurityModerate: gtk3 security update
���+https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184
�M�wgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm�M�wgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm����0�s	��mBsecurityLow: bcc security update�^��J�vhttps://access.redhat.com/errata/RHSA-2024:9187RHSA-2024:9187RHSA-2024:9187https://access.redhat.com/security/cve/CVE-2024-2314CVE-2024-2314CVE-2024-2314https://bugzilla.redhat.com/22690192269019https://errata.almalinux.org/9/ALSA-2024-9187.htmlALSA-2024:9187ALSA-2024:9187
�7�2bcc-devel-0.30.0-6.el9.x86_64.rpm�'�2bcc-doc-0.30.0-6.el9.noarch.rpm�7�2bcc-devel-0.30.0-6.el9.x86_64.rpm�'�2bcc-doc-0.30.0-6.el9.noarch.rpm����T�t	��UB�[BBBBBBBBBsecurityModerate: python3.12 security update
��@�Fhttps://access.redhat.com/errata/RHSA-2024:9190RHSA-2024:9190RHSA-2024:9190https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/22929212292921https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9190.htmlALSA-2024:9190ALSA-2024:9190
%�-python3.12-test-3.12.5-2.el9.i686.rpm#�-python3.12-debug-3.12.5-2.el9.i686.rpm$�-python3.12-idle-3.12.5-2.el9.x86_64.rpm��-python3.12-tkinter-3.12.5-2.el9.i686.rpm��-python3.12-3.12.5-2.el9.i686.rpm%�-python3.12-test-3.12.5-2.el9.x86_64.rpm#�-python3.12-debug-3.12.5-2.el9.x86_64.rpm$�-python3.12-idle-3.12.5-2.el9.i686.rpm%�-python3.12-test-3.12.5-2.el9.i686.rpm#�-python3.12-debug-3.12.5-2.el9.i686.rpm$�-python3.12-idle-3.12.5-2.el9.x86_64.rpm��-python3.12-tkinter-3.12.5-2.el9.i686.rpm��-python3.12-3.12.5-2.el9.i686.rpm%�-python3.12-test-3.12.5-2.el9.x86_64.rpm#�-python3.12-debug-3.12.5-2.el9.x86_64.rpm$�-python3.12-idle-3.12.5-2.el9.i686.rpm���>�u	��XB�cBBBBBBBBBsecurityModerate: python3.11 security update
���Rhttps://access.redhat.com/errata/RHSA-2024:9192RHSA-2024:9192RHSA-2024:9192https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9192.htmlALSA-2024:9192ALSA-2024:9192
�"python3.11-test-3.11.9-7.el9.i686.rpmd�"python3.11-3.11.9-7.el9.i686.rpm�"python3.11-idle-3.11.9-7.el9.x86_64.rpm�"python3.11-debug-3.11.9-7.el9.i686.rpme�"python3.11-tkinter-3.11.9-7.el9.i686.rpm�"python3.11-debug-3.11.9-7.el9.x86_64.rpm�"python3.11-test-3.11.9-7.el9.x86_64.rpm�"python3.11-idle-3.11.9-7.el9.i686.rpm�"python3.11-test-3.11.9-7.el9.i686.rpmd�"python3.11-3.11.9-7.el9.i686.rpm�"python3.11-idle-3.11.9-7.el9.x86_64.rpm�"python3.11-debug-3.11.9-7.el9.i686.rpme�"python3.11-tkinter-3.11.9-7.el9.i686.rpm�"python3.11-debug-3.11.9-7.el9.x86_64.rpm�"python3.11-test-3.11.9-7.el9.x86_64.rpm�"python3.11-idle-3.11.9-7.el9.i686.rpm���f�v	��FBsecurityLow: NetworkManager security update�^��X�jhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317
�p�UNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm�p�UNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpm�p�UNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm�p�UNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpm����F�w	��\�S�\BBBBBBBBBsecurityModerate: python3.9 security update
��B�khttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371
Q�?python3-tkinter-3.9.19-8.el9.i686.rpm�?python3-idle-3.9.19-8.el9.x86_64.rpm�?python3-idle-3.9.19-8.el9.i686.rpm�?python3-debug-3.9.19-8.el9.x86_64.rpm�?python3-debug-3.9.19-8.el9.i686.rpm�?python3-test-3.9.19-8.el9.x86_64.rpmP�?python3-3.9.19-8.el9.i686.rpm�?python3-test-3.9.19-8.el9.i686.rpmQ�?python3-tkinter-3.9.19-8.el9.i686.rpm�?python3-idle-3.9.19-8.el9.x86_64.rpm�?python3-idle-3.9.19-8.el9.i686.rpm�?python3-debug-3.9.19-8.el9.x86_64.rpm�?python3-debug-3.9.19-8.el9.i686.rpm�?python3-test-3.9.19-8.el9.x86_64.rpmP�?python3-3.9.19-8.el9.i686.rpm�?python3-test-3.9.19-8.el9.i686.rpm���7�x	��TBsecurityModerate: bluez security update
��-�+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413
�	�bluez-libs-devel-5.72-2.el9.i686.rpm�	�bluez-libs-devel-5.72-2.el9.x86_64.rpm�	�bluez-libs-devel-5.72-2.el9.i686.rpm�	�bluez-libs-devel-5.72-2.el9.x86_64.rpm����J�y	��WBsecurityModerate: fontforge security update
��X�ehttps://access.redhat.com/errata/RHSA-2024:9439RHSA-2024:9439RHSA-2024:9439https://access.redhat.com/security/cve/CVE-2024-25081CVE-2024-25081CVE-2024-25081https://access.redhat.com/security/cve/CVE-2024-25082CVE-2024-25082CVE-2024-25082https://bugzilla.redhat.com/22661802266180https://bugzilla.redhat.com/22661812266181https://errata.almalinux.org/9/ALSA-2024-9439.htmlALSA-2024:9439ALSA-2024:9439
�D�hfontforge-20201107-6.el9.i686.rpm�D�hfontforge-20201107-6.el9.x86_64.rpm�D�hfontforge-20201107-6.el9.i686.rpm�D�hfontforge-20201107-6.el9.x86_64.rpm����L�z	��[BBsecurityModerate: mingw-glib2 security update
��=�(https://access.redhat.com/errata/RHSA-2024:9442RHSA-2024:9442RHSA-2024:9442https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-9442.htmlALSA-2024:9442ALSA-2024:9442
�Z�}mingw64-glib2-static-2.78.6-1.el9.noarch.rpm�W�}mingw32-glib2-2.78.6-1.el9.noarch.rpm�X�}mingw32-glib2-static-2.78.6-1.el9.noarch.rpm�Y�}mingw64-glib2-2.78.6-1.el9.noarch.rpm�Z�}mingw64-glib2-static-2.78.6-1.el9.noarch.rpm�W�}mingw32-glib2-2.78.6-1.el9.noarch.rpm�X�}mingw32-glib2-static-2.78.6-1.el9.noarch.rpm�Y�}mingw64-glib2-2.78.6-1.el9.noarch.rpm����3�{	�!�_B�ABBBsecurityImportant: bubblewrap and flatpak security update��e�Rhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449
��7flatpak-1.12.9-3.el9_5.i686.rpm��7flatpak-devel-1.12.9-3.el9_5.x86_64.rpm��7flatpak-devel-1.12.9-3.el9_5.i686.rpm��7flatpak-session-helper-1.12.9-3.el9_5.i686.rpm��7flatpak-1.12.9-3.el9_5.i686.rpm��7flatpak-devel-1.12.9-3.el9_5.x86_64.rpm��7flatpak-devel-1.12.9-3.el9_5.i686.rpm��7flatpak-session-helper-1.12.9-3.el9_5.i686.rpm����4�|	�$�bB�CBBBBBBBBBsecurityModerate: python3.11 security update
��7�\https://access.redhat.com/errata/RHSA-2024:9450RHSA-2024:9450RHSA-2024:9450https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9450.htmlALSA-2024:9450ALSA-2024:9450
�#python3.11-test-3.11.9-7.el9_5.1.i686.rpm�#python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm�#python3.11-idle-3.11.9-7.el9_5.1.i686.rpm�#python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm�#python3.11-test-3.11.9-7.el9_5.1.x86_64.rpme�#python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm�#python3.11-debug-3.11.9-7.el9_5.1.i686.rpmd�#python3.11-3.11.9-7.el9_5.1.i686.rpm�#python3.11-test-3.11.9-7.el9_5.1.i686.rpm�#python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm�#python3.11-idle-3.11.9-7.el9_5.1.i686.rpm�#python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm�#python3.11-test-3.11.9-7.el9_5.1.x86_64.rpme�#python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm�#python3.11-debug-3.11.9-7.el9_5.1.i686.rpmd�#python3.11-3.11.9-7.el9_5.1.i686.rpm����y�}	�'�eB�KBBBBBBBBBsecurityModerate: python3.12 security update
���
https://access.redhat.com/errata/RHSA-2024:9451RHSA-2024:9451RHSA-2024:9451https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9451.htmlALSA-2024:9451ALSA-2024:9451
%�.python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm��.python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm#�.python3.12-debug-3.12.5-2.el9_5.1.i686.rpm$�.python3.12-idle-3.12.5-2.el9_5.1.i686.rpm#�.python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm%�.python3.12-test-3.12.5-2.el9_5.1.i686.rpm$�.python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm��.python3.12-3.12.5-2.el9_5.1.i686.rpm%�.python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm��.python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm#�.python3.12-debug-3.12.5-2.el9_5.1.i686.rpm$�.python3.12-idle-3.12.5-2.el9_5.1.i686.rpm#�.python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm%�.python3.12-test-3.12.5-2.el9_5.1.i686.rpm$�.python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm��.python3.12-3.12.5-2.el9_5.1.i686.rpm����|�~	�)�h�H�MBBBBBBBBBsecurityModerate: python3.9 security update
�� �\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468
�@python3-test-3.9.19-8.el9_5.1.x86_64.rpm�@python3-idle-3.9.19-8.el9_5.1.x86_64.rpm�@python3-debug-3.9.19-8.el9_5.1.x86_64.rpm�@python3-test-3.9.19-8.el9_5.1.i686.rpmQ�@python3-tkinter-3.9.19-8.el9_5.1.i686.rpmP�@python3-3.9.19-8.el9_5.1.i686.rpm�@python3-debug-3.9.19-8.el9_5.1.i686.rpm�@python3-idle-3.9.19-8.el9_5.1.i686.rpm�@python3-test-3.9.19-8.el9_5.1.x86_64.rpm�@python3-idle-3.9.19-8.el9_5.1.x86_64.rpm�@python3-debug-3.9.19-8.el9_5.1.x86_64.rpm�@python3-test-3.9.19-8.el9_5.1.i686.rpmQ�@python3-tkinter-3.9.19-8.el9_5.1.i686.rpmP�@python3-3.9.19-8.el9_5.1.i686.rpm�@python3-debug-3.9.19-8.el9_5.1.i686.rpm�@python3-idle-3.9.19-8.el9_5.1.i686.rpm�����	�*�FsecurityImportant: .NET 9.0 security update��|�fhttps://access.redhat.com/errata/RHSA-2024:9543RHSA-2024:9543RHSA-2024:9543https://access.redhat.com/security/cve/CVE-2024-43498CVE-2024-43498CVE-2024-43498https://access.redhat.com/security/cve/CVE-2024-43499CVE-2024-43499CVE-2024-43499https://bugzilla.redhat.com/23232392323239https://bugzilla.redhat.com/23232402323240https://errata.almalinux.org/9/ALSA-2024-9543.htmlALSA-2024:9543ALSA-2024:9543
�i�.dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm�i�.dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm����O�	�+�HBsecurityImportant: openexr security update��b�:https://access.redhat.com/errata/RHSA-2024:9548RHSA-2024:9548RHSA-2024:9548https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-9548.htmlALSA-2024:9548ALSA-2024:9548
� �oopenexr-devel-3.1.1-2.el9_5.1.x86_64.rpm� �oopenexr-devel-3.1.1-2.el9_5.1.i686.rpm� �oopenexr-devel-3.1.1-2.el9_5.1.x86_64.rpm� �oopenexr-devel-3.1.1-2.el9_5.1.i686.rpm����X�	�,�KBBBBsecurityModerate: kernel security update
���'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605
�kernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm�libperf-5.14.0-503.14.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm�libperf-5.14.0-503.14.1.el9_5.x86_64.rpm����:�	�-�QBsecurityModerate: libvpx security update
��C�>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827
��Qlibvpx-devel-1.9.0-8.el9_5.i686.rpm��Qlibvpx-devel-1.9.0-8.el9_5.x86_64.rpm��Qlibvpx-devel-1.9.0-8.el9_5.i686.rpm��Qlibvpx-devel-1.9.0-8.el9_5.x86_64.rpm����Z�	�.�TBBBBsecurityImportant: kernel security update���

https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:0059
�kernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpm�libperf-5.14.0-503.21.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpm�libperf-5.14.0-503.21.1.el9_5.x86_64.rpm����4�	�/�ZBsecurityImportant: raptor2 security update���@https://access.redhat.com/errata/RHSA-2025:0312RHSA-2025:0312RHSA-2025:0312https://access.redhat.com/security/cve/CVE-2024-57823CVE-2024-57823CVE-2024-57823https://bugzilla.redhat.com/23369212336921https://errata.almalinux.org/9/ALSA-2025-0312.htmlALSA-2025:0312ALSA-2025:0312
�"�[raptor2-devel-2.0.15-32.el9_5.i686.rpm�"�[raptor2-devel-2.0.15-32.el9_5.x86_64.rpm�"�[raptor2-devel-2.0.15-32.el9_5.i686.rpm�"�[raptor2-devel-2.0.15-32.el9_5.x86_64.rpm����@�	�0�securityModerate: ipa security update
��K�ahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334
��python3-ipatests-4.12.2-1.el9_5.3.noarch.rpm��python3-ipatests-4.12.2-1.el9_5.3.noarch.rpm����v�	�1�^BsecurityModerate: Security and bug fixes for NetworkManager
��,�Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377
�p�VNetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm�p�VNetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm�p�VNetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm�p�VNetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm���� �	�2�aBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5
��x�fhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422
v4java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmm4java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt4java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpml4java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms4java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmr4java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo4java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn4java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq4java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmk4java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmx4java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmw4java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmu4java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp4java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmv4java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmm4java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt4java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpml4java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms4java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmr4java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo4java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn4java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq4java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmk4java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmx4java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmw4java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmu4java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp4java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm����Q�	�3�}BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5
��^�https://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426
�rFjava-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�mFjava-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�lFjava-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�tFjava-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�nFjava-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�sFjava-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�gFjava-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�iFjava-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�hFjava-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�jFjava-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�qFjava-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�kFjava-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�pFjava-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�oFjava-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�rFjava-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�mFjava-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�lFjava-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�tFjava-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�nFjava-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�sFjava-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�gFjava-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�iFjava-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�hFjava-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�jFjava-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�qFjava-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�kFjava-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�pFjava-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm�oFjava-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm��ɲ%�		�4�YBBBBsecurityModerate: kernel security update
��a�Ehttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578
�kernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm�libperf-5.14.0-503.22.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm�libperf-5.14.0-503.22.1.el9_5.x86_64.rpm��Օ�
	�5�_BBBBsecurityModerate: galera and mariadb security update
��&�4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914
�V�mariadb-test-10.5.27-1.el9_5.x86_64.rpm�U�mariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm�T�mariadb-devel-10.5.27-1.el9_5.x86_64.rpm�V�mariadb-test-10.5.27-1.el9_5.x86_64.rpm�U�mariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm�T�mariadb-devel-10.5.27-1.el9_5.x86_64.rpm����6�	�)�eBBsecurityModerate: mingw-glib2 security update
��Z�https://access.redhat.com/errata/RHSA-2025:0936RHSA-2025:0936RHSA-2025:0936https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://bugzilla.redhat.com/23253402325340https://errata.almalinux.org/9/ALSA-2025-0936.htmlALSA-2025:0936ALSA-2025:0936
�W�~mingw32-glib2-2.78.6-2.el9.noarch.rpm�X�~mingw32-glib2-static-2.78.6-2.el9.noarch.rpm�Z�~mingw64-glib2-static-2.78.6-2.el9.noarch.rpm�Y�~mingw64-glib2-2.78.6-2.el9.noarch.rpm�W�~mingw32-glib2-2.78.6-2.el9.noarch.rpm�X�~mingw32-glib2-static-2.78.6-2.el9.noarch.rpm�Z�~mingw64-glib2-static-2.78.6-2.el9.noarch.rpm�Y�~mingw64-glib2-2.78.6-2.el9.noarch.rpm�����	�7�v�{�{BBBBBBBBBsecurityImportant: python3.9 security update��o�ghttps://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136
�Cpython3-test-3.9.21-2.el9_6.1.i686.rpm�Cpython3-test-3.9.21-2.el9_6.1.x86_64.rpm�Cpython3-idle-3.9.21-2.el9_6.1.i686.rpmP�Cpython3-3.9.21-2.el9_6.1.i686.rpm�Cpython3-debug-3.9.21-2.el9_6.1.x86_64.rpm�Cpython3-debug-3.9.21-2.el9_6.1.i686.rpmQ�Cpython3-tkinter-3.9.21-2.el9_6.1.i686.rpm�Cpython3-idle-3.9.21-2.el9_6.1.x86_64.rpm�Cpython3-test-3.9.21-2.el9_6.1.i686.rpm�Cpython3-test-3.9.21-2.el9_6.1.x86_64.rpm�Cpython3-idle-3.9.21-2.el9_6.1.i686.rpmP�Cpython3-3.9.21-2.el9_6.1.i686.rpm�Cpython3-debug-3.9.21-2.el9_6.1.x86_64.rpm�Cpython3-debug-3.9.21-2.el9_6.1.i686.rpmQ�Cpython3-tkinter-3.9.21-2.el9_6.1.i686.rpm�Cpython3-idle-3.9.21-2.el9_6.1.x86_64.rpm�Ó�D�
	�:�xB�}BBBBBBBBBsecurityImportant: python3.11 security update��V�ghttps://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148
�python3.11-debug-3.11.11-2.el9_6.1.i686.rpme�python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm�python3.11-test-3.11.11-2.el9_6.1.i686.rpm�python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm�python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm�python3.11-idle-3.11.11-2.el9_6.1.i686.rpmd�python3.11-3.11.11-2.el9_6.1.i686.rpm�python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm�python3.11-debug-3.11.11-2.el9_6.1.i686.rpme�python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm�python3.11-test-3.11.11-2.el9_6.1.i686.rpm�python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm�python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm�python3.11-idle-3.11.11-2.el9_6.1.i686.rpmd�python3.11-3.11.11-2.el9_6.1.i686.rpm�python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm��o�	�=�{B�EBBBBBBBBBsecurityImportant: python3.12 security update��=�ghttps://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189
%�2python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm#�2python3.12-debug-3.12.9-1.el9_6.1.i686.rpm��2python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm%�2python3.12-test-3.12.9-1.el9_6.1.i686.rpm$�2python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm��2python3.12-3.12.9-1.el9_6.1.i686.rpm$�2python3.12-idle-3.12.9-1.el9_6.1.i686.rpm#�2python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpm%�2python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm#�2python3.12-debug-3.12.9-1.el9_6.1.i686.rpm��2python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm%�2python3.12-test-3.12.9-1.el9_6.1.i686.rpm$�2python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm��2python3.12-3.12.9-1.el9_6.1.i686.rpm$�2python3.12-idle-3.12.9-1.el9_6.1.i686.rpm#�2python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpm��d�	�>�KBBBBsecurityImportant: kernel security update��$�]https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379
�#kernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpm�#libperf-5.14.0-570.25.1.el9_6.x86_64.rpm�#kernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpm�#kernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpm�#libperf-5.14.0-570.25.1.el9_6.x86_64.rpm�#kernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpm�ÿ�}�	�1�QBsecurityModerate: jq security update
���
https://access.redhat.com/errata/RHSA-2025:10585RHSA-2025:10585RHSA-2025:10585https://access.redhat.com/security/cve/CVE-2024-23337CVE-2024-23337CVE-2024-23337https://access.redhat.com/security/cve/CVE-2025-48060CVE-2025-48060CVE-2025-48060https://bugzilla.redhat.com/23678072367807https://bugzilla.redhat.com/23678422367842https://errata.almalinux.org/9/ALSA-2025-10585.htmlALSA-2025:10585ALSA-2025:10585
�t�Ljq-devel-1.6-17.el9_6.2.i686.rpm�t�Ljq-devel-1.6-17.el9_6.2.x86_64.rpm�t�Ljq-devel-1.6-17.el9_6.2.i686.rpm�t�Ljq-devel-1.6-17.el9_6.2.x86_64.rpm�þ�D�	�?�TBBBBsecurityModerate: kernel security update
���https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837
�$kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm�$kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm�$libperf-5.14.0-570.26.1.el9_6.x86_64.rpm�$kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm�$kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm�$libperf-5.14.0-570.26.1.el9_6.x86_64.rpm����Q�	��ZBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update���ahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862

�`java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�	`java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�
`java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm
�`java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�	`java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�
`java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm�`java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm���+�	��nBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update���
https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867
l6java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms6java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp6java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmw6java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmk6java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr6java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmv6java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq6java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmo6java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmu6java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmm6java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn6java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt6java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmx6java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpml6java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms6java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp6java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmw6java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmk6java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr6java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmv6java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq6java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmo6java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmu6java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmm6java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn6java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt6java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmx6java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm��޿k�	��JBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��
�qhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873
�lHjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�mHjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�jHjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�kHjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�rHjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�sHjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�nHjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�gHjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�qHjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�oHjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�iHjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�hHjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�tHjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�pHjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�lHjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�mHjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�jHjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�kHjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�rHjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�sHjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�nHjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�gHjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�qHjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�oHjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�iHjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�hHjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�tHjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�pHjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm�Ĩ�p�	��fBsecurityModerate: glib2 security update
��~�https://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140
�u�aglib2-static-2.68.4-16.el9_6.2.x86_64.rpm�u�aglib2-static-2.68.4-16.el9_6.2.i686.rpm�u�aglib2-static-2.68.4-16.el9_6.2.x86_64.rpm�u�aglib2-static-2.68.4-16.el9_6.2.i686.rpm��޽/�	��iBBBBsecurityImportant: kernel security update���Vhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411
�%kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm�%libperf-5.14.0-570.28.1.el9_6.x86_64.rpm�%kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm�%kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm�%libperf-5.14.0-570.28.1.el9_6.x86_64.rpm�%kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm��*�	��oBsecurityImportant: unbound security update��X�hhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849
�[�9unbound-devel-1.16.2-19.el9_6.1.x86_64.rpm�[�9unbound-devel-1.16.2-19.el9_6.1.i686.rpm�[�9unbound-devel-1.16.2-19.el9_6.1.x86_64.rpm�[�9unbound-devel-1.16.2-19.el9_6.1.i686.rpm��]�	��rBBBBsecurityModerate: kernel security update
��@�https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861
�&libperf-5.14.0-570.30.1.el9_6.x86_64.rpm�&kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm�&kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm�&libperf-5.14.0-570.30.1.el9_6.x86_64.rpm�&kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm�&kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm��	��xBBBBsecurityImportant: kernel security update��N�https://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262
�kernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm�libperf-5.14.0-503.23.2.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm�libperf-5.14.0-503.23.2.el9_5.x86_64.rpm����u�	��~BBBBsecurityImportant: kernel security update��k�ohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746
�'libperf-5.14.0-570.32.1.el9_6.x86_64.rpm�'kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm�'kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm�'libperf-5.14.0-570.32.1.el9_6.x86_64.rpm�'kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm�'kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm��ҙi�	�	�securityModerate: python3.12-setuptools security update
��Z�Jhttps://access.redhat.com/errata/RHSA-2025:12834RHSA-2025:12834RHSA-2025:12834https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-12834.htmlALSA-2025:12834ALSA-2025:12834
�]�%python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpm�]�%python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpm����s�	��EBBBBsecurityModerate: doxygen security update
��$�ehttps://access.redhat.com/errata/RHSA-2025:1329RHSA-2025:1329RHSA-2025:1329https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1329.htmlALSA-2025:1329ALSA-2025:1329
�B�zdoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm�A�zdoxygen-1.9.1-12.el9_5.x86_64.rpm�C�zdoxygen-latex-1.9.1-12.el9_5.x86_64.rpm�B�zdoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm�A�zdoxygen-1.9.1-12.el9_5.x86_64.rpm�C�zdoxygen-latex-1.9.1-12.el9_5.x86_64.rpm����f�	�
�LBBBBsecurityModerate: gcc security update
��	�Khttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346
�
�Lgcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�
�Lgcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm��Llibstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm��Llibstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpm�
�Lgcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm�
�Lgcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm��Llibstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm��Llibstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpm�����	��RBBBBsecurityModerate: kernel security update
��T�Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602
�(libperf-5.14.0-570.33.2.el9_6.x86_64.rpm�(kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm�(kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm�(libperf-5.14.0-570.33.2.el9_6.x86_64.rpm�(kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm�(kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm����	��XBBBBsecurityImportant: kernel security update���https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962
�)kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm�)kernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm�)libperf-5.14.0-570.35.1.el9_6.x86_64.rpm�)kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm�)kernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm�)libperf-5.14.0-570.35.1.el9_6.x86_64.rpm��Z� 	�
�^BBBBsecurityImportant: kernel security update��-�!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420
�*kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm�*kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm�*libperf-5.14.0-570.37.1.el9_6.x86_64.rpm�*kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm�*kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm�*libperf-5.14.0-570.37.1.el9_6.x86_64.rpm��j�!	��dBBBBBBBBBBBsecurityImportant: postgresql security update��N�Nhttps://access.redhat.com/errata/RHSA-2025:14878RHSA-2025:14878RHSA-2025:14878https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14878.htmlALSA-2025:14878ALSA-2025:14878
�
�Opostgresql-static-13.22-1.el9_6.x86_64.rpm��Opostgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm��Opostgresql-private-devel-13.22-1.el9_6.x86_64.rpm�F�Opostgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpm��Opostgresql-docs-13.22-1.el9_6.x86_64.rpm�	�Opostgresql-server-devel-13.22-1.el9_6.x86_64.rpm��Opostgresql-test-13.22-1.el9_6.x86_64.rpm�
�Opostgresql-static-13.22-1.el9_6.x86_64.rpm��Opostgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm��Opostgresql-private-devel-13.22-1.el9_6.x86_64.rpm�F�Opostgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpm��Opostgresql-docs-13.22-1.el9_6.x86_64.rpm�	�Opostgresql-server-devel-13.22-1.el9_6.x86_64.rpm��Opostgresql-test-13.22-1.el9_6.x86_64.rpm��Śg�"	��OB�bBBBBBBBBBsecurityModerate: python3.12 security update
���;https://access.redhat.com/errata/RHSA-2025:15007RHSA-2025:15007RHSA-2025:15007https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15007.htmlALSA-2025:15007ALSA-2025:15007
%�3python3.12-test-3.12.9-1.el9_6.2.i686.rpm#�3python3.12-debug-3.12.9-1.el9_6.2.i686.rpm��3python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm%�3python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm#�3python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm$�3python3.12-idle-3.12.9-1.el9_6.2.i686.rpm$�3python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm��3python3.12-3.12.9-1.el9_6.2.i686.rpm%�3python3.12-test-3.12.9-1.el9_6.2.i686.rpm#�3python3.12-debug-3.12.9-1.el9_6.2.i686.rpm��3python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm%�3python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm#�3python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm$�3python3.12-idle-3.12.9-1.el9_6.2.i686.rpm$�3python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm��3python3.12-3.12.9-1.el9_6.2.i686.rpm���%�#	��RB�jBBBBBBBBBsecurityModerate: python3.11 security update
��W�;https://access.redhat.com/errata/RHSA-2025:15010RHSA-2025:15010RHSA-2025:15010https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15010.htmlALSA-2025:15010ALSA-2025:15010
�python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmd�python3.11-3.11.11-2.el9_6.2.i686.rpm�python3.11-test-3.11.11-2.el9_6.2.i686.rpm�python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm�python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm�python3.11-debug-3.11.11-2.el9_6.2.i686.rpm�python3.11-idle-3.11.11-2.el9_6.2.i686.rpme�python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm�python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmd�python3.11-3.11.11-2.el9_6.2.i686.rpm�python3.11-test-3.11.11-2.el9_6.2.i686.rpm�python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm�python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm�python3.11-debug-3.11.11-2.el9_6.2.i686.rpm�python3.11-idle-3.11.11-2.el9_6.2.i686.rpme�python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm���!�$	��GBBBBsecurityImportant: kernel security update���https://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011
https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684�+kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm�+kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm�+libperf-5.14.0-570.39.1.el9_6.x86_64.rpm�+kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm�+kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm�+libperf-5.14.0-570.39.1.el9_6.x86_64.rpm����%	��MBsecurityImportant: udisks2 security update��)�https://access.redhat.com/errata/RHSA-2025:15018RHSA-2025:15018RHSA-2025:15018https://access.redhat.com/security/cve/CVE-2025-8067CVE-2025-8067CVE-2025-8067https://bugzilla.redhat.com/23886232388623https://errata.almalinux.org/9/ALSA-2025-15018.htmlALSA-2025:15018ALSA-2025:15018
��elibudisks2-devel-2.9.4-11.el9_6.1.i686.rpm��elibudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm��elibudisks2-devel-2.9.4-11.el9_6.1.i686.rpm��elibudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm���W�&	��W�\�_BBBBBBBBBsecurityModerate: python3.9 security update
��?�;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019
�Dpython3-debug-3.9.21-2.el9_6.2.i686.rpm�Dpython3-idle-3.9.21-2.el9_6.2.x86_64.rpmQ�Dpython3-tkinter-3.9.21-2.el9_6.2.i686.rpm�Dpython3-debug-3.9.21-2.el9_6.2.x86_64.rpm�Dpython3-idle-3.9.21-2.el9_6.2.i686.rpmP�Dpython3-3.9.21-2.el9_6.2.i686.rpm�Dpython3-test-3.9.21-2.el9_6.2.x86_64.rpm�Dpython3-test-3.9.21-2.el9_6.2.i686.rpm�Dpython3-debug-3.9.21-2.el9_6.2.i686.rpm�Dpython3-idle-3.9.21-2.el9_6.2.x86_64.rpmQ�Dpython3-tkinter-3.9.21-2.el9_6.2.i686.rpm�Dpython3-debug-3.9.21-2.el9_6.2.x86_64.rpm�Dpython3-idle-3.9.21-2.el9_6.2.i686.rpmP�Dpython3-3.9.21-2.el9_6.2.i686.rpm�Dpython3-test-3.9.21-2.el9_6.2.x86_64.rpm�Dpython3-test-3.9.21-2.el9_6.2.i686.rpm����'	��[BBBBsecurityImportant: kernel security update��z�Whttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429
�,kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm�,kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm�,libperf-5.14.0-570.41.1.el9_6.x86_64.rpm�,kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm�,kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm�,libperf-5.14.0-570.41.1.el9_6.x86_64.rpm�Ɵ��(	��aBBBBsecurityImportant: kernel security update��Q�
https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661
�-kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm�-kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm�-libperf-5.14.0-570.42.2.el9_6.x86_64.rpm�-kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm�-kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm�-libperf-5.14.0-570.42.2.el9_6.x86_64.rpm�Ƥ�G�)	��gBBBBsecurityModerate: kernel security update
��k�https://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740
�.libperf-5.14.0-570.44.1.el9_6.x86_64.rpm�.kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm�.kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm�.libperf-5.14.0-570.44.1.el9_6.x86_64.rpm�.kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm�.kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm��ԃ�*	��\B�QBBsecurityModerate: mysql security update
��k�hhttps://access.redhat.com/errata/RHSA-2025:16086RHSA-2025:16086RHSA-2025:16086https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-53023CVE-2025-53023CVE-2025-53023https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803112380311https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16086.htmlALSA-2025:16086ALSA-2025:16086
�2�Pmysql-devel-8.0.43-1.el9_6.x86_64.rpm�[�Pmysql-libs-8.0.43-1.el9_6.x86_64.rpm�3�Pmysql-test-8.0.43-1.el9_6.x86_64.rpm�2�Pmysql-devel-8.0.43-1.el9_6.x86_64.rpm�[�Pmysql-libs-8.0.43-1.el9_6.x86_64.rpm�3�Pmysql-test-8.0.43-1.el9_6.x86_64.rpm���o�+	��qBBBBsecurityModerate: kernel security update
��q�
https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398
�/libperf-5.14.0-570.46.1.el9_6.x86_64.rpm�/kernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm�/kernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm�/libperf-5.14.0-570.46.1.el9_6.x86_64.rpm�/kernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm�/kernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm���^�,	� �wBBBBsecurityModerate: kernel security update
��x�https://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:1659
�kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm�libperf-5.14.0-503.26.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm�libperf-5.14.0-503.26.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm����5�-	�"�a�]BBBsecurityImportant: bind9.18 security update��	�rhttps://access.redhat.com/errata/RHSA-2025:1670RHSA-2025:1670RHSA-2025:1670https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://access.redhat.com/security/cve/CVE-2024-12705CVE-2024-12705CVE-2024-12705https://bugzilla.redhat.com/23428792342879https://bugzilla.redhat.com/23428802342880https://errata.almalinux.org/9/ALSA-2025-1670.htmlALSA-2025:1670ALSA-2025:1670
��dbind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpm�R�dbind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm��dbind9.18-devel-9.18.29-1.el9_5.1.i686.rpm��dbind9.18-libs-9.18.29-1.el9_5.1.i686.rpm��dbind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpm�R�dbind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm��dbind9.18-devel-9.18.29-1.el9_5.1.i686.rpm��dbind9.18-libs-9.18.29-1.el9_5.1.i686.rpm���3�.	�#�BBBBBsecurityImportant: mysql security update��{�*dhttps://access.redhat.com/errata/RHSA-2025:1671RHSA-2025:1671RHSA-2025:1671https://access.redhat.com/security/cve/CVE-2024-11053CVE-2024-11053CVE-2024-11053https://access.redhat.com/security/cve/CVE-2024-21193CVE-2024-21193CVE-2024-21193https://access.redhat.com/security/cve/CVE-2024-21194CVE-2024-21194CVE-2024-21194https://access.redhat.com/security/cve/CVE-2024-21196CVE-2024-21196CVE-2024-21196https://access.redhat.com/security/cve/CVE-2024-21197CVE-2024-21197CVE-2024-21197https://access.redhat.com/security/cve/CVE-2024-21198CVE-2024-21198CVE-2024-21198https://access.redhat.com/security/cve/CVE-2024-21199CVE-2024-21199CVE-2024-21199https://access.redhat.com/security/cve/CVE-2024-21201CVE-2024-21201CVE-2024-21201https://access.redhat.com/security/cve/CVE-2024-21203CVE-2024-21203CVE-2024-21203https://access.redhat.com/security/cve/CVE-2024-21212CVE-2024-21212CVE-2024-21212https://access.redhat.com/security/cve/CVE-2024-21213CVE-2024-21213CVE-2024-21213https://access.redhat.com/security/cve/CVE-2024-21218CVE-2024-21218CVE-2024-21218https://access.redhat.com/security/cve/CVE-2024-21219CVE-2024-21219CVE-2024-21219https://access.redhat.com/security/cve/CVE-2024-21230CVE-2024-21230CVE-2024-21230https://access.redhat.com/security/cve/CVE-2024-21231CVE-2024-21231CVE-2024-21231https://access.redhat.com/security/cve/CVE-2024-21236CVE-2024-21236CVE-2024-21236https://access.redhat.com/security/cve/CVE-2024-21237CVE-2024-21237CVE-2024-21237https://access.redhat.com/security/cve/CVE-2024-21238CVE-2024-21238CVE-2024-21238https://access.redhat.com/security/cve/CVE-2024-21239CVE-2024-21239CVE-2024-21239https://access.redhat.com/security/cve/CVE-2024-21241CVE-2024-21241CVE-2024-21241https://access.redhat.com/security/cve/CVE-2024-21247CVE-2024-21247CVE-2024-21247https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://access.redhat.com/security/cve/CVE-2024-7264CVE-2024-7264CVE-2024-7264https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-21491CVE-2025-21491CVE-2025-21491https://access.redhat.com/security/cve/CVE-2025-21494CVE-2025-21494CVE-2025-21494https://access.redhat.com/security/cve/CVE-2025-21497CVE-2025-21497CVE-2025-21497https://access.redhat.com/security/cve/CVE-2025-21500CVE-2025-21500CVE-2025-21500https://access.redhat.com/security/cve/CVE-2025-21501CVE-2025-21501CVE-2025-21501https://access.redhat.com/security/cve/CVE-2025-21503CVE-2025-21503CVE-2025-21503https://access.redhat.com/security/cve/CVE-2025-21504CVE-2025-21504CVE-2025-21504https://access.redhat.com/security/cve/CVE-2025-21505CVE-2025-21505CVE-2025-21505https://access.redhat.com/security/cve/CVE-2025-21518CVE-2025-21518CVE-2025-21518https://access.redhat.com/security/cve/CVE-2025-21519CVE-2025-21519CVE-2025-21519https://access.redhat.com/security/cve/CVE-2025-21520CVE-2025-21520CVE-2025-21520https://access.redhat.com/security/cve/CVE-2025-21521CVE-2025-21521CVE-2025-21521https://access.redhat.com/security/cve/CVE-2025-21522CVE-2025-21522CVE-2025-21522https://access.redhat.com/security/cve/CVE-2025-21523CVE-2025-21523CVE-2025-21523https://access.redhat.com/security/cve/CVE-2025-21525CVE-2025-21525CVE-2025-21525https://access.redhat.com/security/cve/CVE-2025-21529CVE-2025-21529CVE-2025-21529https://access.redhat.com/security/cve/CVE-2025-21531CVE-2025-21531CVE-2025-21531https://access.redhat.com/security/cve/CVE-2025-21534CVE-2025-21534CVE-2025-21534https://access.redhat.com/security/cve/CVE-2025-21536CVE-2025-21536CVE-2025-21536https://access.redhat.com/security/cve/CVE-2025-21540CVE-2025-21540CVE-2025-21540https://access.redhat.com/security/cve/CVE-2025-21543CVE-2025-21543CVE-2025-21543https://access.redhat.com/security/cve/CVE-2025-21546CVE-2025-21546CVE-2025-21546https://access.redhat.com/security/cve/CVE-2025-21555CVE-2025-21555CVE-2025-21555https://access.redhat.com/security/cve/CVE-2025-21559CVE-2025-21559CVE-2025-21559https://bugzilla.redhat.com/22945812294581https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/23018882301888https://bugzilla.redhat.com/23188572318857https://bugzilla.redhat.com/23188582318858https://bugzilla.redhat.com/23188702318870https://bugzilla.redhat.com/23188732318873https://bugzilla.redhat.com/23188742318874https://bugzilla.redhat.com/23188762318876https://bugzilla.redhat.com/23188822318882https://bugzilla.redhat.com/23188832318883https://bugzilla.redhat.com/23188842318884https://bugzilla.redhat.com/23188852318885https://bugzilla.redhat.com/23188862318886https://bugzilla.redhat.com/23188972318897https://bugzilla.redhat.com/23189002318900https://bugzilla.redhat.com/23189052318905https://bugzilla.redhat.com/23189142318914https://bugzilla.redhat.com/23189222318922https://bugzilla.redhat.com/23189232318923https://bugzilla.redhat.com/23189252318925https://bugzilla.redhat.com/23189262318926https://bugzilla.redhat.com/23189272318927https://bugzilla.redhat.com/23311912331191https://bugzilla.redhat.com/23392182339218https://bugzilla.redhat.com/23392202339220https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23392262339226https://bugzilla.redhat.com/23392312339231https://bugzilla.redhat.com/23392362339236https://bugzilla.redhat.com/23392382339238https://bugzilla.redhat.com/23392432339243https://bugzilla.redhat.com/23392472339247https://bugzilla.redhat.com/23392522339252https://bugzilla.redhat.com/23392592339259https://bugzilla.redhat.com/23392662339266https://bugzilla.redhat.com/23392702339270https://bugzilla.redhat.com/23392712339271https://bugzilla.redhat.com/23392752339275https://bugzilla.redhat.com/23392772339277https://bugzilla.redhat.com/23392812339281https://bugzilla.redhat.com/23392842339284https://bugzilla.redhat.com/23392912339291https://bugzilla.redhat.com/23392932339293https://bugzilla.redhat.com/23392952339295https://bugzilla.redhat.com/23392992339299https://bugzilla.redhat.com/23393002339300https://bugzilla.redhat.com/23393042339304https://bugzilla.redhat.com/23393052339305https://errata.almalinux.org/9/ALSA-2025-1671.htmlALSA-2025:1671ALSA-2025:1671
�2�Omysql-devel-8.0.41-2.el9_5.x86_64.rpm�[�Omysql-libs-8.0.41-2.el9_5.x86_64.rpm�3�Omysql-test-8.0.41-2.el9_5.x86_64.rpm�2�Omysql-devel-8.0.41-2.el9_5.x86_64.rpm�[�Omysql-libs-8.0.41-2.el9_5.x86_64.rpm�3�Omysql-test-8.0.41-2.el9_5.x86_64.rpm��݄c�/	�%�d�eBBBsecurityImportant: bind security update��%�Xhttps://access.redhat.com/errata/RHSA-2025:1681RHSA-2025:1681RHSA-2025:1681https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/23428792342879https://errata.almalinux.org/9/ALSA-2025-1681.htmlALSA-2025:1681ALSA-2025:1681
��`bind-doc-9.16.23-24.el9_5.3.noarch.rpmR�`bind-devel-9.16.23-24.el9_5.3.i686.rpmR�`bind-devel-9.16.23-24.el9_5.3.x86_64.rpm�f�`bind-libs-9.16.23-24.el9_5.3.i686.rpm��`bind-doc-9.16.23-24.el9_5.3.noarch.rpmR�`bind-devel-9.16.23-24.el9_5.3.i686.rpmR�`bind-devel-9.16.23-24.el9_5.3.x86_64.rpm�f�`bind-libs-9.16.23-24.el9_5.3.i686.rpm��ܴ�0	�&�MBBBBsecurityModerate: kernel security update
��}�ihttps://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880
�0kernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm�0libperf-5.14.0-570.49.1.el9_6.x86_64.rpm�0kernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpm�0kernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm�0libperf-5.14.0-570.49.1.el9_6.x86_64.rpm�0kernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpm����h�1	�'�securityImportant: ipa security update��f�ghttps://access.redhat.com/errata/RHSA-2025:17084RHSA-2025:17084RHSA-2025:17084https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-17084.htmlALSA-2025:17084ALSA-2025:17084
�� python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm�� python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm���8�2	��TsecurityModerate: perl-JSON-XS security update
��M�shttps://access.redhat.com/errata/RHSA-2025:17162RHSA-2025:17162RHSA-2025:17162https://access.redhat.com/security/cve/CVE-2025-40928CVE-2025-40928CVE-2025-40928https://bugzilla.redhat.com/23938782393878https://errata.almalinux.org/9/ALSA-2025-17162.htmlALSA-2025:17162ALSA-2025:17162
��hperl-JSON-XS-4.04-1.el9_6.x86_64.rpm��hperl-JSON-XS-4.04-1.el9_6.x86_64.rpm�����3	�(�WBBBBsecurityModerate: kernel security update
��@�Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377
�1kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm�1kernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm�1libperf-5.14.0-570.51.1.el9_6.x86_64.rpm�1kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm�1kernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm�1libperf-5.14.0-570.51.1.el9_6.x86_64.rpm�ǝ�=�4	�)�]BBBBBBBBBBBsecurityImportant: postgresql security update���'https://access.redhat.com/errata/RHSA-2025:1742RHSA-2025:1742RHSA-2025:1742https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1742.htmlALSA-2025:1742ALSA-2025:1742
�	�Npostgresql-server-devel-13.20-1.el9_5.x86_64.rpm�F�Npostgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm��Npostgresql-private-devel-13.20-1.el9_5.x86_64.rpm��Npostgresql-test-13.20-1.el9_5.x86_64.rpm�
�Npostgresql-static-13.20-1.el9_5.x86_64.rpm��Npostgresql-docs-13.20-1.el9_5.x86_64.rpm��Npostgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpm�	�Npostgresql-server-devel-13.20-1.el9_5.x86_64.rpm�F�Npostgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm��Npostgresql-private-devel-13.20-1.el9_5.x86_64.rpm��Npostgresql-test-13.20-1.el9_5.x86_64.rpm�
�Npostgresql-static-13.20-1.el9_5.x86_64.rpm��Npostgresql-docs-13.20-1.el9_5.x86_64.rpm��Npostgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpm���s�5	�*�jBBBBsecurityModerate: kernel security update
��-�d
https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760
�2kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm�2libperf-5.14.0-570.52.1.el9_6.x86_64.rpm�2kernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm�2kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm�2libperf-5.14.0-570.52.1.el9_6.x86_64.rpm�2kernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm��¿�6	�+�psecurityImportant: .NET 8.0 security update���Mhttps://access.redhat.com/errata/RHSA-2025:18149RHSA-2025:18149RHSA-2025:18149https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18149.htmlALSA-2025:18149ALSA-2025:18149
��*dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm��*dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm����\�7	�,�rsecurityImportant: .NET 9.0 security update��^�Mhttps://access.redhat.com/errata/RHSA-2025:18151RHSA-2025:18151RHSA-2025:18151https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18151.htmlALSA-2025:18151ALSA-2025:18151
�i�2dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpm�i�2dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpm�ȡ�h�8	�-�tBBBBsecurityModerate: kernel security update
��+�https://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281
�3kernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm�3kernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm�3libperf-5.14.0-570.55.1.el9_6.x86_64.rpm�3kernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm�3kernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm�3libperf-5.14.0-570.55.1.el9_6.x86_64.rpm����c�9	�.�zBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update
��@�\https://access.redhat.com/errata/RHSA-2025:18815RHSA-2025:18815RHSA-2025:18815https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18815.htmlALSA-2025:18815ALSA-2025:18815

�ajava-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�
ajava-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�	ajava-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm
�ajava-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�
ajava-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�	ajava-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ajava-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm�ȍ�I�:	�/�NBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:18821RHSA-2025:18821RHSA-2025:18821https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18821.htmlALSA-2025:18821ALSA-2025:18821
o7java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmw7java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmt7java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmk7java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmn7java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmr7java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmp7java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmx7java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmv7java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmu7java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpms7java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmm7java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmq7java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpml7java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmo7java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmw7java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmt7java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmk7java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmn7java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmr7java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmp7java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmx7java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmv7java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmu7java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpms7java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmm7java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmq7java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpml7java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm�Ȍ�l�;	�0�jBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update
��!�lhttps://access.redhat.com/errata/RHSA-2025:18824RHSA-2025:18824RHSA-2025:18824https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://access.redhat.com/security/cve/CVE-2025-61748CVE-2025-61748CVE-2025-61748https://errata.almalinux.org/9/ALSA-2025-18824.htmlALSA-2025:18824ALSA-2025:18824
�nIjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�gIjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�mIjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�rIjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�qIjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�tIjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�hIjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�iIjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�lIjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�jIjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�sIjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�kIjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�oIjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�pIjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�nIjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�gIjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�mIjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�rIjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�qIjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�tIjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�hIjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�iIjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�lIjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�jIjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�sIjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�kIjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�oIjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�pIjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm�Ȍ�W�<	�1�FsecurityImportant: libtiff security update��
�<https://access.redhat.com/errata/RHSA-2025:19113RHSA-2025:19113RHSA-2025:19113https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-19113.htmlALSA-2025:19113ALSA-2025:19113
��{libtiff-tools-4.4.0-13.el9_6.2.x86_64.rpm��{libtiff-tools-4.4.0-13.el9_6.2.x86_64.rpm�ȁ�1�=	�2�HBBBBsecurityModerate: kernel security update
��I�https://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409
�4kernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpm�4kernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpm�4libperf-5.14.0-570.60.1.el9_6.x86_64.rpm�4kernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpm�4kernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpm�4libperf-5.14.0-570.60.1.el9_6.x86_64.rpm�ȷ�H�>	�3�NBBBBsecurityModerate: galera and mariadb security update
��M�!https://access.redhat.com/errata/RHSA-2025:19584RHSA-2025:19584RHSA-2025:19584https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://errata.almalinux.org/9/ALSA-2025-19584.htmlALSA-2025:19584ALSA-2025:19584
�U�mariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpm�V�mariadb-test-10.5.29-2.el9_6.x86_64.rpm�T�mariadb-devel-10.5.29-2.el9_6.x86_64.rpm�U�mariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpm�V�mariadb-test-10.5.29-2.el9_6.x86_64.rpm�T�mariadb-devel-10.5.29-2.el9_6.x86_64.rpm�ȶ�9�?	�4�TBBBBsecurityModerate: kernel security update
��n�9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930
�5kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpm�5kernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpm�5libperf-5.14.0-570.62.1.el9_6.x86_64.rpm�5kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpm�5kernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpm�5libperf-5.14.0-570.62.1.el9_6.x86_64.rpm��ѲA�@	�6�u�fBBBsecurityImportant: bind9.18 security update��'�phttps://access.redhat.com/errata/RHSA-2025:19950RHSA-2025:19950RHSA-2025:19950https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-19950.htmlALSA-2025:19950ALSA-2025:19950
��ebind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpm�R�ebind9.18-doc-9.18.29-4.el9_6.2.noarch.rpm��ebind9.18-libs-9.18.29-4.el9_6.2.i686.rpm��ebind9.18-devel-9.18.29-4.el9_6.2.i686.rpm��ebind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpm�R�ebind9.18-doc-9.18.29-4.el9_6.2.noarch.rpm��ebind9.18-libs-9.18.29-4.el9_6.2.i686.rpm��ebind9.18-devel-9.18.29-4.el9_6.2.i686.rpm���1�A	�7�_BBBBsecurityModerate: kernel security update
���X�ahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518
https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396�Glibperf-5.14.0-611.5.1.el9_7.x86_64.rpm�Gkernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpm�Gkernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm�Glibperf-5.14.0-611.5.1.el9_7.x86_64.rpm�Gkernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpm�Gkernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm���7�B	�3�eBsecurityLow: shadow-utils security update�^��o�https://access.redhat.com/errata/RHSA-2025:20559RHSA-2025:20559RHSA-2025:20559https://access.redhat.com/security/cve/CVE-2024-56433CVE-2024-56433CVE-2024-56433https://bugzilla.redhat.com/23341652334165https://errata.almalinux.org/9/ALSA-2025-20559.htmlALSA-2025:20559ALSA-2025:20559
�~�kshadow-utils-subid-devel-4.9-15.el9.i686.rpm�~�kshadow-utils-subid-devel-4.9-15.el9.x86_64.rpm�~�kshadow-utils-subid-devel-4.9-15.el9.i686.rpm�~�kshadow-utils-subid-devel-4.9-15.el9.x86_64.rpm����C	�8�hBsecurityModerate: zziplib security update
��v�https://access.redhat.com/errata/RHSA-2025:20838RHSA-2025:20838RHSA-2025:20838https://access.redhat.com/security/cve/CVE-2018-17828CVE-2018-17828CVE-2018-17828https://bugzilla.redhat.com/16358881635888https://errata.almalinux.org/9/ALSA-2025-20838.htmlALSA-2025:20838ALSA-2025:20838
��.zziplib-devel-0.13.71-12.el9.i686.rpm��.zziplib-devel-0.13.71-12.el9.x86_64.rpm��.zziplib-devel-0.13.71-12.el9.i686.rpm��.zziplib-devel-0.13.71-12.el9.x86_64.rpm���t�D	�9�+securityImportant: ipa security update���ghttps://access.redhat.com/errata/RHSA-2025:20928RHSA-2025:20928RHSA-2025:20928https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-20928.htmlALSA-2025:20928ALSA-2025:20928
��!python3-ipatests-4.12.2-22.el9_7.1.noarch.rpm��!python3-ipatests-4.12.2-22.el9_7.1.noarch.rpm�ɵ�V�E	�:�lBsecurityImportant: sssd security update��o�/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954
�y�glibsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpm�y�glibsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpm�y�glibsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpm�y�glibsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpm�ɵ��F	�;�osecurityImportant: libtiff security update���<https://access.redhat.com/errata/RHSA-2025:20956RHSA-2025:20956RHSA-2025:20956https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-20956.htmlALSA-2025:20956ALSA-2025:20956
��|libtiff-tools-4.4.0-15.el9_7.2.x86_64.rpm��|libtiff-tools-4.4.0-15.el9_7.2.x86_64.rpm���/�G	�=�|�vBBsecurityModerate: xorg-x11-server-Xwayland security update
��Z�
https://access.redhat.com/errata/RHSA-2025:20960RHSA-2025:20960RHSA-2025:20960https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20960.htmlALSA-2025:20960ALSA-2025:20960
�w�kxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpm�w�kxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpm�^�kxorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpm�w�kxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpm�w�kxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpm�^�kxorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpm���7�H	�>�uBBsecurityModerate: xorg-x11-server security update
��d�yhttps://access.redhat.com/errata/RHSA-2025:20961RHSA-2025:20961RHSA-2025:20961https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20961.htmlALSA-2025:20961ALSA-2025:20961
f�	xorg-x11-server-devel-1.20.11-32.el9_7.i686.rpm�\�	xorg-x11-server-source-1.20.11-32.el9_7.noarch.rpmf�	xorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpmf�	xorg-x11-server-devel-1.20.11-32.el9_7.i686.rpm�\�	xorg-x11-server-source-1.20.11-32.el9_7.noarch.rpmf�	xorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpm����I	���{BBBsecurityImportant: bind security update��]�~https://access.redhat.com/errata/RHSA-2025:21110RHSA-2025:21110RHSA-2025:21110https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://errata.almalinux.org/9/ALSA-2025-21110.htmlALSA-2025:21110ALSA-2025:21110
R�abind-devel-9.16.23-34.el9_7.1.x86_64.rpmR�abind-devel-9.16.23-34.el9_7.1.i686.rpm��abind-doc-9.16.23-34.el9_7.1.noarch.rpm�f�abind-libs-9.16.23-34.el9_7.1.i686.rpmR�abind-devel-9.16.23-34.el9_7.1.x86_64.rpmR�abind-devel-9.16.23-34.el9_7.1.i686.rpm��abind-doc-9.16.23-34.el9_7.1.noarch.rpm�f�abind-libs-9.16.23-34.el9_7.1.i686.rpm���<�J	��A�~BBBsecurityImportant: bind9.18 security update��[�phttps://access.redhat.com/errata/RHSA-2025:21111RHSA-2025:21111RHSA-2025:21111https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-21111.htmlALSA-2025:21111ALSA-2025:21111
��fbind9.18-devel-9.18.29-5.el9_7.2.i686.rpm��fbind9.18-libs-9.18.29-5.el9_7.2.i686.rpm�R�fbind9.18-doc-9.18.29-5.el9_7.2.noarch.rpm��fbind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpm��fbind9.18-devel-9.18.29-5.el9_7.2.i686.rpm��fbind9.18-libs-9.18.29-5.el9_7.2.i686.rpm�R�fbind9.18-doc-9.18.29-5.el9_7.2.noarch.rpm��fbind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpm�ɵ��K	��CBsecurityCritical: lasso security update�B��K�$https://access.redhat.com/errata/RHSA-2025:21462RHSA-2025:21462RHSA-2025:21462https://access.redhat.com/security/cve/CVE-2025-47151CVE-2025-47151CVE-2025-47151https://bugzilla.redhat.com/24127392412739https://errata.almalinux.org/9/ALSA-2025-21462.htmlALSA-2025:21462ALSA-2025:21462
��dlasso-devel-2.7.0-11.el9_7.3.i686.rpm��dlasso-devel-2.7.0-11.el9_7.3.x86_64.rpm��dlasso-devel-2.7.0-11.el9_7.3.i686.rpm��dlasso-devel-2.7.0-11.el9_7.3.x86_64.rpm���	�L	��FBBBBsecurityModerate: kernel security update
��o�;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405
�6kernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpm�6kernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpm�6libperf-5.14.0-611.11.1.el9_7.x86_64.rpm�6kernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpm�6kernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpm�6libperf-5.14.0-611.11.1.el9_7.x86_64.rpm��ۅ]�M	��LBBBBsecurityModerate: kernel security update
��*�Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865
�7kernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpm�7kernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpm�7libperf-5.14.0-611.13.1.el9_7.x86_64.rpm�7kernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpm�7kernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpm�7libperf-5.14.0-611.13.1.el9_7.x86_64.rpm�ʊ�z�N	��RBBsecurityModerate: mysql security update
��}�[https://access.redhat.com/errata/RHSA-2025:23109RHSA-2025:23109RHSA-2025:23109https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23109.htmlALSA-2025:23109ALSA-2025:23109
�3�(mysql-test-8.0.44-1.el9_7.x86_64.rpm�2�(mysql-devel-8.0.44-1.el9_7.x86_64.rpm�3�(mysql-test-8.0.44-1.el9_7.x86_64.rpm�2�(mysql-devel-8.0.44-1.el9_7.x86_64.rpm����D�O	��VBsecurityImportant: wireshark security update��X�&https://access.redhat.com/errata/RHSA-2025:23142RHSA-2025:23142RHSA-2025:23142https://access.redhat.com/security/cve/CVE-2025-13499CVE-2025-13499CVE-2025-13499https://bugzilla.redhat.com/24162932416293https://errata.almalinux.org/9/ALSA-2025-23142.htmlALSA-2025:23142ALSA-2025:23142
�J�Zwireshark-devel-3.4.10-8.el9_7.1.i686.rpm�J�Zwireshark-devel-3.4.10-8.el9_7.1.x86_64.rpm�J�Zwireshark-devel-3.4.10-8.el9_7.1.i686.rpm�J�Zwireshark-devel-3.4.10-8.el9_7.1.x86_64.rpm����#�P	��YBBBBsecurityImportant: kernel security update��~�Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241
�8kernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpm�8kernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpm�8libperf-5.14.0-611.16.1.el9_7.x86_64.rpm�8kernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpm�8kernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpm�8libperf-5.14.0-611.16.1.el9_7.x86_64.rpm����Q	��IB�VBBBBBBBBBsecurityModerate: python3.12 security update
��K�ghttps://access.redhat.com/errata/RHSA-2025:23323RHSA-2025:23323RHSA-2025:23323https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/24023422402342https://errata.almalinux.org/9/ALSA-2025-23323.htmlALSA-2025:23323ALSA-2025:23323
$�(python3.12-idle-3.12.12-1.el9_7.x86_64.rpm��(python3.12-3.12.12-1.el9_7.i686.rpm��(python3.12-tkinter-3.12.12-1.el9_7.i686.rpm%�(python3.12-test-3.12.12-1.el9_7.i686.rpm$�(python3.12-idle-3.12.12-1.el9_7.i686.rpm%�(python3.12-test-3.12.12-1.el9_7.x86_64.rpm#�(python3.12-debug-3.12.12-1.el9_7.x86_64.rpm#�(python3.12-debug-3.12.12-1.el9_7.i686.rpm$�(python3.12-idle-3.12.12-1.el9_7.x86_64.rpm��(python3.12-3.12.12-1.el9_7.i686.rpm��(python3.12-tkinter-3.12.12-1.el9_7.i686.rpm%�(python3.12-test-3.12.12-1.el9_7.i686.rpm$�(python3.12-idle-3.12.12-1.el9_7.i686.rpm%�(python3.12-test-3.12.12-1.el9_7.x86_64.rpm#�(python3.12-debug-3.12.12-1.el9_7.x86_64.rpm#�(python3.12-debug-3.12.12-1.el9_7.i686.rpm�ʥ��R	�
�L�i�wBBBBBBBBBsecurityModerate: python3.9 security update
��2�x
https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342
�Epython3-test-3.9.25-2.el9_7.x86_64.rpm�Epython3-idle-3.9.25-2.el9_7.x86_64.rpmQ�Epython3-tkinter-3.9.25-2.el9_7.i686.rpm�Epython3-debug-3.9.25-2.el9_7.x86_64.rpm�Epython3-test-3.9.25-2.el9_7.i686.rpm�Epython3-idle-3.9.25-2.el9_7.i686.rpm�Epython3-debug-3.9.25-2.el9_7.i686.rpmP�Epython3-3.9.25-2.el9_7.i686.rpm�Epython3-test-3.9.25-2.el9_7.x86_64.rpm�Epython3-idle-3.9.25-2.el9_7.x86_64.rpmQ�Epython3-tkinter-3.9.25-2.el9_7.i686.rpm�Epython3-debug-3.9.25-2.el9_7.x86_64.rpm�Epython3-test-3.9.25-2.el9_7.i686.rpm�Epython3-idle-3.9.25-2.el9_7.i686.rpm�Epython3-debug-3.9.25-2.el9_7.i686.rpmP�Epython3-3.9.25-2.el9_7.i686.rpm�ʥ�u�S	��uBBBBsecurityImportant: kernel security update��*�9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627
�libperf-5.14.0-503.31.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm�libperf-5.14.0-503.31.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm�����T	��{securityImportant: .NET 9.0 security, bug fix, and enhancement update��c�|https://access.redhat.com/errata/RHSA-2025:2668RHSA-2025:2668RHSA-2025:2668https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2668.htmlALSA-2025:2668ALSA-2025:2668
�i�/dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpm�i�/dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpm����Y�U	��}securityImportant: .NET 8.0 security, bug fix, and enhancement update��_�}https://access.redhat.com/errata/RHSA-2025:2669RHSA-2025:2669RHSA-2025:2669https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2669.htmlALSA-2025:2669ALSA-2025:2669
��'dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpm��'dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpm����P�V	��QB�nBBBBBBBBBsecurityLow: python3.12 security update�^��\�Xhttps://access.redhat.com/errata/RHSA-2025:3631RHSA-2025:3631RHSA-2025:3631https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3631.htmlALSA-2025:3631ALSA-2025:3631
��0python3.12-3.12.5-2.el9_5.3.i686.rpm$�0python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm#�0python3.12-debug-3.12.5-2.el9_5.3.i686.rpm��0python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm%�0python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm$�0python3.12-idle-3.12.5-2.el9_5.3.i686.rpm#�0python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm%�0python3.12-test-3.12.5-2.el9_5.3.i686.rpm��0python3.12-3.12.5-2.el9_5.3.i686.rpm$�0python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm#�0python3.12-debug-3.12.5-2.el9_5.3.i686.rpm��0python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm%�0python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm$�0python3.12-idle-3.12.5-2.el9_5.3.i686.rpm#�0python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm%�0python3.12-test-3.12.5-2.el9_5.3.i686.rpm����;�W	��TB�vBBBBBBBBBsecurityLow: python3.11 security update�^��4�Xhttps://access.redhat.com/errata/RHSA-2025:3634RHSA-2025:3634RHSA-2025:3634https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3634.htmlALSA-2025:3634ALSA-2025:3634
�%python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm�%python3.11-debug-3.11.9-7.el9_5.3.i686.rpm�%python3.11-test-3.11.9-7.el9_5.3.i686.rpm�%python3.11-idle-3.11.9-7.el9_5.3.i686.rpmd�%python3.11-3.11.9-7.el9_5.3.i686.rpm�%python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm�%python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpme�%python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpm�%python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm�%python3.11-debug-3.11.9-7.el9_5.3.i686.rpm�%python3.11-test-3.11.9-7.el9_5.3.i686.rpm�%python3.11-idle-3.11.9-7.el9_5.3.i686.rpmd�%python3.11-3.11.9-7.el9_5.3.i686.rpm�%python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm�%python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpme�%python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpm����C�X	��UBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:3845RHSA-2025:3845RHSA-2025:3845https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3845.htmlALSA-2025:3845ALSA-2025:3845

�_java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�	_java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�
_java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm
�_java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�	_java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm�_java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm�
_java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm����T�Y	��iBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:3852RHSA-2025:3852RHSA-2025:3852https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3852.htmlALSA-2025:3852ALSA-2025:3852
n5java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmk5java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpms5java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmv5java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmw5java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmp5java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmx5java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmo5java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmq5java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmr5java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpml5java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmu5java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmm5java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmt5java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmn5java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmk5java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpms5java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmv5java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmw5java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmp5java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmx5java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmo5java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmq5java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmr5java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpml5java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmu5java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmm5java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmt5java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm���"�Z	��EBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:3855RHSA-2025:3855RHSA-2025:3855https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3855.htmlALSA-2025:3855ALSA-2025:3855
�qGjava-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�rGjava-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�iGjava-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�lGjava-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�oGjava-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�nGjava-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�gGjava-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�sGjava-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�jGjava-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�kGjava-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�pGjava-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�mGjava-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�tGjava-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�hGjava-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�qGjava-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�rGjava-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�iGjava-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�lGjava-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�oGjava-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�nGjava-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�gGjava-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�sGjava-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�jGjava-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�kGjava-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�pGjava-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�mGjava-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�tGjava-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm�hGjava-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm����[	��aBBBBsecurityModerate: kernel security update
���https://access.redhat.com/errata/RHSA-2025:3937RHSA-2025:3937RHSA-2025:3937https://access.redhat.com/security/cve/CVE-2024-53150CVE-2024-53150CVE-2024-53150https://bugzilla.redhat.com/23339712333971https://errata.almalinux.org/9/ALSA-2025-3937.htmlALSA-2025:3937ALSA-2025:3937
�kernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpm�libperf-5.14.0-503.38.1.el9_5.x86_64.rpm�kernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpm�kernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpm�libperf-5.14.0-503.38.1.el9_5.x86_64.rpm����X�\	��gBBBBBBBBBBBBsecurityModerate: glibc security update
��#�;https://access.redhat.com/errata/RHSA-2025:4244RHSA-2025:4244RHSA-2025:4244https://access.redhat.com/security/cve/CVE-2025-0395CVE-2025-0395CVE-2025-0395https://bugzilla.redhat.com/23394602339460https://errata.almalinux.org/9/ALSA-2025-4244.htmlALSA-2025:4244ALSA-2025:4244
	�T{glibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpm�j{glibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpm�X{nss_db-2.34-125.el9_5.8.alma.1.i686.rpm�U{glibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpm�U{glibc-static-2.34-125.el9_5.8.alma.1.i686.rpm�Y{nss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpm�T{glibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm�X{nss_db-2.34-125.el9_5.8.alma.1.x86_64.rpm�Y{nss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm	�T{glibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpm�j{glibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpm�X{nss_db-2.34-125.el9_5.8.alma.1.i686.rpm�U{glibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpm�U{glibc-static-2.34-125.el9_5.8.alma.1.i686.rpm�Y{nss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpm�T{glibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm�X{nss_db-2.34-125.el9_5.8.alma.1.x86_64.rpm�Y{nss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm����?�]	��usecurityModerate: 389-ds-base security update
��^�zhttps://access.redhat.com/errata/RHSA-2025:4491RHSA-2025:4491RHSA-2025:4491https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-4491.htmlALSA-2025:4491ALSA-2025:4491
��m389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpm��m389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpm���i�^	��]�Y�CBBBBBBBBBsecurityModerate: python3.9 security update
��X�[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:6977
�Bpython3-idle-3.9.21-2.el9.i686.rpm�Bpython3-debug-3.9.21-2.el9.x86_64.rpm�Bpython3-idle-3.9.21-2.el9.x86_64.rpm�Bpython3-test-3.9.21-2.el9.x86_64.rpmQ�Bpython3-tkinter-3.9.21-2.el9.i686.rpm�Bpython3-test-3.9.21-2.el9.i686.rpmP�Bpython3-3.9.21-2.el9.i686.rpm�Bpython3-debug-3.9.21-2.el9.i686.rpm�Bpython3-idle-3.9.21-2.el9.i686.rpm�Bpython3-debug-3.9.21-2.el9.x86_64.rpm�Bpython3-idle-3.9.21-2.el9.x86_64.rpm�Bpython3-test-3.9.21-2.el9.x86_64.rpmQ�Bpython3-tkinter-3.9.21-2.el9.i686.rpm�Bpython3-test-3.9.21-2.el9.i686.rpmP�Bpython3-3.9.21-2.el9.i686.rpm�Bpython3-debug-3.9.21-2.el9.i686.rpm�Ô�t�_	�!�_B�cBBBBBBBBBsecurityModerate: python3.12 security update
��3�[https://access.redhat.com/errata/RHSA-2025:7107RHSA-2025:7107RHSA-2025:7107https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7107.htmlALSA-2025:7107ALSA-2025:7107
#�1python3.12-debug-3.12.9-1.el9.i686.rpm��1python3.12-tkinter-3.12.9-1.el9.i686.rpm$�1python3.12-idle-3.12.9-1.el9.i686.rpm%�1python3.12-test-3.12.9-1.el9.x86_64.rpm��1python3.12-3.12.9-1.el9.i686.rpm#�1python3.12-debug-3.12.9-1.el9.x86_64.rpm$�1python3.12-idle-3.12.9-1.el9.x86_64.rpm%�1python3.12-test-3.12.9-1.el9.i686.rpm#�1python3.12-debug-3.12.9-1.el9.i686.rpm��1python3.12-tkinter-3.12.9-1.el9.i686.rpm$�1python3.12-idle-3.12.9-1.el9.i686.rpm%�1python3.12-test-3.12.9-1.el9.x86_64.rpm��1python3.12-3.12.9-1.el9.i686.rpm#�1python3.12-debug-3.12.9-1.el9.x86_64.rpm$�1python3.12-idle-3.12.9-1.el9.x86_64.rpm%�1python3.12-test-3.12.9-1.el9.i686.rpm��!�`	�$�bB�kBBBBBBBBBsecurityModerate: python3.11 security update
���[https://access.redhat.com/errata/RHSA-2025:7109RHSA-2025:7109RHSA-2025:7109https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7109.htmlALSA-2025:7109ALSA-2025:7109
�python3.11-idle-3.11.11-2.el9.i686.rpm�python3.11-test-3.11.11-2.el9.i686.rpme�python3.11-tkinter-3.11.11-2.el9.i686.rpm�python3.11-idle-3.11.11-2.el9.x86_64.rpm�python3.11-debug-3.11.11-2.el9.i686.rpm�python3.11-test-3.11.11-2.el9.x86_64.rpmd�python3.11-3.11.11-2.el9.i686.rpm�python3.11-debug-3.11.11-2.el9.x86_64.rpm�python3.11-idle-3.11.11-2.el9.i686.rpm�python3.11-test-3.11.11-2.el9.i686.rpme�python3.11-tkinter-3.11.11-2.el9.i686.rpm�python3.11-idle-3.11.11-2.el9.x86_64.rpm�python3.11-debug-3.11.11-2.el9.i686.rpm�python3.11-test-3.11.11-2.el9.x86_64.rpmd�python3.11-3.11.11-2.el9.i686.rpm�python3.11-debug-3.11.11-2.el9.x86_64.rpm�Ô�P�a	�%�XBBBBBBBsecurityModerate: protobuf security update
��i�:https://access.redhat.com/errata/RHSA-2025:7138RHSA-2025:7138RHSA-2025:7138https://access.redhat.com/security/cve/CVE-2022-1941CVE-2022-1941CVE-2022-1941https://bugzilla.redhat.com/22914702291470https://errata.almalinux.org/9/ALSA-2025-7138.htmlALSA-2025:7138ALSA-2025:7138
�I�protobuf-lite-devel-3.14.0-16.el9.x86_64.rpm�G�protobuf-compiler-3.14.0-16.el9.i686.rpm�H�protobuf-devel-3.14.0-16.el9.i686.rpm�H�protobuf-devel-3.14.0-16.el9.x86_64.rpm�G�protobuf-compiler-3.14.0-16.el9.x86_64.rpm�I�protobuf-lite-devel-3.14.0-16.el9.i686.rpm�I�protobuf-lite-devel-3.14.0-16.el9.x86_64.rpm�G�protobuf-compiler-3.14.0-16.el9.i686.rpm�H�protobuf-devel-3.14.0-16.el9.i686.rpm�H�protobuf-devel-3.14.0-16.el9.x86_64.rpm�G�protobuf-compiler-3.14.0-16.el9.x86_64.rpm�I�protobuf-lite-devel-3.14.0-16.el9.i686.rpm�Ô�C�b	�&�aBBsecurityModerate: xorg-x11-server security update
��#�shttps://access.redhat.com/errata/RHSA-2025:7163RHSA-2025:7163RHSA-2025:7163https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7163.htmlALSA-2025:7163ALSA-2025:7163
�\�xorg-x11-server-source-1.20.11-28.el9_6.noarch.rpmf�xorg-x11-server-devel-1.20.11-28.el9_6.i686.rpmf�xorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpm�\�xorg-x11-server-source-1.20.11-28.el9_6.noarch.rpmf�xorg-x11-server-devel-1.20.11-28.el9_6.i686.rpmf�xorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpm�Ô�-�c	�(�g�BBsecurityModerate: xorg-x11-server-Xwayland security update
���https://access.redhat.com/errata/RHSA-2025:7165RHSA-2025:7165RHSA-2025:7165https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7165.htmlALSA-2025:7165ALSA-2025:7165
�w�ixorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpm�^�ixorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm�w�ixorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm�w�ixorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpm�^�ixorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm�w�ixorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm���d	�)�iBsecurityModerate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update
���shttps://access.redhat.com/errata/RHSA-2025:7178RHSA-2025:7178RHSA-2025:7178https://access.redhat.com/security/cve/CVE-2024-0444CVE-2024-0444CVE-2024-0444https://access.redhat.com/security/cve/CVE-2024-4453CVE-2024-4453CVE-2024-4453https://bugzilla.redhat.com/22829992282999https://bugzilla.redhat.com/22923352292335https://errata.almalinux.org/9/ALSA-2025-7178.htmlALSA-2025:7178ALSA-2025:7178
�v�Cgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm�v�Cgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpm�v�Cgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm�v�Cgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpm�Ô�/�e	�*�lsecurityModerate: corosync security update
��
�$https://access.redhat.com/errata/RHSA-2025:7201RHSA-2025:7201RHSA-2025:7201https://access.redhat.com/security/cve/CVE-2025-30472CVE-2025-30472CVE-2025-30472https://bugzilla.redhat.com/23542292354229https://errata.almalinux.org/9/ALSA-2025-7201.htmlALSA-2025:7201ALSA-2025:7201
�-�ucorosync-vqsim-3.1.9-2.el9_6.x86_64.rpm�-�ucorosync-vqsim-3.1.9-2.el9_6.x86_64.rpm�Ô�:�f	�+�nBBBBsecurityModerate: openjpeg2 security update
��1�Xhttps://access.redhat.com/errata/RHSA-2025:7309RHSA-2025:7309RHSA-2025:7309https://access.redhat.com/security/cve/CVE-2024-56826CVE-2024-56826CVE-2024-56826https://access.redhat.com/security/cve/CVE-2024-56827CVE-2024-56827CVE-2024-56827https://bugzilla.redhat.com/23351722335172https://bugzilla.redhat.com/23351742335174https://errata.almalinux.org/9/ALSA-2025-7309.htmlALSA-2025:7309ALSA-2025:7309
�|�Qopenjpeg2-tools-2.4.0-8.el9.i686.rpm�{�Qopenjpeg2-devel-2.4.0-8.el9.x86_64.rpm�{�Qopenjpeg2-devel-2.4.0-8.el9.i686.rpm�|�Qopenjpeg2-tools-2.4.0-8.el9.x86_64.rpm�|�Qopenjpeg2-tools-2.4.0-8.el9.i686.rpm�{�Qopenjpeg2-devel-2.4.0-8.el9.x86_64.rpm�{�Qopenjpeg2-devel-2.4.0-8.el9.i686.rpm�|�Qopenjpeg2-tools-2.4.0-8.el9.x86_64.rpm�Ô�<�g	�5�4securityModerate: perl-Module-ScanDeps security update
��	�https://access.redhat.com/errata/RHSA-2025:7350RHSA-2025:7350RHSA-2025:7350https://access.redhat.com/security/cve/CVE-2024-10224CVE-2024-10224CVE-2024-10224https://bugzilla.redhat.com/23273292327329https://errata.almalinux.org/9/ALSA-2025-7350.htmlALSA-2025:7350ALSA-2025:7350
�:�perl-Module-ScanDeps-1.30-6.el9.noarch.rpm�:�perl-Module-ScanDeps-1.30-6.el9.noarch.rpm�Ô�K�h	�,�vsecurityModerate: 389-ds-base security update
��
�zhttps://access.redhat.com/errata/RHSA-2025:7395RHSA-2025:7395RHSA-2025:7395https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-7395.htmlALSA-2025:7395ALSA-2025:7395
��n389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm��n389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm�����i	�-�xsecurityModerate: nginx security update
���Ghttps://access.redhat.com/errata/RHSA-2025:7402RHSA-2025:7402RHSA-2025:7402https://access.redhat.com/security/cve/CVE-2022-41741CVE-2022-41741CVE-2022-41741https://access.redhat.com/security/cve/CVE-2022-41742CVE-2022-41742CVE-2022-41742https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://bugzilla.redhat.com/21414952141495https://bugzilla.redhat.com/21414962141496https://errata.almalinux.org/9/ALSA-2025-7402.htmlALSA-2025:7402ALSA-2025:7402
�\�qnginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm�\�qnginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm����^�j	�1�nBB�KBBBBsecurityModerate: ghostscript security update
��N�hhttps://access.redhat.com/errata/RHSA-2025:7422RHSA-2025:7422RHSA-2025:7422https://access.redhat.com/security/cve/CVE-2023-46751CVE-2023-46751CVE-2023-46751https://access.redhat.com/security/cve/CVE-2024-46951CVE-2024-46951CVE-2024-46951https://access.redhat.com/security/cve/CVE-2024-46952CVE-2024-46952CVE-2024-46952https://access.redhat.com/security/cve/CVE-2024-46953CVE-2024-46953CVE-2024-46953https://access.redhat.com/security/cve/CVE-2024-46954CVE-2024-46954CVE-2024-46954https://access.redhat.com/security/cve/CVE-2024-46956CVE-2024-46956CVE-2024-46956https://bugzilla.redhat.com/22533652253365https://bugzilla.redhat.com/23250412325041https://bugzilla.redhat.com/23250432325043https://bugzilla.redhat.com/23250442325044https://bugzilla.redhat.com/23250452325045https://bugzilla.redhat.com/23250472325047https://errata.almalinux.org/9/ALSA-2025-7422.htmlALSA-2025:7422ALSA-2025:7422
�*�ghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpmi�libgs-devel-9.54.0-18.el9_6.i686.rpmi�libgs-devel-9.54.0-18.el9_6.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm�)�ghostscript-9.54.0-18.el9_6.i686.rpm�*�ghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpmi�libgs-devel-9.54.0-18.el9_6.i686.rpmi�libgs-devel-9.54.0-18.el9_6.x86_64.rpm�+�ghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm�)�ghostscript-9.54.0-18.el9_6.i686.rpm����^�k	�2�@BBBBsecurityImportant: kernel security update��6�@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423
�libperf-5.14.0-570.16.1.el9_6.x86_64.rpm�kernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpm�libperf-5.14.0-570.16.1.el9_6.x86_64.rpm�kernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpm��ɐ#�l	�3�FBsecurityImportant: yelp security update��v�dhttps://access.redhat.com/errata/RHSA-2025:7430RHSA-2025:7430RHSA-2025:7430https://access.redhat.com/security/cve/CVE-2025-3155CVE-2025-3155CVE-2025-3155https://bugzilla.redhat.com/23570912357091https://errata.almalinux.org/9/ALSA-2025-7430.htmlALSA-2025:7430ALSA-2025:7430
�(�myelp-devel-40.3-2.el9_6.1.x86_64.rpm�(�myelp-devel-40.3-2.el9_6.1.i686.rpm�(�myelp-devel-40.3-2.el9_6.1.x86_64.rpm�(�myelp-devel-40.3-2.el9_6.1.i686.rpm����5�m	�4�IBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: avahi security update
��Z�*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437
�A&avahi-devel-0.8-22.el9_6.x86_64.rpm�=&avahi-compat-howl-0.8-22.el9_6.i686.rpm�B&avahi-glib-devel-0.8-22.el9_6.i686.rpm�?&avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm�@&avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpm�&avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm�?&avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpm�&avahi-gobject-devel-0.8-22.el9_6.i686.rpm�=&avahi-compat-howl-0.8-22.el9_6.x86_64.rpm�&avahi-gobject-0.8-22.el9_6.i686.rpm�@&avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm�B&avahi-glib-devel-0.8-22.el9_6.x86_64.rpm�>&avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpm�&avahi-gobject-0.8-22.el9_6.x86_64.rpm�A&avahi-devel-0.8-22.el9_6.i686.rpm�>&avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm�A&avahi-devel-0.8-22.el9_6.x86_64.rpm�=&avahi-compat-howl-0.8-22.el9_6.i686.rpm�B&avahi-glib-devel-0.8-22.el9_6.i686.rpm�?&avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm�@&avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpm�&avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm�?&avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpm�&avahi-gobject-devel-0.8-22.el9_6.i686.rpm�=&avahi-compat-howl-0.8-22.el9_6.x86_64.rpm�&avahi-gobject-0.8-22.el9_6.i686.rpm�@&avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm�B&avahi-glib-devel-0.8-22.el9_6.x86_64.rpm�>&avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpm�&avahi-gobject-0.8-22.el9_6.x86_64.rpm�A&avahi-devel-0.8-22.el9_6.i686.rpm�>&avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm����~�n	�8�uBB�kBBBBsecurityModerate: ghostscript security update
���fhttps://access.redhat.com/errata/RHSA-2025:7586RHSA-2025:7586RHSA-2025:7586https://access.redhat.com/security/cve/CVE-2025-27832CVE-2025-27832CVE-2025-27832https://bugzilla.redhat.com/23549492354949https://errata.almalinux.org/9/ALSA-2025-7586.htmlALSA-2025:7586ALSA-2025:7586
�+�ghostscript-tools-printing-9.54.0-19.el9_6.i686.rpmi�libgs-devel-9.54.0-19.el9_6.x86_64.rpm�*�ghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm�)�ghostscript-9.54.0-19.el9_6.i686.rpmi�libgs-devel-9.54.0-19.el9_6.i686.rpm�+�ghostscript-tools-printing-9.54.0-19.el9_6.i686.rpmi�libgs-devel-9.54.0-19.el9_6.x86_64.rpm�*�ghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm�)�ghostscript-9.54.0-19.el9_6.i686.rpmi�libgs-devel-9.54.0-19.el9_6.i686.rpm��v�o	�9�gsecurityImportant: .NET 8.0 security update��j�Ghttps://access.redhat.com/errata/RHSA-2025:7598RHSA-2025:7598RHSA-2025:7598https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7598.htmlALSA-2025:7598ALSA-2025:7598
��(dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpm��(dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpm����H�p	�:�isecurityImportant: .NET 9.0 security update��1�Fhttps://access.redhat.com/errata/RHSA-2025:7600RHSA-2025:7600RHSA-2025:7600https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7600.htmlALSA-2025:7600ALSA-2025:7600
�i�0dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpm�i�0dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpm��;�q	�;�kBBBBsecurityImportant: kernel security update��w�9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903
�kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm�libperf-5.14.0-570.17.1.el9_6.x86_64.rpm�kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm�libperf-5.14.0-570.17.1.el9_6.x86_64.rpm����V�r	�<�qBBBBsecurityModerate: kernel security update
��0�
https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142
�libperf-5.14.0-570.18.1.el9_6.x86_64.rpm�kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpm�libperf-5.14.0-570.18.1.el9_6.x86_64.rpm�kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpm��ܣf�s	�=�wBsecurityImportant: gstreamer1-plugins-bad-free security update��=�https://access.redhat.com/errata/RHSA-2025:8183RHSA-2025:8183RHSA-2025:8183https://access.redhat.com/security/cve/CVE-2025-3887CVE-2025-3887CVE-2025-3887https://bugzilla.redhat.com/23679192367919https://errata.almalinux.org/9/ALSA-2025-8183.htmlALSA-2025:8183ALSA-2025:8183
�v�Dgstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm�v�Dgstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm�v�Dgstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm�v�Dgstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm�����t	�>�zBBBBsecurityModerate: kernel security update
��K�Whttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333
�kernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm�libperf-5.14.0-570.19.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpm�kernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm�libperf-5.14.0-570.19.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpm��H�u	�?�@BsecurityImportant: varnish security update��"�Zhttps://access.redhat.com/errata/RHSA-2025:8337RHSA-2025:8337RHSA-2025:8337https://access.redhat.com/security/cve/CVE-2025-47905CVE-2025-47905CVE-2025-47905https://bugzilla.redhat.com/23642352364235https://errata.almalinux.org/9/ALSA-2025-8337.htmlALSA-2025:8337ALSA-2025:8337
�'�varnish-devel-6.6.2-6.el9_6.1.i686.rpm�'�varnish-devel-6.6.2-6.el9_6.1.x86_64.rpm�'�varnish-devel-6.6.2-6.el9_6.1.i686.rpm�'�varnish-devel-6.6.2-6.el9_6.1.x86_64.rpm����[�v	��CBBBBsecurityImportant: kernel security update��|�https://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643
�kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm�libperf-5.14.0-570.21.1.el9_6.x86_64.rpm�kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm�kernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm�libperf-5.14.0-570.21.1.el9_6.x86_64.rpm�«�]�w	��IBBBBBBBBBBBBsecurityModerate: glibc security update
���Nhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655
	�X|nss_db-2.34-168.el9_6.19.i686.rpm�Y|nss_hesiod-2.34-168.el9_6.19.i686.rpm�j|glibc-benchtests-2.34-168.el9_6.19.x86_64.rpm�U|glibc-static-2.34-168.el9_6.19.x86_64.rpm�T|glibc-nss-devel-2.34-168.el9_6.19.i686.rpm�U|glibc-static-2.34-168.el9_6.19.i686.rpm�Y|nss_hesiod-2.34-168.el9_6.19.x86_64.rpm�X|nss_db-2.34-168.el9_6.19.x86_64.rpm�T|glibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm	�X|nss_db-2.34-168.el9_6.19.i686.rpm�Y|nss_hesiod-2.34-168.el9_6.19.i686.rpm�j|glibc-benchtests-2.34-168.el9_6.19.x86_64.rpm�U|glibc-static-2.34-168.el9_6.19.x86_64.rpm�T|glibc-nss-devel-2.34-168.el9_6.19.i686.rpm�U|glibc-static-2.34-168.el9_6.19.i686.rpm�Y|nss_hesiod-2.34-168.el9_6.19.x86_64.rpm�X|nss_db-2.34-168.el9_6.19.x86_64.rpm�T|glibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm�Ÿ� �x	��WsecurityImportant: .NET 8.0 security update��R�8https://access.redhat.com/errata/RHSA-2025:8813RHSA-2025:8813RHSA-2025:8813https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8813.htmlALSA-2025:8813ALSA-2025:8813
��)dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm��)dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm�°�q�y	��YsecurityImportant: .NET 9.0 security update��
�7https://access.redhat.com/errata/RHSA-2025:8817RHSA-2025:8817RHSA-2025:8817https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8817.htmlALSA-2025:8817ALSA-2025:8817
�i�1dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpm�i�1dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpm�ª�B�z	��[BBBBsecurityImportant: kernel security update��A�ihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080
� kernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpm� kernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpm� libperf-5.14.0-570.22.1.el9_6.x86_64.rpm� kernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpm� kernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpm� libperf-5.14.0-570.22.1.el9_6.x86_64.rpm���{	�"�!securityImportant: apache-commons-beanutils security update��*�ihttps://access.redhat.com/errata/RHSA-2025:9114RHSA-2025:9114RHSA-2025:9114https://access.redhat.com/security/cve/CVE-2025-48734CVE-2025-48734CVE-2025-48734https://bugzilla.redhat.com/23689562368956https://errata.almalinux.org/9/ALSA-2025-9114.htmlALSA-2025:9114ALSA-2025:9114
�&�apache-commons-beanutils-1.9.4-10.el9_6.noarch.rpm�&�apache-commons-beanutils-1.9.4-10.el9_6.noarch.rpm��3�|	��cBsecurityImportant: libvpx security update���8https://access.redhat.com/errata/RHSA-2025:9118RHSA-2025:9118RHSA-2025:9118https://access.redhat.com/security/cve/CVE-2025-5283CVE-2025-5283CVE-2025-5283https://bugzilla.redhat.com/23687492368749https://errata.almalinux.org/9/ALSA-2025-9118.htmlALSA-2025:9118ALSA-2025:9118
��Rlibvpx-devel-1.9.0-9.el9_6.x86_64.rpm��Rlibvpx-devel-1.9.0-9.el9_6.i686.rpm��Rlibvpx-devel-1.9.0-9.el9_6.x86_64.rpm��Rlibvpx-devel-1.9.0-9.el9_6.i686.rpm��@�}	��&securityImportant: ipa security update��K�ghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184
��python3-ipatests-4.12.2-14.el9_6.1.noarch.rpm��python3-ipatests-4.12.2-14.el9_6.1.noarch.rpm��E�~	��gBBBBsecurityModerate: kernel security update
��2�https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302
�!libperf-5.14.0-570.23.1.el9_6.x86_64.rpm�!kernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpm�!kernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpm�!libperf-5.14.0-570.23.1.el9_6.x86_64.rpm�!kernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpm�!kernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpm��;�	�	�H�fBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security update��L�zhttps://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303
�w�jxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm�w�jxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpmf�xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpm�\�xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpm�^�jxorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpmf�xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm�w�jxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm�w�jxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpmf�xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpm�\�xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpm�^�jxorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpmf�xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm���	�7�usecurityImportant: perl-YAML-LibYAML security update��F�nhttps://access.redhat.com/errata/RHSA-2025:9330RHSA-2025:9330RHSA-2025:9330https://access.redhat.com/security/cve/CVE-2025-40908CVE-2025-40908CVE-2025-40908https://bugzilla.redhat.com/23696302369630https://errata.almalinux.org/9/ALSA-2025-9330.htmlALSA-2025:9330ALSA-2025:9330
��eperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpm��eperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpm��y�	�
�xBsecurityModerate: qt5-qtbase security update
��4�.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462
�&�yqt5-qtbase-static-5.15.9-11.el9_6.i686.rpm�&�yqt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm�&�yqt5-qtbase-static-5.15.9-11.el9_6.i686.rpm�&�yqt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm���	�<�;securityImportant: perl-File-Find-Rule security update��b�4https://access.redhat.com/errata/RHSA-2025:9517RHSA-2025:9517RHSA-2025:9517https://access.redhat.com/security/cve/CVE-2011-10007CVE-2011-10007CVE-2011-10007https://bugzilla.redhat.com/23704242370424https://errata.almalinux.org/9/ALSA-2025-9517.htmlALSA-2025:9517ALSA-2025:9517
�9�perl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpm�9�perl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpm���	��}BBBBBBBBBBBBsecurityModerate: glibc security update
���2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877
	�j}glibc-benchtests-2.34-168.el9_6.20.x86_64.rpm�U}glibc-static-2.34-168.el9_6.20.x86_64.rpm�X}nss_db-2.34-168.el9_6.20.x86_64.rpm�U}glibc-static-2.34-168.el9_6.20.i686.rpm�X}nss_db-2.34-168.el9_6.20.i686.rpm�Y}nss_hesiod-2.34-168.el9_6.20.i686.rpm�T}glibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm�T}glibc-nss-devel-2.34-168.el9_6.20.i686.rpm�Y}nss_hesiod-2.34-168.el9_6.20.x86_64.rpm	�j}glibc-benchtests-2.34-168.el9_6.20.x86_64.rpm�U}glibc-static-2.34-168.el9_6.20.x86_64.rpm�X}nss_db-2.34-168.el9_6.20.x86_64.rpm�U}glibc-static-2.34-168.el9_6.20.i686.rpm�X}nss_db-2.34-168.el9_6.20.i686.rpm�Y}nss_hesiod-2.34-168.el9_6.20.i686.rpm�T}glibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm�T}glibc-nss-devel-2.34-168.el9_6.20.i686.rpm�Y}nss_hesiod-2.34-168.el9_6.20.x86_64.rpm��t�	��KBBBBsecurityModerate: kernel security update
��H�	https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880
�"libperf-5.14.0-570.24.1.el9_6.x86_64.rpm�"kernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpm�"kernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpm�"libperf-5.14.0-570.24.1.el9_6.x86_64.rpm�"kernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpm�"kernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpm�Ó�b�	�
�QBBBBBBBBBBBsecurityModerate: poppler security update
��Q�xhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126
	�!�poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm�!�poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm�[�poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm�$�poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm�"�poppler-devel-21.01.0-23.el9_7.x86_64.rpm�$�poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm�"�poppler-devel-21.01.0-23.el9_7.i686.rpm�#�poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm�#�poppler-glib-devel-21.01.0-23.el9_7.i686.rpm	�!�poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm�!�poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm�[�poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm�$�poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm�"�poppler-devel-21.01.0-23.el9_7.x86_64.rpm�$�poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm�"�poppler-devel-21.01.0-23.el9_7.i686.rpm�#�poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm�#�poppler-glib-devel-21.01.0-23.el9_7.i686.rpm���q�	��^BBBBsecurityImportant: mariadb security update��I�8https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137
�T�mariadb-devel-10.5.29-3.el9_7.x86_64.rpm�U�mariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm�V�mariadb-test-10.5.29-3.el9_7.x86_64.rpm�T�mariadb-devel-10.5.29-3.el9_7.x86_64.rpm�U�mariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm�V�mariadb-test-10.5.29-3.el9_7.x86_64.rpm����	��dBBBBsecurityModerate: kernel security update
���0
https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445
�9libperf-5.14.0-611.20.1.el9_7.x86_64.rpm�9kernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpm�9kernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm�9libperf-5.14.0-611.20.1.el9_7.x86_64.rpm�9kernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpm�9kernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm�˩�F�	��jBBBBBBBBBBBsecurityModerate: postgresql security update
��1�[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491
��Ppostgresql-docs-13.23-1.el9_7.x86_64.rpm��Ppostgresql-test-13.23-1.el9_7.x86_64.rpm�
�Ppostgresql-static-13.23-1.el9_7.x86_64.rpm�	�Ppostgresql-server-devel-13.23-1.el9_7.x86_64.rpm�F�Ppostgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpm��Ppostgresql-private-devel-13.23-1.el9_7.x86_64.rpm��Ppostgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpm��Ppostgresql-docs-13.23-1.el9_7.x86_64.rpm��Ppostgresql-test-13.23-1.el9_7.x86_64.rpm�
�Ppostgresql-static-13.23-1.el9_7.x86_64.rpm�	�Ppostgresql-server-devel-13.23-1.el9_7.x86_64.rpm�F�Ppostgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpm��Ppostgresql-private-devel-13.23-1.el9_7.x86_64.rpm��Ppostgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpm�˩�W�		�9�wsecurityModerate: transfig security update
���Phttps://access.redhat.com/errata/RHSA-2026:0700RHSA-2026:0700RHSA-2026:0700https://access.redhat.com/security/cve/CVE-2025-46397CVE-2025-46397CVE-2025-46397https://bugzilla.redhat.com/23620582362058https://errata.almalinux.org/9/ALSA-2026-0700.htmlALSA-2026:0700ALSA-2026:0700
��gtransfig-3.2.7b-11.el9_7.x86_64.rpm��gtransfig-3.2.7b-11.el9_7.x86_64.rpm�˩�Q�
	�<�zsecurityImportant: jmc security update��\�"https://access.redhat.com/errata/RHSA-2026:0752RHSA-2026:0752RHSA-2026:0752https://access.redhat.com/security/cve/CVE-2025-66566CVE-2025-66566CVE-2025-66566https://bugzilla.redhat.com/24195002419500https://errata.almalinux.org/9/ALSA-2026-0752.htmlALSA-2026:0752ALSA-2026:0752
�e�-jmc-8.2.0-18.el9_7.2.x86_64.rpm�e�-jmc-8.2.0-18.el9_7.2.x86_64.rpm�˽��	��}BBBBsecurityImportant: kernel security update��~�+https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793
�:libperf-5.14.0-611.24.1.el9_7.x86_64.rpm�:kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm�:kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpm�:libperf-5.14.0-611.24.1.el9_7.x86_64.rpm�:kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm�:kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpm����t�	��CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update��)�dhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927
o8java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms8java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn8java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmk8java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmu8java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmv8java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmm8java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq8java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt8java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpml8java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmw8java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmr8java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmx8java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp8java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmo8java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms8java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn8java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmk8java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmu8java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmv8java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmm8java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq8java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt8java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpml8java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmw8java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmr8java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmx8java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp8java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm����2�
	��_BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��
�)https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928
�m@java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�n@java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�t@java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�o@java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�p@java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�h@java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�g@java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�s@java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�l@java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�j@java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�r@java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�q@java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�i@java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�k@java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�m@java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�n@java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�t@java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�o@java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�p@java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�h@java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�g@java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�s@java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�l@java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�j@java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�r@java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�q@java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�i@java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm�k@java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm����&�	��{BBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update��6�whttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932

�bjava-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�
bjava-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�	bjava-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm
�bjava-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�
bjava-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�	bjava-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm�bjava-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm����	��OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update��-�fhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933
�:!java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�;!java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�6!java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�=!java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�9!java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�A!java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�B!java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�@!java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�8!java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�5!java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�D!java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�>!java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�C!java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�7!java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�?!java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�<!java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�:!java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�;!java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�6!java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�=!java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�9!java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�A!java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�B!java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�@!java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�8!java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�5!java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�D!java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�>!java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�C!java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�7!java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�?!java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm�<!java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm����	��oBsecurityModerate: glib2 security update
���https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936
�u�bglib2-static-2.68.4-18.el9_7.1.i686.rpm�u�bglib2-static-2.68.4-18.el9_7.1.x86_64.rpm�u�bglib2-static-2.68.4-18.el9_7.1.i686.rpm�u�bglib2-static-2.68.4-18.el9_7.1.x86_64.rpm����e�	��WB�[BBBBBBBBBsecurityImportant: python3.12 security update��0�ihttps://access.redhat.com/errata/RHSA-2026:10745RHSA-2026:10745RHSA-2026:10745https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10745.htmlALSA-2026:10745ALSA-2026:10745
$�,python3.12-idle-3.12.12-4.el9_7.3.i686.rpm#�,python3.12-debug-3.12.12-4.el9_7.3.x86_64.rpm#�,python3.12-debug-3.12.12-4.el9_7.3.i686.rpm$�,python3.12-idle-3.12.12-4.el9_7.3.x86_64.rpm%�,python3.12-test-3.12.12-4.el9_7.3.x86_64.rpm%�,python3.12-test-3.12.12-4.el9_7.3.i686.rpm��,python3.12-tkinter-3.12.12-4.el9_7.3.i686.rpm��,python3.12-3.12.12-4.el9_7.3.i686.rpm$�,python3.12-idle-3.12.12-4.el9_7.3.i686.rpm#�,python3.12-debug-3.12.12-4.el9_7.3.x86_64.rpm#�,python3.12-debug-3.12.12-4.el9_7.3.i686.rpm$�,python3.12-idle-3.12.12-4.el9_7.3.x86_64.rpm%�,python3.12-test-3.12.12-4.el9_7.3.x86_64.rpm%�,python3.12-test-3.12.12-4.el9_7.3.i686.rpm��,python3.12-tkinter-3.12.12-4.el9_7.3.i686.rpm��,python3.12-3.12.12-4.el9_7.3.i686.rpm����b�	��ZB�cBBBBBBBBBsecurityImportant: python3.11 security update���ihttps://access.redhat.com/errata/RHSA-2026:10774RHSA-2026:10774RHSA-2026:10774https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10774.htmlALSA-2026:10774ALSA-2026:10774
�python3.11-debug-3.11.13-5.3.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.3.el9_7.i686.rpm�python3.11-test-3.11.13-5.3.el9_7.i686.rpmd�python3.11-3.11.13-5.3.el9_7.i686.rpm�python3.11-test-3.11.13-5.3.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.3.el9_7.x86_64.rpme�python3.11-tkinter-3.11.13-5.3.el9_7.i686.rpm�python3.11-debug-3.11.13-5.3.el9_7.i686.rpm�python3.11-debug-3.11.13-5.3.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.3.el9_7.i686.rpm�python3.11-test-3.11.13-5.3.el9_7.i686.rpmd�python3.11-3.11.13-5.3.el9_7.i686.rpm�python3.11-test-3.11.13-5.3.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.3.el9_7.x86_64.rpme�python3.11-tkinter-3.11.13-5.3.el9_7.i686.rpm�python3.11-debug-3.11.13-5.3.el9_7.i686.rpm����:�	��]�Z�SBBBBBBBBBsecurityImportant: python3.9 security update���ihttps://access.redhat.com/errata/RHSA-2026:10949RHSA-2026:10949RHSA-2026:10949https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10949.htmlALSA-2026:10949ALSA-2026:10949
Q�Ipython3-tkinter-3.9.25-3.el9_7.3.i686.rpm�Ipython3-test-3.9.25-3.el9_7.3.i686.rpm�Ipython3-idle-3.9.25-3.el9_7.3.i686.rpm�Ipython3-debug-3.9.25-3.el9_7.3.i686.rpm�Ipython3-debug-3.9.25-3.el9_7.3.x86_64.rpm�Ipython3-idle-3.9.25-3.el9_7.3.x86_64.rpm�Ipython3-test-3.9.25-3.el9_7.3.x86_64.rpmP�Ipython3-3.9.25-3.el9_7.3.i686.rpmQ�Ipython3-tkinter-3.9.25-3.el9_7.3.i686.rpm�Ipython3-test-3.9.25-3.el9_7.3.i686.rpm�Ipython3-idle-3.9.25-3.el9_7.3.i686.rpm�Ipython3-debug-3.9.25-3.el9_7.3.i686.rpm�Ipython3-debug-3.9.25-3.el9_7.3.x86_64.rpm�Ipython3-idle-3.9.25-3.el9_7.3.x86_64.rpm�Ipython3-test-3.9.25-3.el9_7.3.x86_64.rpmP�Ipython3-3.9.25-3.el9_7.3.i686.rpm����@�	��SBsecurityImportant: LibRaw security update��k�'https://access.redhat.com/errata/RHSA-2026:11360RHSA-2026:11360RHSA-2026:11360https://access.redhat.com/security/cve/CVE-2026-21413CVE-2026-21413CVE-2026-21413https://access.redhat.com/security/cve/CVE-2026-24450CVE-2026-24450CVE-2026-24450https://bugzilla.redhat.com/24559252455925https://bugzilla.redhat.com/24559292455929https://errata.almalinux.org/9/ALSA-2026-11360.htmlALSA-2026:11360ALSA-2026:11360
�<�1LibRaw-devel-0.21.1-2.el9_7.i686.rpm�<�1LibRaw-devel-0.21.1-2.el9_7.x86_64.rpm�<�1LibRaw-devel-0.21.1-2.el9_7.i686.rpm�<�1LibRaw-devel-0.21.1-2.el9_7.x86_64.rpm��Nj)�	�!�`�wBBsecurityImportant: xorg-x11-server-Xwayland security update���https://access.redhat.com/errata/RHSA-2026:11369RHSA-2026:11369RHSA-2026:11369https://access.redhat.com/security/cve/CVE-2026-33999CVE-2026-33999CVE-2026-33999https://access.redhat.com/security/cve/CVE-2026-34001CVE-2026-34001CVE-2026-34001https://access.redhat.com/security/cve/CVE-2026-34003CVE-2026-34003CVE-2026-34003https://bugzilla.redhat.com/24511062451106https://bugzilla.redhat.com/24511092451109https://bugzilla.redhat.com/24511132451113https://errata.almalinux.org/9/ALSA-2026-11369.htmlALSA-2026:11369ALSA-2026:11369
�w�lxorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.i686.rpm�w�lxorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.x86_64.rpm�^�lxorg-x11-server-Xwayland-23.2.7-6.el9_7.i686.rpm�w�lxorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.i686.rpm�w�lxorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.x86_64.rpm�^�lxorg-x11-server-Xwayland-23.2.7-6.el9_7.i686.rpm��NJG�	�"�ZBBsecurityImportant: xorg-x11-server security update��.�https://access.redhat.com/errata/RHSA-2026:11388RHSA-2026:11388RHSA-2026:11388https://access.redhat.com/security/cve/CVE-2026-33999CVE-2026-33999CVE-2026-33999https://access.redhat.com/security/cve/CVE-2026-34001CVE-2026-34001CVE-2026-34001https://access.redhat.com/security/cve/CVE-2026-34003CVE-2026-34003CVE-2026-34003https://bugzilla.redhat.com/24511062451106https://bugzilla.redhat.com/24511092451109https://bugzilla.redhat.com/24511132451113https://errata.almalinux.org/9/ALSA-2026-11388.htmlALSA-2026:11388ALSA-2026:11388
f�
xorg-x11-server-devel-1.20.11-33.el9_7.i686.rpm�\�
xorg-x11-server-source-1.20.11-33.el9_7.noarch.rpmf�
xorg-x11-server-devel-1.20.11-33.el9_7.x86_64.rpmf�
xorg-x11-server-devel-1.20.11-33.el9_7.i686.rpm�\�
xorg-x11-server-source-1.20.11-33.el9_7.noarch.rpmf�
xorg-x11-server-devel-1.20.11-33.el9_7.x86_64.rpm��ljM�	�#�^BBBBsecurityImportant: kernel security update��9�https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143
�;kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm�;kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm�;libperf-5.14.0-611.26.1.el9_7.x86_64.rpm�;kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm�;kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm�;libperf-5.14.0-611.26.1.el9_7.x86_64.rpm���/�	�$�dBsecurityImportant: PackageKit security update��V�bhttps://access.redhat.com/errata/RHSA-2026:11504RHSA-2026:11504RHSA-2026:11504https://access.redhat.com/security/cve/CVE-2026-41651CVE-2026-41651CVE-2026-41651https://bugzilla.redhat.com/24606042460604https://errata.almalinux.org/9/ALSA-2026-11504.htmlALSA-2026:11504ALSA-2026:11504
��@PackageKit-glib-devel-1.2.6-2.el9_7.i686.rpm��@PackageKit-glib-devel-1.2.6-2.el9_7.x86_64.rpm��@PackageKit-glib-devel-1.2.6-2.el9_7.i686.rpm��@PackageKit-glib-devel-1.2.6-2.el9_7.x86_64.rpm��̱G�	�%�gsecurityImportant: libtiff security update��8�Lhttps://access.redhat.com/errata/RHSA-2026:12271RHSA-2026:12271RHSA-2026:12271https://access.redhat.com/security/cve/CVE-2026-4775CVE-2026-4775CVE-2026-4775https://bugzilla.redhat.com/24507682450768https://errata.almalinux.org/9/ALSA-2026-12271.htmlALSA-2026:12271ALSA-2026:12271
��}libtiff-tools-4.4.0-15.el9_7.3.x86_64.rpm��}libtiff-tools-4.4.0-15.el9_7.3.x86_64.rpm��њ�	�&�iBBBBsecurityImportant: kernel security update���S
https://access.redhat.com/errata/RHSA-2026:13565RHSA-2026:13565RHSA-2026:13565https://access.redhat.com/security/cve/CVE-2026-23136CVE-2026-23136CVE-2026-23136https://access.redhat.com/security/cve/CVE-2026-23270CVE-2026-23270CVE-2026-23270https://access.redhat.com/security/cve/CVE-2026-31402CVE-2026-31402CVE-2026-31402https://access.redhat.com/security/cve/CVE-2026-31431CVE-2026-31431CVE-2026-31431https://bugzilla.redhat.com/24398522439852https://bugzilla.redhat.com/24487452448745https://bugzilla.redhat.com/24548442454844https://bugzilla.redhat.com/24605382460538https://errata.almalinux.org/9/ALSA-2026-13565.htmlALSA-2026:13565ALSA-2026:13565
�Hlibperf-5.14.0-611.54.1.el9_7.x86_64.rpm�Hkernel-tools-libs-devel-5.14.0-611.54.1.el9_7.x86_64.rpm�Hkernel-cross-headers-5.14.0-611.54.1.el9_7.x86_64.rpm�Hlibperf-5.14.0-611.54.1.el9_7.x86_64.rpm�Hkernel-tools-libs-devel-5.14.0-611.54.1.el9_7.x86_64.rpm�Hkernel-cross-headers-5.14.0-611.54.1.el9_7.x86_64.rpm���l�	�'�osecurityModerate: corosync security update
��W�https://access.redhat.com/errata/RHSA-2026:13673RHSA-2026:13673RHSA-2026:13673https://access.redhat.com/security/cve/CVE-2026-35091CVE-2026-35091CVE-2026-35091https://access.redhat.com/security/cve/CVE-2026-35092CVE-2026-35092CVE-2026-35092https://bugzilla.redhat.com/24538132453813https://bugzilla.redhat.com/24538142453814https://errata.almalinux.org/9/ALSA-2026-13673.htmlALSA-2026:13673ALSA-2026:13673
�-�vcorosync-vqsim-3.1.9-2.el9_7.1.x86_64.rpm�-�vcorosync-vqsim-3.1.9-2.el9_7.1.x86_64.rpm���4�	�)�h�JBBsecurityImportant: dovecot security update��l�https://access.redhat.com/errata/RHSA-2026:13857RHSA-2026:13857RHSA-2026:13857https://access.redhat.com/security/cve/CVE-2025-59032CVE-2025-59032CVE-2025-59032https://access.redhat.com/security/cve/CVE-2026-27857CVE-2026-27857CVE-2026-27857https://access.redhat.com/security/cve/CVE-2026-27858CVE-2026-27858CVE-2026-27858https://bugzilla.redhat.com/24521722452172https://bugzilla.redhat.com/24521752452175https://bugzilla.redhat.com/24521792452179https://errata.almalinux.org/9/ALSA-2026-13857.htmlALSA-2026:13857ALSA-2026:13857
�C�fdovecot-devel-2.3.16-15.el9_7.1.i686.rpm�C�fdovecot-devel-2.3.16-15.el9_7.1.x86_64.rpm�*�fdovecot-2.3.16-15.el9_7.1.i686.rpm�C�fdovecot-devel-2.3.16-15.el9_7.1.i686.rpm�C�fdovecot-devel-2.3.16-15.el9_7.1.x86_64.rpm�*�fdovecot-2.3.16-15.el9_7.1.i686.rpm����B�	�,�jB�KBBBBBBBBBsecurityModerate: python3.12 security update
��|�,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408
#�)python3.12-debug-3.12.12-4.el9_7.x86_64.rpm��)python3.12-tkinter-3.12.12-4.el9_7.i686.rpm%�)python3.12-test-3.12.12-4.el9_7.x86_64.rpm��)python3.12-3.12.12-4.el9_7.i686.rpm$�)python3.12-idle-3.12.12-4.el9_7.x86_64.rpm%�)python3.12-test-3.12.12-4.el9_7.i686.rpm$�)python3.12-idle-3.12.12-4.el9_7.i686.rpm#�)python3.12-debug-3.12.12-4.el9_7.i686.rpm#�)python3.12-debug-3.12.12-4.el9_7.x86_64.rpm��)python3.12-tkinter-3.12.12-4.el9_7.i686.rpm%�)python3.12-test-3.12.12-4.el9_7.x86_64.rpm��)python3.12-3.12.12-4.el9_7.i686.rpm$�)python3.12-idle-3.12.12-4.el9_7.x86_64.rpm%�)python3.12-test-3.12.12-4.el9_7.i686.rpm$�)python3.12-idle-3.12.12-4.el9_7.i686.rpm#�)python3.12-debug-3.12.12-4.el9_7.i686.rpm����	�/�mB�SBBBBBBBBBsecurityModerate: python3.11 security update
��(�,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410
�python3.11-idle-3.11.13-5.el9_7.x86_64.rpm�python3.11-test-3.11.13-5.el9_7.x86_64.rpmd�python3.11-3.11.13-5.el9_7.i686.rpm�python3.11-test-3.11.13-5.el9_7.i686.rpm�python3.11-debug-3.11.13-5.el9_7.i686.rpme�python3.11-tkinter-3.11.13-5.el9_7.i686.rpm�python3.11-idle-3.11.13-5.el9_7.i686.rpm�python3.11-debug-3.11.13-5.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.el9_7.x86_64.rpm�python3.11-test-3.11.13-5.el9_7.x86_64.rpmd�python3.11-3.11.13-5.el9_7.i686.rpm�python3.11-test-3.11.13-5.el9_7.i686.rpm�python3.11-debug-3.11.13-5.el9_7.i686.rpme�python3.11-tkinter-3.11.13-5.el9_7.i686.rpm�python3.11-idle-3.11.13-5.el9_7.i686.rpm�python3.11-debug-3.11.13-5.el9_7.x86_64.rpm���J�	�1�p�H�UBBBBBBBBBsecurityModerate: python3.9 security update
��T�bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478
�Fpython3-debug-3.9.25-3.el9_7.i686.rpmP�Fpython3-3.9.25-3.el9_7.i686.rpm�Fpython3-test-3.9.25-3.el9_7.x86_64.rpm�Fpython3-idle-3.9.25-3.el9_7.i686.rpm�Fpython3-debug-3.9.25-3.el9_7.x86_64.rpmQ�Fpython3-tkinter-3.9.25-3.el9_7.i686.rpm�Fpython3-test-3.9.25-3.el9_7.i686.rpm�Fpython3-idle-3.9.25-3.el9_7.x86_64.rpm�Fpython3-debug-3.9.25-3.el9_7.i686.rpmP�Fpython3-3.9.25-3.el9_7.i686.rpm�Fpython3-test-3.9.25-3.el9_7.x86_64.rpm�Fpython3-idle-3.9.25-3.el9_7.i686.rpm�Fpython3-debug-3.9.25-3.el9_7.x86_64.rpmQ�Fpython3-tkinter-3.9.25-3.el9_7.i686.rpm�Fpython3-test-3.9.25-3.el9_7.i686.rpm�Fpython3-idle-3.9.25-3.el9_7.x86_64.rpm����u� 	�2�VBsecurityModerate: freeipmi security update
��6�Khttps://access.redhat.com/errata/RHSA-2026:14819RHSA-2026:14819RHSA-2026:14819https://access.redhat.com/security/cve/CVE-2026-33554CVE-2026-33554CVE-2026-33554https://bugzilla.redhat.com/24507782450778https://errata.almalinux.org/9/ALSA-2026-14819.htmlALSA-2026:14819ALSA-2026:14819
��Nfreeipmi-devel-1.6.17-1.el9_7.x86_64.rpm��Nfreeipmi-devel-1.6.17-1.el9_7.i686.rpm��Nfreeipmi-devel-1.6.17-1.el9_7.x86_64.rpm��Nfreeipmi-devel-1.6.17-1.el9_7.i686.rpm���J�!	�3�YBsecurityImportant: openexr security update���ahttps://access.redhat.com/errata/RHSA-2026:15887RHSA-2026:15887RHSA-2026:15887https://access.redhat.com/security/cve/CVE-2026-34588CVE-2026-34588CVE-2026-34588https://bugzilla.redhat.com/24554082455408https://errata.almalinux.org/9/ALSA-2026-15887.htmlALSA-2026:15887ALSA-2026:15887
� �qopenexr-devel-3.1.1-3.el9_7.2.i686.rpm� �qopenexr-devel-3.1.1-3.el9_7.2.x86_64.rpm� �qopenexr-devel-3.1.1-3.el9_7.2.i686.rpm� �qopenexr-devel-3.1.1-3.el9_7.2.x86_64.rpm�А�/�"	�4�\BsecurityModerate: glib2 security update
��b�https://access.redhat.com/errata/RHSA-2026:15971RHSA-2026:15971RHSA-2026:15971https://access.redhat.com/security/cve/CVE-2025-14087CVE-2025-14087CVE-2025-14087https://access.redhat.com/security/cve/CVE-2025-14512CVE-2025-14512CVE-2025-14512https://bugzilla.redhat.com/24190932419093https://bugzilla.redhat.com/24213392421339https://errata.almalinux.org/9/ALSA-2026-15971.htmlALSA-2026:15971ALSA-2026:15971
�u�cglib2-static-2.68.4-18.el9_7.2.i686.rpm�u�cglib2-static-2.68.4-18.el9_7.2.x86_64.rpm�u�cglib2-static-2.68.4-18.el9_7.2.i686.rpm�u�cglib2-static-2.68.4-18.el9_7.2.x86_64.rpm�Ј��#	�5�_BBBBsecurityModerate: kernel security update
��|�Dhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617
�<libperf-5.14.0-611.27.1.el9_7.x86_64.rpm�<kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm�<kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm�<libperf-5.14.0-611.27.1.el9_7.x86_64.rpm�<kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm�<kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm�̖�4�$	�6�eBBBBsecurityImportant: kernel security update��@�.https://access.redhat.com/errata/RHSA-2026:16206RHSA-2026:16206RHSA-2026:16206https://access.redhat.com/security/cve/CVE-2026-43284CVE-2026-43284CVE-2026-43284https://bugzilla.redhat.com/24677712467771https://errata.almalinux.org/9/ALSA-2026-16206.htmlALSA-2026:16206ALSA-2026:16206
�Kkernel-cross-headers-5.14.0-611.55.1.el9_7.x86_64.rpm�Klibperf-5.14.0-611.55.1.el9_7.x86_64.rpm�Kkernel-tools-libs-devel-5.14.0-611.55.1.el9_7.x86_64.rpm�Kkernel-cross-headers-5.14.0-611.55.1.el9_7.x86_64.rpm�Klibperf-5.14.0-611.55.1.el9_7.x86_64.rpm�Kkernel-tools-libs-devel-5.14.0-611.55.1.el9_7.x86_64.rpm�д�T�%	�7�kBBBBsecurityModerate: freerdp security update
��n�ehttps://access.redhat.com/errata/RHSA-2026:16482RHSA-2026:16482RHSA-2026:16482https://access.redhat.com/security/cve/CVE-2026-25952CVE-2026-25952CVE-2026-25952https://access.redhat.com/security/cve/CVE-2026-26986CVE-2026-26986CVE-2026-26986https://access.redhat.com/security/cve/CVE-2026-27951CVE-2026-27951CVE-2026-27951https://access.redhat.com/security/cve/CVE-2026-29775CVE-2026-29775CVE-2026-29775https://access.redhat.com/security/cve/CVE-2026-31883CVE-2026-31883CVE-2026-31883https://access.redhat.com/security/cve/CVE-2026-31884CVE-2026-31884CVE-2026-31884https://access.redhat.com/security/cve/CVE-2026-31885CVE-2026-31885CVE-2026-31885https://access.redhat.com/security/cve/CVE-2026-33985CVE-2026-33985CVE-2026-33985https://bugzilla.redhat.com/24427682442768https://bugzilla.redhat.com/24427822442782https://bugzilla.redhat.com/24427832442783https://bugzilla.redhat.com/24473792447379https://bugzilla.redhat.com/24473832447383https://bugzilla.redhat.com/24473852447385https://bugzilla.redhat.com/24473862447386https://bugzilla.redhat.com/24532172453217https://errata.almalinux.org/9/ALSA-2026-16482.htmlALSA-2026:16482ALSA-2026:16482
j�Xlibwinpr-devel-2.11.7-1.el9_7.7.i686.rpmh�Xfreerdp-devel-2.11.7-1.el9_7.7.x86_64.rpmj�Xlibwinpr-devel-2.11.7-1.el9_7.7.x86_64.rpmh�Xfreerdp-devel-2.11.7-1.el9_7.7.i686.rpmj�Xlibwinpr-devel-2.11.7-1.el9_7.7.i686.rpmh�Xfreerdp-devel-2.11.7-1.el9_7.7.x86_64.rpmj�Xlibwinpr-devel-2.11.7-1.el9_7.7.x86_64.rpmh�Xfreerdp-devel-2.11.7-1.el9_7.7.i686.rpm��E�&	�8�qBsecurityImportant: jq security update��S�'https://access.redhat.com/errata/RHSA-2026:16693RHSA-2026:16693RHSA-2026:16693https://access.redhat.com/security/cve/CVE-2026-39979CVE-2026-39979CVE-2026-39979https://access.redhat.com/security/cve/CVE-2026-40164CVE-2026-40164CVE-2026-40164https://bugzilla.redhat.com/24580772458077https://bugzilla.redhat.com/24580842458084https://errata.almalinux.org/9/ALSA-2026-16693.htmlALSA-2026:16693ALSA-2026:16693
�t�Mjq-devel-1.6-19.el9_7.0.2.x86_64.rpm�t�Mjq-devel-1.6-19.el9_7.0.2.i686.rpm�t�Mjq-devel-1.6-19.el9_7.0.2.x86_64.rpm�t�Mjq-devel-1.6-19.el9_7.0.2.i686.rpm��q�'	�8�tsecurityCritical: nginx security update�B��z�-https://access.redhat.com/errata/RHSA-2026:18029RHSA-2026:18029RHSA-2026:18029https://access.redhat.com/security/cve/CVE-2026-42945CVE-2026-42945CVE-2026-42945https://bugzilla.redhat.com/24771162477116https://errata.almalinux.org/9/ALSA-2026-18029.htmlALSA-2026:18029ALSA-2026:18029
�\�tnginx-mod-devel-1.20.1-24.el9_7.3.alma.1.x86_64.rpm�\�tnginx-mod-devel-1.20.1-24.el9_7.3.alma.1.x86_64.rpm��O�(	�9�6securityImportant: ruby security update��'�Bhttps://access.redhat.com/errata/RHSA-2026:18039RHSA-2026:18039RHSA-2026:18039https://access.redhat.com/security/cve/CVE-2026-41316CVE-2026-41316CVE-2026-41316https://bugzilla.redhat.com/24613692461369https://errata.almalinux.org/9/ALSA-2026-18039.htmlALSA-2026:18039ALSA-2026:18039
�]�ruby-doc-3.0.7-166.el9_7.noarch.rpm�]�ruby-doc-3.0.7-166.el9_7.noarch.rpm��)	�:�wBBBBsecurityModerate: util-linux security update
��i�https://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913
��Olibsmartcols-devel-2.37.4-21.el9_7.i686.rpm��Olibfdisk-devel-2.37.4-21.el9_7.x86_64.rpm��Olibsmartcols-devel-2.37.4-21.el9_7.x86_64.rpm��Olibfdisk-devel-2.37.4-21.el9_7.i686.rpm��Olibsmartcols-devel-2.37.4-21.el9_7.i686.rpm��Olibfdisk-devel-2.37.4-21.el9_7.x86_64.rpm��Olibsmartcols-devel-2.37.4-21.el9_7.x86_64.rpm��Olibfdisk-devel-2.37.4-21.el9_7.i686.rpm�̫�E�*	�;�=securityImportant: python3.12-wheel security update���hhttps://access.redhat.com/errata/RHSA-2026:1939RHSA-2026:1939RHSA-2026:1939https://access.redhat.com/security/cve/CVE-2026-24049CVE-2026-24049CVE-2026-24049https://bugzilla.redhat.com/24319592431959https://errata.almalinux.org/9/ALSA-2026-1939.htmlALSA-2026:1939ALSA-2026:1939
�=�python3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm�=�python3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm�̫�!�+	��~BsecurityImportant: fontforge security update��m�thttps://access.redhat.com/errata/RHSA-2026:2039RHSA-2026:2039RHSA-2026:2039https://access.redhat.com/security/cve/CVE-2025-15269CVE-2025-15269CVE-2025-15269https://access.redhat.com/security/cve/CVE-2025-15275CVE-2025-15275CVE-2025-15275https://access.redhat.com/security/cve/CVE-2025-15279CVE-2025-15279CVE-2025-15279https://bugzilla.redhat.com/24264212426421https://bugzilla.redhat.com/24264232426423https://bugzilla.redhat.com/24264292426429https://errata.almalinux.org/9/ALSA-2026-2039.htmlALSA-2026:2039ALSA-2026:2039
�D�ifontforge-20201107-7.el9_7.x86_64.rpm�D�ifontforge-20201107-7.el9_7.i686.rpm�D�ifontforge-20201107-7.el9_7.x86_64.rpm�D�ifontforge-20201107-7.el9_7.i686.rpm�̙�J�,	�<�BBBBBsecurityImportant: freerdp security update��a�https://access.redhat.com/errata/RHSA-2026:2048RHSA-2026:2048RHSA-2026:2048https://access.redhat.com/security/cve/CVE-2026-23530CVE-2026-23530CVE-2026-23530https://access.redhat.com/security/cve/CVE-2026-23531CVE-2026-23531CVE-2026-23531https://access.redhat.com/security/cve/CVE-2026-23532CVE-2026-23532CVE-2026-23532https://access.redhat.com/security/cve/CVE-2026-23533CVE-2026-23533CVE-2026-23533https://access.redhat.com/security/cve/CVE-2026-23534CVE-2026-23534CVE-2026-23534https://access.redhat.com/security/cve/CVE-2026-23883CVE-2026-23883CVE-2026-23883https://access.redhat.com/security/cve/CVE-2026-23884CVE-2026-23884CVE-2026-23884https://bugzilla.redhat.com/24308772430877https://bugzilla.redhat.com/24308802430880https://bugzilla.redhat.com/24308852430885https://bugzilla.redhat.com/24308862430886https://bugzilla.redhat.com/24308872430887https://bugzilla.redhat.com/24308882430888https://bugzilla.redhat.com/24308912430891https://errata.almalinux.org/9/ALSA-2026-2048.htmlALSA-2026:2048ALSA-2026:2048
h�Sfreerdp-devel-2.11.7-1.el9_7.1.i686.rpmj�Slibwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpmj�Slibwinpr-devel-2.11.7-1.el9_7.1.i686.rpmh�Sfreerdp-devel-2.11.7-1.el9_7.1.x86_64.rpmh�Sfreerdp-devel-2.11.7-1.el9_7.1.i686.rpmj�Slibwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpmj�Slibwinpr-devel-2.11.7-1.el9_7.1.i686.rpmh�Sfreerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm�̫�u�-	�=�HBBBBsecurityModerate: kernel security update
���u"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212
�=libperf-5.14.0-611.30.1.el9_7.x86_64.rpm�=kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm�=kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm�=libperf-5.14.0-611.30.1.el9_7.x86_64.rpm�=kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm�=kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm�̶�#�.	�>�NBBBBsecurityModerate: kernel security update
��t�https://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722
�>kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm�>kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm�>libperf-5.14.0-611.34.1.el9_7.x86_64.rpm�>kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm�>kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm�>libperf-5.14.0-611.34.1.el9_7.x86_64.rpm���,�/	��B�UBsecurityModerate: edk2 security update
���Ghttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776
�S�tedk2-tools-doc-20241117-4.el9_7.3.noarch.rpm��tedk2-tools-20241117-4.el9_7.3.x86_64.rpm�(�tedk2-ovmf-20241117-4.el9_7.3.noarch.rpm�R�tedk2-aarch64-20241117-4.el9_7.3.noarch.rpm�S�tedk2-tools-doc-20241117-4.el9_7.3.noarch.rpm��tedk2-tools-20241117-4.el9_7.3.x86_64.rpm�(�tedk2-ovmf-20241117-4.el9_7.3.noarch.rpm�R�tedk2-aarch64-20241117-4.el9_7.3.noarch.rpm��׆=�0	��WBBBBBBBBBBBBsecurityModerate: glibc security update
��R�|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786
	�U~glibc-static-2.34-231.el9_7.10.x86_64.rpm�j~glibc-benchtests-2.34-231.el9_7.10.x86_64.rpm�T~glibc-nss-devel-2.34-231.el9_7.10.i686.rpm�X~nss_db-2.34-231.el9_7.10.x86_64.rpm�Y~nss_hesiod-2.34-231.el9_7.10.i686.rpm�T~glibc-nss-devel-2.34-231.el9_7.10.x86_64.rpm�X~nss_db-2.34-231.el9_7.10.i686.rpm�U~glibc-static-2.34-231.el9_7.10.i686.rpm�Y~nss_hesiod-2.34-231.el9_7.10.x86_64.rpm	�U~glibc-static-2.34-231.el9_7.10.x86_64.rpm�j~glibc-benchtests-2.34-231.el9_7.10.x86_64.rpm�T~glibc-nss-devel-2.34-231.el9_7.10.i686.rpm�X~nss_db-2.34-231.el9_7.10.x86_64.rpm�Y~nss_hesiod-2.34-231.el9_7.10.i686.rpm�T~glibc-nss-devel-2.34-231.el9_7.10.x86_64.rpm�X~nss_db-2.34-231.el9_7.10.i686.rpm�U~glibc-static-2.34-231.el9_7.10.i686.rpm�Y~nss_hesiod-2.34-231.el9_7.10.x86_64.rpm��ׄ	�1	��eBsecurityImportant: munge security update��N�}https://access.redhat.com/errata/RHSA-2026:3034RHSA-2026:3034RHSA-2026:3034https://access.redhat.com/security/cve/CVE-2026-25506CVE-2026-25506CVE-2026-25506https://bugzilla.redhat.com/24387152438715https://errata.almalinux.org/9/ALSA-2026-3034.htmlALSA-2026:3034ALSA-2026:3034
��4munge-devel-0.5.13-14.el9_7.x86_64.rpm��4munge-devel-0.5.13-14.el9_7.i686.rpm��4munge-devel-0.5.13-14.el9_7.x86_64.rpm��4munge-devel-0.5.13-14.el9_7.i686.rpm�̀�;�2	��hBBBBsecurityModerate: kernel security update
��K�whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066
�?kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm�?libperf-5.14.0-611.35.1.el9_7.x86_64.rpm�?kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm�?kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm�?libperf-5.14.0-611.35.1.el9_7.x86_64.rpm�?kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm�̀��3	��nBBBBsecurityImportant: freerdp security update��B�^https://access.redhat.com/errata/RHSA-2026:3067RHSA-2026:3067RHSA-2026:3067https://access.redhat.com/security/cve/CVE-2026-22855CVE-2026-22855CVE-2026-22855https://access.redhat.com/security/cve/CVE-2026-22858CVE-2026-22858CVE-2026-22858https://access.redhat.com/security/cve/CVE-2026-22859CVE-2026-22859CVE-2026-22859https://bugzilla.redhat.com/24296452429645https://bugzilla.redhat.com/24296492429649https://bugzilla.redhat.com/24296532429653https://errata.almalinux.org/9/ALSA-2026-3067.htmlALSA-2026:3067ALSA-2026:3067
h�Tfreerdp-devel-2.11.7-1.el9_7.2.i686.rpmj�Tlibwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpmh�Tfreerdp-devel-2.11.7-1.el9_7.2.x86_64.rpmj�Tlibwinpr-devel-2.11.7-1.el9_7.2.i686.rpmh�Tfreerdp-devel-2.11.7-1.el9_7.2.i686.rpmj�Tlibwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpmh�Tfreerdp-devel-2.11.7-1.el9_7.2.x86_64.rpmj�Tlibwinpr-devel-2.11.7-1.el9_7.2.i686.rpm�̀��4	��tBBBBBBBsecurityImportant: protobuf security update�� �9https://access.redhat.com/errata/RHSA-2026:3095RHSA-2026:3095RHSA-2026:3095https://access.redhat.com/security/cve/CVE-2026-0994CVE-2026-0994CVE-2026-0994https://bugzilla.redhat.com/24323982432398https://errata.almalinux.org/9/ALSA-2026-3095.htmlALSA-2026:3095ALSA-2026:3095
�H�protobuf-devel-3.14.0-17.el9_7.i686.rpm�I�protobuf-lite-devel-3.14.0-17.el9_7.i686.rpm�G�protobuf-compiler-3.14.0-17.el9_7.x86_64.rpm�I�protobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpm�H�protobuf-devel-3.14.0-17.el9_7.x86_64.rpm�G�protobuf-compiler-3.14.0-17.el9_7.i686.rpm�H�protobuf-devel-3.14.0-17.el9_7.i686.rpm�I�protobuf-lite-devel-3.14.0-17.el9_7.i686.rpm�G�protobuf-compiler-3.14.0-17.el9_7.x86_64.rpm�I�protobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpm�H�protobuf-devel-3.14.0-17.el9_7.x86_64.rpm�G�protobuf-compiler-3.14.0-17.el9_7.i686.rpm����-�5	��}securityModerate: 389-ds-base security update
��Y�https://access.redhat.com/errata/RHSA-2026:3189RHSA-2026:3189RHSA-2026:3189https://access.redhat.com/security/cve/CVE-2025-14905CVE-2025-14905CVE-2025-14905https://bugzilla.redhat.com/24236242423624https://errata.almalinux.org/9/ALSA-2026-3189.htmlALSA-2026:3189ALSA-2026:3189
��o389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpm��o389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpm�̀��6	��BBBBsecurityModerate: kernel security update
��r�Zhttps://access.redhat.com/errata/RHSA-2026:3488RHSA-2026:3488RHSA-2026:3488https://access.redhat.com/security/cve/CVE-2025-40168CVE-2025-40168CVE-2025-40168https://access.redhat.com/security/cve/CVE-2025-71085CVE-2025-71085CVE-2025-71085https://access.redhat.com/security/cve/CVE-2026-23097CVE-2026-23097CVE-2026-23097https://bugzilla.redhat.com/24144822414482https://bugzilla.redhat.com/24290262429026https://bugzilla.redhat.com/24368022436802https://errata.almalinux.org/9/ALSA-2026-3488.htmlALSA-2026:3488ALSA-2026:3488
�@libperf-5.14.0-611.36.1.el9_7.x86_64.rpm�@kernel-cross-headers-5.14.0-611.36.1.el9_7.x86_64.rpm�@kernel-tools-libs-devel-5.14.0-611.36.1.el9_7.x86_64.rpm�@libperf-5.14.0-611.36.1.el9_7.x86_64.rpm�@kernel-cross-headers-5.14.0-611.36.1.el9_7.x86_64.rpm�@kernel-tools-libs-devel-5.14.0-611.36.1.el9_7.x86_64.rpm�͠�F�7	�	�EBBBBBBBBBBBsecurityImportant: postgresql security update��L�https://access.redhat.com/errata/RHSA-2026:3730RHSA-2026:3730RHSA-2026:3730https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-3730.htmlALSA-2026:3730ALSA-2026:3730
��Qpostgresql-upgrade-devel-13.23-2.el9_7.x86_64.rpm�	�Qpostgresql-server-devel-13.23-2.el9_7.x86_64.rpm�F�Qpostgresql-test-rpm-macros-13.23-2.el9_7.noarch.rpm��Qpostgresql-test-13.23-2.el9_7.x86_64.rpm�
�Qpostgresql-static-13.23-2.el9_7.x86_64.rpm��Qpostgresql-docs-13.23-2.el9_7.x86_64.rpm��Qpostgresql-private-devel-13.23-2.el9_7.x86_64.rpm��Qpostgresql-upgrade-devel-13.23-2.el9_7.x86_64.rpm�	�Qpostgresql-server-devel-13.23-2.el9_7.x86_64.rpm�F�Qpostgresql-test-rpm-macros-13.23-2.el9_7.noarch.rpm��Qpostgresql-test-13.23-2.el9_7.x86_64.rpm�
�Qpostgresql-static-13.23-2.el9_7.x86_64.rpm��Qpostgresql-docs-13.23-2.el9_7.x86_64.rpm��Qpostgresql-private-devel-13.23-2.el9_7.x86_64.rpm���d�8	�
�RBsecurityModerate: nfs-utils security update
��Q�@https://access.redhat.com/errata/RHSA-2026:3940RHSA-2026:3940RHSA-2026:3940https://access.redhat.com/security/cve/CVE-2025-12801CVE-2025-12801CVE-2025-12801https://bugzilla.redhat.com/24130812413081https://errata.almalinux.org/9/ALSA-2026-3940.htmlALSA-2026:3940ALSA-2026:3940
��Wlibnfsidmap-devel-2.5.4-38.el9_7.3.x86_64.rpm��Wlibnfsidmap-devel-2.5.4-38.el9_7.3.i686.rpm��Wlibnfsidmap-devel-2.5.4-38.el9_7.3.x86_64.rpm��Wlibnfsidmap-devel-2.5.4-38.el9_7.3.i686.rpm��ϲ!�9	��UBBBBsecurityModerate: kernel security update
���https://access.redhat.com/errata/RHSA-2026:3966RHSA-2026:3966RHSA-2026:3966https://access.redhat.com/security/cve/CVE-2025-38106CVE-2025-38106CVE-2025-38106https://access.redhat.com/security/cve/CVE-2026-23001CVE-2026-23001CVE-2026-23001https://bugzilla.redhat.com/23760772376077https://bugzilla.redhat.com/24326642432664https://errata.almalinux.org/9/ALSA-2026-3966.htmlALSA-2026:3966ALSA-2026:3966
�Akernel-cross-headers-5.14.0-611.38.1.el9_7.x86_64.rpm�Alibperf-5.14.0-611.38.1.el9_7.x86_64.rpm�Akernel-tools-libs-devel-5.14.0-611.38.1.el9_7.x86_64.rpm�Akernel-cross-headers-5.14.0-611.38.1.el9_7.x86_64.rpm�Alibperf-5.14.0-611.38.1.el9_7.x86_64.rpm�Akernel-tools-libs-devel-5.14.0-611.38.1.el9_7.x86_64.rpm���m�:	��LB�OBBBBBBBBBsecurityModerate: python3.12 security update
��"�`https://access.redhat.com/errata/RHSA-2026:4165RHSA-2026:4165RHSA-2026:4165https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4165.htmlALSA-2026:4165ALSA-2026:4165
��*python3.12-tkinter-3.12.12-4.el9_7.1.i686.rpm%�*python3.12-test-3.12.12-4.el9_7.1.i686.rpm$�*python3.12-idle-3.12.12-4.el9_7.1.i686.rpm#�*python3.12-debug-3.12.12-4.el9_7.1.x86_64.rpm��*python3.12-3.12.12-4.el9_7.1.i686.rpm$�*python3.12-idle-3.12.12-4.el9_7.1.x86_64.rpm%�*python3.12-test-3.12.12-4.el9_7.1.x86_64.rpm#�*python3.12-debug-3.12.12-4.el9_7.1.i686.rpm��*python3.12-tkinter-3.12.12-4.el9_7.1.i686.rpm%�*python3.12-test-3.12.12-4.el9_7.1.i686.rpm$�*python3.12-idle-3.12.12-4.el9_7.1.i686.rpm#�*python3.12-debug-3.12.12-4.el9_7.1.x86_64.rpm��*python3.12-3.12.12-4.el9_7.1.i686.rpm$�*python3.12-idle-3.12.12-4.el9_7.1.x86_64.rpm%�*python3.12-test-3.12.12-4.el9_7.1.x86_64.rpm#�*python3.12-debug-3.12.12-4.el9_7.1.i686.rpm���\�;	��O�k�nBBBBBBBBBsecurityModerate: python3.9 security update
���`	https://access.redhat.com/errata/RHSA-2026:4168RHSA-2026:4168RHSA-2026:4168https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4168.htmlALSA-2026:4168ALSA-2026:4168
https://www.redhat.com/security/data/cve/CVE-2025-15366.htmlCVE-2025-15366CVE-2025-15366https://www.redhat.com/security/data/cve/CVE-2025-15367.htmlCVE-2025-15367CVE-2025-15367https://www.redhat.com/security/data/cve/CVE-2026-0865.htmlCVE-2026-0865CVE-2026-0865https://www.redhat.com/security/data/cve/CVE-2026-1299.htmlCVE-2026-1299CVE-2026-1299�Gpython3-debug-3.9.25-3.el9_7.1.i686.rpm�Gpython3-idle-3.9.25-3.el9_7.1.i686.rpm�Gpython3-test-3.9.25-3.el9_7.1.i686.rpm�Gpython3-test-3.9.25-3.el9_7.1.x86_64.rpmP�Gpython3-3.9.25-3.el9_7.1.i686.rpm�Gpython3-debug-3.9.25-3.el9_7.1.x86_64.rpmQ�Gpython3-tkinter-3.9.25-3.el9_7.1.i686.rpm�Gpython3-idle-3.9.25-3.el9_7.1.x86_64.rpm�Gpython3-debug-3.9.25-3.el9_7.1.i686.rpm�Gpython3-idle-3.9.25-3.el9_7.1.i686.rpm�Gpython3-test-3.9.25-3.el9_7.1.i686.rpm�Gpython3-test-3.9.25-3.el9_7.1.x86_64.rpmP�Gpython3-3.9.25-3.el9_7.1.i686.rpm�Gpython3-debug-3.9.25-3.el9_7.1.x86_64.rpmQ�Gpython3-tkinter-3.9.25-3.el9_7.1.i686.rpm�Gpython3-idle-3.9.25-3.el9_7.1.x86_64.rpm��ϰ*�<	��QB�`BBBBBBBBBsecurityModerate: python3.11 security update
��b�`https://access.redhat.com/errata/RHSA-2026:4216RHSA-2026:4216RHSA-2026:4216https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4216.htmlALSA-2026:4216ALSA-2026:4216
�python3.11-debug-3.11.13-5.1.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.1.el9_7.x86_64.rpm�python3.11-debug-3.11.13-5.1.el9_7.i686.rpm�python3.11-test-3.11.13-5.1.el9_7.i686.rpme�python3.11-tkinter-3.11.13-5.1.el9_7.i686.rpm�python3.11-idle-3.11.13-5.1.el9_7.i686.rpmd�python3.11-3.11.13-5.1.el9_7.i686.rpm�python3.11-test-3.11.13-5.1.el9_7.x86_64.rpm�python3.11-debug-3.11.13-5.1.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.1.el9_7.x86_64.rpm�python3.11-debug-3.11.13-5.1.el9_7.i686.rpm�python3.11-test-3.11.13-5.1.el9_7.i686.rpme�python3.11-tkinter-3.11.13-5.1.el9_7.i686.rpm�python3.11-idle-3.11.13-5.1.el9_7.i686.rpmd�python3.11-3.11.13-5.1.el9_7.i686.rpm�python3.11-test-3.11.13-5.1.el9_7.x86_64.rpm��ϭ=�=	��|securityImportant: .NET 10.0 security update��B�*https://access.redhat.com/errata/RHSA-2026:4445RHSA-2026:4445RHSA-2026:4445https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4445.htmlALSA-2026:4445ALSA-2026:4445
�=�ddotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7.x86_64.rpm�=�ddotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7.x86_64.rpm����<�>	��~BsecurityImportant: libvpx security update��l�9https://access.redhat.com/errata/RHSA-2026:4447RHSA-2026:4447RHSA-2026:4447https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://bugzilla.redhat.com/24402192440219https://errata.almalinux.org/9/ALSA-2026-4447.htmlALSA-2026:4447ALSA-2026:4447
��Olibvpx-devel-1.9.0-10.el9_7.i686.rpm��Olibvpx-devel-1.9.0-10.el9_7.x86_64.rpm��Olibvpx-devel-1.9.0-10.el9_7.i686.rpm��Olibvpx-devel-1.9.0-10.el9_7.x86_64.rpm����H�?	��AsecurityImportant: .NET 8.0 security update��%�_https://access.redhat.com/errata/RHSA-2026:4454RHSA-2026:4454RHSA-2026:4454https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4454.htmlALSA-2026:4454ALSA-2026:4454
��+dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7.x86_64.rpm��+dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7.x86_64.rpm��Ϭ$�@	��CsecurityImportant: .NET 9.0 security update���)https://access.redhat.com/errata/RHSA-2026:4456RHSA-2026:4456RHSA-2026:4456https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4456.htmlALSA-2026:4456ALSA-2026:4456
�i�3dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7.x86_64.rpm�i�3dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7.x86_64.rpm�����A	��EBBBBsecurityModerate: kernel security update
��-�https://access.redhat.com/errata/RHSA-2026:4759RHSA-2026:4759RHSA-2026:4759https://access.redhat.com/security/cve/CVE-2025-39818CVE-2025-39818CVE-2025-39818https://access.redhat.com/security/cve/CVE-2025-68800CVE-2025-68800CVE-2025-68800https://bugzilla.redhat.com/23957972395797https://bugzilla.redhat.com/24290652429065https://errata.almalinux.org/9/ALSA-2026-4759.htmlALSA-2026:4759ALSA-2026:4759
�Bkernel-tools-libs-devel-5.14.0-611.41.1.el9_7.x86_64.rpm�Bkernel-cross-headers-5.14.0-611.41.1.el9_7.x86_64.rpm�Blibperf-5.14.0-611.41.1.el9_7.x86_64.rpm�Bkernel-tools-libs-devel-5.14.0-611.41.1.el9_7.x86_64.rpm�Bkernel-cross-headers-5.14.0-611.41.1.el9_7.x86_64.rpm�Blibperf-5.14.0-611.41.1.el9_7.x86_64.rpm����g�B	��KBBsecurityModerate: mysql security update
��1�Ahttps://access.redhat.com/errata/RHSA-2026:4828RHSA-2026:4828RHSA-2026:4828https://access.redhat.com/security/cve/CVE-2026-21936CVE-2026-21936CVE-2026-21936https://access.redhat.com/security/cve/CVE-2026-21937CVE-2026-21937CVE-2026-21937https://access.redhat.com/security/cve/CVE-2026-21941CVE-2026-21941CVE-2026-21941https://access.redhat.com/security/cve/CVE-2026-21948CVE-2026-21948CVE-2026-21948https://access.redhat.com/security/cve/CVE-2026-21964CVE-2026-21964CVE-2026-21964https://access.redhat.com/security/cve/CVE-2026-21968CVE-2026-21968CVE-2026-21968https://bugzilla.redhat.com/24313842431384https://bugzilla.redhat.com/24313852431385https://bugzilla.redhat.com/24314022431402https://bugzilla.redhat.com/24314092431409https://bugzilla.redhat.com/24314132431413https://bugzilla.redhat.com/24314312431431https://errata.almalinux.org/9/ALSA-2026-4828.htmlALSA-2026:4828ALSA-2026:4828
�3�)mysql-test-8.0.45-1.el9_7.x86_64.rpm�2�)mysql-devel-8.0.45-1.el9_7.x86_64.rpm�3�)mysql-test-8.0.45-1.el9_7.x86_64.rpm�2�)mysql-devel-8.0.45-1.el9_7.x86_64.rpm���>�C	��OBBBBsecurityImportant: capstone security update��r�Thttps://access.redhat.com/errata/RHSA-2026:4898RHSA-2026:4898RHSA-2026:4898https://access.redhat.com/security/cve/CVE-2025-67873CVE-2025-67873CVE-2025-67873https://access.redhat.com/security/cve/CVE-2025-68114CVE-2025-68114CVE-2025-68114https://bugzilla.redhat.com/24234162423416https://bugzilla.redhat.com/24234192423419https://errata.almalinux.org/9/ALSA-2026-4898.htmlALSA-2026:4898ALSA-2026:4898
�
�hcapstone-devel-4.0.2-11.el9_7.i686.rpm�
�hpython3-capstone-4.0.2-11.el9_7.x86_64.rpm�
�hcapstone-devel-4.0.2-11.el9_7.x86_64.rpm�(�hcapstone-java-4.0.2-11.el9_7.noarch.rpm�
�hcapstone-devel-4.0.2-11.el9_7.i686.rpm�
�hpython3-capstone-4.0.2-11.el9_7.x86_64.rpm�
�hcapstone-devel-4.0.2-11.el9_7.x86_64.rpm�(�hcapstone-java-4.0.2-11.el9_7.noarch.rpm���V�D	��UsecurityModerate: nginx security update
��F�Lhttps://access.redhat.com/errata/RHSA-2026:5599RHSA-2026:5599RHSA-2026:5599https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-5599.htmlALSA-2026:5599ALSA-2026:5599
�\�rnginx-mod-devel-1.20.1-24.el9_7.1.alma.1.x86_64.rpm�\�rnginx-mod-devel-1.20.1-24.el9_7.1.alma.1.x86_64.rpm���E	�:�WBsecurityModerate: opencryptoki security update
���[https://access.redhat.com/errata/RHSA-2026:5603RHSA-2026:5603RHSA-2026:5603https://access.redhat.com/security/cve/CVE-2026-23893CVE-2026-23893CVE-2026-23893https://bugzilla.redhat.com/24319092431909https://errata.almalinux.org/9/ALSA-2026-5603.htmlALSA-2026:5603ALSA-2026:5603
�z�uopencryptoki-devel-3.25.0-4.el9_7.2.i686.rpm�z�uopencryptoki-devel-3.25.0-4.el9_7.2.x86_64.rpm�z�uopencryptoki-devel-3.25.0-4.el9_7.2.i686.rpm�z�uopencryptoki-devel-3.25.0-4.el9_7.2.x86_64.rpm��d�F	��ZBBBBsecurityImportant: freerdp security update��m�https://access.redhat.com/errata/RHSA-2026:6004RHSA-2026:6004RHSA-2026:6004https://access.redhat.com/security/cve/CVE-2026-26955CVE-2026-26955CVE-2026-26955https://access.redhat.com/security/cve/CVE-2026-26965CVE-2026-26965CVE-2026-26965https://bugzilla.redhat.com/24429592442959https://bugzilla.redhat.com/24431322443132https://errata.almalinux.org/9/ALSA-2026-6004.htmlALSA-2026:6004ALSA-2026:6004
j�Ulibwinpr-devel-2.11.7-1.el9_7.3.i686.rpmh�Ufreerdp-devel-2.11.7-1.el9_7.3.x86_64.rpmj�Ulibwinpr-devel-2.11.7-1.el9_7.3.x86_64.rpmh�Ufreerdp-devel-2.11.7-1.el9_7.3.i686.rpmj�Ulibwinpr-devel-2.11.7-1.el9_7.3.i686.rpmh�Ufreerdp-devel-2.11.7-1.el9_7.3.x86_64.rpmj�Ulibwinpr-devel-2.11.7-1.el9_7.3.x86_64.rpmh�Ufreerdp-devel-2.11.7-1.el9_7.3.i686.rpm��!�G	��`BBBBsecurityModerate: kernel security update
���<https://access.redhat.com/errata/RHSA-2026:6153RHSA-2026:6153RHSA-2026:6153https://access.redhat.com/security/cve/CVE-2025-38180CVE-2025-38180CVE-2025-38180https://access.redhat.com/security/cve/CVE-2025-40096CVE-2025-40096CVE-2025-40096https://access.redhat.com/security/cve/CVE-2026-23144CVE-2026-23144CVE-2026-23144https://access.redhat.com/security/cve/CVE-2026-23171CVE-2026-23171CVE-2026-23171https://access.redhat.com/security/cve/CVE-2026-23191CVE-2026-23191CVE-2026-23191https://access.redhat.com/security/cve/CVE-2026-23193CVE-2026-23193CVE-2026-23193https://access.redhat.com/security/cve/CVE-2026-23204CVE-2026-23204CVE-2026-23204https://access.redhat.com/security/cve/CVE-2026-23209CVE-2026-23209CVE-2026-23209https://bugzilla.redhat.com/23763762376376https://bugzilla.redhat.com/24073332407333https://bugzilla.redhat.com/24398722439872https://bugzilla.redhat.com/24398862439886https://bugzilla.redhat.com/24398872439887https://bugzilla.redhat.com/24399002439900https://bugzilla.redhat.com/24399312439931https://bugzilla.redhat.com/24399472439947https://errata.almalinux.org/9/ALSA-2026-6153.htmlALSA-2026:6153ALSA-2026:6153
�Ckernel-tools-libs-devel-5.14.0-611.45.1.el9_7.x86_64.rpm�Ckernel-cross-headers-5.14.0-611.45.1.el9_7.x86_64.rpm�Clibperf-5.14.0-611.45.1.el9_7.x86_64.rpm�Ckernel-tools-libs-devel-5.14.0-611.45.1.el9_7.x86_64.rpm�Ckernel-cross-headers-5.14.0-611.45.1.el9_7.x86_64.rpm�Clibperf-5.14.0-611.45.1.el9_7.x86_64.rpm��H	� �^B�HBBBBBBBBBsecurityImportant: python3.12 security update��<�Yhttps://access.redhat.com/errata/RHSA-2026:6285RHSA-2026:6285RHSA-2026:6285https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6285.htmlALSA-2026:6285ALSA-2026:6285
��+python3.12-tkinter-3.12.12-4.el9_7.2.i686.rpm%�+python3.12-test-3.12.12-4.el9_7.2.x86_64.rpm$�+python3.12-idle-3.12.12-4.el9_7.2.x86_64.rpm$�+python3.12-idle-3.12.12-4.el9_7.2.i686.rpm%�+python3.12-test-3.12.12-4.el9_7.2.i686.rpm#�+python3.12-debug-3.12.12-4.el9_7.2.i686.rpm#�+python3.12-debug-3.12.12-4.el9_7.2.x86_64.rpm��+python3.12-3.12.12-4.el9_7.2.i686.rpm��+python3.12-tkinter-3.12.12-4.el9_7.2.i686.rpm%�+python3.12-test-3.12.12-4.el9_7.2.x86_64.rpm$�+python3.12-idle-3.12.12-4.el9_7.2.x86_64.rpm$�+python3.12-idle-3.12.12-4.el9_7.2.i686.rpm%�+python3.12-test-3.12.12-4.el9_7.2.i686.rpm#�+python3.12-debug-3.12.12-4.el9_7.2.i686.rpm#�+python3.12-debug-3.12.12-4.el9_7.2.x86_64.rpm��+python3.12-3.12.12-4.el9_7.2.i686.rpm�γ�=�I	�#�aB�PBBBBBBBBBsecurityImportant: python3.11 security update���Yhttps://access.redhat.com/errata/RHSA-2026:6286RHSA-2026:6286RHSA-2026:6286https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6286.htmlALSA-2026:6286ALSA-2026:6286
�python3.11-debug-3.11.13-5.2.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.2.el9_7.i686.rpm�python3.11-idle-3.11.13-5.2.el9_7.x86_64.rpme�python3.11-tkinter-3.11.13-5.2.el9_7.i686.rpm�python3.11-test-3.11.13-5.2.el9_7.i686.rpm�python3.11-debug-3.11.13-5.2.el9_7.i686.rpmd�python3.11-3.11.13-5.2.el9_7.i686.rpm�python3.11-test-3.11.13-5.2.el9_7.x86_64.rpm�python3.11-debug-3.11.13-5.2.el9_7.x86_64.rpm�python3.11-idle-3.11.13-5.2.el9_7.i686.rpm�python3.11-idle-3.11.13-5.2.el9_7.x86_64.rpme�python3.11-tkinter-3.11.13-5.2.el9_7.i686.rpm�python3.11-test-3.11.13-5.2.el9_7.i686.rpm�python3.11-debug-3.11.13-5.2.el9_7.i686.rpmd�python3.11-3.11.13-5.2.el9_7.i686.rpm�python3.11-test-3.11.13-5.2.el9_7.x86_64.rpm�γ�,�J	�$�|BsecurityImportant: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update��n�https://access.redhat.com/errata/RHSA-2026:6300RHSA-2026:6300RHSA-2026:6300https://access.redhat.com/security/cve/CVE-2026-2920CVE-2026-2920CVE-2026-2920https://access.redhat.com/security/cve/CVE-2026-2921CVE-2026-2921CVE-2026-2921https://access.redhat.com/security/cve/CVE-2026-2922CVE-2026-2922CVE-2026-2922https://access.redhat.com/security/cve/CVE-2026-2923CVE-2026-2923CVE-2026-2923https://access.redhat.com/security/cve/CVE-2026-3082CVE-2026-3082CVE-2026-3082https://access.redhat.com/security/cve/CVE-2026-3083CVE-2026-3083CVE-2026-3083https://access.redhat.com/security/cve/CVE-2026-3085CVE-2026-3085CVE-2026-3085https://bugzilla.redhat.com/24474902447490https://bugzilla.redhat.com/24474922447492https://bugzilla.redhat.com/24474952447495https://bugzilla.redhat.com/24474962447496https://bugzilla.redhat.com/24474982447498https://bugzilla.redhat.com/24475002447500https://bugzilla.redhat.com/24475032447503https://errata.almalinux.org/9/ALSA-2026-6300.htmlALSA-2026:6300ALSA-2026:6300
�v�Egstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.i686.rpm�v�Egstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.x86_64.rpm�v�Egstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.i686.rpm�v�Egstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.x86_64.rpm�ο�5�K	�%�BBBBsecurityImportant: freerdp security update��y�https://access.redhat.com/errata/RHSA-2026:6340RHSA-2026:6340RHSA-2026:6340https://access.redhat.com/security/cve/CVE-2026-22852CVE-2026-22852CVE-2026-22852https://access.redhat.com/security/cve/CVE-2026-22854CVE-2026-22854CVE-2026-22854https://access.redhat.com/security/cve/CVE-2026-22856CVE-2026-22856CVE-2026-22856https://access.redhat.com/security/cve/CVE-2026-23732CVE-2026-23732CVE-2026-23732https://access.redhat.com/security/cve/CVE-2026-23948CVE-2026-23948CVE-2026-23948https://access.redhat.com/security/cve/CVE-2026-24491CVE-2026-24491CVE-2026-24491https://access.redhat.com/security/cve/CVE-2026-24675CVE-2026-24675CVE-2026-24675https://access.redhat.com/security/cve/CVE-2026-24676CVE-2026-24676CVE-2026-24676https://access.redhat.com/security/cve/CVE-2026-24679CVE-2026-24679CVE-2026-24679https://access.redhat.com/security/cve/CVE-2026-24681CVE-2026-24681CVE-2026-24681https://access.redhat.com/security/cve/CVE-2026-24683CVE-2026-24683CVE-2026-24683https://access.redhat.com/security/cve/CVE-2026-24684CVE-2026-24684CVE-2026-24684https://access.redhat.com/security/cve/CVE-2026-31806CVE-2026-31806CVE-2026-31806https://bugzilla.redhat.com/24296502429650https://bugzilla.redhat.com/24296522429652https://bugzilla.redhat.com/24296542429654https://bugzilla.redhat.com/24308812430881https://bugzilla.redhat.com/24382012438201https://bugzilla.redhat.com/24382022438202https://bugzilla.redhat.com/24382072438207https://bugzilla.redhat.com/24382082438208https://bugzilla.redhat.com/24382102438210https://bugzilla.redhat.com/24382162438216https://bugzilla.redhat.com/24382172438217https://bugzilla.redhat.com/24382212438221https://bugzilla.redhat.com/24473762447376https://errata.almalinux.org/9/ALSA-2026-6340.htmlALSA-2026:6340ALSA-2026:6340
j�Vlibwinpr-devel-2.11.7-1.el9_7.5.x86_64.rpmh�Vfreerdp-devel-2.11.7-1.el9_7.5.x86_64.rpmh�Vfreerdp-devel-2.11.7-1.el9_7.5.i686.rpmj�Vlibwinpr-devel-2.11.7-1.el9_7.5.i686.rpmj�Vlibwinpr-devel-2.11.7-1.el9_7.5.x86_64.rpmh�Vfreerdp-devel-2.11.7-1.el9_7.5.x86_64.rpmh�Vfreerdp-devel-2.11.7-1.el9_7.5.i686.rpmj�Vlibwinpr-devel-2.11.7-1.el9_7.5.i686.rpm�θ�5�L	�&�EBBBBsecurityModerate: kernel security update
��{�
https://access.redhat.com/errata/RHSA-2026:6570RHSA-2026:6570RHSA-2026:6570https://access.redhat.com/security/cve/CVE-2025-38109CVE-2025-38109CVE-2025-38109https://access.redhat.com/security/cve/CVE-2026-23111CVE-2026-23111CVE-2026-23111https://access.redhat.com/security/cve/CVE-2026-23210CVE-2026-23210CVE-2026-23210https://access.redhat.com/security/cve/CVE-2026-23231CVE-2026-23231CVE-2026-23231https://bugzilla.redhat.com/23761012376101https://bugzilla.redhat.com/24396872439687https://bugzilla.redhat.com/24398952439895https://bugzilla.redhat.com/24443762444376https://errata.almalinux.org/9/ALSA-2026-6570.htmlALSA-2026:6570ALSA-2026:6570
�Dlibperf-5.14.0-611.47.1.el9_7.x86_64.rpm�Dkernel-tools-libs-devel-5.14.0-611.47.1.el9_7.x86_64.rpm�Dkernel-cross-headers-5.14.0-611.47.1.el9_7.x86_64.rpm�Dlibperf-5.14.0-611.47.1.el9_7.x86_64.rpm�Dkernel-tools-libs-devel-5.14.0-611.47.1.el9_7.x86_64.rpm�Dkernel-cross-headers-5.14.0-611.47.1.el9_7.x86_64.rpm����M	��KBsecurityImportant: fontforge security update��
�https://access.redhat.com/errata/RHSA-2026:6628RHSA-2026:6628RHSA-2026:6628https://access.redhat.com/security/cve/CVE-2025-15270CVE-2025-15270CVE-2025-15270https://bugzilla.redhat.com/24264342426434https://errata.almalinux.org/9/ALSA-2026-6628.htmlALSA-2026:6628ALSA-2026:6628
�D�jfontforge-20201107-8.el9_7.i686.rpm�D�jfontforge-20201107-8.el9_7.x86_64.rpm�D�jfontforge-20201107-8.el9_7.i686.rpm�D�jfontforge-20201107-8.el9_7.x86_64.rpm���4�N	�(�g�U�UBBBBBBBBBsecurityImportant: python3.9 security update���Yhttps://access.redhat.com/errata/RHSA-2026:6766RHSA-2026:6766RHSA-2026:6766https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6766.htmlALSA-2026:6766ALSA-2026:6766
�Hpython3-test-3.9.25-3.el9_7.2.i686.rpm�Hpython3-debug-3.9.25-3.el9_7.2.i686.rpm�Hpython3-test-3.9.25-3.el9_7.2.x86_64.rpm�Hpython3-debug-3.9.25-3.el9_7.2.x86_64.rpm�Hpython3-idle-3.9.25-3.el9_7.2.x86_64.rpmP�Hpython3-3.9.25-3.el9_7.2.i686.rpmQ�Hpython3-tkinter-3.9.25-3.el9_7.2.i686.rpm�Hpython3-idle-3.9.25-3.el9_7.2.i686.rpm�Hpython3-test-3.9.25-3.el9_7.2.i686.rpm�Hpython3-debug-3.9.25-3.el9_7.2.i686.rpm�Hpython3-test-3.9.25-3.el9_7.2.x86_64.rpm�Hpython3-debug-3.9.25-3.el9_7.2.x86_64.rpm�Hpython3-idle-3.9.25-3.el9_7.2.x86_64.rpmP�Hpython3-3.9.25-3.el9_7.2.i686.rpmQ�Hpython3-tkinter-3.9.25-3.el9_7.2.i686.rpm�Hpython3-idle-3.9.25-3.el9_7.2.i686.rpm���y�O	�)�ZsecurityImportant: nginx security update��u�
https://access.redhat.com/errata/RHSA-2026:7002RHSA-2026:7002RHSA-2026:7002https://access.redhat.com/security/cve/CVE-2026-27651CVE-2026-27651CVE-2026-27651https://access.redhat.com/security/cve/CVE-2026-27654CVE-2026-27654CVE-2026-27654https://access.redhat.com/security/cve/CVE-2026-27784CVE-2026-27784CVE-2026-27784https://access.redhat.com/security/cve/CVE-2026-32647CVE-2026-32647CVE-2026-32647https://bugzilla.redhat.com/24495982449598https://bugzilla.redhat.com/24507762450776https://bugzilla.redhat.com/24507852450785https://bugzilla.redhat.com/24507912450791https://errata.almalinux.org/9/ALSA-2026-7002.htmlALSA-2026:7002ALSA-2026:7002
�\�snginx-mod-devel-1.20.1-24.el9_7.2.alma.1.x86_64.rpm�\�snginx-mod-devel-1.20.1-24.el9_7.2.alma.1.x86_64.rpm����P	�<�\BBBsecurityImportant: nghttp2 security update���.https://access.redhat.com/errata/RHSA-2026:7668RHSA-2026:7668RHSA-2026:7668https://access.redhat.com/security/cve/CVE-2026-27135CVE-2026-27135CVE-2026-27135https://bugzilla.redhat.com/24487542448754https://errata.almalinux.org/9/ALSA-2026-7668.htmlALSA-2026:7668ALSA-2026:7668
��dlibnghttp2-devel-1.43.0-6.el9_7.1.i686.rpm��dnghttp2-1.43.0-6.el9_7.1.x86_64.rpm��dlibnghttp2-devel-1.43.0-6.el9_7.1.x86_64.rpm��dlibnghttp2-devel-1.43.0-6.el9_7.1.i686.rpm��dnghttp2-1.43.0-6.el9_7.1.x86_64.rpm��dlibnghttp2-devel-1.43.0-6.el9_7.1.x86_64.rpm���j�Q	�+�j�xBBBsecurityImportant: bind9.18 security update��=�https://access.redhat.com/errata/RHSA-2026:7915RHSA-2026:7915RHSA-2026:7915https://access.redhat.com/security/cve/CVE-2026-1519CVE-2026-1519CVE-2026-1519https://bugzilla.redhat.com/24513052451305https://errata.almalinux.org/9/ALSA-2026-7915.htmlALSA-2026:7915ALSA-2026:7915
��gbind9.18-devel-9.18.29-5.el9_7.4.x86_64.rpm��gbind9.18-libs-9.18.29-5.el9_7.4.i686.rpm�R�gbind9.18-doc-9.18.29-5.el9_7.4.noarch.rpm��gbind9.18-devel-9.18.29-5.el9_7.4.i686.rpm��gbind9.18-devel-9.18.29-5.el9_7.4.x86_64.rpm��gbind9.18-libs-9.18.29-5.el9_7.4.i686.rpm�R�gbind9.18-doc-9.18.29-5.el9_7.4.noarch.rpm��gbind9.18-devel-9.18.29-5.el9_7.4.i686.rpm���3�R	�-�l�{BBBsecurityImportant: bind security update��=�Zhttps://access.redhat.com/errata/RHSA-2026:8075RHSA-2026:8075RHSA-2026:8075https://access.redhat.com/security/cve/CVE-2026-1519CVE-2026-1519CVE-2026-1519https://bugzilla.redhat.com/24513052451305https://errata.almalinux.org/9/ALSA-2026-8075.htmlALSA-2026:8075ALSA-2026:8075
R�bbind-devel-9.16.23-34.el9_7.2.x86_64.rpm�f�bbind-libs-9.16.23-34.el9_7.2.i686.rpm��bbind-doc-9.16.23-34.el9_7.2.noarch.rpmR�bbind-devel-9.16.23-34.el9_7.2.i686.rpmR�bbind-devel-9.16.23-34.el9_7.2.x86_64.rpm�f�bbind-libs-9.16.23-34.el9_7.2.i686.rpm��bbind-doc-9.16.23-34.el9_7.2.noarch.rpmR�bbind-devel-9.16.23-34.el9_7.2.i686.rpm���?�S	�.�kBBBBsecurityImportant: freerdp security update���https://access.redhat.com/errata/RHSA-2026:8457RHSA-2026:8457RHSA-2026:8457https://access.redhat.com/security/cve/CVE-2026-33983CVE-2026-33983CVE-2026-33983https://access.redhat.com/security/cve/CVE-2026-33984CVE-2026-33984CVE-2026-33984https://bugzilla.redhat.com/24532192453219https://bugzilla.redhat.com/24532202453220https://errata.almalinux.org/9/ALSA-2026-8457.htmlALSA-2026:8457ALSA-2026:8457
j�Wlibwinpr-devel-2.11.7-1.el9_7.6.i686.rpmh�Wfreerdp-devel-2.11.7-1.el9_7.6.i686.rpmh�Wfreerdp-devel-2.11.7-1.el9_7.6.x86_64.rpmj�Wlibwinpr-devel-2.11.7-1.el9_7.6.x86_64.rpmj�Wlibwinpr-devel-2.11.7-1.el9_7.6.i686.rpmh�Wfreerdp-devel-2.11.7-1.el9_7.6.i686.rpmh�Wfreerdp-devel-2.11.7-1.el9_7.6.x86_64.rpmj�Wlibwinpr-devel-2.11.7-1.el9_7.6.x86_64.rpm�ψ�D�T	�/�qsecurityImportant: .NET 8.0 security update��%�o
https://access.redhat.com/errata/RHSA-2026:8469RHSA-2026:8469RHSA-2026:8469https://access.redhat.com/security/cve/CVE-2026-26171CVE-2026-26171CVE-2026-26171https://access.redhat.com/security/cve/CVE-2026-32178CVE-2026-32178CVE-2026-32178https://access.redhat.com/security/cve/CVE-2026-32203CVE-2026-32203CVE-2026-32203https://access.redhat.com/security/cve/CVE-2026-33116CVE-2026-33116CVE-2026-33116https://bugzilla.redhat.com/24577392457739https://bugzilla.redhat.com/24577402457740https://bugzilla.redhat.com/24577412457741https://bugzilla.redhat.com/24577812457781https://errata.almalinux.org/9/ALSA-2026-8469.htmlALSA-2026:8469ALSA-2026:8469
��,dotnet-sdk-8.0-source-built-artifacts-8.0.126-1.el9_7.x86_64.rpm��,dotnet-sdk-8.0-source-built-artifacts-8.0.126-1.el9_7.x86_64.rpm�ψ��U	�0�sBsecurityImportant: giflib security update���lhttps://access.redhat.com/errata/RHSA-2026:8859RHSA-2026:8859RHSA-2026:8859https://access.redhat.com/security/cve/CVE-2026-23868CVE-2026-23868CVE-2026-23868https://bugzilla.redhat.com/24462072446207https://errata.almalinux.org/9/ALSA-2026-8859.htmlALSA-2026:8859ALSA-2026:8859
��|giflib-devel-5.2.1-9.el9_7.1.x86_64.rpm��|giflib-devel-5.2.1-9.el9_7.1.i686.rpm��|giflib-devel-5.2.1-9.el9_7.1.x86_64.rpm��|giflib-devel-5.2.1-9.el9_7.1.i686.rpm��̌
�V	�1�vBsecurityImportant: openexr security update���]https://access.redhat.com/errata/RHSA-2026:8888RHSA-2026:8888RHSA-2026:8888https://access.redhat.com/security/cve/CVE-2026-27622CVE-2026-27622CVE-2026-27622https://bugzilla.redhat.com/24442512444251https://errata.almalinux.org/9/ALSA-2026-8888.htmlALSA-2026:8888ALSA-2026:8888
� �popenexr-devel-3.1.1-3.el9_7.1.x86_64.rpm� �popenexr-devel-3.1.1-3.el9_7.1.i686.rpm� �popenexr-devel-3.1.1-3.el9_7.1.x86_64.rpm� �popenexr-devel-3.1.1-3.el9_7.1.i686.rpm�ϗ��W	�2�yBBBBsecurityImportant: kernel security update��]�ahttps://access.redhat.com/errata/RHSA-2026:8921RHSA-2026:8921RHSA-2026:8921https://access.redhat.com/security/cve/CVE-2025-39766CVE-2025-39766CVE-2025-39766https://access.redhat.com/security/cve/CVE-2025-68741CVE-2025-68741CVE-2025-68741https://bugzilla.redhat.com/23946482394648https://bugzilla.redhat.com/24250462425046https://errata.almalinux.org/9/ALSA-2026-8921.htmlALSA-2026:8921ALSA-2026:8921
�Ekernel-tools-libs-devel-5.14.0-611.49.1.el9_7.x86_64.rpm�Ekernel-cross-headers-5.14.0-611.49.1.el9_7.x86_64.rpm�Elibperf-5.14.0-611.49.1.el9_7.x86_64.rpm�Ekernel-tools-libs-devel-5.14.0-611.49.1.el9_7.x86_64.rpm�Ekernel-cross-headers-5.14.0-611.49.1.el9_7.x86_64.rpm�Elibperf-5.14.0-611.49.1.el9_7.x86_64.rpm�Ϣ�&�X	�3�BBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update��>�Y	https://access.redhat.com/errata/RHSA-2026:9683RHSA-2026:9683RHSA-2026:9683https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://errata.almalinux.org/9/ALSA-2026-9683.htmlALSA-2026:9683ALSA-2026:9683

�cjava-1.8.0-openjdk-src-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-devel-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-demo-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�	cjava-1.8.0-openjdk-headless-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-src-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-headless-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�
cjava-1.8.0-openjdk-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-devel-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-demo-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm
�cjava-1.8.0-openjdk-src-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-devel-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-demo-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�	cjava-1.8.0-openjdk-headless-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-src-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-headless-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�
cjava-1.8.0-openjdk-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-devel-slowdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm�cjava-1.8.0-openjdk-demo-fastdebug-1.8.0.492.b09-2.el9.alma.1.x86_64.rpm��́k�Y	�4�SBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update���
https://access.redhat.com/errata/RHSA-2026:9686RHSA-2026:9686RHSA-2026:9686https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9686.htmlALSA-2026:9686ALSA-2026:9686
s9java-17-openjdk-jmods-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmp9java-17-openjdk-headless-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmo9java-17-openjdk-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmq9java-17-openjdk-headless-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmw9java-17-openjdk-static-libs-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmv9java-17-openjdk-src-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmu9java-17-openjdk-src-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpml9java-17-openjdk-demo-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmm9java-17-openjdk-devel-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmk9java-17-openjdk-demo-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmr9java-17-openjdk-jmods-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmx9java-17-openjdk-static-libs-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmn9java-17-openjdk-devel-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmt9java-17-openjdk-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpms9java-17-openjdk-jmods-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmp9java-17-openjdk-headless-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmo9java-17-openjdk-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmq9java-17-openjdk-headless-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmw9java-17-openjdk-static-libs-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmv9java-17-openjdk-src-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmu9java-17-openjdk-src-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpml9java-17-openjdk-demo-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmm9java-17-openjdk-devel-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmk9java-17-openjdk-demo-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmr9java-17-openjdk-jmods-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmx9java-17-openjdk-static-libs-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmn9java-17-openjdk-devel-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmt9java-17-openjdk-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpm����~�Z	�5�oBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update��)�Z
https://access.redhat.com/errata/RHSA-2026:9689RHSA-2026:9689RHSA-2026:9689https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9689.htmlALSA-2026:9689ALSA-2026:9689
�pAjava-21-openjdk-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�nAjava-21-openjdk-jmods-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�hAjava-21-openjdk-demo-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�sAjava-21-openjdk-static-libs-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�iAjava-21-openjdk-devel-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�rAjava-21-openjdk-src-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�mAjava-21-openjdk-headless-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�qAjava-21-openjdk-src-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�kAjava-21-openjdk-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�tAjava-21-openjdk-static-libs-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�lAjava-21-openjdk-headless-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�gAjava-21-openjdk-demo-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�oAjava-21-openjdk-jmods-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�jAjava-21-openjdk-devel-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�pAjava-21-openjdk-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�nAjava-21-openjdk-jmods-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�hAjava-21-openjdk-demo-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�sAjava-21-openjdk-static-libs-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�iAjava-21-openjdk-devel-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�rAjava-21-openjdk-src-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�mAjava-21-openjdk-headless-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�qAjava-21-openjdk-src-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�kAjava-21-openjdk-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�tAjava-21-openjdk-static-libs-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�lAjava-21-openjdk-headless-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�gAjava-21-openjdk-demo-fastdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�oAjava-21-openjdk-jmods-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm�jAjava-21-openjdk-devel-slowdebug-21.0.11.0.10-2.el9.alma.1.x86_64.rpm��̅�[	�6�KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update���Khttps://access.redhat.com/errata/RHSA-2026:9693RHSA-2026:9693RHSA-2026:9693https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22008CVE-2026-22008CVE-2026-22008https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-26740CVE-2026-26740CVE-2026-26740https://access.redhat.com/security/cve/CVE-2026-33416CVE-2026-33416CVE-2026-33416https://access.redhat.com/security/cve/CVE-2026-33636CVE-2026-33636CVE-2026-33636https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9693.htmlALSA-2026:9693ALSA-2026:9693
�>"java-25-openjdk-jmods-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�6"java-25-openjdk-crypto-adapter-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�="java-25-openjdk-headless-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�;"java-25-openjdk-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�D"java-25-openjdk-static-libs-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�<"java-25-openjdk-headless-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�?"java-25-openjdk-jmods-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�A"java-25-openjdk-src-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�7"java-25-openjdk-demo-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�8"java-25-openjdk-demo-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�C"java-25-openjdk-static-libs-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�@"java-25-openjdk-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�:"java-25-openjdk-devel-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�B"java-25-openjdk-src-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�5"java-25-openjdk-crypto-adapter-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�9"java-25-openjdk-devel-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�>"java-25-openjdk-jmods-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�6"java-25-openjdk-crypto-adapter-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�="java-25-openjdk-headless-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�;"java-25-openjdk-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�D"java-25-openjdk-static-libs-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�<"java-25-openjdk-headless-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�?"java-25-openjdk-jmods-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�A"java-25-openjdk-src-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�7"java-25-openjdk-demo-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�8"java-25-openjdk-demo-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�C"java-25-openjdk-static-libs-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�@"java-25-openjdk-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�:"java-25-openjdk-devel-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�B"java-25-openjdk-src-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�5"java-25-openjdk-crypto-adapter-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�9"java-25-openjdk-devel-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm�Ϭ�@�\	�7�kBBBBsecurityImportant: kernel security update��N�https://access.redhat.com/security/cve/CVE-2026-31431CVE-2026-31431CVE-2026-31431https://bugzilla.redhat.com/show_bug.cgi?id=2460538show_bug.cgi?id=2460538https://errata.almalinux.org/9/ALSA-2026-A002.htmlALSA-2026:A002ALSA-2026:A002
�Fkernel-tools-libs-devel-5.14.0-611.49.2.el9_7.x86_64.rpm�Fkernel-cross-headers-5.14.0-611.49.2.el9_7.x86_64.rpm�Flibperf-5.14.0-611.49.2.el9_7.x86_64.rpm�Fkernel-tools-libs-devel-5.14.0-611.49.2.el9_7.x86_64.rpm�Fkernel-cross-headers-5.14.0-611.49.2.el9_7.x86_64.rpm�Flibperf-5.14.0-611.49.2.el9_7.x86_64.rpm����R�]	�8�qBBBBsecurityImportant: kernel security update��M�https://access.redhat.com/security/cve/CVE-2026-43284CVE-2026-43284CVE-2026-43284https://bugzilla.redhat.com/show_bug.cgi?id=2467771show_bug.cgi?id=2467771https://errata.almalinux.org/9/ALSA-2026-A005.htmlALSA-2026:A005ALSA-2026:A005
�Ikernel-cross-headers-5.14.0-611.54.3.el9_7.x86_64.rpm�Ilibperf-5.14.0-611.54.3.el9_7.x86_64.rpm�Ikernel-tools-libs-devel-5.14.0-611.54.3.el9_7.x86_64.rpm�Ikernel-cross-headers-5.14.0-611.54.3.el9_7.x86_64.rpm�Ilibperf-5.14.0-611.54.3.el9_7.x86_64.rpm�Ikernel-tools-libs-devel-5.14.0-611.54.3.el9_7.x86_64.rpm���	�^	�9�wBBBBsecurityImportant: kernel security update��L�^https://access.redhat.com/security/cve/CVE-2026-46300CVE-2026-46300CVE-2026-46300https://access.redhat.com/security/cve/CVE-2026-46333CVE-2026-46333CVE-2026-46333https://bugzilla.redhat.com/show_bug.cgi?id=2477015show_bug.cgi?id=2477015https://bugzilla.redhat.com/show_bug.cgi?id=2477802show_bug.cgi?id=2477802https://errata.almalinux.org/9/ALSA-2026-A009.htmlALSA-2026:A009ALSA-2026:A009
�Jkernel-tools-libs-devel-5.14.0-611.54.6.el9_7.x86_64.rpm�Jlibperf-5.14.0-611.54.6.el9_7.x86_64.rpm�Jkernel-cross-headers-5.14.0-611.54.6.el9_7.x86_64.rpm�Jkernel-tools-libs-devel-5.14.0-611.54.6.el9_7.x86_64.rpm�Jlibperf-5.14.0-611.54.6.el9_7.x86_64.rpm�Jkernel-cross-headers-5.14.0-611.54.6.el9_7.x86_64.rpm���N�For detailed information �changes� this release, see�e AlmaLinux R� Not�0link�Nfrom�'Referenc�sec�^.T�grub2 packa�gprovide vers��2 of�?Grand Unifi�VBoot Loader (GRUB), a highly configurable �5customiz�b�:l�:with modular archit��ure. ����support�bvariety��kernel �.s, fi�]system�
compute�Vs,��hardware�uvi�.
�mshim�r�é�ns�rfirst-st�UEFI�that h�Tl����ining to�7tru����ull�3un���ur�environment��S�i��Fix(es):
*��: Integ�Bflow��_net_recv_ip4_��ets (CVE-2022-28733)�HCraf��PNG�aysca�=im�nmay �Kd��out-of-bo�rs wr�J�sheap�^1-3695�]�S�R�Qd��7huffma��)�V��g6�gJPE�hc�>�hb�N�,������7�ZOȤwhen��split HTTP�Id�/�n4�M�[_lock�X�B��l��s non-��i�D��e�*d�Q�buse-��r-fre�ӳcmd_���k()�B�=��: B�ov��ޢ6��c�Y���H�+�mo�F��+b�ګ[s��issue(s�inclu�[� im��t�4CVSS sc�G�
cknow�g�
��o�/r�a���,����1�R����g�m�s�,�
��w�f��3�S�!,����wany�oper����v���C: Sma��ڡ8�b siz��TCP sourc���gen�^�algor�+m���*�k�1012)�{rac��di�-�qp��_ev�f_�ƤT�|priv���Je��^�Y729�Ya��c����sub�$���l�r��t966�tb��mIP�� ESP�wans�co���76�K�
Bug�`make SHA512_���.s�CRYPTO_USER�4��-��(BZ#207264�SR-IOV���n�*> 50%��d��34830�3fix �a�rup�ia�
d by dm�gt�=�F�98218�_SC�1cli�$-s�jpeeloff�ns [al�(�_-9]�<404�N�#��n�	 f��in��asymmetric�<u��itu¼8548��F�6�h�fMultipl�jT VMs ea�B��vCPUs�E��6spec:����para��too�X�hd�-9�u��c������	���eeh_pse��s ob�v���vm�oi�!t�=p�d,�kdump���ggere�n225�%Mark�C	�X NIC d�j�vs�mai���7638)�lib�2	ve�
�mm�L�rary��cre��r��sev�l dif��t
st��7�K�	�KGNU�r�	pio�/ISO ��0 CD-ROM�z.
L��is �f��Jy�'bsdta��til�t,��rip�l�Au�bin�ws
su�$��
yth�~�񤄦�pop�
desktop�`
�ag�����J: an�<	�+via�Mmpon�+ zipx_lzma_al�_�B
t
�62���7�
�<�
�l�inp��i�P�J�;���-�M�b	�6
�rs��ap�{	c��s�Ene�Ndir�sly�H�����X���%:�� st�
vul�b�R��
�
$215�	java-11-� jdk�%�<O�JDK 11 J�/ Runtime E�����+Soft�
D�rlop�,Kit�
fo�"��xhave��up���a ��r��w�:�(11.0.16�8).�]77����: ���Krun�y���BXa�b-J (JAXP, 82�h07�y3416�5	�Oclass�il�N(Hotspot�F1859�1�X�F�&r�
 ����I�
Me��dH�[.invokeBasic��a�	�a1�	rh1991003�Bt�br�*�Rn.��.pkcs�wr�Yer.PKCS�getIn��^�7�,��P�[�9�e�z�GretKey�e/im���/�don'�d�CKA_SIGN at��bu�@FIPS�e�{107�ǡ{R�t�	s��	�v���1t�q���e�etoge���v�5�h.8.0�-8�,�*�T+��(�.342.b���06�$08�/���V/�z��95�V.�u�-7�X7�X�+�T,��(17�(4�W9�&�a�N�ex�
ia����L�i��J3875�J9�qPr�ous���Cs�r��a�I��he�Wgu���vss����i��rd��fac��������i������Ha�~�#m���\�mo�i�*����5at��
whi�nde��d���� r�=�\��!e���3����
�<���s�/W�0p�v,�Lc�z��q��wou��������la�������e�U�`����w�ced�a�
�IN�����c�P�a53��ޢ/r��>���V wa�����������requi�~u�Tbo�h-D��}�HeS�LP�BF�4=���<-D�.��.fips=f�	e�=�,�ڢa�n�{����c�b��tr���{�F�1l�,����ha�}�
r������I����7�fe��,�Ṇ��-�1��@�r��=a �M���a���e�
�s�m�F���(�!���ed¶3)M�aDB��a�F-u��,�th��SQL�Fb�������r�4�pomp��5��My�4. �5�g�ra (26�11),���db��0.5.�	�ysql-sel�~(�C5)�K�=: ���ough �M9���ack���/����on�r_co�_to_i��`��BIGINT�typ�l��,1-4����������v�	���bleng�f�
��-�l���f�o�-copy�m�=
�$xed-�;s��-��d����8˒���7ex�G���Lbj�j��p��.�(�X�,�v50�	a��bef�sus��a���4����u1�uCONNECT Stora�pEng� H��1�Ov��P�kE�kV��p2�p�r�3���r �!I�_�s::walk�
�D��6�D�pois�q����lex���/"�vol���gblob�X7�X���nsh�0�Z_tmp_�)::f�;�&�F8�F�]��_�B� or::�e_r� _���X9�X��my_d����::�uor=�A80�AField::s�!defa���=�y�z�s�	��	�c�T���R���f�x�!�[s/upd�m�+_map_��_�
�o�S��r��$ca���8bit�`
�Ic����*.c�V3�V�#ɺ�<��ct::�_�5r_c��)r�G�W4��e�nquery_a�a����$��SEL���?%view�`���d�(_��_s�8����V�]HAVI�>#��NOT EXIST�
d�0����[a�744�����_�]�f445��IS NULLޡ�_�;B��T�j��_�M�J�H���v����lit�)#oup���G�R�4�/i�L�z.cc�A�;��wi��w�in ��ess�
ORD�BY�O5�
�‘�u˔5���LWHERE��	�h�	�8
�e����q���d�(˩VD�/:��/���_�ȴ���h
�
�K"dup�ue" erro�;	f���@g��ique�P�$�)o5�'�*��%�T�un�
d����/�=b�up/ds��
�31622�Xk�C��ex��
�	�VIEW�ggreg�\�9�S�|
5���n��fi��_�:��d����g�^an���
��mon�d%�b(CTE�D�1˚�13���_�,::�Vɹ����B&�>���|3�|�+�&s��'�_postjo����=a��#��
�ă4�� ���0s��ȏbe�#�j��k����Ĉ5�-�y��~D�2IN�	�8��(�m(��csi_io�q!�h*049�[�k��c�,w_�(��#(/s��	d/cls_api�%
���J!��ower9 - LPAR��&t�&�Sha�,��c��������C&��s��[H��T22��H��.����+�\&�e��-�ss-ng�`���s�O5��R�i�V�����|nam����>3�gfs�,F�y��0(�Ll�
�5*�en����� t�P0t�K730�i/o���i�~
��u���:�Kwork�;�j�g��
����372.9.1.el8.x86_��[82�k	�c�(�tes�v��3�SSATA�M7�6Guest���re�����3 mig�B���21�� ���-�J�<(�{Oops ���~l�t�[ �?�IRIP�q�+_�K_�_label�r	�g�+�!�s�l1�\�l�	
BUG:�U�H���%��tas ���(n����'fs4�ton�
�;��lookup�r��lpa��ɢ�: K���o�kad��a�=ig:�C$[#� ����+tu�bon��t�D��(P10/ ibmvnic/����L)��3�)��S�����^vm��O�U��m��q�\e�'���)
Enh�f�^�'�B�u/vt-d���+DMAR_UNITS_SUPPORTED��� ���U5326).NET�V��d-s��fr���D.�5����a�}-e�E�C�- API�^	s�(n����i��P�u CLR�Z��.
N�/�����_��dd��a��T'����vail�D�3�
d�U�'�VS���%108������%��dot�: Ext�OE�2�"Inj�K�2XML�`nat�G�1���.47��:�I�ZJ�-�9�Q9���L9���M�NDen�OfS�\ice��ASP�]C�MVC���H��0�<M�lS�
D�i�r�u��.�v801��wRub��a�ens������p�:��.�-or�&0���-��h�e���2�5	 t�Y�O5���-�����,sks���4Pr��(3�
"�	"�Y428)�J��Hou�!�(R��xp���!��5�9�:��5��	�=S��-to-F�Pt��E��L�
���f�>�f�b�i�a�M�.daem�0�d)��m�5
�2�k�1�al�"�7H�w (�(0�J�8���J�2�i6��:����	r��2un�d�>��%(��2 Apr ��r#412, �4�35�6�7�8�40�52�9�6�78��x�D�����3�NRe��$V5�VInno��/��j1�51�2��DDL�/�2���iFTS�$=27�NG���Plugi�%�5ʲPAM Au��ZJul�Z5�/Zε�Log�"
�#R60�R�!`�
50��5�;526�7�8��O30�1�53��o69��R
�"5�+��T�3���� �gP�=	d��.�22�v��ede��,d�$@4���:��
cry�i�#_�d	�z�{�,D�r logro��)��
�[wr�7���8�l92)�Dd����=�A��=nft_���#9�r3491��?���>�3>�Rd��7�r%�0���6A0�l"�R�z/mlx5�<numb�f�fc�{XLT entr����227��8,�it�j�7)�V��un te�-E�=e-n�
hop-��
.���G53���N���n!un�
c�FMSR���: WR��0x�1��amaz�4.32x�Li��,��	�nX86/p�X�S/UV�cS��F�$�{:UV5 �)��
773�b�^�:�mf�2�"sync s�\��M��|b�e%mq_��_��:�[2_�*e�[9��0.z�,111��+��NVMe/�?der��a��
�&,�KD�=onic�<�R,���^77�~Ad����)�nvme��?�a�-��7��(/tcp�9t���+�z
s���-G�(rq(�)_�)��l(��ue)�O�M?��I�K-an�!ce��g�Y�&929�x�; 9/ppc64�I�jSo��F�
& "�{�
�*s�"�=�a�T�lscpu�,���Y
17�.�
*�/��?sh��ll�6�AMX fla�=amx�)8, �	bf�- �H82�����h�?U�"�!4�!avf�"194�I'i40e�"9�Berk�7��t�t N�Dom��(BIND)����)�5��, (DNS)�oc�@. �E��� ��J(�d);���(r�1��A����=o�S�Z�����%�~;���uA�=v��*�2����is��7ly���-@:��9����x/e�ns����&�����l��!-�Q�.�D>��min��un�edly��0�C(����sECDSA��SEC���D�$(�"�Fs�Gd�G��������10���8�g!��Nuget���7%�߱1��	��&orld-�����+�A�}�U4�r2�U�r�h�8����7��FBy�p��(M�(JGSS�}7607�q8216�g�eex�	�E�a�A
�ci��8.5�W�#�`�Cr�k(���h5�N�h26�hHttpS��no���Hcount��m�r�<8�2 we�8 �M�2�c�#�c�̯2��M���Q$NTLM�h����s��26�,9�_ns�j�*�F�9�Q�iJNDI��M�s�����0ƿ4�_��	SNI�{����/2 (N�!��O93�93939���Pr�Ie� �4� �,r��v�n�r�37(�1�7��;5��=�329���nA�
�o����b
H�V��K7��18�-KSB�)p�̱�c��Kasbah�?�����R�s�8(well���MS e�CBly����;��5�. �xZth�i9����=����M
S/MIME��TLS�D��k�����C���Mr���U���1���P�����&O-��(��a�q���s��t�; �;�~�<,���!�O�~̔:�(�"$�Wby�	C,�Wd��!��n�"���U�2<�U0bs�t��\��S�5��41��)��z����a�],-pur�,�Zssl��=�54�h�Q�s>by���T�#�����?X���,>��-r�z�l�����
�20�4�M.g�SS�[�5 f�M4�743���U��ix ���	r��1�,�	�.�
"S��$�Un�(d�T��K�TPTRACE_SEIZE�W��O�/-SPEND_�COMP�0D��059�������-/�Z0�g0��T14/G2�D�p�V(mt7921e�})��0�K��1��v�jAt��4���e��.�/7Ma�bEx�ea�scr��&�vVGA�*:�iU�
some�a�]120���U��o��a�F�9�h��U�.�o DRBG�f��1mi��y��c�]
�E
�� ��1�\w�od����0��3�+� #30�G2�$34s! [sw�q/30:0]�O78�\#�j����(D�"�lB����}6��p�*qemu-kvm  pfn:68a7�_#0�?��vfio�J�E�p0s�E��2M ��s�>879���Vh�H2)�9�$�FN�W�.1 h��*o���?�@HPE RL3�
Gen���ARM�Q�XY�3��4��P��Y�{
�#�B,�a�G��Y�O,���Z�P,�[[�J��3���TM���H�y�3l� dynam�`�.��<��d���l. ������J�2���B�'_ll�C�\*,�<o�
e�H�_>���s��Z��
�� �4Fn��L�
_F���9,����nam�{�dd��Kt�gv���)�gt�`t��o�3S�0-�?���plua�>	����Lua��p�ful�V�-��x �l�p2ed�>�/���L�w��lso�%.�F��J�|	�F�	, �d-�T\�5/�
u�
�s#�o	�G_�!ms��de�.c�>un�x�}K�0�)�?�f�30��ibg��!f�M�	��������ࡖ�d�� �`l���e�8k �_���y��ein g��$�0As���0��	211�!	�"�
�9C�$s:�Ҥ��j�RRk��-v2v�
�%���7��?�� �cKV��$�#
V�-M�-) hype�|4sor�.
��E�
i�I�3�)�*���}��%��O��Ui����oci���{�+�Qa��.�zso,���)b�-!��%;�ۢ�IO�b��f�`���p�#�2�P�$���Google'�Q��uQ��.�3�Cen�vs�OQ��md�? ��dyet�O6�R����fl���n6�8�"autom��me��ism��ser��<�Ł�c	���-c�&�
�?	n�nchar��. �fbol�N�%pt��r�y��1-�+�c�9�S�hx�a	 pa�jT������	e��#
�+�Ach�E$s��M�?�vo��(�s(un��w �,M-�/���Zx:����k�i�d@ad_sa�Y$s�	�E�?NWAV��-�23�R@�>���	�	s�$�&���	�n��(�^�{����i�l1�9���X�s.�q�Y,���~�()���;of�~ed�G���0�8����85.��80603��<���3���J��nw�CFCo��NumOfNWF��7�K��d�=��s�'	�H�F8��q�>Qt5����Qt 5,� 5��th�cro�F�y/��I�)�-q�(QP�a�Z���LX���?r���%�(�GFo���s�xPATH��gm�>8unb�u�2�w�X��c�`�m� �Q ����,�-�+Z�5����Z�Cj2��a7�����4:�T�'g�T! d�P/�Z ��+��L�Z�Pi�^d����4�c��S�!���6I�c1�q��u!�4�'�1�>�Ywa�RRs�	��.�+:�
��:�1�j���"��Y�5�r�{03��z�:FLAC��0F�
L�� A�8o�G�M. �*�
����s��Ogg Vorbi�2bu�
�8�.�0��V^c�7D�'��Q����Z���Mr����2R=, a command-line program to encode � de�
FLAC files,��;metadata editor f��2.

Security Fix(es):

* flac: out of bou�Ww�$e in append_to_verify_fifo_interleaved_�4stream_��r.c (CVE-2021-0561)

F��more��tails ab�pthe s��issue(s),�xcluding� impact�(CVSS sc�G�
cknowledgment�o�/r related�F�mation,�f��U�R�� pag�m lis�,�R�&��es���:�6Ad�O�
al Changes:�Ҥ��j �c�%�Tis��eas��see�fAlmaLinux�p� Not�0��k�NfromΎWavP�� is��pletely o�� a�7o�ress�����Wvi�Slossl�, high-qual�~�y�Vunique hybrid�Nm��. �Jwavp��: Heap�R-of-�R�a�eW�#��Sa��s()�044269�<1Pop�gr�1Portable Docu�	 F�!(PDF) r���'ibrar�us�`by�lic���\uch as Evi�l�[p�y: A�_gic error�:Hi��::� fun�� ca�u��deni�A�aervice�'2-27337�<'T���tiff ��a�icon��n�$�����s�c�ipul���XTagg�hIm�=�le�_TIF�`�
��}: D��S��vi��raf�R�I�H��i�BNull source��� l����"^2�^�����Has�����.865�.O�R����!cp�=924�=st��-buf��-o�flow�:�rin��in�K2-135Ą��_��memcpy�>�T_�x���p284Ĕh���� “extr�W�S�[�9����p�Pd�\a�vrg������b��FetchN�[l�s��dir��ü0908�tDi�
e By Zero�rop�89��������RawD�	Striped��f�����N�:�O�	JPEG��n�	�[����B���
�i�����E2000�=	���ajpeg:���m��fault�Fopj2_��?	 due�h�[n�v�w	z�Ҷ��122�<D��cot�IMAP �S�ݲ�U�UNIX�R
k�hy��m�)�(t�Opr�*ri�owith��ind. It also�7�r	s�l POP3�t�xsupp�	s e-m��Bei���� �box�� �SQL dri�Is�u�1nt�	 plug-�zr�P���Osub����d�): Pr�&le�escal�Zwh�Simila�s����non-��db�|�:
��30550�<�X.Org��-��i�[
����AX W���S�س��!s� bas���-level��	�$th��	f�-f�k���phic�use�Et�a��a��sign�&up�:�qxorg-x11-�: ��S��ProcXkbSetGeo���
��acc�[�31��W�7���bDe�
I�����st h�I�<
�@kb��en�
�t2�=�Yet An��JSON���(YAJL)���[��nt-���SAX-style)�7par������ANSI C�K�Cv��da�
�5genera�G��yajl�
a�#��,�?�O��
�Tput�	a��t�c�5�S4795�<T�>kern�����3�W�!,��1��any��fr�(s�E�
ff-pat�'t�
e�1�)j�� �o�Ter�8at���m's TC�s�a0-36516���h-�r-fre�6ul��bi�in�I��_sock_s��ms�#
�N1�N40�Msmb2_ioctl_��ry_�� NULL�
der�I�
16�S
�*��udf_expa�C�[_�xicbd��)��g�lba���[617��wiotlb�!��k�|	DMA_FROM_DEVICE�?8�\
*�ireg���4	�t�r��nft_do_�ui�|�$�9�,�UM�0��rac�*n��Ws��pcm_hw_��l�v���M4�S� ���o����4�bm�����ŷ���a��rup�����e8�#������y�wbetwe�`drm�Ct��	�,�k��_get���xs�b28�c�K�Y�����pfkey_���:353�	in �P9k_htc_�be�_
��Ocould��an�
of���
ß67�)�	�x86_em��e_�Sn�ê��GoS�N85�#fa��-�suse�$d�:t�e��w�.	h���G�99�nf_�s �ss-��pot��|	�@£lo�	����g258���u���Fs�G�=	�"���^	_sfa_s�f�263�`slab-�~	�et�cv�2�3�din�� c��n-up��m�hi-�sh�p
��乮 SBDR�N�Y3�Ni�]arch��ctural�l�TS�T5�T�pecif�T��R��C���L�_DRPW�_6��po����0�debug����Nz����o����cho�A149��AMD:�+tBle�@Arbit�f	Sp���)v���~Ex��O�~�2ur�Ln�u�q�816, �9900�nBran�Typ�[nfu���Fretb��)�L�cIn���ost�t	rri����S��B�	P�iȓ637��dou�H�R��_usb_��rt_xmi��a/net/�/�!/�)�839���xf�٦XSUNRPC�w�)�589���
impr��9
d����c���_��sched/cl��32Ę958�k�5�?��ӣ`���fqnl_m�	le����C��/nf��	�hueê3694����dis�0�bin�8al�y���D91��nfs_���_�(����s��	��*�aENOTDIR��44��:��ba���M�,�Blo�)
SMB)�toco��+�8C�!o��t�xt�S��IFS�;,��jPC-�����ma�	ne��^�{!pr�*��v�ou�,�C�s�hfo�U��kha�ib�T	up�;��a�7up�K! �x�G�X�,(4.16.4). (BZ#207748��v�2��8�7
�A���E1�?274�=x�Sldb��p�
�J�m��c��%LDAP�API�/�<	r������Zor��	TDB����u�4���(2.5.2���
�AD�(s�i
��u��a���l��p�����
 add�od�h���6�<�Python��pre��,�ac�F��b��-o�	n����&m�Vl��u���v�p�d��u�[cl��excep�x�ve��$ �dynam�R�t�D
��d���l. ���h�to� y �	c��C��i�b'�sell��.��w�@����7Vp��3.9 (�.1���H24�%�e#�6:�2cap: fi��a�()�
do��n�sa�	z�se��f�A15�0��^�O�Wre�Q�y�;/http/��.py����	c�r&ur�1��>.(��#rpc��Sun�U's�|	�
s�7-i��*��r�d���9��#-��)�d�T&�F���C$�i�y���e�-���������l��:���9lots�onn�s�z46828�@zgc�u��cil�f���C++, Java,�-&�y, O�F��3Ada 95 GNU��D����)��:��r�e��&���ib��%y/rus�Te����,461�>�G��!����u*��!�?b��=��)�*��C�����d�u���-GNOME�m�%loop�!,�n��se�=/����)st����c���Rur����: g�;repla����G_FILE_CREATE_REP��/E�	STINATI�c�\�|empt�V��t��d���m���1�w�>zl����dl-pur���
�/�!�x/�s��b�`	��
dif�w���L�R���-�1w��F���K�r��(�-
�&��der�8���.
8�A03�=<.NET�n
��a�n#�*ftw���ework���.�m��W�C�-�@�sev�y�w��V��	CLR��"N�0��O	�`�����(a���	��n�f��il����&��d�U�'�VSDK 7.0.1�)RC 2���R��me����&�4�
dot�67�X(�}�
3464��;'�7��,�jcach��,son���-��z��ld-����+�Z
���41�W�9�
����C�m��!�Yf���7���8hod�P2919�PVarnish C�7�"��6p���`n�VHTTP�)l��%�)store��b�m��"so��H��n't�:to�L	�a�w�@�%��g�, giv�*�(s���
)�ant�e�)�v�����Forg��V�P��5060�����6�q13���3.�<�6���s��5445�n��Par�r���b�p�p��e�3�I)��J���#�2��(���5sh�����3-2���	j�-17-�;2dk��<��2�17��Environ�����+S�2D��op�,Ki��2�?:�*��ke�A�(���DTLS�:JSS�#�57411)�83�!�Ys�gba�iURL �Blo�'(S��I93��I4�Bug�pIn FIPS�e�d�of a��1�+����
N��w�T��m�:	�	��K���!-only�]���-no PIN �)��ed�i�r�8-ed…��4�e�^�_(�Do�뢏�%. �P�"�L�	���f���u���wo�p��"t��-�ps.n�G2.�@+nd���-�H'an���ffigu�R�F�>��l����t.�*��9or t�o�	ly�9�LA�s���\�~tu�E�  (RH�04747�"P���_�5n�� �c?r��f����/�J��01,���6) [a�9l�0-9]�3097)�G1�G1�G�+�G�0j1�8�k77�{*�k.8.0�n8�m�*�&li�''re�g�T�FCORBA d�*��%�6
(S��v5��v�E&�Fv8u362�t991�C-solr brok�~.�,3��"�Be��"��io.��%P�E1�(" "/�>/pki/�!/ca�s��"�w�s��-8��63594���S�fA�T�>�F�'�>E�>�2�@�q+057��J-�ԢV�+�Gc�)0�%�Hot�F���D at�%?�j*5�s7�\�%�1?�&@���^9�
0�^A�sAfa�:;��20�QIn�6�0��-�a��Cl��_�V_c��W� �g7eOff�/.��!�),�&	un��-d�ed o�-�d�&,v��su��
��b��1�kt�O�,�OF����o�*=�,���e��e� �(�&���x�J� a��-a�&�K. ���Ss���6�����<b��enh�Yd�#�'������� re�(: Mac���Ka�-sc�0Bt�Te�~-�R314���C�-�Unt����Zs D�1I�C�,f�me V��8�c�/05�dS�dc��2-�5Ve������fR�"��P����W�!��/��	Wi�u��n��}M�2>�8Ő6ǐW�*�4Keys�0�H�Z�8�E:�@t�z�/��6�[
l�%�
@495��U�S�TAX88179_178A �3;USB e�K�-��5.�V64�Vi915��We�NGPU TLB��ushïra�lm���$>413ï�t$�;�u�1me�{.���9�Rg����I�X3945ò2�n"b�&
e��5ngt��V5�@Gismt_���
5��7�YUn��d�U+�n'�[PTR� SEIZE�e� �O_SUSPEND�CCOMP�1�q0�	�wt�W9.2:��M�D3avf b�)fixes�m)78�9vf�MO�Q5��m�i��!�t��32M ��7�|�)51�>nvme-tcp�Co��c r�o)��C�Xm�"��;EMC�w��� NDU��13�q�D�4 U��/5.19�)�-�@WARNING: CPU: �V6���53440���6/��8/mm/���c:105�_��l�9f�}��+0x3f/0x50�58�`
�::����e�9l�jK�-:��acy_scr��9_�09��5��i�o:�&or�$���m
�n�p���%el�arough�fs���3�*�"-EINVAL�I�S69��DE�:�:�02i�5+boo�)H�Z7RT�~��
��c12�"921�
N�w��al�=2�̷�VGA mon�S�t!�:�^�. 9�-��acy�5o��e�e401�P�>�dy��6"Dummy��it"�N	kar��!t��9����M2��=ppc64l�Qun�, o�Gpan������e's�
	�c�alef�6zsw�Lt�/�Z39�fatal�t:�tK�=�G	�8�$�g�3�q;r�b!�M�b0� AMdCLIENT: �5�� ���ame��"no�:�"�̪�
���8�\�7�\z�I:�4I�v�*
�9-�ECI_�5MA�@MEMORY�me��0VM�' ��S50910�S z-�:����imes����
oy�nVMs�9t g�y����)���+�
���s16��	��9� !T�0O��DE R760��,���
e�sob����g�����Eun�e��ss�l�>�bash�B�(Bou��-� ��ll)���'de�8K��B
����p:�b�c��
_�_��,�^��71��)KS��(p�d���Kasbah�#E�t� ke�_G����%�s� �}MS e�	Hl�9	�4by���
. Both��<��K�)o�mQ/MIME���,
ks�,4�>��t�WKde�&
�y	762�� �a�}5��rl2�N2_re�W#mbl��?du���;blueto�/�'����;5�����o��Ac�C���wL�|c_skip_sp��\78�Q�76__��42_ss�;i�$s/n�4�r���������T��~�4N��<��3�fDpay�6�)py_vla�s��[�u�0A�Q�X-�*�>�5
8��>��H)��: L�k T�e�G�Y���A ��
f� 14�S�hir�da�
s P�um�0+�	308�L	�d1�d���NMI�(dog's��r�LPM�	�xF�DSERVER�F��mdps���i���#Mto�T��
�G�g	a����8�`qla2xxx NVMe-F�
��0��12�2���@scsi/�=�_�?��70�S_��_�$e_wa�2��25/��0 [�#�21��Reg�,:��1
��L��vo T480�.AH�p�-C�/4�	���5�9�	S��@u�~M��(�9.2)�.79�
�<.�fNx_Gzi�nr�^�{
_cr����,r��#ed���u��������	�dlpa�
�lD�](FW�)0 / DLPAR��4�RMSFT, �0
A���
#P�p��-9:���{on�L-CQ�4(�*n��_i��&�Rf�,�b51�k�[
v�
�W�$;���3o�1EM�L�B4�F�B��
D�
�F�gs���&�F9�4�'��'���1o�Z��?��K�bs�=Cx g�L881�������Hto��nc�W��$��$�K613�XCEE �*hfs:�d
��;*i���?���BIP�I�9:��Bs_r�6�Y���ef�8��]�p41���|%y�zP�!Ц25���'+�}�����,^��!��:��IDN��b��506��ua�|
���ILua���X��S�Vght-we��C��>e�
�Lu��C�Vf�?���D
����2,���f#alone�k�ua��	�YG�_$Sa��WEs�~
�G<�$�y
�<�v
�_��um�8ld�[�Sa�>:�:a�^��^1�
���7ib��Z-�!b���$��y[m�;��*y�Y�Gp��0�h�m�F�b����j�Mse���b�-�V�-�'Cas�K��{bet�E�M�?nc�	����^g�L�_rgb_row�ordppm�1:8��[�b�tu��avoid�K��YQ_��9�	��ALSA�UAc�mMo�-rws��i�uE�n�
�Re��-�����) UAF�
2�M���-�y�.�T��MTC�GNr�
�-to-���).�H©��f��
�y- z�b�Bx �#�?u�e�s���thus���R� 	��`
Cg��ps_v2���8re�O�E*c�/��� �, ��)��pu�Ef���79sk�~l�?Q�gFe�T�z����������: Add��e�rai���
�)
�-r�W>�u:�
��Ocir�Mr�R���|Ac�+�Pe�(&n->��_�%->&p->�&�����606��S���.�AN_�bal�;3b���8������6�<�
10��!��/k��ip�Q���C1��kdump�K690��#gpio��es�3�X9m�������Kph�d&�*�+�E5����9 ��orvs���
�lV�o���l�T�;�`,�C�e
V��7���u E�"�k(�IBM�l F�=��1�WQETH�������%��.�^�l�'�� �����_ SPR�AMX��r���n�f�~s�p�B�O8�YQ)�OQ��W`�{adv��"�j�3�a��-�z#���(DBMS)��p�dsq�<�Y�.�\	s��#�p�selo����y]�# 6�R�_C�f��lF��<�"n��
�be�7#��QJ�`(�E7�186�"�FUSE��(�&l�]`�  �W�_"�}3�V�(��i��_id����Eagle�/���
����j���n�3Cstop�'�")bu�hutex�
��p�,e�m��/()�_�`�.�4i��&�ա�� �u��t0�0(�-44�H�_21��WS�HTML p��6�Y�>�y2�>9�>���'�\%o��U�.�A$c�F�S'�Z8191�Z��\�Z��`�5���
LS �?^nego��M�]3��]67�]�	�N/���jE�&[���l$�62��O����	�K��P�	B�6e�5���]8˭����sl��ZURI��K4�&�	�6����J�s6�D��crypt���e��i�J��algor�m��:��e"ed���D�
;�+�c�[i�\%�+�6�gD�%�$C�4�-��C�lc���6�9��S���ribu�.	���l;m�f	������;in�h��S��5868�e	Pr�(�ly�4X���#�
�r��un�nto��y.�/�;���e�2
�x�+���r�7
��b�.��7�k-s�e��dń��1�8��PKCS#�5�[����d7�i��sF�@t�1s��some�&�(��	 �Y�w�]hy�f�{u�-�an��#�o�un���-��.�n,�mr�E�
�?�)��$�|��&d�N��s�6�#�7���8�ҲI�938)
* OpenJDK: missing check for slash�aracters in URI-to-pat�onv�ion (8298667) (CVE-2023-2196�b
F�Jmore details about the security �{ue(s),�cclud��� imp�{, a CVSS sc�G�
cknowledgments�nd o�/r related�F��mat��,�f�to�R�� pag�m lis�,�R�&ences���:.

Bug Fix(es):
�/T�(SAPSSSignatur��le���o works wi�"�) keys via�cSun��: provider. Howe�I��t did not fully��tha�/�N�yuld be use�y��O�f�nattempt�Jo do so, lead��3o��bil��of erro��be�"re��n�_��custom��ms.���� valid��s���will all�!���I��h�"l�uch�2whe�at can�. (RHBZ#2188024)Samba�?�[ o��-sourcǐ�ܫ~erv�rMess� Blo�^(SMB)��tocol���+�JComm�AIn�net�
l�Hys�]��IFS�;,��i����PC-comp��b�1machine��s�Se f�H��pri�Z��variou�k����S�v�s��: RC4/HMAC-MD5 NetLog���1��h�6el� weak�bsh�>avo�yd��2-38���EDK (Embed��D�[lop�u Kit)�,��j�/�`ena��UEFI�xpport�Virtual M����;p�ɲ<��n�L��p�A64-b���Hfirmw��IQEMU��KVM. ����ssl: X.400 addr�� typ�kfu�i��X.509 GeneralName�t0286��edk2: �Xg�Eun�_f��i�mmEntryPoin�gn�5���pot�*i��SMM��v����escal�M�o1�/57�G��tim��}a�[�o��Decryp�;��z4304�Idou��fre��ft��c�X�\PEM_r��_bio_ex�D450�D�!-�<-�Gfo���CBIO_new_NDEF�@15�Addi�
���ges:�Ҥ��j �c�%�T�㡑eas��s�3�fAlmaLinux�p� No����k�Nfr���F�xRADIUS�zhigh-p����n��	�ly��igura��Rem�i Au�^��c��D��I�s�$��ice��e) s��,��s�ied�F�ce���z�a�R���oriz���a ��������r�Tus:���Ul�n�&�REAP-PWD�1859)�=Cr�o	�:un�*���1�ASIM�A60�Ain�}��inary �a�<1�<�X.Org��X Wind���H. It�	s� basic ��-l��a�	�
�"
-f�k��graphic�u��Rfa��a�߽up�Oxorg-x11-�>: buf��ov�<_GetCoun��Str�()�xkb/�.c�J5��VXkb�EKbdBy���283�ATestSwapFakeInp��s�n���D634͇IPa�
veUng�p ��-of-bo�.s��c�~�H1�HvdiS�0ctV��o�3ify�֡H2�HSc�)nSa�SetAt�abu���K�#I�Pro�k����4�IDeepCop�0erCl�5ȓ�?�1�����_49�eme�y�6�Q��c�(�
j�=�Pop�r�P��Docu�HF�� (PDF) �;�_
�Ilibr�o,�a�E�`s��
as Evi�l��p�y�
�JBIG2�co��u�mal����Q
�8784�<��Berk�8y���Domai��BIND�f
����)�5�JDN�I�l
�E���� � �, (na��);��#
ol��z (r���h�	��~u��w�	�\� �����~;��tool�=v��fy�	������Za�b�r�"ly��b��:���w�+ar�#de�*��may�[ve��y�g��	e���1��279��^�&o����UPDATE�Aqu�/�_��DoS�(0��Es�ϢDspecif��?rie�@����Pca�Sa�P736�;P92�=��
DP�������
Desktop��((�<),��d�e��pache l�
nse�!x�dp cli�Acan��
ne����W�'Microsoft�,���, x�J���Box�
�
dp:�z��`/par�el` c���Ll�] s�=��m�t r�0unini��8�M
��8��	�g�`/v�
�/h3�h������	�A�*zgfx�#�>316�>��fi�behavi��?7�?d��	���zero�<urbdrc���x�>8�>�rleng��0�O�G9�Gheap���B20ˊ��sa�����G`dr�%`�H47�Hi����N�7�N�>���
f�s��$�6�E�b�m�pu���XTag�dIm����TIF��x
�~�}��B����c�
��7���>�
w�g�]_���=
cpy��./�_�Mx�Q97�Qext��Co�gS��sShif��24�����%	/͹98�g��oS�^leS���W9�s�
��S626�0e�S�g���x�XR�RGBAT�GEx���ϲV�m�
�W�;p�K�I4645�I�B�b��� �
��TAG_INKNAMES�F��NUMBEROF�$S�u�30774�zH����32�~,�0�Z�=��=un�`�=��$��ng��[�N�c�	g�0
���SEC ����l: NRD�
�M���
n�rol��S�jc�um�4(Non-Resp��� �LA�L� �X2�z�>8wi����k�x�V�walyze���lcap�^!�3br�*���f�Crunn�}o�M�hu�"�����+5eth�Li��Inf�x�*oo�:�-cy�Vyle��
s��o�
190�@3k�Ol�0�3�W�!,��1�,any��s�Y�g���2�p_��
�le�_�I�)�c/b���^th/�7re�b289�Y�-ul�m
�r����UL��"et��,�* cpu: AMD CPU��������)ex�౺beyond���di� br�7h�Z1-2��ma��r"�m�
F�PUT_VSCREENINFO io���OOB�	��Z3365�]�]$�?ra������
r�ty�_�s�A146�V�4!�ULL�P� der�>�Lkvm_mmu_�pcid_gva�F78�5
�~�_pipe_���^�W%�e�O�
� �W88��nVMX�
IBP��fexi����ne��g���iSp����v2�����G'�G�
t�nf���	k_i��m��$ha�>%�o�r�D66�9��m_�be_algs���U
/����g"�N��
fib_nh_�5ch��
�
ipv4/�!se�b
�}�����;Ȩhugetl�Yo_���
mm/��)2���T�{6_re�!�[s()�5�
���s�<���k->�_af�;�do_�Ps�����Q�K66�K�I�G��/�3ű�\��v_acl�L�P��36�/d�j��?�h�0!���#�Q_p���Sgu�Zdue�oiso�$�e�:$�\2�X�]�#f�Cdev��,o�!�_�m_get�Q�USB-��C�!brcmf��<���B����fla�1��_d�'n�A�BD�$�?sp�_2MB_gtt_�����
�l�t_dma�p_���n��f70�ptc�/�	�sub���Gal a�;*s��%�&1�l2t�w�(��c�o���u�_�i�
ό�d�gigm��i�Y��*_mc_rcu�y�*!�x�2lo�;et�
2�1�����vpas�fIMA�,150�F�E&in�+b_8�~_�0 rt_xmi�#����/�&��*�
�8�J�
ba�������ron�����d SKB��XSA-4���374�Hn�&m���_r�n	()��m� ��^VM_PFNMAP �/s�"
�ߡ�TLB�91�¢flu�2$�5	��."� �I�=
cer�	K�nV�_P�MPTED�m�{�o�������t�8���vl��dfg8�<1_up�4,_��+�
�	���416�F�f����
on_vma�re���G270���]ss_����(�=l�/s�#��	7�QB�����
ru�%����)��_�(�[��D��beac�c�N�G��	P2P-���'�H�����,�	�537��#�	��
c����H79� �Hraw�Rp��_p�5_frame�39����9q�_gr�+�D�G590�G��� �F'��host�z�Tfs/����q�119�{��tipc���e�63�Q
�>R�-�"��mul����������%t�; �;�modul�um�ge�!�9�͔:�Ad�7�����i��"�-/�C/shm�sym�j	�0�0973�@\fw����N�|,�9�x	o�	���0�����60���n:�b4l�ad�%�	��;/etc/�&/redf��.c�T-�
328�f
shim: 3r��� (��&-�vboot�d	�?�/1�-@2�-@�=���H5���2��ha�"been���v%�20 ��r�st�km�&��:�z5 (4.17.5).��&�6�9�����5GnuTLS gnutl�_
nd�van���g�p��ic�s)ra�"m�H�16�>�2�+ ar�a��og�{
��4l�' �$������'�kf�S�.�/�7�K��s�GNU �,��io�eISO 9660 CD-ROM����.�R��i�y-�$:����bsd�K �(� 0,��ri�9l�0u���'i�#�_%py��2n-�񤄦��+ula���%�q��r�	� �L���$_�Y�l2�>�?�ua���8Lua�1p�<r�[2�X�&-we�&��Q�V2�>���)�t+.�V�Vlso��)���as�pg��8-purpo��t��-alone�k�ou�T� ���Q2�+<�=*�7oT�j�۶�c�@�{�!���ve�@�4�?a�Wt�W��-��H?�1#�%�?a�Dp�bm�0$23��<�}�go-md2m�+���r����of�m� ��s)��go��:��gexp/sy�b
x:���������+�417�>	MySQL���-us�M;�th�]�B�#�&b�\�-��8c�q#�n0�*�M�31dae�(mysqld)�Sm��.�Gs��s	i�D�4��w�D.0.32�77731, �����>:���#:�/�+s���0e�ul���aC(�<�/r ���*E1��_O�	mi�#�TO����"��&ƴtor�EP�2d�c�$[9�[I�CDB�#I60ʥ�,�608�5�11ɞ�(n�. Ha��$^7�@��A�0��_3��Re�	�%V3�5�3�AU��9T��0�BT8�@T1ʩDML�NJ�
2��8� 6�%��T63�AT4�AT5�AT7�AT�J�I�3�5�7��*�7���.����En�G�$_�AG7��+S�A�78�AT���I8�*��T1�AT��GIS�%N�*���TT��@o�z	���A����,c�:
-�n*��L��$ e��), �#���was�c�r��4���UNIX�
n�1�UP�dis�E�but�n��=@����de�)"�U�V2���r��<��:�=-�_in�&,�; ����%��4�R.NET����d-���s#�H1����+��#e�ɣC�- API��D�k+����l'�e�ICLR�^��New��B�`�D�Oa�Z����av���;�y>�ad�U�'�VS�(P6�
118���Runt�=)�8�7zdot��U (�s�2123�}�)"�7:��Ke�V��&��: p�ZBX� PC�f�
���933�J�W�C�.��5NuGe��he�-��P�_%�$*a�"�v7�v�U@C��E��- S�v�t�T��.�gc��L��%�)�����&����+�B�T r�Pi��lT�,s�B�?�J�B��S��r�
T�N�?X��9���P��n �}-,�O�L�VOyn���Qy�Rd�Ʊ�p�2V�^�*�O��*a�1mph��L����"���u�)�:e��7�ar�y�
h�Iva�O)�@�z(�ird-�]"�N�i�:�7@l�+.�te� b�� �<���"��329�7�07��7�=
7�
�r�
�B��
E�'Nof��#�u5-�vAr�$$.E�
>ToD��6��Kor���%>�<d��YI�L�20���T�a���"ob�Y-or�4�r�C&�d�+s,�k�P,�<ce�����y�� �pS���5�������l. ���G!�-t�WLe������/�C�,�!we�]�#�&w��H�̤;���texl�%�� TeXL��$�V�c���"�2<r��k�k:�]�� �&�@��+d�$Q�(l�=��ol�NI��7����C��_eG-�d�38�C�<D�U���K:�yF482��eo��:�9G16�D�i�2��O�'h�G�h6�h�F�R�/�F�B8a�C�!��ׁ7�+�8���H��5�c�rF�d��H�0!8�2�i�I�801�,��V8�)0�RV3�,i�y8�mF�Xstgre�'$n�
v�Td�	�pi�B�$$�%��8DBMS�!&p�d�s�:<�B=el�?d��at��*�8v�4�S,_�h�%�t245���Sr�g2�xpo�Ces�sr�Erd�'�FD�M�P>inli��:.�]�
��virt���������ag�n�P�n�tV�^�Cu��q	�S?�S�^��v	���Es.��aa�',���,�*�7�����Y�_�~ed�
�	�Z:��2�p(l�wA�PCI�ZTF�Li��;�"nup��	�UzG�E��|�w��X�;oup_�V��
�[A�t�{K��Pe�#YEv�4�2�ZD�n�PE��bE�~3��Qb��D�TY��
1F��2��$K���xB: Un�{ded���/V�e��0����E��_��'s XFS��=3-�4�Hi2c��x�_sl��r�E2c_x�N���N9�N��4:�Ho_�5g�>E�Z��\��B3��/4�vE�
,�sn�17l QAT U�,:- (���)��*6��zRPL-P IOTG/�
S�
:�HJ�1c�s�:8��i�:�zFI��m��,�doe�yt�xJ��to�2n����)RCT��APT�
l��'��6�j8172�j��BUG�iwlmvm�Efi�@�Q�.Mesh���F672�NAz��*��,9 B����2�{�G�q9�b?7a0a36396f2fd6368a54a020f420c8916e9b [��I��IF�DU���Y�Nr��eBcs]��822����blk�
nvme/047��a���E753���$U�-�n�qs�o
 clus�,be��e��)rea����"Ol�th�  hours�`70���[-rt]:�6sk�8a��*e_��:�-8�Se��3�\�Q�5��o�$�U8�Kf�8�� �;����Ge�JM�k�J�5�JY���2.��w�~H:�los��!0�occ�ձ��
J�w�Re�^9234�w�G_wd� �|dog�+G�rigge�-un�e0ec�����?58��i�2�'�"u�:�GNS��Rptp4���s1�v
�"smp��<:��ehe�r��sB���w�wob��7,�
�٩�!"��nohz_�h�N���15g��}�)%D��`�K��k���!�F����S���Q[a��l��-9]�P2�CFJ���: [REG] N�Yi�CQ�COMMIT�_�.�$4ERR_DELAY�!p�!�Y3����r- "ev�-�2�: '�_�lay�Fc_�}_����G�5'" b'_�{V�`�4g���,�hximum�255'��74�(��
&�Dc�u�T��2rpmi�'$��E�e�/�+�s/zh_CN/�G/m�Ac-nu�pr.rst��82�hc�ZD:�w"��sm�Cp���
�J��us �CD�9.1�0�1��ae��fc40a7f�T��wro�>n�=�/t��s�Y�)_tre�P��90�8X��x86_64�*d�|U 2n����s�<l��3n�7�g"�O�-�1H25.hv2"�_1061��s��?��r9,�j9�9�Q)��Z	C���evInM�;<T�*o> ��j�*B�A�Y�=P�y
��$3�8����D6�D�O$20�D��J�E4��� E���'�h��'�J��s�.�	s�: ��9�@b�gn� ��Vc�.Oe�r)8�@�Mj�"-�n�dEjd�[���<�} 11�g,��V��En�on����+S���x���~ZIP��A�n;��	(830�*��,�	��D�fzn�AES��D�
�D��Q�D�\�qKha�J��~30531�e�
�@fbuzz:�oO(n^�,g�th�c>co�{K�Y��<�H519�x�?HTTP��:i�^�O��U���f�H75ŝ0�Harra�d�#���Cb��K44�3����I)curity issue(s), including the impact, a CVSS score�
cknowledgments�nd o�/r related�Fformation,�f�to�RCVE pag�m lis�,�R�&ences sec�:.

Bug Fix(es):

* Prepare �^�4next quarterly OpenJDK upstream��ease (2023-07, 11.0.20) [almalinux-9] (BZ#2223100)T�Yjava-17-o�Rjdk p����s provide�~�o17 J�/ Runtime Environ���+Softw��Develop�,Kit��Se����?: ZIP file �	s���minite loop (8302483) (�l-��22036)�Dweakness�}AES��le�����D8682�D41�D�4r�r h��l��of slash char�;er�aURI-to-pat�onve���e531�e9�e�@fbuzz:�oO(n^�,grow�Hvia�Ls�,tive marks�I5193ïHTTP cli�iinsuffic��Nna��v�d�2475ŝ0�Hmodulo �at��array�]dex���Z�J4460��4�J�:nteg�\o�.flow�K8�K5)

F��mo�Sdetails about�~�&��Install��s���-headl�ǽ� o�`wo dif�at sy�xms��sul��d����t�asses.jsa�s gett�qgen��ed. This was becaus��CDS��ch�y��5 by�Ipost�Iript a��!�>�ǥupr�n�O�4�{�?dy��ic dump featu��s�checksum�m��ould�����each�%�ui�-olv����I��u�u�X�7��d�g�S�ial buil�H(RH�f165���0�7��8��2852��.8.0��8���*�&��JD�[�/y8u3��x066�xSamba�Lan�n-sourc�
�k��Serv��M���Block (SMB)��tocol�{�Comm�AIn��net��l�H�ʩ�IFS�;, whi���P��PC-comp��bl�9�nes�[sh���,�<i�Z��variou������s��: ��2�he�ign� not e�Dc��when "s���$=��quired"�0s�?�3347��tru�/�ji��hip�twee�wo���5�
���y doma�ofail�y��
6��
k� l���@t�/�BL���!,����any����>�)���E��pvlan: ��-of-��nd��r�
�Dd�I��ea��kb->cb��090)�Ocls_�er�S��l_�'_�ve_opt()�P5788�QKVM: x86/mmu: �g��ndi�]�#r��_��_fa�:�N2-45869�Nsp���ve��6��r���Qo_prlimi�J��:/�P.c��0�[�YSp��r�
2�OT m��g� ��bl��<199�<�.NET�6�n�5d�8�\fr�
�. It�H�+sub�&�M�C�- APIs��sev��l��w���i��e�ICLR���N�0�rs�d�`tha�ddr�	a�Zvul�
	bil�
��n�t�&ila��.��upd�6�U�'�VS�y��110�����0�dot�: RCE und��� c�*a�/�3�d�4Ke��lž��3r�
 attac�f
l��0o��n��	���ice�$�i818�i�6�}21��21�`�FLAC ��D��
Fre��oss�NA��o�'
dec. �*�N	�la�oOgg Vorbi��b��l�8��0�djec��ns���f���ť����od���x���libr��2�1��-l�|
�fgr�O���@�>���
��;m����a e����2��flac:�Smote�" Exe�L�U
��)�b��bit�fr_�{_ fun�},��supply�craf��p�>�ͭ
�v0-�9�v�DT
�Vfo���Yhave��up�%ded��a ��r�
�:��(5.14.0)�
�
UAF��nft��S
��
�P
�Ukup_glob�Otriggere��f�{��>d��nonym�)
�>��bat�z
��e�@����
����t��
nf_��:��x��Hin�rans�Qlog��v�Brt �#�jNFT_MSG_NEWRULE�x61�x/s�7d�jw�`pon��can�4exploit���M�c�qure��cf_c��1�iv�'�x776���-�T-f��due���e��zmov��i��pipapo_�e��4004�
\_�qru����3�]a �i�E�BA_�<_CHAIN_ID�d�+Ű�y1��y���3�īݶibyid�1���Os��-�
-��Ybyteord�e�4�
001�Vs�e/r������MSRs��S3��s��d�*um�163��hw�qm�KCr�O-Proc�I�{ L��9205���bypas�k�d������e�S�a�err�O�Q�=2�e�&[��l 9.3 BUG] [SPR][EM�FHF] ACPI:�1�R ���wakeup��2��[Del�T2�TMon�Fl����.l��WD19TBS��SUT���lwi�'VGA/DVI��ype-C�	ngle�j946��rtmutex:��M�b��i�bwok�����)u�Qin�2_�3_adj� _p��1�����
�^A��\AWS ARM�E�3
D�Mic��hif�2�D��23��H9.x��`	SEV-SNP g�����>��L���rup��from ne��� b����blk��ush_�m��562�<bpf_ji��D hi��g�-�dpy_�6��7�1�;69�*�|	ceph:�Xd�cmsgr2.1��q����ng�_�A�B707�Tem���	�Ju������FIPS �X�S�U���rzeroiz�6use�]76��I�\��
��avf�
g�ơeJu��Ӧ1815��i40e/��]���oan�\�q
�f��MAC/�i�41e:b7:e2:02:b1:aa/0��if�ens4f0 ��0�
�t��il��1
����lv�t --sp�rca�I,�
��
���W
�ihu��H48��p��: ���5	�`un�
PMU�s3017��NVIDIA�G��: B��'i2��
�����$�
�b�C�@fw��S�A�S�nPEC���%MBUS�� ��X�*[Hyp�V][�i]in��le�6fc_���m�2���vsc�L�Ru��o�Ai�	_���K307�K�"
��fig o��CONFIG_CRYPTO_STATS���6����til�s�0�b���_185�,�ק�Ex�	�Shv_��dri���g��wsrb_�?�E
 SRB��US_INTERNAL_ERROR  (0x30)�{9�N
�z-9: WARNING:�
������
���ec�!�A�H��drm/as�b
��
�
�?���t6.4�M3��Lenovo�J1��]  �_����echo c > /p�9� rq-�x".�\70�h�bz20�`9�/��/�l�N�~�g-suit�
�d�	�#64�P�s[pid]/w��
 br��d392�bE����(�FEAT] cpuf��:�l_p�:�N�<HWP IO bo�f�@a���z��7����Y- �MB�,AMP�� C�~��Maya��y (a��d)�X896�X���ZMDRA��
- U��������k
�G�e	���� Add����5��-�u��y����1�X�l2���l2�
l��-C�#C�i�#�����d�n�,79���Q�U����Q�n�Uwebp��M"a����tool�=�LWebP �9	p����.��- �	ge��a��ssy�����digita�h���Q�=s�P��5�$ba�o��VP8�i�+�$����(��n c�h�q F��(RIFF)�wmaste�7 � d�#�b�Bser��a���to��,�$���%ribut�	����Ce��'ly�����
(eap��%�#n���J��8��g�����@� C��ie��/��POSIX�&���p��$�Am�|�%m)�ڢi�e
s�=�
dae��"(nscd)�T�Wm�`ip��*�s���&W���se�q�m�[
�c���y�'�):� ��&so�gp��g�scal��;91��
�QS���H�Ug�dr��no-a� m�
�K527�Kp�
n�_'�T�P�8�*�Baih_i��@1�Py�8n�kac�
�@,�Qgh-l�,�a)�y��d�Ʃ��^��m��l�
u�}, ���$ed��\)mphasi���������m�!n �&en��L��y�
ha�v�~
����ird-p�&y���p��: TLS��^k��)�n��0217��Gho��+��
����t����re���P�1S�+��PDF�	cu��.�P��
�4�������=map�d����a�B�)�_��play�pr�y'd����:�
l�tOS�w��inj�+mis��ermi�G��.f�zip����6664������Q�lob�8-or�M���P)���	0�~�T.,���q�x���y�_ �_�-��_�	���l. ���>�L���m�K��ll�C�	as�	ll�.o�)w��`�/�+�9vpx�!	�'�B
�G+�n/���ǫ�e��2�6�C�
�,��G���'�'�x
M��m�� ��2�$��
����
vp8�������5���H�� s��b�OVP9�A44���M� aDB�&��-u�
,���
�BSQL���
��
�p��is��
��a�^-��My�4.�6� gal�
(2�m�� ),�4iad�C+�(5��� �(:���es��T�p���*���:��n��mysq�g�f��a���H15�H�d�W
�Oso�p�|/_�'#l��_�
_�`1tu���r0a�.c�
2-320� �_�jr�a� �Z�->g�!�
_coun��
== 0�`dict0��\2�\�a�_�� �$�!�"�ylect�K4�K�&�Yi��5_l��u�q::�0�K_�"�M9�MJO� CACHE::�or��fiel�a'�N9�E�p_��$�@����r�0��f�N87�NNULL�-spi� db_m�>::��_��/s�l�e-701�{2�XBerk�Hy�1N�D�/(BIND)��2�)�5��1DN��1�
�E���M ��'(�$); a ��5r�&�rout�1�	ap�c�{��"��y�W�,�~;�7��v�@f�'��
���
��%����$��"�I	haus���ntrol ���d��2y���DoS�
3�:��W���:�3���3�K�;/2: M�S�������y�r�R
�J�Q�?,Rapid��J�� �	�n�x�o��h�hxy������T=���,�f�:�������o���� ���|���
me�6���. �4��\�;�h	��iMe�d�9�4043��?I�!deseri��z�G���GCORBA��:33�	���97�Hc�� �F+��P�L'�G@authe� c�"�d9966�d8��(A�xim�e>�t�
�s��%�Ope�, �f.jar.�-S�(�5S�&,�:?i��duc���[;�z
�Y�g��-�d�/*6�bde�3�)8�!��>���e�b���72m�i!�so��JAR�(0�7�w��;92��r�s�t�A&6�c(�w"13�*�f/usr/�/jf��!��	a�E+�J
w ow� by�����_�%��1��D1��D�+�&��9d�e:�r	�"���p)�F�����Zip�$�2����E�[r���<��F�>,�-'�u���� zip��A�貪��
���b)�"�l.1,��V��)�G�J*��B�a��p�k/p���I3����q��[���)%th�zs�T2�7�B�'��-D�|��.��.��`Ex�F�V��=�=e�B37�W)�I����\����������g���XD���)��9�7u�=���)�e�i3�H������D�6se�2�q,�7�#d����|&y���12432��-�$��^�32�\jcm��M��P��E, ra�vt�j(�-�#!,��m�y����Ƙ6)��*7�*��$�B'��$�='�'Y�,M�L�l�1���A_�i�VAVX�2�17�J2�2����I�T��k9���8���$*���6�8�*�M�*�-�*651)�nghttp2�0���B�1t�#J�"�!P�I� �=�*�I�|�5hV�!��C�3(���%�D����t��It�*4�j
�O�m�{��#�f�8't�to����{P�@�Z���7, g�(�*�(s�h$a��J�)�'pe��p�5���
�V�
4����4�k��/�!2�[�P��`�P�m��~*��:�PDL�H��C��`e�UG�Y�$G�����31�!E�P(Embed��
���!�+
�^I�`�� UEFI�09�V�%M�S��p�Pa��964-b�[�Hfirm���IQE�>>���P�[edk2��=u�,1GetEfiG�FV��#��2�#�8+ur�=,���#&��DxeI�3V�"�Ha��%��#19-145�:���yJ:�����ߪ�ASN�=<�+ iden�I�	�D6�z=�C�3��;s:�Ҥ��j�V0�%�T�se�
�j=R�)No�2�w���B��X.Or�Ua��VX��Z,�$�,��
�*+b�1c��-��&�3a��f��-f�ked�$7a�2��&�,a���m1up�:��xorg-x�S�;: ���nWO�l�9$��U�(A�(�FM�zP��3E��3V�j�13�	�:�LibRa�Z ��1�5RAW��ob��O�9�mera�.RW/CR��NEF,�<�DNG�Os�:+���&�h-� _�_�",�+::g�
L�i�)rc/��w� .cpp�E1-�42�<FQ��,a ���k�B����;�)�qt�8�qK�����1Iy���)��
32�z�M�W�7	���x�n1��r�,ic����e�A��P�����v44�qt�+��QXmlS��R���>73�X�>i�~d���=8197��Un� `�Hv�[�%�Gm�-sPerEm�C257�=c���1irt�c�W
C��(��&n��te�45n�,�^��/�%cap�%���'���X�=a�Rs.�$-�C,���G�m,�,��V�_�~ed��4���0v1��(9�c10)�F�' 7���+�3��a��K�St�YJgeP��ObjLi�
e�>��,d�W���>�
�f�j�2���� n�8=���O��f�sJSON)����
�]W�T�
�MMr��A��J�@����C�8utp��m��7�!-��b��E1��c�L�#������re�ԭaf�|��-c���,��H�]d�7��_�1�X���m�V#��0-12762�@�wi��har����&net���a��yz��j�Jp�%�3��C�mt�f��
run��co�M�Y4u�L�V�H���uOT�HPdis��o��4��066��@�1IEEE C37�8�{nch�h�-?�c�G8�GC���Pi�M���bme�:�	5�:VMS T�WOPt�Jb�=�Ne���7�8ƱXRA���	�895�AF�b�_q�H��"�0Adv�P��gQ��T�P�;(AMQP)�'"����you��dn���"�8 ��J��� 0-9-��I��-��
�U�e��eals���-@�w�9�<V��@�4���@3.��.(�.5���2*���
At�r��L �%h�J ��da��07�G5�*�<���(
�$c�R��\0�U��m�a4��Z�{m�~MreO�e�� ��,�hty-�Ld��-��%t�t�a�g�Gkey �kt�{�D,�,�1B�Hwor��c�or��sp�<�?e������&� �]��b��a�:Sa���. ������'��6���"�	d�c��V�#�H�L������re�(��Tmpt��t�G%n�)�p�����6>�Z�>A�p�)f�Calc��v��	9�vW�L���/�y�t�3�-
3�3�d�lo�U�u�tpromp�@IF���g	2�
�:�F��p�*`��Ifo���Rt�4,�P�
��s�boxe�E������7\f��(1�`.8�Y�!9��=�4�eGIOCLINUX�Isend�a�/�?s�U
���\�f
�>C�:ol�81�'Y�gMe�-g�H
NSI�
�Q?o��~��v��	l�e��mi���a�,�^�ϹL�y�S/sbcp.c�eQ��c��/�}�~D)�YO�m ��[g���n.c:�3��_pcx�D_rl����4r��f�"�QB8��	��;�ditional Changes:

For detailed informa�$ �c�%� this release, see�e AlmaLinux R� Not�0link�Nfrom�'Referenc�sec�^.Yet Ano�r JSON Library (YAJL) �oa small event-dri� (SAX-style)�7pars�Cwritt���ANSI C, and�Cvalid��ng�5generator.

Secu�=y Fix(es)�* yajl: Memo����k�Y�_tree_�u fun�� (CVE-2023-33460)�X�;e�]��bout�s�oissue(s),�[clud��� impact,��CVSS sc�G�
cknow��gm�s�߬@��at�,�f�to�R���)g�m��s�,��

Ad�y+GNU�'bmicrohttpd�C��9that mak��t �cy��run�) HTTP �(v�as�5t of��Aapplica���Á:��m�� DoS�27371�<�T��{tiff p�a�icon��n�$���̾�s f�anipul��Tagg�hIm�=��l��� (TIFF) f�s���}: nu�ppointe�r����LZWDecode()��3/�_lzw.c�%�$�W��Yp�a��Clos�a�p16�Lm��[Á357�4heap-b��d u��af�fr��via�ecr�d�����E��oad�R���j26965�kBuf��O��flow�9uv_��<�:���>Mprotobuf-c�P�vide�Nbin�=�DGoogle's P�3col���+�[: unsign��teg�@o���A_required_��b�!��2-48468�=H�d	��s�%�� buil�?block��bies�R	�-s�v	C. It�]obj� sy�,m�]�1GNOME,�%m��loop��le���y�	larg���util����str���0comm����	a�uctur��g��: GV��an�af�htab�"���Hsize�p�)��eck��is_n��l�9499)�Wg_v�X_by��wap�-can�`ke��o��ime with so�	non-�Y�fputs�2611�^���pe�	����doe���Xc�Wpec�'�[��Y��>kshadow-���u
�m�7�gram������UNIX�-ssword���P���,��
we�<��#���V�	ag�Tu�'
�|group��cou��. �º:�ssi��y�adur�[�d(1)�Q�Y464�=Pytho����+
pre��,�a�&v�j�y-o�n��mm�Vl��u��, whi�"��s��du�n, cl�Ӣexcep�k, ��y high��ve�Eyna�
�Mtype����l. ��support�t�	a�ԩ���y�c��
�C�u���.�Rous�2n���̤;���rfoll��ohave bee�i
p�d��H�Z��
ups��am��s��죯3.9 (�.18). (BZ#2210783)���6:��r���K d��ct�tra�c�E�07-4559�<Samba�open-sourc�'�_�N�AS�Mess��B��gMB)��
�
�:�+�8C�dI��n�0�RS��(CIFS�;�aa�� PC-�p���Kmachin��nre��,�<�"�����C�7�s�,(4��.6��19041���2: ��-of-b�Fd��a�#���B AUTH_CRAP��2127)�@��inite�	n mdssvc RPC �ic��r�otl�tt�4��K�|�Bfu��� L˜�#�2-s�
����h��sc�ure�E�=���tpm2-ts�?	��5��l��Tru��P�#�� M�(TPM) 2.0��API�py. T�ť
���r�	�U�e��K�Jde�cs�3����TSS2_RC_�@�N274�A���cps-�6�Q�i��L�_�y��#�wp�P�=��kill���grep�n�(��?,�T�up��`	mst��w��
��pwdx�q��:�s b�Y�f�0�%�:GAvahi��}DNS�\�yDi�0�=� Mult�Cst�#�if�S�Zero�d�gur�TNet�v
k�O�h�=��at���dd�do�oc�*n�7. ���~�	-aw�����you��plug��m�����J�R�K,�no�{��,�7ew�people�Rc�B�0����n����f�D�r��Y�P����a��: L��by�Fbusy-�n����
o��	/�4/�C-dae��	/so��11-3��i�����	�4
r���L�_s_host_�
��sol��_st�when �e�do � badly-�˺�?�>s502��®�bb�	rashed��DBu�I198�=�Whe�����w�3���t�.ard,��defi�> PEP 427��M-�M��:a��rs�ca��deni�-���3���)�r�R�tp�o��cli��4089�A�
G��script�,�
����<de�yP�1S�1�*PDF�cu�=.�P�|ns�Bs�4�q
���bitmap�U���Xa�ѣ)�Y�iplaye��r��d����:�PDL�Hl�2����`ex�C�p���w������311�'�j��-���jdk��O�JDK 21 J�/ R���CEnviron�����+Soft�D�op�,Kit���?�V�r�
���H�x86_64�AVX-512 (831712���02�
�Tc�*��W�#�^�_�~��uthent��d09��d��B�z	���"���s�Fh��l����Zip���J�h-�'2483,�Fre i��duc��21.0�r��B��,�7�u���� zip�n�;
f�k�	��err�a%�O�+�k1,�k
��z��
-leng�6head��\a��p���p��by����c�	�tool�W��bo��ws�k�3���	�� �[-D�r.�h.��.��`Ex�=FieldV��=�\e.����ximum ��at���:pr��rty, �]jar.�-S�(�8S�&��
��0�����0596,�t�4a�]�)8 MB�}��Fe�sb�o�D%���MJAR�#���1�(r�O�c%�F16�d(�-14954��W��
T�tpar��Hu�^P��(THP) �un����l�od��e�������9th�zs��f�����<Re���Se���(RSS)��ydu�a rac�>tw�A��k��l�=�ݼ��s�6	��
h��p�����Virtu��M�� (JV�sh��r�^s�9�I��er�es�&�a ��~�+� �>�
is�@�&get���4c���Oert�I���Ev�%�)�Q�H����6�In�	l�}�:sa�I��-��le�����E��f��! s�ű��d�*inct�.jsa�p����)���be��
�yDS�h�vve��5� a��t �'	ac���>�ǥu�:e���(�
�!um�*e��,à�um��ould��"on �h�*����<���`����"��4�l�/usr/��/jfr���at��is�ow�by�>�5�19�]jcm��ol�N��Q�, rat�th���-d��s�)*���$�e���8)��O�	�smbd��	�2�iunix���#�(������a��o�"�096��"�d�"�\�tr��
�����w-on�(�Tmi���
��9�R"rpcecho" ����
�,���slee�#ll��AD DC�h�0#��ng��,2�� ���ئ�Hy��ext���p�(�I ���e-/2���{C�Z�,:�� ��web��s�)vul����D�����ap�
Re�A�)�4487�.NET����#ed���
fr�r������+sub���W�C�-��sev�Z�,w���it��� CLR����dot��: Ar�N�P��Wr���XD��2V����':�-Ftp��(�+604�$�\SP����\ By�$�Z�WBlazor��s�X55���N�0�s�d�`�N��
r�<�l�Zv�����il��.�upd�6�U�'��
7�14�����4.
  �{�6��25��25�w^�~�SQL�advan��c)�pi��
)b�
�آ��(DBM�u���dsq��B���6�8��E1array �g(�?�z586���X��8�$�Eg�g�iu��8�)�K8�K�
en�	�9@��tit�s@��^quo�H
��Dn�5ĭ39417�bRole�5!_�Xl_ba�]�����B�xu�
��,�!�����7�9GS�'er�8��'��med��	��5�]�$ph���B
�h�;���on�;���g�Ver1-� �*-b�r
�6�a�a ��l��of�2 -��P�����j:�61��4��;�6��"442�m1�IMXF��muxer�-��6����F����zI����M�(Id�o�6centr��zed�O�Ӧ:����(�G.z�b�g����et�h*��/�\ud��e�y��e���!ip�In�_CSRF�M�.5�7-��	��	I�D���D.SqlC�N(MD�@&�P.�������Y4-�O���aX509 C�s - ��	a�:�Az�,�L7�L��D�q�&�M	�>2131�e���8��01�������6����6���$�o�4����3�Lr��'�{��C�mpi�r�$4��+��W��jRSA �"����i�
�n -�.(�: �ag�3
�ALS�%547�b52�b�$ ��Gv�* fie�claw�un�� t�@2�C'��295��9�g��-op�����ܣI30Ʊ21�Ilog��*�
digit��#p��I�ukeys�O6976�O4��'1.���#8�"�*�!a���ōi��1�/or��84�N6�p�,)I�+�#�� r� #�COc�F�h2�B�u392)�(RPM� �G8�Q&��-�S&�#P��D�����'����"��
�� ��s��{?��f�JR�R8�`	�_$����$�TEt�>2�(p�!.nc�
4�i� (��exa�(
, "R�G�>6ÿ 1:�."�"'��T'�#�^<��rt�y��o�$"�8�*u�L#963�(�7)�0�Q1�Q�+�/�o7�o7�o�+�oinc��0e�]*�</IP�p&du�u,�t�K(8276123�\3�i����&/3930��1�4�5)��I�@!�~IPar���~4� 5em�'/�Y�.p� U���
�.�!�+Xtupl�
��U043�����������p��5lR �k.��138��>��2�@40�`5�-7�w�-��?�.w�2�w�2�Av�^@*��W�7r 'REFRESH MATERIALIZED VIEW CONCURRENTLY'����r���098�unb���a�'d�e��s�a��c�g�I��SEC�Kr�EW�Q9: KeyTr�XC- �J>em��PU�H)s�:�����S��o�F��&038�{�OP�HLa�
a��53 �-est en�	�+�e�++exhau��s���8s�]��+�������M�3���!�
@��o�dy��+�k.�22�  *�K: bpf:��-n�@r�[v�������*�O4100�i�IUSB:�C�!:��s7840:��x��I��resume�F2244�Fcxl/�
���+,�99t�c��Y�qd�r�kutd�8�_5��G�+�wE�(E�e`d�j��+�1�^�a�` UEFI������(A�q�-s�d 64-b�m�Hfirm�k�IQEMU��KVM�>edk�"9B�-��DHCPv6�;�c��L�<ID�o�7+4523�	/�Y�B�A/���Ms�Ki�r�zAdv��e��<�i��
M��vS�	OL�,a�	SESSI�j�]WORIZAT�
�k��wr���1����10978)�fPL/P�T�-���J�"�!�T�g9�gr�d��be�se.�:�bque�`�2�2rds�ɦ��i�Rub���Y�N3b�����, �n3�������aB�QQ�� �=���ɢ��orm���tasks��rexm�3EXML���=�Y1�97��?��gY�1
/sm�Kg�i��g�grmb_�Mc�in�:AC-D��n���nD��@� M�Z��e���C��d�`6����-�I��f���,Si�j�84��38�G�bi�f8u: R�
�?lo�
��ur�D�_��
�Z_�<Y_�H()�V�Pe�V���4: ��e��se�Iack���!�O5018�Osel��,sma�don't��	*�eB�jin�_s��Becctx�Sok�b�B�l�avoid poten�gEu��O��q�7_pkt_�K_�̩�UFO�R949�nft��y�XX��]�z����f�!�eK����kb_�F�}5�M��H�
��N��
�(v�
) �8���s�=��9�th�92���[U��k��y�e��e�[8orS�TF�#�.���es�122��F�Imp��O�R��I�
�ӡFu�� �e�
�a8�<��L��
��?�M�A�PeC�r	Lo��TRe�_te�zv���9��GO�
|�r�@�_�(�y�Fc�?Q��!�v�8���snd�
(�8�{���%������
��������S,�c�gPs A�w,�r,��WAV����:�l�����V�#���(_vo�Js.c:4�9*�_a�Lys�w�?��y)�5mpg1�0�P��l�tMPEG �-Y/2�5�Adi�c�x]r/��ܣ�/, 2����0m�m��]�/(�KN) 1.0 layer 3 also known as MP3),�well�re-usable decoding and output libraries.  

Security Fix(es):�  * mpg123: Buff�toverflow when w�2�V�_ed PCM samples (CVE-2024-10573)


For mor��tails abo��the s�issue(s��inclu��� impact�� CVSS sc�G�
c��ledgments,��/r��lat��information,���to�R�� pag�m�
s�,�R�&enc�ơ��:.
MySQL����multi�\er,�threa��#databas��r�/. It cons�cs of�b�M� �0emon (mysqld)��many cli�� programs����

���E: InnoDB unspecifi��vulnerabil�3(CPU Apr ��3)��3-21911)�IS��: DDL�%N9, �2�33�nOptimiz��#t20�d5�4�6�7�7�82ɴCompon���i�C�#�4ž4�~6�~Parti���$t53�AT5�TJSON�$O66��M�%�7�HC�q�#R80ɡReplica�HJul�V200��7�57�v���i8�)�Oct�T32Ů9�64���70�8��O9�o103�10���*>�+��T4����R5�054��i��n�U�`�J66�*�
8��9�)104�4��UDF�#�1�>���N�@RAPID��an�P4�P4-�
6�����T1�S�2�5�6�7�1�2�3�4��^�_8����`	: Encryp���3�_Privileges�%_���s�V7�*��
�%R�\�U�N9�:N8�$��N� ��
Firewa�
�$_�$��N�jzstd:�Tb�
run�#
util.c�82-489���"��Q�3Plugg��Auth�$Y4�Y�!����Bug�
� f��b�#33630199�`8.0.32�	trodu�Cregress���z--set-gtid-purged=OFF (AlmaLinux�y454)�tT�kernel p�va�?�I�Ȥ3��!,����c�=�op���sy�om���K��lueto��: l2cap: f��null-ptr-de�բ��_chan_�=e�Z�O73��Wbpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type e�Gce�g�l�3LINK_CREATE�i385��i�ga�B�ٲ�r crash�Pst�Usafe(�45020�Lnfs�ensu�^that�4_f��r_args.��ext�!�Coe�i�U6697͢�J-after-free���_u��
be_�a_link_�Ĭ7675�sdiv����;9888�;arm64: �ys�?m�= brok�tLDR (��Pl) �� suppor��500�xfrm�B����-�*leak��algo dump���O��O�SCO��UAF on��_sock���H25�HIS�His�H�nKVM�&S�Ign��nCR3[4:0]�loa�XPDPTEs from me�
y��š�:valid�[ new SA&#39;s��e�Slen�A�[SA family�rsel.�i�xe��42�
bne��wild-��-acc�����to_un���r�X�Virqchip/gic-v4�Oon't ���a VMOVP�ra dy��VPE�O9Шhci���_�_��ed_�cs�\25�qsched/numa��Wpot�ial�f�in��j���ask_�8_work�5�'3���\-of-�nd�rit�M��_get_n�W_key�P��V����eoki����2.11�>PKCS#��,��l�#�j�TIBM C�Ncard��su�P���/4�ϡ5 �u �'. ������*�����\�}�G58�e�phic�Pro�o�
withêfirmwa���ed)��Je��MA�jl��MFC 4��#�1S�� p�L�D Exp�/	2�:0863 �F�
7�E�=z)��AP A�i	s��ĔFun���V3�V�K�E���br� soft�t�[���
�cca�e�d �O���Óh���H��)	Slot D�gpkcss��jge��
l�����Y��: �-�U	ide-�	n�b�t�Rl���R��� v1.5��d�$cip�K�-�Ma�&n��09��
.NET�,ana�-��f�e�����+sub���C�-���sev���
���i�"
����LR�R��N�0�M��`�i���.���Z����n�v���r
��upd�6�U�'�VSDK 7��117���Run�L�7�fdotnet�$S�b�9C�/ YARP HTTP�2 WebS��1�	21392�E8�,03�E�%�DL�0eOffi�	�����u�Z,�%mmun���7
vel�d�գ-p�}t���su�	�l� �	 �ktop ap�i�qa �td�H��sp�
shee�����&��ula edit�8� �raw�Y�. ��r��a��O���6�,vi��sim�yr�rt���ced�#�en������\� 3-6186�e�6�riou��law��JIRA:����P�A5� A�Varni�Cac����high-p��`�N��a�
�zstore��"b�m�
�D�Z	��R!s���a
have��c�rte�a�:�@���g�/	, giv�*�(s��9gnifi�	t ���up�v��:��/2 B�?Wind�A��k��y ������den�]
�O��������8�
�4�
��un��
�
���������e��sive��ca�;��DNS���SEC�:ol����A�{was�S�}��U��du��*orre�defa����mi�os,
���|���s��t��group�Pm�o%fy�r�
�figu����t�bin�	�"��rol�m$-c�4:�@"��$�
ei��ex�it�"��us�
 IP����Z��f�8"
�Wcould��Kr�C��ss��f����Gn�;�Bl�tlhost�
�N89�fi��al�6�~����(.���i���s
�?unp�Jd�k���vanipu�����pn��in����,��ly
�����w�A
�3,�g�1m��r���que�t%�.d b�ߣ�
�����{�me��se�Wdisrup��(�Ll��
e����T���{
g�����	f��
"/etc/�,/�E.d/r�t� ���f"�s�>en�������
m�����l, "���R����\�vwo
di�<��s �
sh�@limit�7�M�K:�o �F�: "/���� "�-�"yes"��se ��,� "manÆ"�{Up�x���
�����dvis�v���m��
��k���Bo��I�+y�	�z�_not
�7���Ȼ�������t�,| g�� "��	a�㺭��o�)����(�)"�3�n� dpipe)",̝
n�L���d�t�b*retur�#n��^"��R
��N��ca��it��e��	�L�R���|
�
b���f�����9��Q�:
�X�xe�����8�"����a cu��m��������r�����$.�6�8�5�)

�5Berk�
y�2$�$n�
N��	Do�(BIND)������)�5�(�E)��col�.�E��
�l�+�);�S���+�rout�F��
��s�A
����W��~;�7��l�=��za����is���ly��b�j
�vepa�o���5	3�R,o��P�	r��&�exhau�������*3�q8�!�\KeyT� -�ltreme�8co�$m�F�s�	��	or�N387�NS�[c�	�sy�,t��s�0l�:�Y���5��wd�*�a6516�`En�]�bo����_-�Gle�b�|�sser��7u�Au�L���u�v5679�vQ�Ģ5R�2�
-8�4�ae zo�7�r�>�“nxd��-re���”�e�չC�~51�V�+�lar���Om�@�|�yex�U�Ъ���O44�
*�H j�u-1.�5-�jdk��?�<J�w�##va�mEnviron�����*S�D�I�+Kit���>:�q�(E���7������(831�#1�#10�n(�M�lge�1�C1�pil������83�"22�X��XP�.�,�.�|�7c�I14�I�W$�IC2���4f�P�"�e�j	_n�_�_s�ray"��7507�[9��"��1���O���+�h��[���3�\��look�F�O57�{�N���7��7���+����U�2��2���+�ͣ��G�Ra�y(���3��
r��RAW����
b�ed�'digit��ho���ra�
RW/CR�	1NEF,�<�DNG��s)�<��: �jeap-��--���Z2im��_ex�j%3�29�

�t+��TC�g��)�7�j��#c�%�Ti�-�_se,�S����p� N�s�Vk����;Ident�:M��(IdM�� centr�=ze�uth�,���b�:m�:�B�(oriz����x��Q��/�
ud-�<d e��d����$�+ip�)(�/�Z�{f���re���<�|���	��1�<tX.Org�)��-���5X��2�����/��<-l� fu�'a�o��f�*f�ke��&�i&�x������ae�V�:�mxorg-x�%
��4�:*XI�n�X�UP�wty/RR�O����53��4�go�g�X�� /�ts�u�/�X ton a�	�=637�Z�Rͱ���P��r��6478�sHe���3��/Fo�Ev��h��)XI��P�+�b8�c�b�qt���i�l�Rmas�:,�����	����H,9�qSE�un�[$e�\GLX P�B�@���@�{��0�eu�b	�=�~h�SXIS�)�YHie�chy�]��8��VDi��C�W�I��U�e1�u4��s�hy���
��>�:�
snd�>��C�
��YE�
���
��^Ed�%�g�g%AIF�

AU,��WAV. �@����src/�
4��7���au.c�����O'�$2-33�$�<%�z�H/�
��. (PMI)�p�+m�+��WMPI�����C�Aasc��Qx�R��'v�
t���7�O!dard��	f��l�	(����J)����s �#���e�~s��
�`
pmix: r�����"�+7k�_�=�@
 �I��l3�"rbit�a�I��4��=�Net�c,B�ok �NBD��p�n�+���J�.��h�Y�1#ks�9�	-lik���!)�' �n�"��nbd�g�^
sp�1�z�f�Z����z�S:���M%�)�4�N�=�e�z�:87�a�?C�&�hisbe�(i� ���P�.!�"��%�Ue�p"��!�`2�>�F�	RDP�@�:�
�:�cD�,P��(�<),��d und���p��*lice�8��x�ardp���F'�M���s��Micro�/�
���]�m$x�J��VirtualBox�	��.�E��
�q�y,�00�c�<'�����DOS�z3�GK�=D�GN�8�Der�\�C�@in�9FX�L1�Lin�* ���*đO��Of B�#W��
�S2�S��)ng�S�{�Ss���~
gdi�<opa��_�/�l6�l��T	�c����*�qC�,Su���018�m��c�tr_�Om�7_ba�_�N�N5���N��`p�q/�X�Y`�k�K+�Os�v9�v���g6ush�h� s�r���gin�m&�`8�`��U���3�*O�/nsc_rl� �t�I4���1-U�1�2�f�ezgfx�bse��)�X���^�7_L�;ToYUV444�F�!���vir���
s�A�����E�5ter�Tn�@&�^�Cu����B�H�,����X�a�	C��-�,�,�����&�(�b�_�~ed�Q�I	�-�,ULL�=>u��	C�L��All��s�=2�<�<�E�(E�:+�*.��j��u& UEFI�>�~�1���/p�9���� 64-b��+�H�!>�IQEMU�~�XB��edk2:��Vh�;��'�*>�+M��0���)HCPv6��xy�Ev�w's�3"�K�523��#2��Tcg2M�u�'GptT���*67�L�FPeI��E�>���mu�;�����IA_NA/�TA��A����j�l� o� �B�j�
D�]�(�O��}/c�@���`1��fin�y�p����(un��n�Ȳ����73�Lhea��e2�ea�J$dN�.�c���]�Y/:��$� sp��heck�iDH�C9���}���,�-44�=�Q�H��Aolki��;���-�
qt5�#���aA��-st�&,�
ml�Xn��)�3Qt��q�(�F��>�$��+�Rqt��:�E�`���hKTX ���]�
F�>�GSt�sm�ʹy�
�,m�+�m�?�on�*��	��w�9h��	e�"�;�]��g�Ver1-p�O�e��d����l���e�1-�������	�j�i������TMXF�I6��(un���	�
o�47���I�AES3�A!di�y5�y�_H.2�bG���[er�{M���k6�k���3�P��3�A�
t�����%����X�:�XTag�!��	�]l��� (T��)��O
�}�&��v�a��G���?
4�N��A�<�9�<��Fax3En�-L�
�,/���Ox3�S3�
18�Q�W�cp�740745�8��B�&�'�D117�D��&�H�^cpS�pToTi����/ɠ622�=�Py�&��:�7��pre��,����?ob�h-or�e�~;��C�3l��u��,��pes m�Dl�
cl�F5��	0�,��y�dB �$dyn�c�@�lS����l�&��������m�@���l�C��i�<�e�.��Cw����6p�}��5�Wor��em��/_�V�+.p�F#�:
��u���.��+par�Hup�3�T043�C+jpeg-��b�
�$1JPEG���	��2so�Fsi�Q�3f�F�kt���j�M������5;��'���as�K�OG�=	be�9�?C�c������,��m�S�_�jdcoefct��1-293���:�MinGW�O�wma�� GNU�f��.�y�p�nJ�u�i�b�g,�!�G����Ub��t����(�P�-gdb/bfd/����4i��fd�oTl6��0�=�.�zzip�{�*l�twe��t�e�`,�X$ext���Xz��#�
�]�O�L*�e�!_�["_e�`/y_��W�Q_������Bp�M�O0-18770�@
�X��3�W�!�;�]GSM�m�7x�<�e&�P	�	�sH e�&��(5��Y�U��\����C�%o8��f3��413�g69�Ki39��5�51��	�7�i�8�h�{�e65�e�oZ BR/E�]PIN�
i�A�md�@i��Et�A���o�:�'�Q�l�Z��cg�E�EH���YZber��POSIX���%s�I����B�2-��a0������2-�-9�6�/�1�j427�]i4686�.525�f��h�g�4�S\�#�`��F_�z3���~/b��/�#re��c593��]�7�~�`_t���Wo�I �]�"_�F�	�D66�8/�^GC's�kle�f�L�a����:�Rx_���\� ic()�J�^��M�h����Z��
�W�<H()�7s�O�0�Ya�)e�/'�_�'���u�3F�3L��Fut�)��
y�P�7D�tn��"�U240�5]ird�]I�M�1�J�;57�aK�;dou������^�u&_�/$nu�1+�gb���JV�0G�W84�kb�^HCI: global�)���sync�{2��0�S�be�1�X
�pUARTSET�NcTO�I�G���u�_tty_ioct�*3��f�����H���y3��E9�9��12������IP��_CMD_ADD���SWAP����U�%	/k�o����xl_�_�Gh��_�[586�Csm�	��`��OOB�
�"2�����\�5��mm/s�1���V�in���_�c->u���V�"&�h���C��lT te�AI���
_pe��dic��`��2�8�F�l��c�?�A�258�V���D^�R7:��/in�-��"_ha��e_�__�'shƯ78�]/�:��o'�OETH_P_1588 �d��
�^or�P�a�P�Pb: �
_c�dskb����c�oo�
g�6�dCIFS�2�De�i�I�(V��'�+C��Ex�
�V�`��(�e��(e��^ed_�0of�e���56��t�����a�����O���^e�x+�K�K�	3�L���%cklog�&����`�h;�G4֔tx �{��u��!Ԛ�	lxsw�;��!m_acl_t�>��c����I7�K�i2c�801�<�.��"�a�<nsa�"�K9�}��dm�P�Bi�8�Lk����8h�X�F	n�;_�/�]60���	re�!%QUEUE/DROP�w�+t�s��!�W���Tdos��z�[�,nk�,pych�#�*617�O�/x86/lbr�R�}Uv��K��4�D��d�8� V�h�hnonym���g+���Sjip6_tun��NEXTHDR_FRAGMENT�-!�,nl�*tlv��_��(66�#�  ����e�
Avahi��dQ��C�k'��3�:c�<��M�ca�(��P�36�²5Z�/l C�dT��3i�It �:Qlitat���dd�do�C�8�i#. ���~�	-a�u�Q���S��l�;�,Tm�:���`
o�X�#�K,�n�t�QTvi�S�
peo��to����pr�^�Qn���fi�share��Dn�P����KoSecurity Fix(es):

* avahi: Reachable assertion in�_dns_packet_append_record (CVE-2023-38469)�Oescape_label�C70�Cdbus_s��host_name�C1އrdata��rs�B2�BalternativeϏ3)

For more details about the s��issue(s),�^cluding� im�|t, a CVSS sc�G�
cknowledgments�nd o�/r related�Fforma��,�f�to�R�� pag�m lis�,�R�&ences���:.

Addi�
al Changes:�Ҥ��j �c�%�Tis��eas��see�fAlmaLinux�p� Not�0link�NfromΎT�4y��md ��a�icon��n��-�
���vice man�-r f���~,�8�^ti��with�uSysV�7LSB��it�tripts. It provide��ggress�� �Dalle�Km ��abil�1e��us��o�=�RD-Bus ac�2�.��sta�X�泌�7of��s�L-dem�æ#of daemon��keeps tr�
���ces�uus�.�fcgroup�����αh��upport��napshot�c�W��tor�q���P��t��m�n�rs��un��auto�
poi����le��� el��r�B��ns�	�Yde�Z��y-b����rol logic��ca��lso work����drop-��replac�m�Yysv�������/-��olved: Unsign��ʡp�ie�ʥzone ��not�Uu��when DNSSEC=y�z�7008�@fi�����i��5��id�ify�,p�/cular�-ac��T�type�Mta��T�ַi�R�ky dif��t�-�Cs�Ex��t�/�A�ϣF� (ELF) binary�As,�Wlibrar�4RPM����vgraphics �ps���\:��ck�Pbu�C over��a��%_cop��r�uncs.c��2-48554�<�Pixm�Y�pix�	�ipul�~�	y��BX Window���Cairo��p�_:��te����fl�@�ͤ_sa�_�or_y l��heap ��-of-b��ds w�ae�463�=�GLib�[�%� �qlic��buil�?bl�Ps��5��-��te�
C��]obj���D�-GNOME,�%�� �#p���y�n �]g��t�Hut�y�D�����D������q�uctu�a��g��: GV��an�af�h�\e�y�z�check��is_n��l()�2949��Wg_v�X_by��wap�-��take��o��im�
so�	n�	�Y�fput��32611�^T�9��Tzz�ltext�536�5�쩦e�	�Ƭ�doe�汎c��pec�]���U�Y65�@zBerk�8y�]rn��N�)
Do�+(BIND)��n�3�G�)�5��(�;
)��tocol�{�E�����[
 ��G(�
d);��
�y (rou�e�y�
�~use�
i��fac��ܢ~;��tool�=v�fy�	a�/��i�pera�.�r�"ly��b�: P�a�Qa���+3 clos�g en�	r��&��exhau�CPU��ur����5086��\KeyTr�-�	treme�8c��ump�~�s� v�W�-or�N387�NS�`ific r����
que�b�-��s���6�Yan�1me�ky�w���a6516�`En����o��64���_-�	le�bca�����~f��u��u�L���u�v5679�vQ�Ģ5RFC 1918�4v�ie��s�r�>�“nxd���H
di���”�e��ed�~51�VPa���}�7�Om����yex��Ъ�loa�O44�P
Bug�a-dyndb-ldap:���.t���t ABI��0����virt���� API����w�Pter�v���^�Cu�z�����/����:�X���q�Vr� t���_�~ed�Q�J�*�X:�-by-�erro��+vL�5�fa�+ByS�{us�4-144��Knegat�ng_new0��ng����un�
������o�	�Y249�*
�Y�.p[a�hl�8-9] (JIRA:�{-2��:��n9515)�1�r�\S�s D�U (SSS��~�� ��
�}�����Z�����o�uth�E��me��,�e������S����	(�)��!Plugg�	A�[Modul�(PAM)����war�<�b��p�Jb�,en�����On�"��ultipl����S����ess�Ra������(�x��HGPO�D��B�P�/�.o���n�p��
75��{�Xk�234�rP��key�l�cf�W���p�w���=816���I��s7209��k�|
l�����!��
��
f �����.  ���  *�K: Marv�dvuln�>�#�
de-�Ң��i��cSA�cry�	�u�6�	2���e�I5743 hw: amd���-�7rai�##VC�'�Uat�i�W
AMD-SN-3�u,�L2���*��ffdhe*��go�hm�+�~duc�60a2e5b909���z.fips_�wed=1 l�5p�w����cy t��
s��009��mm/mglru:�x ��r��}e��ge��che��235�B[EMR] [TBOOT OS] SUT ��ld�;go�{S3����
9.2 Tbo�'OS O���y�n -16 run��BUSYɄ6�����<�j	���
te��- NMI��po��	�p�E30678�E�0�:6f:00.0�;
TP�
e�g�
��C110��.NET�d�d-soft�e��
�a�>���b�����C�-�Q	��s�5����Li���
CLR�� N�0�pi�B�d�`�a
�>	r�F�h���f��n���{il�. �upd��U�'�VSDK 8.0.105���Run�7�5��dot���?�9��Dou�����4�w4���?�;i�%���O�<ASP��C�#	ue��d����Http2Out�`P�zr.Sto��j�N
���7��19��9�l��gj��fi�`!�
f_�s:�(���|����in�4a�y�s�$����
664��md����Vflag�[2�[t_c��an�'
�lay��3��4� numbe�d
cust�exp����s�m7��: ip_tun�p����Oe�f��d�gm � wth�N80��
���c����t���OC�z��
(�/��POSIX�&�e�p�),�A��h�%m)�Ңi�� �	�
�	scd)�by���g�s����tWi��xse�q������������): Ou��6in��onv ����ISO�r2-CN-EXT
�9�V�S��������!�
�}35��c�ull�!e�=r��af��Z	�Oin�
�Y600�Y�2���Pmin�d
�����U�Z1�Zas����N�
c�H�
�b#���o�T����ngh�v�0��y���Hyp���eT�`#�pP�U�2 (HTTP/2�t�{C���y: CONTINUATION�ts�hS�A818�l�g�ipv6��r��(
��-��-fre�Z"��-ptr-����7��Ufs:���F�V���in�_br�_���(�{���2699�=���I��#��M�(Id�<�gcentr���,�$�:����������Q���/�ud��e�pr�>env��!n�
���ipa��
l�A�"����xy�A�.�}�o���us�F��an�st�t�8��x�z�@�ob�"a�sh��@�L�Y�:�5�md��� �clin�rute�-�v318�K+Li�cOff�f���&�!�?�*mun��-d�	l�d��d�v��su�Y���
��kt�!�,�,�=�%)��p� *or�sp�	shee�pr�	��ԣ&���$ e���8���t)aw�Y�o	. ���)s O�����Oimi�'bu��/�c�#��*�����l�t�(�(mpr�x�1p�UV�����z�o�}bit�<gst��m�/�i�tec�@618�0�h�W�
i�.macro��mi�on�`�w�&�b�z(��389 D���R�F��LDAP�x3 (�v3)���"s�.�*�
�s�ݣvLi�we��jA����^)�R��
�%*-�Y�$�tor�%dminist��g��-ds�:���7�>vi�W�> ���Rr��-r��
os�Z-REQ�i�O s�365�)�hMal���@�.P��,�_sh�do_mod�*��lapd/���)�1��8i
�_DRub���\�)�"	���8e�=,��&-�n���/��l�u�l�?ha�
ea�&��� �@�+�Ȣ��"�task���fo�u���hav��e�pg�e�2" �r �/��":�by
(3.0).����������3/cgi-��: �� �.spli��/��GI�
1�
2�n
�?��2�����3UR�33��755�3�&�46�4B��#�>S��
IO�7280�wCE�6�.rdoc_o���!RDoc�E��A�
���ɖ�_R�P+x��arch�V�F�Np�����
�w*,���but�
���sa�z#oxed�������
�z:�G �$6�KR�)B�	��C�al�:246�z~�{�;G�B6����ss�r�	�^P�1S�1��PDF ��u�1�P�m3��s�4co�]���+�m�C'�ϡ��E�'�)��be�p��	�'i�a����PVP ��
�
�z�Z�	����Dri������'1��Py�"�0�)��%ve���km��,�i��m�",�W��'��*�v��(h�G	�
ve�y�b��(�3��2����l. ���06�Z"�y�=ll�C�ca�ell��.�
-�Lw��0�@�;��p�}�@(�>�-�v	n �5p�.T�o�'�
�a597�/�G�zi�8�.��� l�D��13mbs��
������	��f/mlx5e���V$p��ed��bu��
�~��Imp�h��:i_po�]���152626�=Blueto�>�/
voi��
��mhc��>� )_�K�t8���Y�%o: q�d- ��/ r�I&AER �x?���U974�Uxe�2�rr�ܡ�d�.��akb_�@_f��cycl��73���g�a��`��f�%ny_cre�__�o<�W67�[smb:�r��]UAF�I�2�c@�z(_��Y58�+@ʨ:��
�z��1� fs���t���O96�O: hns3:���$�O��_nic_n�@�r�<�W�(1-4�
�$�i&�^0s��>n�;�b�_�_�_���x(9�BUG:��h���age�\ul�=��:��&16bf752f593ff8�4+.4.z�8+3�>0��[HPE �& ��]� �<g���z'�=
�l
���	p�4e���x6220�x���+�/�����\/�_de��.c:51!�\68����DPLL-�f�,�D71�)CNB95��s�d:��" TC��to��6.�y764�.IP�SR:�*�����4�X�S�C�TRFE] B�Ot��`6�7 ��?�D�U825�#I��D��s��w���t�u(�O����u�8��!sir�_ۈ59�	)��]��@at�]VF�b�9%�x MDD �!��9083�MC�8)4 REGRESS�] �Lbo�b):�
��oke�10+ �,s��495�ybnx2x�*��� PCI�/��i��J�R����432������)6.0�i�T'6�;'32���O'�32�
O'���S%�G��X.509�	'n��PO�d�8fi���J80���	��)�9,7�B�7�A�\S��T�_.Js��$0�,)�2�v)8�	264�0����j��-1.��-�
jd�}0��'�J�� J�1��E�a ���*S��D��+K�RG�>�3�k9C�?Eli�
&i�arra��dex��&(832�1�h"114��P�zUTF8�?�B�/�7�B31�BE�Z:symbo�2�e6���2He�@�W9�W�W8�W�� �� ��(��c%e-�L�t�0548�0�[P��200�}r�>�;�����,i���)er��e2106�e4�eO��C�
"�|2D�[�O�\�O45�4�O1�L11�M�+��N7�N7�N�+�nN��2�72�7�+�u���Z�TIPC�*F �sembly��~A�P ��3688��e�7�isil�3��_dsaf_�Kc��/�N�Q��/ge_srs�eL_�i��� �vÁ�w�>����hclgevf_s�Ymbx_msg�V9��v�b��$��l�#���F�=.��Ihar�ת��R3�Y�
R62��c�iPj1939�j6�*9by�sG�Y�#_�s_�t�/Cw�	�`�&3��?vms�f�u�����Mup_k�d�[�Aa�z5�M�U����b>��U�H�%b��i�,e�B�O�>WQ x�@����+�~W��occu��.�R5po��Q��m���4_�c#85���8��)����c�����we�.��8��7�avm���h���5��+rved��(g��F�HA5���J�inc�97���$or ��e�)ior���tc��I����iD_�Q_�$_z�K+�c��8wsk_�8/q�7�5)��9��8�S�2�_hmm.c:�3src_pf�n�� ���6�\85�E:r�D9�����I�u�	Cn���cTx�R��a��`�g!r��g��iv�c�����#�!8841�^���ytp�82�sil �Pif��1+��*�;bled�f9��%�|2�o��B�0x2��:��M�YH�u)���2pa�O95��blk-��Z�����d�K���+o�B�66��4Qt���pKki��K2���)�qt5�j.����K�W9,�l�ʱ*����3Qt.���
qt��.�Delay��2�g�l�P�!e���u(r��,�>-��6�e?E��(E��=d�����6���U���UEFI�`%��V�GM�50ch�R��is�ڮٳ(�W 64-b�%�Hfirm���IQEMU��KVM�����:��%�eXC�"Hob���F��HOB O�R/W��2�K�T*�a4k�RP�VPc��UTCP�m3i�pS�t ��#N�?�_"452��A�4�w
 W��8PseudoRand��; Ge�
�R�D�z&(�!K�Mc6��$���i-�N)�z
�%promp�#Bll�e �@b�J/t-�$�ȩ	c�M�A
a��]��0�^�l�70v���A-p�_�Z��)$��foc��)o�Tynch���*I/O���b�8�iWLookup �*��&����SSRF ��Ua�U[�u2480�YK�)	�[<� (��)��Ka�y#ll�
T�<��tBumer��h�C�3���U��Qrh��^�,+�z�f�3���	-��	�8�
�Ru��a��G���D9�� �Y$��p��LQ�tf���Ue��T�f�R�zH�*�NetC��(IOE�Lo�H�T8�[�$�.���'�Y��' pr�he r��s�+032��+�gg�Yc��+I��i��l.c�6����j��B��m�AL�9j�g5����
4��un��c�����I�Iin�5_�&.�c_b��f��E7�!Lbp�|�;�`be�X?en�_�@r_c�(l_a�^�pF��c�7
�cdm:�+/����um�ho�/�Y�Dsusp�qX�K88��/�G��Z�00ip6_�`e_mp��3� �>�8�,�USqu�C+�G�G��n�:�|M�qc�� � u�h��^98��Mf���K�d���30�y
s�[�9�;P�;��s�Oa��^r���[�(s�O3�Uicm����SNULL���|�-_�	<�Hbe�1��Ob�ig�1
���@_irq(��Z� N�^��i�y	�R90�Rs���#3shut�_n�C�Gscsi�f��������fc_l�
_ptp�ru��	��8��W�h����_s��o(�~�2��rx_kr��I�]�,���`�M25�`��p����dhba�zef��(�$_����4_þ�\24�]Mov�PIV'��1�
unregi�9C�����~.c���@�h5�Q��Y-xgb��5�4��a�Y��I�7�e��5:�-be�c��7life�Œ�`�3�F�RADIUS�`��-�B��{�l�!bfigu�8��R�5�H^D���aUs���^(�e�`E,������ 5e�0K���K��a�I�	���0Ku��4org��	��/��:EG�:	�'�v�$EG�5a�=EG��F�<L��FD�A;����5�3�V�7�w�\�D�g�a�>.��?�����g���C�G6�#�$�'�j�����'s��p���zs��|�z��h�S
�:RRs �`st ��s�@nam�c1�O*�i�jIG(0���'k�J975�J��Ass��i��oth����qW���ve�`!�C=n�!407��48����48�$�3I��, ��m�i�+JlsS�:�	1�.>�C�3MBARGOED�K��58��b�B8N�about the security issue(s), including� impact, a CVSS score�
cknowledgments�nd o�/r related�Fformation,�f�to�RCVE pag�m lis�,�R�&ences���:.T�kernel p�v�7s conta�3Linux�!,��� of��y�oper����sy�om.  
S��Fix(es):�
  *�J: phy: (��-2024-26600)�!netfilter: multiple flaws�6808, �7065�35899��e5�fcifs:�R28�"wifiԄ97Ą52�4��3-52651ä78¤27434��4��937��941�22��857�n�6�igc�!53�!dmaengine/idxd�,182�,ipv6�	R741��596��903�40961�avt‚�CƂe���!�mlxsw�#52�Eeprom�$4�<ce�!91ŭp�ֺ�/x86�*�+864�L40�M602Ÿrt�<link�'17�et���7�t7�G1-47606�W5���2�5��pvlanå362�tcp�!7356��ir���$��tls�489�!cxl/reg��(839őbon���%948�]n�r��

For m�Gde�ils �2
Setuptoo��is��coll��enha�0���`Pyth�3 d�]ut��that allow you�(�easily build�â1ribut�E�, especi�Fy one�Uhav�Ypend��i�����9�Th�����so��Ee runtim��mp�Z�̡�s��,�ީsary��ex������oftwar���require�kkg_�ourc��
�"

* pypa/�e:��mot��de�d�gvia download fun�}s����_i�x�Wdule��\�6345)�LibreOff�l���� �p,��mun��-devel�d�ѣ-�du�Ev��suite. It�ߡbkey �ktop applic����such a�word�H�or�spreadshee�p��e�`��man�ף&��ula edit�8nd ��raw�Y�Qgra�R	��re�.��O���6�,vi���|imilar b�����Oext�������l�t�(��il���rust not valid��macro�vgnatu��r��v��high�@m���z472�z�EE�Fnftables�	_��_rbtre�4kip en���B�� el� f� gc��
81��|�Xl�N�*rej���figu���u��cause�lg�E��rf���d6�S
vfio/pc�	Lock��rn��INTx�P�©
op�k1�'�a	�$ p�-��ENULL����Ur���ȡ._brid�$�3�)	()�e5�!�	/xe�Add�S�null�_chec��t�mp.�^90��^_��r��a�Em�Ix af�X�}gc��q_�ͫ��rt�ith�e25�e�%��a-ra�__�nexpr_type_get�7�j
�$cobj�b19�b�S�c:�z pppoe h�k�.�H6�H��:��rm�cas�Vcke��bef��pass�gm up�ta���j415�j��s�v�W���if��A����a�S3��x�A�~�0���	ca����:g�����en�ba�$h�d����l7�l���Xr��put�, ����l�n��O����	��e�X�
�]�I96��
�af�^LAG�JVF l��i
y�Y��t_vf�Y�z��op�ʬ�� e���T�<v�
r�un��	���ҦZ�$77�3
ty��_gsm�x�
 CAP_NET_ADMIN�at��h N_GSM0710 l���X88��scs�qla2xxx���  b���_��f_�)	�^s��s�	��/�m5��n�)f �9e h�kl�J�@86�Pcry��
�lcm -��ar��me���A57�ORDMA/rx��seg fa��ҡ_�=_queue_pkt�J4��bnxt�: avoi�-hif��d�qn��be�ior�Z�*qp�h	_�
c_i�
_hwq�a���Xx�mak��	r���4ve ��O�
�%�len��tes�_3�Nmd/raid5��d�;�����d��wai��itself�Qc�pr MD_SB_CHANGE_PENDING�o9�9�\��kpo�o�R�fib6_drop_pcpu_��O�V���cfg8�1�_wi�k�R���_�e��O��ac�O�����eee�R�N_ps_��i�	_w��upƮ1�[mm/hu�me�y:��
n&#39;�5��s���zero_folio�O���iwl��vm:���^ds��ac��G��Y2�u�^w�io�\�	��
��l	�gis c���d�U��e�lf���h������Y
�� mfuar�ifc��4���ܶma�\
e����when��l�rNF_HOOK����End.DX4��6���557�p�4��0crash�ji��ʢkdebugfs����R7������
 ds�fcou�,��do�V��8��B-��tap�5_�sh�n
f�) ���X�
rv�@�U1���Uun�%U�ud��� SOCK_RCU_FREE �zli���!_�S���a�10�NFSv4�����9���4�W
�_label�N����ntb_���	: Move�_rx_��er���7a�K�����__��o�f�vm�q��a�A�³��troy�tr�
�ȱqp es�	ish��c���PostgreSQL�adv�
��%-�q�+�+b�}
��� (DBMS)���dsq���p�Z��P�ypg_dump�5s�bi��	�w�:�73�J�8�
�<�
��.12���u��,�-l�, dynami��fy�����:�^�m���5gu��,���t��w�]emph�E��6�aa����,�siv��
nd�������h��v�E	co�of��ird-p�vy�0i�Ue�f����_��$"� "�������r�e	��K���cs�d3.�zmajo�
of�	�Ԫ�������-�%�,�ch�ul�
 �talle�Huto���alo�8�
�K���a��
��*�B��ǝ�4broke�
u���p��tk�����e��{��may�Ted��ÿse�tely��Docu���i���+doc�+�EP���ad���]�#�`��gen��Fn�	���%-"�=����c�+: ��vl�doesn't���c�iquo�tnewli�5in�0�$�
����6inj����o3���an�p�xa����-o����
���t�]�}��cl�[
�xce�	s��y�������d���l.�9up����t�i�to�y����C�{,�we�ja�.v�ous w���;s�g�sGh�
script�����z�e�r��
�
S�1��PDF d����P�
ns��s�4�f	���con ��
map��a���a�B�)can��l�ye�r���C�g��:�X � ����lead�p�t�|�����6(SAFER����u95�S
�g�a���d	al��Sdu���+re�G�V3�9�Zto�fil��f�0ur�d�ct�i��er��(�Ns�t7����Bub�wr�J(/usr/bin/b�)�I�D��}&���6r��l�����er��ks��!id �X�x�C�Q�th�)��	sp���f��pa�n%A����šCsid�m�&box���s�X�gp�s�= (--����G� �
���K!��#��b�S��4���y! wr��n�tC��
�]�L��ȣ�GNOME������!i��,�n�qrg�]t�&�:y�l#�������Xs�"!c�!����2���0!l�b��
vul������43�0�D�cot�	IMAP �e���!�}UNIX����3,����m���4
���_#i����%a��iPOP3�t����e-�8�Ai��(l��m�ĩ���dr����uthent��plug-�zr�d�{���. �#d�):�,��number�="ddr�n������g�!a�
U2318�4�c�(
�`�N���!�&�mha�#���Y�G��m�
'�:�a�S&�g�#���6�-f��RO�p�V%�(�f�V��is�%�ʡ׮���463�2fsd�1RELEASE_L�LOWN�	��66�m�Ka�M�8�A��f-�"-f�$in�'�'lk�S30�S/��eb�c�di�2-by-��Twb_dir��$�Z�g���b7�"Blue�(th��e!�
�����B88��k��bes�-Us��py�_�"_no�3�����unsafe���d94�dKVM��Flush��s�<r kvm-&gt;�o�(UAF�svm_�" �t�ģon�w�����tw�?m�2�s�>���%coco�*�c see��R���RDRAND�Z	CoCo���V8�0�tlb��mi��_���,�Nv��`"r�{�k!�i�)f��F�P�"��do�
s_i�<'�z%spl�h�iopt_a���S80�4'����-of-bo��s����ops��ê8���m�ap����H�[ru�#in�&�_�'� �f!�I%usb-s�Da�6 alauda: C��\����a�gi�G$iz�M�/ 6��%� ms���/�x	�Ÿ9�!�'f:�b�� �Spied��f����' �Nmina����55�Pxh�](Ha�j TD� �Ѳ=�0st��m��O����!0�Hem���l����m_�'_�������./s�ɵ�����solv���h�F�����'�)lai��-as-LCP�,a�
�h�	�e�6��&�V�L �#�v��F)�T/ng�_)t�opfn_�4_�^%�p�N)PCI/MSI���	si_cap��(��7x�� /�WARN�8x��{�P!_�o,l�A082�J��s��-����'g�
��ro��
�"�JƕRe�J	t � 4;�2��I�s10�@"�l$�y+���N�Brot��*g��g�%�J3���K�Ldou��'�P,�i1�3y�u0�7�9�,Net��)�^De�1NBD�mp�Eo��2���8#�.�Ih�����an�	�d�!)���N�n�E�nbd�g�r�m����y�w�M�|BD��a�S:�*�`
�d�3 certif��)��738����]�u�6���in�_�2�k���+��C_mirr��%'t�@r�T�B��/�w��4�p
y��s��kb����dAR�e
9��*/��&f�m
�%&�{��i��1�@d��no-m����
���
��$�3*�G�v���p�S/�K��K��`ha�(vp�	�&�X0�Xfc�X
�E�
f��: d���V0�k��%vma �
l�	is�H��a	�g/����o��
�D�'�n1l��<.��&�0�U&���8pf,�ck�
P���(���&�(�_��'�`2�]�-��,��0�V�"0_r�a7�Y��
�pgpio�����k%�w���w��_ch�Hed_�-(y�Y�+>�Y�n*f�=-:�i��
������o�al�A����l
-�
f�.��a��*b�e��	�j��J���s�V�icppc_���W�J�2�	�O"�P5��Cfs2�H�=0g����on����P�N�)nl�0+A�O��Gcul����8�Tof �0
rra�d�v���g�/I�/�y�8
�-add��
��/�����o�s�//��ume���f�.�ACPICA��	��+	I�\�
��[BAR��Y�=�K����.��	�)��+�v,�3E�	��,t7�V�2�?_�@�\�_�
�J22��/�9nr�*Re�EPERM���,�n��	,��
�xs_��=�l)u�o��j�+�e
�cups-�2�<��`e��, �#�\<wa��&c�4r����C��>��i�1S��(CUPS)�Z=���!�Aw��0����2t�+%�����%ws��
�Yd�'UDP��7ADDR_ANY:631�F:��n	���6�] �o()�_�:��
��`cfGet��erA��` API�+ �p�!o��5��qz��
o����IPP�%47��+���~pp����[������Y3k�h��ro�t&��PPD����`.�M4��3+d-����-���q)�_�+��e���C�-���s�ha�-w���i�) CLR��
N�0��o(�`�m@�7��Z�j�~(�avail�
�
�%d�U�'�VSDK 6.0.135���R�9@�35��
do�C:��.IO.�A(��- M�>DoS ve��	u�?S��Lis� �+,���ZD�S��A�oT�*.J�X2�@5�@�����	A�C�a$�o�9h�f�I���P�E�e��4{�.
�8���9��0�
�k�<2�t�Z� HTTP/3�8�'��c�G��s�%���D�q382�N�H�l��g#��FIPMI��#�Q-� �H���*to�R�5M™�,#In��1lige�P�&M��5���, (��).�
adm��j?��������to�K����to�a�G�D#lth �
��Gi�T-�g�
ipm���o�@�P$�?��-���o�.LAN�|#�H���G�o��42934�9j�-1.�-�:jdk�C�?��J� J�1��En�:on����*S�#D�)J�+Kit��'if�Heap-B�� O���7Im�2Sa����D�7Scr�2RGB F���3-481��P* ��������hG832�@��212��,�A��Ri��]A�maxH�S��P2�#�P�xA�PUn�ied�^/c���-���N;���833144�S�P�SI����m�:�W��r�- r���,�Y26�3�&��1��11���+��7��7���+�}���21�xTe���e���}�S<#Loc��"��
�L�Wu�_n��
(R) At�J�p�uU��287�Z-n��R��_�L��&�����GGi�o�G�@4�,e�
,up�P��74��M�%n��L:�)&e�x��Xch�P�U�fn��
co�Bste�QN�#�:^�H�v]��,�w]��o�5S�rm�_�8�[le-CPU�8�-9�[hwm�[w83792d)�[�WS�N��U�&���ry�5�el��"�A\3�G�rmp��[e�+sn�!x��8�2#o��C�K���R-��,�P%�_��9!�"OOB�_'��!_�H�"�I���Ta �����/��)�DN�O�h�2�[�,�0��*��vN��+ ��O=�%f���xr��=t �?Ue�-9��]i�c��1#n�tHnapi��L�95�y*xfrm6�7&p�Mst_i�ա8�[�`(u�S�+�tM���-�-�"�	�U�%_��*_�J&�Q20�_.�R'ct��Jke c�5f��d�}in�� z�R\_ht_�Y�W27��KR��non��+����� _�J��2�_���b�Z8��� ��@��@�@t�5i�1ReDo��#��s�H�"tra��$�BN�7��@�w��623�B<�S �	R	�UY��ҡL���YJ���Xs�$�{�L�2�L�S�L�1��_xhw��.:����
Nat��Bran��Hi�1:y�v�2IBHI��2�.��
�-�m)y��.to�J[ ��9=�A66��8���hre-�b)�S�+e�#��m�E
��=�e��1g�iG���hor���l7s��b�Q()�T�Já�-5�7V����ec �*�9��g���a�O�-_�(�S�^
�b��l�2����0�^�Ue���,Xh��3�H��8r�?���W3��1�'�w1�2�O���i�<bl�9��K@�4�:Xr�4�ff�C��t�dr�(!i��to��cyc�!��`62�:x�A�kog r���	b����Ga�_h_�W1�8up�`94��
�!inn�`�a�hmeta���
9�#ŷUSB:�[
:�2c-wd�8[�����"d�C������a4�fY�;�5un�e4�5�<�~�]�;�'��rt6_p�A��6���4��6�-�\�A�B�	��@���-�K��0���p���2hu���
�ch�g�<�_�b�7��1inf�W���EHn�f�r_����_��5��n���<�^e�A�__�<_��l_�g�LZ�k�p��|�$in�_�Xl�EB�R
�P1�<s���]��C�b�}������b��1013�V�?�s��6�2x�����r�_�X�R�!�u���a�g��p�\��?]�j;i���A�b�a�=��3�qse��a���_�q�O5018���EXR�F
�-��1�F
�?
-�B�z�b-���m�1�����7qual���"���nd ��B��is �P��pm�
b��
f�vi�|+�����?�Pfl�y3c�J3pt�
�+�I��>f���
i�m�I�\�<
�	�=
�LN�J�g��	�$����gS�~&�'D�gt D��P��:�8��^�
�t���
a�
of�Mma�='�7��Tag��O��F�IF�I(TIFF)�\�3��:�
t�!������k700�6E�(E�dLd�Z�"!�
A���	�=UEFI����V�}Bu�Ma�sn�|�5�Lsam��+64-b�m�H�k�/�IQEMU������	��rss�P�hC�M��X.509���o;61��F�i�mys�Ma��OLY1305 MAC�Z�O1�
�Is�M.�
�r�]PowerPC�,61�?�]E�p�x!�<t�r�>� RSA�@bli��
s�R237�R�s���=�I�s072�Cedk�Tempo���(/�2�5���3��A�C�?s�
�֤��n��'�Xi�j, se�nAlma�
R�N�%Z�Ae�M�<Xw��
����X��e���#�>X�E�W�2. :� 

Security Fix(es): �  * xorg-x11-server: Heap buffer o�read/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)�.bPassiveGrabDevice�b1�bUse-after-fre�ORenderAddGlyphƮ3)


For more details about the s�Cissue(s),�Wcluding� impact, a CVSS sc�G�
cknowledgm�#�nd o�/r rela�<�Fformation,��to�R�� p��m lis�,�R�&ences���:.�ӡ�i�al Changes��֤��n �c�'�Xis��eas��s�9�jAlmaLinux�t� Not�0link�NfromΒ
X.Org is�� open-sourc�,le���f�BX Window Sy��m. It provid�T� basic low-level fun�ial��that�ll-f�p��graphic�us�Vin�fa��a��sign�&up�?�g(Kernel-b�6d Virtu��Machin��KVM)�$�7s�6�� v�#iz��solu������numerous hardw��p�I��s. T���D:rh�Imodule con��ns p��a��w�>h���E-spac�)m�5��u����run�� m�������.�p�V also�VAPIs���5nag�/����a� �with�<���rs�%s��lib�� Crash�i��	d�a�Conn��L�=I�&()�8235�B�Pop�
r�& Portab��Docu� F�� (PDF) r��N��rary,�~by a�E���T�]u��as Evi�m�"p�: pdf��: c�+��broken d��s wh���-�?t�)ramet���*6239�B*Jose�'C-l�hu��LJavascript Obj�A S���\Encryp�/st�� �j�b��jdep�uncy�[cl�es�Hta�Q��,�ige�����nNetwork Bou�/Disk�}(NBDE)�.�����:�V�I	exhaus�J�28176)�.Deni�ġ��� due��@	��rol��CPU�sump�P3-50967�B��rGTK+����
a multi-���olkit�)c�
���
��gtk3�u���pv�M��3�o�A:�2: L��inj����CWD�65�C'BPF C�v	i�,C����(BCC)��"e�,
�(�)�effici�Tk�o
 t�`	��|	ipul�,��g���E�\�Z�
ext�
d Berk��y P��et�5l�e��)���Ubcc:�|priv���
����a��
�loa����k
�i��l�=h�
�.��314�C�	yth�%12��ac�!si�	, high�, dynam�l�yped�_�pre���Rm�	�, ����]emph��s��o��abi�����es�,������
��ha��t eco�0��ird-�	�
�0i�1p�����"� "��S�
:�r�A��r����J����zmajo����its�Ӫ���F��-�%�
, �
shoul����N��auto�=��alon�`
�K��rem�-���)s���ǝ�`�0�r����tk����est�D	��may nee�Zÿse�stel��%��h���*���*.������ �_��gen��Dn����#-" p�i��	�0:�vzipfile���vul�i�
��-bombs��o d��	�045�d�fin��r�IPv4���6 ��Y r�Q�B4032�Bc�I����al�e�wZIP ��ay�����
Sǩ8088�I�����fv�ko�)
-or�$��������Rcl��exce�Bs��y�& ��% ���&�G
���l.�duppo�{����y �����C��,�we�&a�.v���w�^���;�\��Q��M�e���n�����m�(s�d����wn�X�Ftte��Bkeep ���:�.v�����il���!	�Ep�1	����\E���K,��s�tmob�U�adb��(WWAN)��PPPoE���[��VPN��gr���	�ye��dif�Ft�+����d:�
�6501�;����bluez�3�3f�t��l�^�u�n B�9���: hci�,�����
�Yfig,�p�6�Ql2��,�\
rt �����pcmc��Au�r�B���	����y�h���GHID��� a��s�����
 ���arbit�
�m�s�
� �94586��Z: A��o�h��AVRCP I��p�IV�d��f Arr�I�q��mo�C�E�hV�	��v27349�v��phon��ook����h�h�y�nfl� r�t���v�t51596�tOBEX���-of-b���a��disclosure�`4�`a�L��avrcp�se_�ia_��d���2z2�ze��3{89�{�m_�m�Qribute_�s�4n0�n��st��2(44431�^��0�`t2�C
F�F��#�a�n��d�h�o�\l�;"��m�K$�"s�B�	a���k�@��s�PostS�G(ASCII�Rn��T�	 1��ome�3��
0��True�, O�D�(�2)�'CID-�`�줜�S���#f��:�s�v�r��$��}"ve�r�)pres��� �F	2508���Z�C���G�CzG�q���~��^	�il�Dblock�	���"w��ten��C�`(�]���"�^"i�3NOME,�%m�
loop�z ,�n����set�W�)
y�(��st��"�mm����uctur�
g����� ��sub�*
�����3439�C�Bub�|wr�e(/usr/�/b���X�.eng��	��l���4�s�a�Nui�x�C���th����p��
J��pak�������Is�'s��box���@��'p�st��= (--��&'42472�d�5����V:�cDos�H��s�b��� k�_�"�w
���
�����
��X'�[�TR���B�.NET�
�d�5ft�2f�5/��
��G
�+���;
�X�C�-�+2��sev�)��w���i�� CLR�
��N�2�'��b�o��+�n�]����n��p��upd�9�U�'�VSDK 9.0.100���Runti�1���
kdot�:�S��u��ė�5��AV���eC�7NrbfDe��
�3��'8)�h�<-�S�(un�O���f�Wor�.�_��
�YEXR���f:�J�?-��f�W,�-poin�xa������7q�g6���"p�9�����}�c��T�L�4�s��b�nf�6vi�o�f���?ex��/�h7�4����6specif���
i�"	���j�@�)�A��N	�g�U�$�f:O���gS�-�:D�z"D�P���841�9��	/�*�X�4��!�� f �e���Q�9�v�K: ��n�k
hop:�����8�u��eld�d�3�å(�)22�;�Si�Gufd�qui��ri���-	�C���e_inv�je_�8�]6824�]�$cp�3m:�� uaf��__��r_d�3�Jsync�F58�&l�G:px�&�	
�4VP8���
�8�en�}�3de����6�Co�c,�����s�WebM�4�X��r��v���hte�&��i�px_img_��c��:51�.�i�p�d/aux�1AUX�Ls��:�=�/71��RDMA/bnxt_re�Ga�E�F�'��up L�C
-2 PBL����08��lxsw:�l�rm_ipip�_me���k�\(�:�e��).�)�d52�3co�	�i4���x�4���&_rcv_�_adjust�Z312�
Rap�is�"DF�X�NT�5Redl����&����"l��@p�@���8�5*�	����$/XML�	N-T�.�fr���$0�,�\
�-�n����� URI��t���7�7�<?��"Ide�
���*�	(IdM��entr�@�h%�,c��i�:m�:���%���A�!�`ra�?�/��"ud�!e�is�r��@on�
���Cipa�dm�st�?v��A��e���EBgh�d�S<ur����1102�I�B�-�m�f�~Rout�� ��A�Kt��i�not �\
d�rea��
[a���:-9.5.z] (JIRA:��-730�K�i�U���ۢW��
�rou����1��is�
e�^Bipv4.�'e-�%ڂ1�(�y�\)do�����\i�r�3��s�g7�g��3661�>/H��&��op���r;m�;��N�F��t�"�؊6�6��v	j��-17-�jdk�=�J�%17�A�E���C�+S�ND�op�,Ki�
�A:�^��ce�d�c*h�al���5-21����B���B�������rel����y-��-�ig����s����+�a���]�b.�"K�lis��
�}�be�D�/to�,����R	�o�T=��E�2%o�
��%year�@�Ir�����,��867, �71�2).�\��21������+�R��%�
�/dc��Don&#39;�# �p�)A�Q(�reqsk_queu�o�^k().�<
15�parm64/sv�E�,��e�Est��'��S�7t��
75�&40�Rf��
r��Kn�V
�CId��f��A'�[�ute ���x�
�2
Ma�DB��Hn��d�u�k�Q
MySQL�x�E�.,��)��d �"�B�C�r���_l�D/����s���f�
�%dae�$((m��dbd�?+���8	�X��
�!����&��| �/���S��(�S�	'mysq�pInno�Zun�O	�..��O�r)20�&�\��1���KC��:���VApr�V4��21096��
+:�0in�u_�_ms���253��"�!��!T��!�'�*s�	� �b�K�r�Uor��=0�P	��3�k�PBypa�%�O���Q��o�y��m�k�(o�+�1di�C��p2718�kE�db�}��n�~"�_5��+4��"A�7�.e��"t�8�lpath�v�S51��K�&���)�,�m���
��t�P�J'��138�������x6�Mc��1:�ke��RCU�At����igmp6_s��2
�@75�?�Oovl�[UAF�9�_��ry_��� v�:by��v��dput�#�+�_up�d887�d�<%atm�i�q��`���H�Uɬ200�audf�R!s�i-o�:@��in�*_f�_��X2-�)46�Xvmx��3�O!al�&�a�+Us�;in�'_p�\(_xd�377�)jq�l�Ltwe��n�cxi�H�p=-l�t(JSON �o�3�=lik����"�^. You��E�8sl�,�m, �>,� t�ho�EY�Dd��� same�4W�s�eawk,�bYe�Dsimi��3��% y�����Gt�M��jq:���p�5�le�jv.c:jvp_��_���:2333��OA�#Sa�Q(z���B�-�Xq_fuzz_�p5�Sj�#�y_vfm��9�e8060�)fx86/�&	����'/AMD��p�7	�����-�� NUMA�.�	�99�+�&.8.0�)8�G�*�(FBet�[�g�Q+a�
�07�hH�uTLS�D��l���6���6�I�s9��?�^�B�461�4˚�����4�Y0����On�$r���� �5�Q�(V�L w�%"���E�S�((ei�$�[`-D��.��.�-�BS�A=true�e���o�!�I�6�%�X/)�ce�h
d �^I��.�=
Lo�\H�D�c��	N���w�9re����Kgy ��/��h�+�y8 �9�;H�+sh����/behavi���o�+e��n�$]�Solar�K"�ٲ�i��"vi�H�W@��'�U�>�
.�L �@�wi�:
��Ĵ�_�].�M��%04, �5�6�7�8�9�10�1���#�[�HTTP�R�8�� 5005�t�/��6�Z�D����Hdefa���Uc�/L�3��yWay�+�7�.
�"������cau�;aa�5il�tL�*t��)X11���y
��awt.Robo�Q s�{ake�cr�#c�+�O,��du��a��ank �4�($RPM�8re�ve�w�>�2PipeW�>2���8��s�o����'���f66�669�70���.$�`83��84���
�
��
��choo��mi�,�,tas�#�81�O
�$an���Y	�i1 g�a�#�cgo�GG1A�5Region�os�,a�c��	�
�
��9ato��)d�0u�?N��ob�|�r�e�
�����#�c$��su��g, b�O��he���P�l�)���U�K�
-to-�T�����
�Qa���o�9�3ȭ��"�cmid-���O�� �ll�O����&lway�kJ�c���L�p�/�0��<��}903�
�8�1�^�B#$�?B�?U�!5o��r�23�&/g��.c�\�� g�n�x�_�r(ch�^��437�$�gv�*��vc�g;�=m�}d��#�@���80�-�Fsunrp�l�e�g+C_GARBAGE���tsvc�5���as��^�	80��X���zB��
�$4��[��\r��s����xg DNS���SEC�r.��8�r:�s�{C��>��so�G�
9�,[��=9�nux operating system.  

Security Fix(es):�  * kernel: media: uvcvideo:�( double free in error path (CVE-2024-57980)�Kwifi: iwl�limit printed str��from FW fi�`�M5-21905�MRDMA/mlx5��page_size varia��overflow�G2091�Gext4:�o�!ut-of-bound read�ܡ_xattr_inode_dec_ref_all()�Z12�Zavoid journal�b updat���<if�  is de�
oy�+�_13�core�use-after-��when��name�Qvice ��
8�Unet_sched: hfsc�Xa UAF vuln�Bbil�0�class handlĪ37797�Wmm/hu��memory�ode�Ge��c�>inv�d pmd mig���ntry�Z958Dz: ch9200�Wuniniti�Ms�Xacces�Su�_mii_nway��start�Z8086�Z/mdiobus�eot��i���,s�
�} 45�7/w�Se�y�a11�

F��m���tails ab�O the s��issue(s),�clud��� impact,��CVSS s��,�kknowledgm��s���o�/r��la�ainform�V, �y to�R���?�m �4�,�R��es���:.
T��! p�w�8�on�ɤ4Li�o�!,��� of��y��4�Skip��rs�;��s�gtype UVC_VS_UNDEFINED�ӡ9_�.e_��3104�)�pa�������/�p��kord����72�!HID: �l-ish-hi����y�[�$tp_�&�^m���1928�+_�Y�ccl�b9�bcif�'�gg���wh��pro��Yclosetimeo�lunt�t���`62�Eemstick: rtsx_usb_m�qslab-��n�'_drv���20�eisc/vmw_vmc���an��leak�U�_host_do�Rceiv���g���%2-4978��bwi�Z�6em as��ild qd���890�tip�a��� R���%_a�_�Nryp��ne�52�]���t�zta��o_�z_not����m7�nPytho���"��pre�4,�a�'v��obj�2-orie��	��*m��langu�q,�$ch��emodule����exce�&��Yy��gh lev��dy��ic �����d���l. ��suppo���fa��t����� c��	�Clibra���J��ell��.�j
ou��ndow�0s�1��uptool��P�6Tra��s�VV��+�*��Index�I4�J3�IDoxygen�vn ��e�Ton�]
e�	brows�G�IHTML)��/��a�{�T��u�J�#LaTeX)�Ua�K��docu���u�tce�m���;��~
������e�Jir��ly�N�V�>�9¼also b�Wnfigur�9��F�qde��ucture�N�F
Ζ�
Kjque�PUn�O�d�]ex�0��via <�\> ����:��s���DOM�4ipul��me�$d�
0-�
2�d��gcc�	��J
�4mp�mrs f��C, C++, Java, F�(ra�yO��i�?C��Ada 95 GNU����d�?����B�
�[A�����	�A	o:�gif_hash -���7�_�$p�79������P��		12k�N�
�C�	�9�G292�)�bpf�Pe��
run��D_skb_pkt_�[�	86���i���&�(	�R���'org��ll��o�
4-2895�r�(tlb:�	share�M��ble��VMA sp�$, �\
�n	f��^
4�Y�b��m_�f��vs GUP-fast rac�P�+�
dp g��	�!se�3 �E �l��	�g_��S12Ť�	rtw88�[��'�a' buf�f���k�W�o�����c5�mBlue�Qth����N���q� flush���z5�li2c/�
ig�]�O��z��P�H3�%t�
al��H	f�h��	u����sock�L471�)�Ǭ��k�|��F�.��205��et����ad����91����es�A�,�!����2��
sc��� 1�s�xgreSQL�wadva�#d�f�q�+al�
bas��a���(DBMS)�p�jsq�{�v�e�|rbit��y���|t������871�B�W���N4��Acp��: C����j�joop�%�a ���O819��:�gd���Y�;��<�	�|
�
�8���Wi40�MMIO ��-���a �Nin�1��ear_hw��
0�
�i!iwcm�(�work�h�	�cm_id ��!u�v�b1�,"�OA�
�����c��s���-	�e�e�mp�s�X��
�����n_���46�	v�y�K�s��_* TOCTOU�:��xfrm����@
�?h��]�9_�"�=�<�i5���U�k��M�s��da��
n,�l�������e �N, �G	���
$�>technolog��u�F: O�"�%%UD��D���,06����mgudma�1�`a�<�9�"��O�-��e�f
�k0�kdp�X�ǡKt��rol�m�x��inl�3�+�drm/vk�#�t(�-�8���u�d+�d*��+�~%scs�+pf�#U�/em��()�BIOS�s��33�#��ix-cpu-��$r���~�Kbetwe���0*�y�)_�)_�)()����
�f+���s����7	cqui�fr���GEM�s���&(�K�(449�)�ipv6�ec�<: D��y�t��+c->i�u��mld�Ѣ�K!��5�
�My��	lti�r&r,�th�0	�A�#�� �[. I�Js�c��*�b�M� �	 (my�7d�.��cl�q�o�����K:�dump�spec�&d�'(CPU Apr ���072���NO�m�lr�#N6�2(�NS�d P�=)d�1#�#U99�UUDF�%�1�;��<Re����
�%P3�PC��"��(n�VS�Ii���#���XP�I-�"�21574�7D�N8Ě�0D��InnoDB�%�7�;0�ND�$�$40��S�%Y6�2G70�9_�K�s�A�$L�:�0]ĝ�7�0�<V�<��G�'T�t5�6K703�8��KDD�&����0t�P��Jul�K�k9���@�N�%g�N7�!g�K�m�H���-�9�:210�N��Η�!K�K�8��/r�X��-��
E�2���C��%�1�%Z��ė���P302�x�5Φ�#	�+��;���.N��T��!o��;�$3�=�(U�;|9��+��:��/�,^: ��8��msc75xx:�O�i@��et�Hngth���)->le��3�<2��)�Kdwc3: gadg�l>e��tha�Yv�y�&'�ye��� ��)�v���V1��L9��e�c+:�������
��un�1:ed/�l�*4�Eu���]84����390�al��'SCCB p�+'����>96�+}mm�G;��@���8�D�"or�G6���pp����@�24��:�BIND (Berkeley�vt�/t N�BDom��)�gmpl�(�
�DNS�(�(�4S��)�toc�. �d�`a�3�B(�Cd)���olv�$��<�C��IP�*re�; a�&r�T�rout�8�P����>�����v���*��);�_��9�=�Wif��C�P�䥰is���ly��b�:�9: M��rec�?��^��i���k#������exhaus�}4�261�	�]��-�O-HTT���s�c�.�ple���j�@heavy�8�+o�m�s2��\�`nss�SSL��0�w#n�:_�_�����
�553�8rb�GG�nm�A��tok����43737�v���u���ASN.1��1��s72�$�"�
O��G�	�2123�
X Plugin�#M1�%
͜4�C���$����� S�ma�%�7�W�dͣ1�$:
�N0�!��>��G�p��GCS�%Z�AFT�%H��Heal�Mo� o�%C1���H���-�3�!�Κ3�6K��$�6K�2PS�%G���H����w4�8:3�+�Y��%r�@ssw�	�94�3�!?5�"��
2��214���S�����6
V�M�>52��H�
(Priv�.'�[Den�Lf���BD�pę�)����5�I�0=5��]�N���Hs�$O4�B�k����	Unau�)r��d�8+��)Modif�3�5�%��������P�4���h���)���͢�<��NP�`��n���*�3�;49�<g�#� ����*��X	�-���
�RN�Y�ZMis��A�;�A�O4�%�`�"���.%��,�
���Y��������yt��gu�*�T2��
f��6�M�aFcr�Fdu�]�S�T�=Xe�X8�nO)�esm� �r��6in�T_op�1_br�l�Q52�/tp�nea���+Tn���bD���T�%_rcv�K7�@�K�NC��D�~���o-���o��rx�D9�*�T��R�/f��1: �3�`��_wait��-�[9�r'p��ef�¢-�a�>��Alma��Ide��:��M�uA(IdM�; c�U�Ee��Huth�,c��i�:�A�����n��#A��bo��ra�`�/�4ud-�P���6ise�
viron�
�EF��IPA:�����es�46�����;�1d�admin�'�?��74�n��i�7��ve�a7Per�lC��Q�JSON���	v��S����9im��goa��]�\���1it�uond�'�H�R�ac�Gl�^�Ӥ't w��7�Ite��C����-XS: �=�X���,6���a ��Hfa��7�Mf�8����40�Y�'��/key����Xo�;���_task_�fmi�cZ�J��8�YKVM�=86/hy�2-v�L]non-��T�c�H��PV TLB �J�x35�_��MDecr�TID�RX pee�5g ��V�6�O`97�F>�E�o�Gquo��APIs �%�"	u���sy��x��� �"f�oenco�Q�IA��1�%�'��^�L�
arden�#2ton�9g�~s��D�w��0 b�%�L
�PO�$p�BA�#sem�n�8e�>Ncu��96�wKALSA�
%-au�c: V��e�CC3 cl�Vr���d�#rip�ZÜ975��
�IRseqiv�DRH��e EBUSY�y
�C�%3��Z.NET�
��d-soft�9O�:�ND� �e�+sub��Z�X�C�-�Ӣ�severa��w���it�e�ICLR���N�2�^�r �b�����]���n�(�1Yil�Q�N[��fd�U�'�VSDK 8.0.�c���R�nN�:�21.�1dot��'�4�Dis�D�_��5�K%�$
�F�l�?�@By�E�G3�7�G�
�ĉ7��9��1���0���h�fs�A�xd'��gn�U�^re��n �Q�es�h��0�veg��r�W��firm�Uarm�yKp�E��_�9���K,as�U�!���h�l�Ŧd2�1�dsunr�he�}&s�V_�tt�
l�-��&�K�?��W�K6�fiv�YF�#g�9
�#_d_�`���81����cfg80� �e:�p�2'���U�W__�#�zect�tl�9�@9849��C����L/�L �Ni�cd����2�g �o�]1�j�-1.�-�(jdk��#K�@O�J�[ �a�E����*S�D�kIop�+Kit�:DK�Ph���eFa��Z�K��~9���0C���e�
�t�6�2

Bug�ySi�A��8.8�te�0�)���9.2��has�d����bu�fNre�ed�j�nmaj�
�E�Z. W�ot��,�
s��O�iw�$e�oby��f��]Jol�ܥ@��8.2,�4�6�f�Q On���J�om�w����'s FIPS�e��ll�����$Xbl���L����pi�&�>�w���pr�TM�#Kbeha�	��+��-D�Q.��.fips=f���b�-��77, �8�9����7��17���+�������־��8�8��OL����
�����+��6S�x�1617������ �f�ba��� ��fun�4� ��S��Tag��Ima�F�9QF�� (TIFF) �:l�����9b�4�M-A����
����A��Wr��Q-W�w�e�H99�U�c�]Msr�MAC �is�
�pn��xnt-��7�S<�M�
�_
�kY/GPF��Llnil�
mdt_�Xo��
3��e�E�x�
��4�G�xa���)f�.ch��
��5ma� ws�`��r�$�2e��Xe�]Q�BYa�^�s��s�;'l��
��$. �@�ԭD�t�*��e <https://g�ub.�3/�Irship/�+-�+>�
�xQt�Fc�]a���Z�������gwww.g�*��r>�NVb���'�B�.a�~db�%��;(�,C�$D�$E�?[B�G�"$��o�y�};�"�M�oI��_�+r_view�-~�K7��(��7|O�!)I�vulnerability (CPU Apr 2025)�VE-�
-30693)


For more details about the secur�Eissue(s), including� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fformation,�f�to�R�� pag�m lis�,�R�&ences���:.
T�kernel p�w�8s con�ɤ4Linux�!,��� of��y�op�/t��sy�pm.  

S��Fix(es):�  *�K:�� leak via transi�� ex�@����some AMD pro��sors��4-36350)�j�4U7�Ux86/vmscape: Add�7di�\al IBPB m�
g���840300�8BIND (Berkeley Int�t Na�FDom�@)������le���
�;�UDNS (�(�4S�<)�tocols. �d��es��3serv��(n�3d�which��solv�$host �s��IP addr��es;�@�&r��brar��rou���-f��applic���>use�_en����fac�with��);�_tool�=�Wify��a�����(��ly�*bind: Cac�Ipoison�;att��s��un��ici��RRs�g778)�Gdue��w�{PRNG�;80�;R�7urce�@haus�A��mal�O�|��KEY h�l�]�L8677�)(can: ��tp: fix��t��i�dCAN fr�;recep��race�ȣ0_rcv(�2-4883�soc: qcom�imd-db: Map shar�me��y as WC, not WB�46689�OSquashfs�Yan�ױuck��mb�� ��
ize�F744�Fv�A���betwe��evice_ino��ت�f���()&#38;iput��]767Ť�tdx:�t "in-��MMIO"���@72�rxrpc�>aĢ�Ok�s�up��I/O�rea�"���\986�io_�ng:��if�� need�����dule�¢& ov�low flush�[5006���Mm_�pci:��ss�H�_class_free_de�?�N�be/r�
ve�thod�l2�ġn�hposix-cl��'�dti�pec64��n��_�)_�6��50195�~�V�>�c���g�lls�M29�o/rw�s�SNOWAIT����O_DIRECT start wr�x�[3052�[a�Ǣ�����urs��49�vir�%/v�K�dc��_queu����5	�G11��KVM: VMX: Bu�0�l PT�_ualiz��guest/�:m�H)��hi��CONFIG_BROKEN�j3�xe�PX��hy���t�]�afe ag�(s�p�l�vve��(�6�Advis���[)�s241�sRDMA/rxe�"�sqp�war��s�\req�G2�&b����uaf��Erq�^l�Pt�tags�	7�nfs�1re��s��vc_expkey/�
o�8�rcu_wor��216�Net�E��do��Z�? d���msk�������i�G6603�k-cg�	�[�CUAF�@�cg_unpin_onl�	�H7��cpi��i��vm��oc-��-of-��n�,R��[�)_�(_ctl�T6�Tbpf���nis��ch��_�g/�Fh� RCU��av�����Lj1939�_ses��_new(��skb�2���un��X4�Xrypto�Z� -�u	�	� lay��dire��y�Y
padata_do_par�+el�jreturn -EBUSY�p�*�+iowq�n
kill�2bef��:ƾ70�	rtc�H__�_�_��T�	uc�
ful�Z��r�����'73�j��p�	���
's ������is �5�3b�/
�O��	�\8�*ig��/�"	inv�������	gb�5�����Jķ2332�Zpv�UB�9un�@i�G��s���`p_vs�����k�d368�9etfil��:�Z
ntra��mp�iximum��shtable�C	��NT_MAX�Z5-�C48�Z�2��Hke��������bulk �Nairn�γ�s�a�	�D, bfq�'wak��q��af��_spl�v���R3��z��L���K�T� ��B7�B�~��ge�j��r�@	f�ur����M�mm��swap:�
��
nchr�R
ze �3	�cr�.
s�	�Ehot�Qlug�c9�c�
s�+���D� �i�{
c�2er�on�����U���c�6r uffd-wp�E/P���U�n m��	ap�9�cpfifo_�
_en�: D� �8�
et�ȱj->li� == 0�U70�Xusb���|	��i��rr�c�K�B�o
6�powe�
/x��H�본�Jicp_opa��O4������:���NAPI��om d��3d��ruc�9���9��papr_sc��don't��{	s����'0'��d�b�����_353�v�	���|������Mima�J��!�@���N6�0
l�/dim�Vdivid�4
y��L��	 DIM�D���	�\�s�ID������œ26���a�1teg�n�T
���raise_m��	ure�pî4��/�x��r��Vtma����>��B�Oef�b	D�
��G
ce�(f����UEFI�Le Bo�)��
T2��c�
����8�X
ta-��ar�$ ep->rdl�#�8����J
h�)����=�L��=�In�&:�^ap��-��cr��aen��p�-th��gh ��Y�l4��NFSD���#���4_shutdown_�b���F���Send��g��s�%�ous��A	!p�m���72��p������_�:��_r�6���Y445��Blueto���trt�K��NULL���up��	���	798�2wi��brcm�c�T��
 r�Xe�c�clc_phy_iqc�}�!��
ms_n��d801�ûbc�@��de�����_ge�Woard_�Ǽ�q�=mlx5�P��H ODP�����Ɵdrm/xe/���PTP�
�Uk���495��HI��hid���emas�
�Q�����_��G�{����	����j��rtw8�
�1���mcel_hw_scan����-���/	7�X�`mt76�925�g��ln�_ch�:_vi���
���`ath12�(���x��
��F�h��OPP���:ex��]ert�	void����$
f���u9�uı����tin�&_�[_as�e�to_v��i�����	acl_�/�
default�m��<�B����Hscsi:�C
s���j�--ĸ�`�r�7�7p��s�_3���C�U
P�p���]�8���u�som�(��]� ����b��sf�Ens�(�we���\���Es��Z��	�������a���o���h�Ll�M��ip���mu�|
�>Logic��o��]
���E:���g�reord�#�d���?vrf:���A��u��l3m�l_l3_o�W��fte�
b��e�uEAM_OPTION_TYPE_STRI�g�����]��Wh����'�<��
�
���w�m�p�Zrt�3ūvxl�O
��_vni�� ���u����off�on����lo�,clc���pv6��ip6��_ad�s�6�ASoC�OF�[	t�hda-dai�DAI��dge�_
s����®�?��L�G @��T'�?b����ý�X�
let�.�[.��weight��ways�<non-zero�L80���l��un�jd�_buddy�v����
�4�颎pm�_p_�bw_*���
b���X��
���;�a6�1iw��mv�a����O��d�
��v���p��n�4�@�(��ac80211���1�up���STA��8�
�Ex�y	�2�B �\��v�6�7���kv��	vcpu�7
8���Mnf_�xs��j�
�Is�Vof��eld_l����ke�ngt�T���O�Zs��p�����_p�
�H����.�par�j�c�]�j�N�ra�
���"����a� �v��s�V�L�8�^
"��xe_�5nup+0x12c/�70 [rd��]"�
�u�a:����DR6�Q�e�L��y�e���|.��_run()�.�S�f�*��_���#ly��py SQEs �w�z�}�W��$�6soft�|��L
r�0_�u_�	�j64k�_�9�5�.ibm���
D��l�&�	sen�!o VIOS�O�smb�
��:�>%�next_�h	i�ce��m�ed_�nd��
��8�D �	�+hol����z��utex��m��!�8�h�E���-i�C��c� nul�f_i�msg_�	Ƕ�tc�Ad�T�"�4����s��!��as�
urr�?��-dst�X6��d�s��<�� �r��]��Mt:��, las�6��U���7mm/migr�X�i �S�;�
f�."o���� LRU�H	�5�p�I�X6���,�v�wopcod�X��6�Tfp�F�fp�!��rl���1��8�M�t_�m��Ngene��op���Q�f�� on��ƨ20�����o���a�� �@head�l��	�8�	���c��di��ay������3��
������	��H81�4��jan���$�ke_�k&�C$(�B$x�i�m�
LSM��S�c3�
��& �Y&A�=�]�js�p&�֤��n�\
�'�X�	�� ,�W�Alma��&R�� No��ed��W'�k&�w-�ls�]'�)��c)�
�QUNIX�w�� fil��
t�P���,�5���l��)�4a�-$us��n���
����:�	�'�� �]���|���o� gu�d�L/etc/lo�w.��
�eld�r���c�9i�4��433�E�zz�b�qa�5�X�^�,,���(�n�ra�F���Y�;����)�c�,�o�Urav��z�
�!�t�@b�7%/��-m�6*c�18-�6�T
�?�; Id���>M�%�IdM��.�{�!��auth�,��, i�:m�:�F�(or�h��bo�'ra��/�)ud-ba�e�O�s�:
��'on���xF�A	IPA��Pr�leg�As�����"��d�/admi��?�74�3S��;S�/i�&Da��	SSSD) s������$�:d�'�~����t�+mote��i�7��)������I��so�g���"1��S�Oc�NSS��!P�Z"g�^A�[M��$��PA����0�Wowar�<��� p�J�-���#��
c�$m���f�[t�1 �#��ss��] �Kerb��\/�.�Nw�*&���AD-jo�#d�i/���	115�
��?ti�W�0a�����4���/�0��Tagg�gIm��F��*F�� (TIFF)����:�ob�4 U�A�-�) V�E7��8�)�A��W�>-Wh��Wher�:�0�X�l�_�5X�Per��
��X�s un�
W�2��xorg�qm�+:��a���XP�-�V��_�$�&�05-62� -�Xw�X��� ��&��val�R�v2ƫV��K�RSetCom�M�&�H1�	.Org��wn-�9�)7X W�P��� �b�
c l�l�3l��a�|�sf�-f��e��aph�`���a�Q�i�&up�	�x�>�
�9��9�s9��9�9��9N����9�y�9c�'�9�}��3<� o���3L��\���������y��li�' Si��5�gn-On �s�SAML�٢2��if���a�P
�{�aw�'�afe-cycl�<�C�zfed�%s�^���i�o7�l�l�u���L�: T���YE�Y'ouv� �-�o715����
��EW>�(�e �T!�N	_�e�Z�3��� -��#id_�rm�72��cfg�+"����	cm�/�$3�=e1000e�D�p�	���_eep���J��)�%�N���.�
u�'�C91�C�C�_)t�Y2sk(sk)->fa�@��_rs��*���6��9���,MGMT�H�K=s�B.��'s�?��&i�'u/vt-��Dis���|��O6�%i�Scoh�� wal�"(40058�X��l�j(pt�r�Txa��u�/���0�F�]�W�.B���2 NETDEV_UNREGISTER�+$����*�>2�f'�/f�<��<�f���J���J�cA��MySQL�
��-� ,���Aed �#�b��=�	�Sco��#��5�L�M��	�# (mysqld�m�������i�
8�K������	������JO����}�@�� �HI�,DB�$K�|#�1K�(�1K5�8��!�KO�%mizer�%N0�N�z�!�	��$?9�;�2�wi��
��F�&�;n�2o��K a�@y�4�
to c������br�>���Wff���o�M�u�+�V�����W$�9�BU�_>P��AW���13499�*Sl�z��-at�*$�S7��,ke �"2�+��h�?"CAP_SYS_ADMIN��r�. �3n�<$���m�	f�	��	�v5�(ab�$�E
��cript��)�m6��$t�y"wai�;p�)�8�D�8)i�
if�*_�p�&�)�2,�	��LPy�dn�Q�5e�4,�ac�F, ob�.-�n�R�m����3�Xm�T,��0�ex�K���y��7�:�dy�^ic�/"�4'�����l. ��sup�&�� �Be�Zy���H�*,��$�.v��: w�<��Scp���")����"��E��f C���kD��"(EOC�9L�o��c�z%�3�$�.�-)�_�g�:.1��f�]I�E�0�O�SSL �nA� ��Ke�J�t9-�19�cNPN�w��V�%'�?
�̥�HTMLPar��Nd�&c�lex�	��6�C	�_�Qʦi�s.�..��*��v���Y��s�"�3r�=8d temp�����2�'+ACPI�`,t�)�?��5�".�z3�[H60�s��M/��M��-�J��K�cocc�/�in�Ak->�L2�02�@�:�$7-�_
�d�3�|��:�I3�E��?�6L��4pr��4show����92�KG�
9��E_p��_�H_no�_fš��N�1LS��&�.-a���Q�A�?o�L �%e�Ex�Wy��Mbo��7�
�m9�.�)���&d-�)4w��NT�I�a�9��&�X�C�-��'seve��H���i��*����LR�Za���aN�2ve�Q��b�w����]���n�av���&. �upd�9�U�'�VSDK 9.0.104���R��M�U�3.�dot�:�D)E�&�$���n�In�?*r.���
�A�M�RS�2�O��B�0J����Enh�
�:(�T�BZ#2�^7�z.�8��1���4���3Un�]�5r�� ���C�" http�@ok�-�$�Q7592�W��j��-1.�-�Ujd��M#�6J�� J�1��E�!3���*S�D�Bop�+Kit���@:�K)��FLS��n���V��15��F�7Im����mpi�R��A�5��0��S�:���@��/�D%�98�7�17��+���21������+��d��L�9o�_P�u:ads��I�a��b�7��?50�g�	c���* C�3	 (�/��POS�?�e�p�),�Am�D�%m)�ۢi�- s�9�$[�f#nsc�d#�by�*�r
s����Wi�	���l��	�^�
�#P�c3�i�;0�/:�;R�aGNU�-L�
,'s ��
r�+(03��Q�:389�!��"e��.�7LDAP� 3 (�v3)� �,�Sg�j%��{%�~�-���?�j�V!P��!�^)�R���;P-�kL�B�%�=ist�-����-ds�6-�U'u�e����A�C�'>�f���94�8��%�+URL p���+e�u��re b��+e���?��2�B93�B*B����E
p�
����(
�d�Goo�{7����W�� ��.�3�+ en�aP�>d�? ��8,�/ye�T� ��3�R����a �?x�,�8�"�MFom���HF�
��!��ā���: m�6a�䲿�F�T����2-19�o�?��>B-x11-�_
: �#�	n�'��7�s:�2�H��0�q96��i�4�r�SB�-r�3gc�so��_65�R��BS�>��%T�.���T�q1�HP�MS�dE�Ts�K0�K���n�i�cRe�J��Y5�.�YO��q��U�PC��Ce�0Barr��`C�f�X8�XB��C�oT��OfKey�M7�MH�:�K�`H�CSyms�G�N/Xo?Crg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)


For more details about the security issue(s),�Ucluding� impact, a CVSS sc�G�
cknowledgments�nd o�/r related�Fformation,���to�R�� pag�m lis�,�R�&ences���:.  

Addi�al Changes:��֤��n �c�'�Xis��eas��see�jAlmaLinuxR� Not�/link�MfromΑ
X�� is�� X�rv��fo��unn�;X cli� und�W�2��S�tFix(es)��  * xorg-x11-�P: tig�	nc: heap-b��d b�priv�ge escal�vulnerabil�h�4-9632)�lX.O�^��: Use-after-fr�%of�root ��s���[4�G����F��SyncInitTrig���601�HPlay��dEv�]�K0�K��u���Jaliz�Hpoint�Ii�/ompRedir��Window�J9�YOut-of-�Qnds w�ף�Cre�P�aBarrierC��X8�X���TypesOfKey�M7�MH�?�KW���CSyms�G6�%ە�_�T�gst�emer1 p�
a�lcon��n�+��Cm��a�O�*work, �G��graphs�fil����hich op�;te�"�<data��	���: EXIF M��6 Pars��I�
g��O�;�4453)�EAV1 Video�ASt������L0444�Er�os���pprov����Clus�YEngine�&C APIs�#�� c�'software��|:����'orf_token_en��n_��!t'�30472�A#OpenJPEG�	o���urce�?brary�%	ea�F��2�ima��f�����E2000�/����gjpe�h����Nbin/��mo�lor.c�15682���I��/�%2/j2k�H7�C{�Qmodule ��
ns�	t�i����h�y �l�g��s�&returns�Qhash��a. I�key�r���cn��s�y appea�'
%INC (e.g. Test/M��.pm)��<valu�6�K�hs���t-��dep�jloca�����unsa��
��
inp�X�1022�� � �389 D�!o��S��
��LDAP ve���3 (�v3)�Vl�t ��
�&b�x�@�y��Lightwe��jAc��s Proto��^)�R�����-l�mut��
ie�l�%dm��\	a�`����-ds�g	: null�)
de�� l��s��den���D
�ki��48�
��x�� web�i�_xy�\suppor��HTTP��p����with a��cus��h������py,����}���qmem�us������:�x�1�&rup���ngx_http_mp4_����2-4174��Hdisclosure�H2�Hspec�"l��r��d MP4�� ma�aus��F4-734�F��Ghostscript�6�,�
s�re�7��P�1S�1��PDF d�D��.�P��ns��s�4co�]o�$o�		tm���ӡ���a�C�)ca�#e��p�ne�
�ƺ���g��:�0ngl���dgdev_prn_�>	_�Sr_�kable�73-4675���V�
�U��X�{� �E H�0���j6952�YAr��
C�Ex��<A��fex�jat��n�-l� S�[e�eʿ��Tra�0��������lo��UTF-8�F
����4�`��h�[�0�Ϣ_�Ń�g3�g�B�D����JL�&�`�l6��k�el��4��!,�xr�any����sy�pm�z�K: io_u�3/sqpol�zero sqd->th�t
�xtctx erro���163��Mso�jq�6�
��&voi�E�������X��numbe�,�
8007�Ztp�T��	�dkv�oc��"e��log/acpi�^
�H5�Hrt��pcf85063:�Sx�OOB�PCF�$ NVMEM���Z69�Znvme-tcp�U��_�,_�,_����du�192��Tsi_ibf�LF�_UBSAN shif�X�Sar�Ri�h�._�x�5how_nic�f93�?Yelp�m	� h�browse�`�GNOME��sktop��
�-�ign�Z�t�5you�9 a��
�8�7�1y��a��o�>c�ral�Fol�ra�m�#��s� fo���a�|te� DocBook��y����"	��155��Avahi�=
i�$
e��xDNS�d
�	
Di���y��Multicast�#�\
f��<�;	Z�Configu�� Net���/fac�l	�*	�n
d�d�/a�n�7. ���~�	-aw���l�z��w�vt�lug�^�u�	�a�R�K�n�	��,�ew�Beopl�	�	�0��A	�]����fi�sh�����Y�P����a��:��W��-A���rPr�ct�	�k��� ID�Q�R261���ȵ��: NPDL ��:�@mpr��	i�~��s78�Q��.NET�����6d-��8�i��+subset��C�-����sever�Kw���it��9 CLR���N�2���_�f�b��add�����]����n����il���|upd�9�U�'�VSDK 8.0.116���Ru��me�6.�Fdot��:�4�=Visu��St��o�
oof��V�� �46�F9�-0�F�5�E�g@v��
k: Keep�Wbin���l ���de�Gu���|7��Mdm-fla�_���8
o�	��_b��byt�0�A#�t��6�b�.pp�5dd��'	eck���skb� ��'_�@_txmung�T7749�)8�s���s�[�+�R"le�	��Wacregmax�hunt���4�G�e�$��#�&�#�$-�q�
�d�1'��
a �l���e�1-��(���/
�&:�
 H��%��c��#R������38�C�g�U��G) F�G)gru_�p_��'_�����0o���b��2-34�[��5: �RCU���_�g�_��_��7��V���Cac���c��-����l��or�
stores�O�=i��� ��
��\s�	n't�P v�r�X*�a�Q	�@�o��g�X, g�A �+�(s���'�1�pe��up�Jv��:�*ques�6mug����o�I4790��g���gs�m�xown�hip��__udp_�����62�	v�+: e�ce�.ly���� t�G,�A0�Axsk��a������xp_��_��_as�[_u������Xgen����ng��g�H20��H�4�I���,wh�s�
�Tdot ��-��	8�Hw�: �?12����v�*.d�?
�����"_d���_�Vcap_n�@�b943�g��&��)st�{ar��)��'�
(�/��POSIX �z�p�),�Am��%m)�ۢin���c�odae�(nscd)�&m�p�s
�&o�߾�W�&����q�ż���#no�.un����ly���/:��t�?s�~&id�K
��dl�)� in�O�$ar��	LD_LIBRARY_PATH�V80�g7���g7�!�G�=0399�X�7�6�6�g�	et�.bnx���0es�+�jmb-xdp-pass c�*�)	61�B�T,too�OL2CAP�s�3-u�"7R�fi��
2�se�	cmd�]�� ���D	���C"�T	cfg�11:�Pc��wiphy_�ef�r���c��S7���UUAF��_g��in���y
�>md�<md� uaf��it���_�s�c�
1�csmb:��9�
ry�!����,���
50�hAp�	C�s BeanUt���1�7
�4y���	d��_�~nd m��&f��4per�a���!J�8�b��c��-b�*�v��Χ:�b-�ky���8�w�
��+���
n�R
um'�s"cla�Cl��p�=�
defa���	��*����vpx�VP8�,��!��#e��(���9���6�C���,��ly���A�'WebM�J�	�����+#�����:�#u�u�\<�ԣ�e�*528��
�0Ide�3��M�I	�EIdM)�_	�$�\2auth�,c��i�:m�:���(oriz�'�l����bo���<%�/�P.ud�e��"� s�"viron�
����IPA:��m���)3��1�� �1dom�;�1�'F�?�40��c��3"�Gde�d?�CV�
�o*����8�Z�Es�d/fair�L�v)c���fs_rq_on_�191��Sv����)�.(�i��he��ump�+21��F�uof�)y-�:(��i�5_spli�'0�C�0��x��)s p��&en��'7738��oB�b�:-�:�U
�X �A�<B����
�>� �;�Z�\-l�
l�a�X�
f�4��ݡ��[i��'u�J*�9'fa��a�Q�<*up��
���C-�@C��C�./�X�	�/&Ex���k%Anim�zC�uC�Z9�d)�'���/Big����s���t6�(tUn�B���'�o Du��By�&�I��{8�0���u��d���9�<a�p�
, Ro�r*�e�#� (R�
R)�y8�Kiri�-Sim�
v�6"�k	yaml"�rgu�y�ղYAML�l���by�7�[-pr�+se�@���>1.1�,�Awas o�Fin�6b�."�6Py�n��"��r�Rub����-��:�Eb��P�<F�
M�����r4090��Q�/���H/kit�]d�op��:-��qt5�
���G��:t�2, xml���R-h���3Q��	��n:�6:�*C�nAss�ho�
�v�z$D�8�.�54�/��::Fi��:R��9��frie�I�(�`�-�N��
��.bu�	�K�l.�
�����a�.���mIo�y�]p�G-�7-��.-�a�
Ÿ�
_6�10�4��V�q �&�f��!6bu�5�W��7�u�gSqu�	C�b�+
�����By��m�
_id���a��3�9�8�Poppl�U�eP�3@�C3D�2 F�e (�-2) r��,�O�v4su�g�vi�m�J������|236��Ma�:DB�w��;r,���CSQL��!�p�� �K�8��>5�����My�4�jm�~d�'��:�-�j�� l�lr���3e�=im�j �O�"�Z
�136�+�HID:�to�`��t�<�;�$mt�;�D_�*up�39�_<�au��B�Q�in� _�nre_d�l_���X4�Vmm/�+-f��
�dVM_BUG_ON�X"GE(P�K�Rso�(��))�7%unp��p�k�tp:���>NUL�<6r���%unk�A%�D6i��Ii���2����stgre�F��adv���pbj�%-�qi��g�L��(DBMS)�
��jsq��CREATE STATISTICS��^�5
�
ma�+�\J�4281�'�]�
q�=(��s��},��w�dar�7�U����9fig��(�T��2����9FIG (�(�x�@)�9PIC ��;e�?t�<��(LaTeX��n�&����exa�,�0:(TM)�L��i�Mt�2,�O�:�re ��s(i.e.�Ey�O:�B:����v�ty�b�).��7�h?��f�n�a,a�2����ݪ�cer����-�^:��0����s��Z�=�TMm�
pu���63��*��J�N$M���Co��ol�	pow�/u�No���wAHotSp�OJVMs��ha���h%��3	en�Vs ef���7�,��ysis���ve�-�2�3��Fl�M�e�KM�n�?in�n�c���o�L�L�Y�Y���z�r�1�W �`��[�ly���Olo�f=�w�&d�
7��lz4-j�i:�	I����@�tK�Gsu�E����U3Clea�%�665�'7�'�	drm/x�7	M����8a-f����O� safe�
��0	870�0	�-$l�2�/Fd�=v��
fy��_�T�O,��/�ire����_��	�&��vmwgfx��*e��m���r �&�22�~SVGA_CMD_MAX_DATASIZE�	7��/usb�hwc�GF�j
r�.�����G��P�

��Nt�+_���/�S2�\�_���E�SU8�o�ep��"�'�&�53_m�a�'osd_�DA�?�\�2�D-17-�\jdk�3��W�L�{,���?*E����+S��D�a�,Ki�n#�A��m��e JMX�n����6�{2���1H�gP�kS�5�E�=���=Enh�z5C���ye�nJ�h�64�t��
n�2�}/PNG��B6�:Z0�3�1X�850�Bug�%W�z
�& P11Sec�VK�	�|�C#�5�n�3#�\(i�IPS m����PKCS11���ould ����KR_ATTRIBUTE_VALUE_IN�ID�� �a�has�!e����&c�_G�j�4�'��KA_ENCRYPT=�* ��ibut�H�>���I��i�U��
�-�8�xe�"�R. (��$-142862, �81��#3�4�5�6�7��
�2�r`�^��^�+�^0��76�7�8�9�(�.�.��4��8�/�*�.�366�7�8��.7�1�2�3��,�S5��5���+�5p�eG��'�R�,�t�0�%��blo�C�3���D#���^�$VC��,���<����-�W�d��0loop�!�7),�n l�e)�^��u�C#�T'���tR���K����9#�p+�g_�1pe�Z_�i���p��G*��.C��2e�4,�a�'v����&�]p�%�J���@5�b�fs, c�l6�ex���,�<y�Rb�/dyn�lJc����C�ئ�i�
W���b�y��'�(m�G�w%ll�C��,�u"well�(go�ous���/�̤;�
�'��:���X�o�(���b�g��c6��T�&h�61�.r��cߋ�q�Din�΢in�fG�Z.�
���R>�t4786�����
Raw�����&��RAW�/ob�e�.md�M3ta�hoto�Sm���RW/CR�yNEF,�<�DNG���1"�	C��:��
��8#��bjmal�/���#��mv�%�d��{i�|ssl��rlo�5�k
41�,�J�|�hz�.:�_:��3�x&�h�o7KB���+�gB��633�D�~�|��G�
o�cr�q�%�	�<��40�}?s: X.Org X server: Information exposure and denial of�*ice via out-of-bounds memory access (CVE-2026-34003)


For �"e�Mtails ab�A the�Ucurity issue(s), including� impact, a CVSS sc�G,�kknowledgments,��o�/r related�F��,�f�to�R�� pag�m lis�,�R�&en�Ǣ��:.
�+is�c open-sourc��le�~�6�"�BX Window Sy�Ym. It provid�T� basic low-level fun�ial�that�ll-f�ݡ�graphic��us��interfa��a�Qsign�&up��  

S�QFix(es):�  * xorg: xwayl�-�D��S���og�w��wl�ة+XKB co��tibi��map h�Vl���3999)�~Use-af��-fre�{ulnera�^leads���- crash��pot������� rup���1܇�	
T�kern��p�w�8s�on�ɤ4Linux�!,����2any��Br����s�!�	��K:�Y�+�}de����p��due��rac��ndi�͡&zone�por����5-3814� �r�{�q��ntpoll�E349�Edrm/xe:�� vm_b�_ioctl double �ObuČ73ь: vsock�"ma�&���
5-40248�\mptcp: f���2�_schedule_work()�O5�OĬO�!w��?Blueto�� MGMT c�]��� discl�	�É94ĉnet: at��tic��fra�) ov�����RX ��h�U6830���: hci_��: Pr��A�I�et��t��������a5�P�Kit�, D-Bu��stra�# lay�]��al�y�s�*�����an�F�`�sa��e w��us��a�oss-di�_ibu���arch�qct�2API�b��:���arbi�Թa����st�Ҵ�as r��41651�libtiff�a������s f��anipu���Tag��Im�7Fil��� (TIFF)��les����:�A��code��:��or���6	����ɢ����	c����4775�7��u
in��ceph OSD cli�V��unres�Vspar�r�1state�23136�	��>�;ff��ro����_ct)�U�H�priv�*g�ts��‹270�fsd�he�5�yNFSv4.0 LOCK�lay�ch��31���Qcrypto:�Tgif_a��-���Xt����
�Wc�R3��uosync���|
�P�Clus�Engi�
��C�)�Alma�1c�'softw�o
���|:�h���l���cr��d UDP��et�509��l��
�ijoin�&
ss�v�{d��j2�D��co�n IMAP���O���~UNIX-like�����	�b��marily wi� 
���G��	��also�E�	sma�POP3�t��sup�s e-m�Q�Bei��Ƣdir�\mbox���. ��SQL�Qi�Is�Iau�1��
��plug-�zr���d�sub����	�d�/: M�	Si�F�X��SASL��i��p��VAUTHENTICATE �0m���
5903���v���i��bef����v78��Yspeci��y�cNOOPǬ�R7�yth��
��Lpre�4,��v��obj�2-or�|ed�L�mm���M
gu�q��h��es��"s,�6ass�ex���y���y high �dynam�s�ya type�Ҧ��l. ���3��,y�� c�ƤC�
i��a�re��a�.v�ous�����p
cp��: Ex�
v�D�ebuf�b�FDoS�vhttp.���1���I��Quad�c��or�m�Qxml.dom.m�_���		12084��a�	�ipmi�~n�t��ig��P�|�w��	����� (IPMI)��mo�9c�Fol���m�5��e�ܤ��@�;	f�}	����:��s�Q�3
��	s��/-o���355��O�FEXR�-�T��-��-r���loa�-poi��i�8������7qu�D�"���tor��G�vdocu��p�O��
b��f��view�K���?�l���.�|���re��
i�D�is����e���I���g�B�$:������b�ګH�`4588�`GLib�v��l�,
bu�f��bl��������-s��uC���]���Bus��GNOME�Am�loop�!�;,�n�rg�^t�{�ɳ��J��ng���
�����u���qg��: ������GV��a��_r�`�c�P�87)�]�g�oOv�W��GIO At�e E�/� Caus�GH�a���:�f51��gw�/����qp���=��b�tc e���r��56�ASoC���bytcr_rt5640�in�h quirk�
p����W401���W���k�te�n�"par��e�"�&_�"_no��_���y�[2��cC"Dir��I"��Uw�A��
Lo�#P����LPE)�Qɯ�432�
F�	R���.�p�9%R�
Deskt�"Protoc��<)����S��1Ap�l����!x�ardp�7�W �n�������ch�Mi�6��
�%s���@n��x�J�V���_	Box��
�4: ���<����	�$�2595�&�\��["�Vdu��	��h6986�he�:!��$�D�X��n St�um_En�u	Ca����79��k�!�*�q-�--���	�5_�_�C��OOB�)I�9��dn��)�cADPCM�n�W
rs��mi�N�3dic�O/��p_i��x �A���M	�Q
188Ӄ��vi�!-by-zeroɀwh�z	`nB�eAl�`�N0�f4���a�-o�F	�y���V3�V�M��*'�b�.	�$��z�b�`39���jq��l�
twe��n��)xi���P-l�oJSON�
or. �=�wed��
�"��. You��u�T��s��,�t�S�,�.t�0s���d����Jam�(
as�at�m�wk,�f*e�Dsimi���# y�����!�Dext�jq:�cjv_�d_sized�S&o�rro�����
n�NUL-��m�5����f997�z'�r����`�ca�T$h�U*coll���^�	6���x��web�i��xy��
��HTTP��p�s,�La��cu��{�ur�py, p���nce�β=�
u������: NGINX��C��E��V�04�(�SRub����f���H�O�\�O,��rip���N��ifea�!���|���r%�ɢ���	task�^erb�xRB���eseri�
z�<bypas�n1316����������>et�9'l�0�G���o�	�'�[�a�?�/���2. A� g��s�	
��V��f�k��figur����*l�he��gin�����:�������pw������256-�?e�*name��10��0�(���g��0�{ma���{�E�un�����<40��/�~�kFo�e�o��e��,�g	�	�
���Y
�"s�5��a �of�@��s��PostS�| (ASCII�Rn��T�U 1�o�~
�3��
0�5True�,���(�2)�'CID-keye����
%�#f��: ��:�_��i�\��YBMP�
,�152�t
�s�*A��N
�gSFD�g6�g�
m�X����5�r�s�������.�o�K7�Efr�k�:��.�-3530��n���3���
�(���j3�j�ps� n�U�s���%GFX ��upd�fs�%���1�8v�9-s�-h���z���h�z�-�:�� vs�Dc�?7�ne������ng�\�.���,() ac��778�p9��1irq�Wp/g�N!v2m�V�W81�WRDMA/�:��"KASAN:�ab-�UR��ib_reg��r_�:"�bl��"�H02��1�ãyrxeԼ����a���~4�~M�L:��k"shf���o��
���	 ���c�5�p415�p��:/vmc�$C���k����
���r�{�/�4�u.iz��it�f03���y4ATM CLIP�B
�!i�n�r��s��59�f�U
�<���'
�58��Gm�� io_u�/net��`?�*<0������US��?���976��4���dst��_rcu���Psk_��u�ps�5<1�5ipv6�GRCU�>p6_xmit�83�=�;ISO��pos�. UAF�iso_�	_�9�N�=ˇ�0�jƉ��<�f6��_�m��1�)�N�<�J6o��8.Å27�	�>ALSA�����<2�"�
�g�}=6��'=�4�e>��cmd��queue_�^&�W��*ttb_hw_�q�=� shif�����%_�6mw��_���3-��3�2sm�Wu��__pn�Df�@�d_n�#�I06�
��B@fb�I�B���,�[30ӗ���
�w�Rgly��:��4�$5��':/p��/�
_INO_LAYOUTCOMMIT�q�m:_�6k_�K:�}_�,;id_�$�g6�Bsvcrdma�
rc_��of�r���- ���$�K81�nvme-�gB��L�$der�2���*�u�vB�(_pdu�3C��5�a�299�EDK (Embed�7D�op�m�@)��5��aena��EFI����)��-�E�z+�L�p�A64-b�.	�Hfirm��-�IQEMU��KVM�f��ss���&�RFC 3211 KEK�&wr�c
�)92����)�w<�tndar�d<�b+(�/��POSIX�&�7�p�),�Am�D�%m)�ۢi�,�q�:>dae�&+(nscd)��d b�.Fulti�	�P�����ZWi���������$���nnot�u��
�ly���/�-+�r�[a��"�~+6-086�i�P�W����d#-�u�
���F �{ry�V9��O�%d�/�WRDE_REUSE�y�APPEND �1@re�hn�(�ed���l8�)MUNGE (�U�R'N' Gi�^/mp�um��n�;���ucre������c�"���is ��L��b�01ly ����&or�(#�3HPC��?�uiron��=l�x�_�x�P����UID��G��	�Dl��)o�M�A�B��y�N#oup�1h�s��v���.���d�&��d�+������lm ���fi��by�#ha��#�A�(N �G.������1�Q��w��ue�s�>���U����F�g	s�;�*�fr�jo�,"l�}4-�2��hod���B:��'���>����@a����ȪSg��2550�a �cV��_p�+ ��� _�
yc�;Lin_�|*��vM2�s
K�D��*i�#FAT�"���	�382�����,�85�s+global�<8�<�w�2 ��p�*����
�D�C��Google's�C,�ch�8��.�3�Ben��*�e�I�myet �&�R����a�g+,�8�"��om�me��ism�#s�&�ā���<� :�ܣ	�l�R�M�9dep�?
��&09�P�8389 �!3e�/y�er�	LD�yG�"�3�
3�v3)�	�g,�q7�B�q�'�y���	L�`-�jA�pU���^)�R��-u�S'�
�%d�U>�P���
��-ds�3":���!�����
r��&9�R�g��U�M__��g�J���mc_cl��rfx_��ch����7�,BUG�@pskb_�%a��h��h�r�1c�pp��$���Za�
:�b710�-2�b�
��b�U+ad�|��hu��lb��li�2g���309��H�3
�0�K�edv�w.d�9)�qi�_[���Y��@�?
(DBMS)���jsq���v�4����_�c�
�$e�L<���es��0�
�si�:rray�|��)��c:t�6[l�1v���mi�yor܈4ӈpg�|���`���h-�W�u�1	a��m�D�
N�{�US��������-s��+�Ys�t�Y�p1 tha���p��Val�D�[�Z���������N�Pm��t.��, u���show��O�<�.��<pc.�;�d�K�	^S��E80�*�<�Y�s :��<�/M��'�������%v��.�$��in�_�w��x[�3E�?����+MJ��S�Qin�#��i�y-�Yr��7e��^2536�M�S�)P7�Pe�S�!
e�A�P��Xquo���\@��(1299�o�.NET���Jd-�&Pfr� �����+�Z��K�X�C�-�}]��s�^�E
�YG����Ud���LR���ZNew�cs�f�b�6;ddr�!�W�T�W;�avai�I��31d�U�'�VS�#10.0.�:���Run�]e�4.��.�4+�2��+��
612��asp�LASP��Co�.�Tun����tP�?c�Z
�b�#�vp�~=��4VP8���e�J�����/e����6�C� �,�8only�X�oCWebM�m�t9a ��
er�7�������3�����44����b8�a25�a�25�a���^9�^1�^��u��cHID: �l-thc-hid��#i�5��-ar�[e�[��I2C �7s�v,v�981�plxsw�p�Mrum_mr�X$�5�Ӣ��Ycas�voo�SU��.��.0�My�����p8�K��#,�A�f�����co�:!�Y(��M��,my��d���
��#�����
�@�K�Yt�KLze�bW�(��r9PU J�$����19�5�5N8�NI�,DB�$K36�:�6ĚDDL�%�7�HT�T.Poo�S2�$��"C�8t�u�C��9mb���t�I�Pe������ate�>m e�;lf���Da�iys����qng���&�*un�	���: C�	�;��uR��snpr�f �.�
11���Y�L@skip�<�ba�^ �#
��o��p<.‰7�:�S�KO�<���Z�3l-��-middle �"��TLS���1��n�6��64�A��4�� k�_c�> 2.��4�HPKCS#���,���j�IB�I>�Nc�s,�+�476�4�5�/ �'��3��5�}�G58�e�/CoP�XT (������5&7are loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on�1System p�L�D Express2�:0863 �F�
7�E�=z�=and�AP Assist foƔFuncti�?�V3�V�K. T�Gopenc�9ki packages also bring a softw��#en implementa�_that can be used without��y �Y��hard�H�yse�nco�Mi�Ke Slot Daem��pkcss�d)��gen�gl utilities.  

Security Fix(es):�  *�۬ki:�
Privilege Escal�˩EData��osu��via�0mlink Follow�(CVE-2026-23893)


F�:mo�1de��l�Ab���s��issue(s��includ�J� �Pact,�iCVSS sc�G�
cknowledg�ks��o�/r re���iin��m��,�f��P�R���]g�m lis�,�R�&��u���:.
FreeRDP����f���of�<mote Desktop�Cotocol (�<)��lea�und���1A��he��cens�� x�ardp cli�a�<�n������s�5��uch as Micro�� Windows m�Wine�x�J�VirtualBox��: ��: Arbitrary��de ex�:���heap ��-of-��nds w�We�RRL�hlanar���;path�!6965)�&vbuf��o�
f�}�rGDI ��fac�lipel��p55��(kernel�&Linux�!�S�����w���r����s����K:�Y: Use-After-�� vul�b�y��ATM��b�`��5-38180)�Xdrm/s�
d:�{ p�Jnti��double�xn�'_�'_job_add_� v_de�d�'i�
�h40096�h�Loc�cen�j��[i�;��me�!y ��k�yDAMON�,fs��setup f�=��144�s�5a�5��bon�]module��ause���)ash�a��~71�~scs��target:�֣�eulj�t_��_se�>on_us�__c��t()�h���h�wv��: f�\erro��c�����Kmm�Xnew�;�T209�Tnet�cls_u32:�� skb_��L_point�ca�Uul�Q�ALSA:��oo�o��racy��c�� �PCM trigger��1�;Py��� an �6�b	�4,�a�'v��obj�2-or��Rpr�mm�ȩ�gu�q, w�h��es����class�excep�y��high�Rve�uynam�d�Utype��d���l. ��supports����s�m���&all�Clib�%i��a�ell��.v�ous w�)��,	p��:��: C���g-�^o�ࡗ�1�	�rbbr�er.�Z	���2��f�LURLs�Y4519�XGStream�?�s�
�.edi��work b�_�'�S
s��filt�+�O��e�"�;�!�wg�Ver1-plugins-bad��c	�b	��c�����e�1-��j�����&:�
�
�
ASF��e�3���92�S	�Z�C�WE�L-�<�RJPEG�rs�
3082�#mH�mB�mO�mrtpqdm2��	ay�n5�n�
7RIFF��let�te����AVI�Xh��l�V1�#�O�
Of-B�
W�
��3�#g�}
ealM��Demux��922�:lDVB Subtitl���F��)�5��285�m
�9�]-�z�:4�':2�::����
�k��
��FastGlyph���^��^373�^�V
AUDIN �� r�go���1�i467�>a�q�~i��deo_tim��4491�NNULL P�;
��r���dp_��_log�
�B_v2�Z
948�aH̰�y_thr�
�84�!�urb_bulk_�nsf�b�W1�!W��put�nd_�
�^
���Z3�Z���se�C_�w
�9�!Z�W�#q�b
�
���]	s�5�
3��6�5z (�mlx5�'�OECVF v��un���d�������}K��e��N�nf_tab�	�9in��We�) �
����ck�P11��:�oi�
ce�i�wdue��r��c�T��du�VSI��build�s21��������ch�"�3�PF����ge�	o��e�y���
�������^map�"�It�{a r��'�@��s��PostScrip�ASCII�Rn�T�� 1,�me�3��
0�5True�, O�6�(�2�<CID-key�꥜�
��#f��: ���	4ma��	�SFD��
�x�|15270�n�x�c���i�4xy�s����HTTP��p�s,��cus��.�)���py, p�����}���	�
�
���: NGINX��or�!speci�^y��MP4�)�C	2647��_�f�g�2ifica�i��ngx_http_dav_��76�
�t�~�-�"rup�x���b78�b�i��sclo�Arequest��e��m��_auth�ӥϱ7en�d����ng��2��y���Hyp�	xt��)
��F���k#�>/�p��|C���:����	��Фd ����8	 �r �m���:�13�BIND (Berk�y I�n�� Na�Dom�&
)�>�\DNS (�(�4�$��l�d�7a�3�'(na�)�\�>olv�$ho�+%���I�@dd�|%es;�	�&r�\(rout�X��	appl�e�>����M��|��);�_tool�=�Wify��a���is�1
��ly��b�~:����	�r�sSEC-v�d��zo�="1�G��
}���8���~�������yX��#�)Y����7���`	a�)s��#�	pix���	39�	�r���N
�s���o�.NET��m�(ged-�+�2����+�&����C�`APIs��sev�k+��$���it��CLR��NN�2�k	��b��o���]�Q'��n�Qv����
�up�S�U�'�VSDK 8.0.126���Run�*�26.��dotn�/&�4: �&Bypa��nd�{Vï�	6�&�V��ta���32203�GInfin�R���Z
�1XmlDe�|-���q�116�eD�SM�Y��^��
H�&���M��A����fla��178�ngif��������z�P��+���v�a�S��D�*�_�l�e�}���/�k��EXR�	���ur����-��-�Rf��u-�%)�w������7qua�+�"�d"����ag�r�vd�@�� �1�:b�f��vi�������?ex��##�m�s��re�f��
i�	���jp�f�ee�8e���+���g�L�&ex�� �-���'"����#76�U!�'���+Make��	ke_en���Wr�n-r�qET_XMIT_CN�pa��s	_limi���976�-�,qla2xxx:���r�T�
��o��%��-x i�.68741��j�C-1.�-�jdk���
�Q �@�+J�E J�1�;Environ����*S�l	D�op�+Kit�
�@:�]h�~� 5�@gor��
m���s200��:Im��e�be���Cede�I0�2013�8�sP�2F��o�]Red���66�6Zip����28�2ce��e � ���1�>Up�"�a���2.14.1��5�qk���%6�c342���7��17���+��TLS��c�}(���*����21����+��Bug��W�	cop�e�,�r����D�,_�)_���v�u�=����ms��on��f���jb�"�U�'���
�>��. How�,�!��v���r�g�� ��pon���	EOPNOTSUPP (��
��no�"e�q=did��7�֢U����ǜ���r��fi�����.��"lma�?-1�;17, �951�2�4�53�#�;��5��5���+�j�d���:c�,s�48�qT��B��numb�=�Gird-��/�7$�O���z���"�m��+���a��c�by�1f�rA���lb���e��Ft�q)���it�Uf�<�R�p�N�:"E�GCBToExt���674�Z)�Upng:��� ��!u�۹��U)o�o2�i/�t2Neo���3�_aƀ33636Ā���"��)�e�Y4�� 5�5�939��37�)p��
?��_a�1-��vert��T����|�14�,��h~�m: �f:��oi���bd��(shared��@�g��)32��~�{���T��:�4
����m-�i�6rk��h�"�%*�-�a4��3lp���630�H0pt�0: �(i��CAP_SYS_PTRACE�ask��3n�m�O33��