File: //var/cache/dnf/crb-updateinfo.solvx
SOLV   	  �  �      �            0 dnf 1.0     1.2�w��e�`�6o����2>���x��+�́��)f  _�  0�   x86_64  cve  bugzilla  i686  noarch  3  final  packager@almalinux.org  rhsa  self  1  Moderate  Important  Copyright 2024 AlmaLinux OS  kernel-tools-libs-devel cross-headers  Copyright 2023 AlmaLinux OS 
5 AlmaLinux OS  libperf  1:11.0.16.0.8-1.el9_0 7.0.4.0.8-2.el9_0  5.14.0-70.17.1.el9_0 
22.1.el9_0  python3-debug idle test  1:1.8.0.342.b07-1.el9_0  python3.11-debug idle test  0.8-22.el9_6  1:11.0.17.0.8-2.el9_0 8.0.10-2.el9_1 9.0.7-1.el9_1 20.0.8-2.el9 1.0.9-2.el9 2.0.7-2.el9 3.0.9-3.el9 4.0.8-2.el9 5.0.9-2.el9 7.0.10.0.7-2.el9 1.0.9-2.el9 2.0.7-2.el9 3.0.11-3.el9.alma.1 4.0.7-2.el9.alma.1 5.0.6-2.el9.alma.1 6.0.8-2.el9.alma.1 7.0.10-1.el9.alma.1 5.0.8-2.el9_0 6.0.10-3.el9_1 7.0.7-1.el9_1 8.0.7-2.el9 9.0.9-2.el9 21.0.1.0.12-2.el9.alma.1 2.0.13-1.el9.alma.1 3.0.9-1.el9.alma.1 4.0.7-1.el9.alma.1 5.0.10-3.el9.alma.1 6.0.7-1.el9.alma.1 7.0.6-1.el9.alma.1 8.0.9-1.el9.alma.1 9.0.10-1.el9.alma.1  3:10.5.16-2.el9_0  Copyright 2022 AlmaLinux OS  4.17.5-102.el9 	3.el9_2.alma 8.6-100.el9 	1.el9_3.alma.1  1:2.06-27.el9_0.7.alma  0.8-15.el9 20.el9  1:1.8.0.352.b08-2.el9_0 	62.b09-2.el9_1 	72.b07-1.el9_1 	82.b05-2.el9 	92.b08-3.el9 402.b06-2.el9 	12.b08-2.el9 	22.b05-2.el9 	32.b06-2.el9 	52.b09-2.el9 	62.b08-3.el9 	72.b08-1.el9.alma.1  python3.12-debug idle test  1:1.48.4-2.el9.alma  python3 -tkinter  bind-devel  libgs-devel  12.0.1-11.2.el9  2.34-100.el9_4.2 25.el9_5.8.alma.1 68.el9_6.19 20 60.el9_2.7  4.16.4-101.el9 	3.el9_1  dotnet-sdk-6.0-source-built-artifacts  python3.11 
-tkinter  21.01.0-21.el9  xorg-x11-server-devel  java-17-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug jmods-fastdebug slowdebug slowdebug rc-fastdebug slowdebug tatic-libs-fastdebug slowdebug  3.11.11-2.el9 
_6.1 2 2-2.el9_2.1 2 5-1.el9_3 7-1.el9 _4.1 3 5 6 9-7.el9 _5.1 2 3 2.1-4.el9_4.3 4 5-2.el9 _5.1 2 3 9-1.el9 _6.1 2 9.14-1.el9 _1.1 2 6-1.el9_2.1 2 8-1.el9_3 .1 3.el9_4.1 3 5 6 9-8.el9 _5.1 21-1.el9_5 2.el9 _6.1 2  21.01.0-13.el9 	4.el9  6.0.8-1.el9_0  java-1.8.0-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug slowdebug rc-fastdebug slowdebug  13.18-1.el9_5 20-1.el9_5 2-1.el9_6  libsmbclient-devel wbclient-devel  samba-devel  unbound-devel  dotnet-sdk-7.0-source-built-artifacts 8.0-source-built-artifacts  13.10-1.el9_1 1-1.el9_2 3-1.el9_3 4-1.el9_3 6-1.el9_4  3.0.21-37.el9 40.el9_4  Low  bind-doc  edk2-aarch64 tools-doc  glibc-nss-devel static  nss_db hesiod  java-11-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug jmods-fastdebug slowdebug slowdebug rc-fastdebug slowdebug tatic-libs-fastdebug slowdebug  3.14.0-13.el9 6.el9  xorg-x11-server-source  3.9.10-3.el9_0  bind-libs  java-21-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug jmods-fastdebug slowdebug slowdebug rc-fastdebug slowdebug tatic-libs-fastdebug slowdebug  python3.12 
-tkinter  9.54.0-10.el9_2 1.el9_2 3.el9 4.el9_3 6.el9_4 7.el9_4 8.el9_6 9.el9_6  flatpak-devel  gstreamer1-plugins-bad-free-devel  libnetapi-devel  python3-samba-devel  qt5-qtbase-static  varnish-devel  edk2-tools  ghostscript -tools-fonts printing  libtiff-tools  postgresql-docs private-devel server-devel tatic test upgrade-devel ython3-ipatests  samba-pidl  6.0.108-1.el9_0  9.0.0-10.2.el9_2 5.0-7.el9_3.alma.1  libvirt-devel 	ocs  1.12.8-1.el9 9-1.el9_4 3.el9_4 
5 8.1-3.el9 4.el9_4 9.3-2.el9_0  3.5.3-2.el9_0  avahi-compat-howl -devel 
libdns_sd -devel devel glib-devel  edk2-ovmf  glib2-static  libnghttp2-devel vpx-devel ua-devel  poppler-cpp-devel devel glib-devel qt5-devel  xorg-x11-server-Xwayland-devel  1.3.3-13.el9 1.5.0-5.el9_5.alma.1  2.0.90-6.el9_1 7.el9 4.0-7.el9 8.el9 :2.11.2-1.el9 4.1-5.el9  32:9.16.23-11.el9 _2.1 2 4.el9_3.4 8.el9_4.1 6 24.el9_5.3 5.el9_1 8.29-1.el9_5.1  libreoffice-sdk -doc  samba-test 
-libs  20230524-3.el9 	4.el9_3.2.alma 1122-6.el9_4.2 4 40524-6.el9_5.3  1.2.12-2.el9 0.0.0-6.2.el9_4.alma.1 	6.el9_4.alma.1 	el9_4.alma.1 5.0-7.el9_5.alma.1 :1.9.1-12.el9_5  2.70.1-2.el9 8.0-1.el9 6-1.el9 2.el9  3:10.5.22-1.el9_2.alma.1 7-1.el9_5  5.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4 503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_5 70.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6  8.0.30-3.el9_0 2-1.el9_2 6-1.el9_3 41-2.el9_5 3-1.el9_6 5.0-7.el9_1  glibc-benchtests  libvirt-daemon-plugin-sanlock  mingw32-glib2 
-static 64-glib2 
-static ysql-devel libs test  1.3.3-10.el9 _2.1 43.0-5.el9_2.1 
3.1 
4.3 :2.3.16-11.el9_4.1 	7.el9  23.2.7-1.el9 3.el9_6 4.el9_6  5.4.2-4.el9_0.3 4-2.el9_1 3.el9  LibRaw-devel  NetworkManager-libnm-devel  cups-filters-devel  device-mapper-multipath-devel ovecot-devel  flac-devel reerdp-devel  libarchive-devel ksba-devel nbd-devel sndfile-devel winpr-devel  openexr-devel jpeg2-devel 
tools  protobuf-compiler 	devel 	lite-devel  repokey:type:id  turbojpeg 	-devel  wireshark-devel  1.20.11-11.el9 	7.el9 	9.el9 24.el9 	6.el9 	8.el9_6 31.el9_6 :0.9.72-5.el9  20221207gitfff6d81270b5-9.el9_2 31122-6.el9 40524-6.el9_5  389-ds-base-devel  9:20200406-26.el9_2  dotnet-sdk-9.0-source-built-artifacts  flatpak -session-helper  python3-samba-test ostgresql-test-rpm-macros  ruby-doc  yajl-devel  15.6-1.el9.alma :7.1.8.1-11.el9.alma 2.el9_3.alma 4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1 
8.el9_1.alma  2.41-3.el9  32:9.16.23-1.el9_0.1  5.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_1 284.11.1.el9_2 25.1.el9_2 70.26.1.el9_0 
30.1.el9_0  lua  mariadb-devel embedded-devel test  nghttp2  xorg-x11-server-Xwayland  0.11.0-7.el9 3.71-11.el9_4 20.2-6.el9 1.1-1.el9 30.0-6.el9 1.1-65.el9 8.7-20.el9 7.el9_0.1  1.0.31-8.el9 _5.2 16.2-19.el9_6.1 2.el9 3.el9 _3.1 5 8.el9_5.1 2.0-11.el9 2.1-2.el9_3 4.el9 2-3.el9 4.el9_6 8.7-11.el9_2.1 7.el9_4 3.3-0.el9 2.9-1.el9_5 5.1-5.el9_0 6.el9_1 6-17.el9_6.2 9.0-7.el9_2.alma.1 8.el9_5 9.el9_6 4-1.el9 :1.42.0-2.el9_4 8.10-2.el9_5.alma.1 
5.el9_5 3.4.10-4.el9 	6.el9  2.0.15-32.el9_5 32-5.el9_4 1.0-22.el9 5.2-1.el9 68.4-11.el9 4.el9_4.1 6.el9_6.2 9.4-11.el9_6.1 6.el9_4 0201107-6.el9 :4.9-8.el9 0.3-2.el9_6.1  3.1.1-2.el9_4.1 5.1 2.2-2.el9 3-5.el9 1.0-9.el9_3.alma.1 3.17-13.el9 5.3-4.el9  5.15.9-10.el9_4 1.el9_6 7.el9 9.el9 39-16.el9 4.0-5.el9 72-2.el9  6.6.2-2.el9_1.1 3.el9_2.1 4.el9_3.1 6.el9_6.1  OpenIPMI-devel  autotrace vahi-gobject 
-devel  bind9.18-devel luez-libs-devel  file-devel ontforge  gcc-plugin-devel  jq-devel  libinput-devel jose-devel ldb-devel microhttpd-devel rabbitmq-devel sss_nss_idmap-devel tdc++-static tirpc-devel udisks2-devel v-devel  mpg123-devel  opencryptoki-devel  pmix-pmi-devel rocps-ng-devel tobuf-c-compiler devel  raptor2-devel epokey:type:str  shadow-utils-subid-devel peex-devel  texlive-lib-devel pm2-tss-devel  wavpack-devel  yelp-devel  zziplib-devel  0.42.2-3.el9  1:0.36.2-8.el9 2.0.7-6.el9  bpftool  dovecot  flac reeradius-mysql perl ostgresql rest sqlite unixODBC  kernel -abi-stablelists core debug -core 
devel -matched 
modules -extra 	vel -matched oc headers modules -extra tools -libs  libvirt-client-qemu lock-sanlock  nginx-mod-devel  ocaml-libnbd -devel  perf ython3-perf .12-setuptools-wheel  qt5-devel  0.99.9-5.el9  1.0.9-1.el9 2.0-7.el9_2 11-32.el9_0 8.10-2.el9.alma :0.82-6.1.el9_6 1.20.1-14.el9_2.1.alma.1 4.04-1.el9_6  2.0.2-4.el9 1.0-21.el9 4.5-8.el9_4 9.el9_4 5.2-9.el9_5 6.1-8.el9_6 52-32.el9_4.alma.1 :1.20.1-22.el9_6.2.alma.1  3.1.9-2.el9_6 24.31-5.el9  4.4.0-10.el9 2.el9 _4.1 3.el9_6.2 2.el9 5.el9_1 7.el9 8.el9_2  5.1.8-6.el9_1 4.0-284.18.1.el9_2 30.1.el9_2  6.0.109-1.el9_0 10-1.el9_0 3-1.el9_1 8-1.el9_2 20-1.el9_2 1-1.el9_2 2-1.el9_2 3-1.el9_2 4-1.el9_2 5-1.el9_3 6-1.el9_3 7-1.el9_3 32-1.el9_4 5-1.el9_4  7.0.100-0.5.rc2.el9_1 7-1.el9_2 9-1.el9_2 10-1.el9_2 1-1.el9_2 2-1.el9_2 3-1.el9_2 4-1.el9_3 5-1.el9_3 6-1.el9_3 7-1.el9_3 9-1.el9_4  8.0.100-2.el9_3 1-1.el9_3 2-2.el9_3 3-2.el9_3 5-1.el9_4 7-1.el9_4 8-1.el9_4 10-1.el9_4 4-1.el9_5 6-1.el9_6 7-1.el9_6 21-1.el9_6  9.0.100-1.el9_5 4-1.el9_5 6-1.el9_6 7-1.el9_6  aspnetcore-runtime-6.0 targeting-pack-6.0  bash-devel cc-devel ind9.18-libs sdtar  corosync-vqsim  dotnet-apphost-pack-6.0 host fxr-6.0 runtime-6.0 sdk-6.0 targeting-pack-6.0 emplates-6.0 xygen -doxywizard latex  fwupd-devel  golang-github-cpuguy83-md2man rub2-efi-x64 
-cdboot pc tools -efi 
xtra minimal tk3-devel-docs  java-1.8.0-openjdk -demo vel headless src 1-openjdk -demo vel headless javadoc -zip mods src tatic-libs 7-openjdk -demo vel headless javadoc -zip mods src tatic-libs  libarchive fastjson-devel guestfs-devel gobject -devel input -utils webp-tools ua-guestfs  mariadb -backup common embedded 	rrmsg gssapi-server oqgraph-engine pam server -galera utils ingw32-binutils cpp gcc -c++ libgcc 64-binutils cpp gcc -c++ libgcc  netstandard-targeting-pack-2.1  ocaml-libguestfs -devel  perl-JSON-XS YAML-LibYAML hp-libguestfs  qatzip-devel  repokey:type:flexarray uby-libguestfs  shim-unsigned-x64 x64 ystemd-boot-unsigned  zlib-static  0.34-19.1.el9_6  1.30-6.el9 9.4-10.el9_6  3.0.4-160.el9_0 7-162.el9_4 3.el9_5  4.10.2-5.el9_3.alma.1 1.0-15.el9_4.alma.1 9.el9_4 2.2-1.el9_5.3 4.el9_6.1 5  5.15.3-1.el9 9-1.el9  68.2.2-3.el9_4.1 5.el9_6  apache-commons-beanutils  bcc-doc ind9.18-doc  grub2-common efi-aa64-modules 
x64-modules pc-modules pc64le-modules  java-1.8.0-openjdk-javadoc -zip  libguestfs-man-pages-ja uk microhttpd-doc  mingw32-pixman zlib -static 64-pixman zlib -static  perl-File-Find-Rule Module-ScanDeps oppler-glib-doc ython3-wheel 
-wheel  texlive-gnu-freefont  virt-v2v-man-pages-ja uk  2  patch:ALBA-2022:8256 SA-2022:5099 249 52 7 695 709 36 948 6003 43 521 85 90 610 763 913 99 7007 13 90 185 314 8 23 9 958 68 70 9 8003 22 62 8 78 139 51 94 207 8 21 52 67 317 8 53 400 15 8 20 34 93 643 3:0077 194 202 10 302 4 34 40 626 951 3 7 1068 470 693 703 879 80 909 2127 65 6 248 59 61 326 40 70 3 458 9 87 519 32 82 9 92 621 3423 581 5 92 5 661 711 4 5 23 4057 60 99 158 77 8 325 77 642 4 5048 69 143 6 214 453 6 9 62 539 684 9 708 11 33 44 9 53 838 924 6242 6 65 330 40 3 69 409 31 69 82 94 508 18 44 51 66 75 621 31 2 59 67 85 705 7 12 32 8 44 6 7253 5 7 784 91 4:0141 51 2 6 249 65 6 7 466 805 7 48 951 77 10274 75 91 858 939 78 83 1111 219 32 7 42 41 86 239 309 10 427 691 750 89 818 22 5 8 2137 47 69 84 99 204 8 36 64 76 87 9 92 5 353 77 94 433 63 512 25 8 51 60 71 758 842 3 3306 39 501 619 754 835 7 8 959 99 4077 8 349 439 50 563 7 8 73 83 623 749 55 6 7 66 79 928 35 5192 231 334 63 533 83 928 99 6146 63 79 97 356 464 529 67 757 997 7346 867 9 8037 117 21 4 7 62 374 446 7 617 800 914 35 9088 93 122 8 67 81 4 7 90 2 317 71 413 39 42 9 50 1 68 543 8 605 827 5:0059 312 34 77 422 6 578 914 36 10136 48 89 379 585 837 62 7 73 1140 411 849 61 262 746 834 329 46 602 962 4420 878 5007 10 1 8 9 429 661 740 6086 398 59 70 1 81 80 7084 162 377 42 760 8149 281 815 21 4 9113 2627 68 9 3631 4 845 52 5 937 4244 491 6977 7107 9 38 63 5 78 201 309 50 95 402 22 3 30 7 586 98 600 903 8142 83 333 7 643 55 813 7 9080 114 8 84 302 3 30 462 517 877 80  repokey:type:relidarray 
num sitory:solvables  solvable:arch 	buildtime 	conflicts 	description 	evr 	name 	patchcategory 
rovides 	summary 	vendor  update:collection :arch evr filename name list reference :href id title ype ights severity tatus �O�O�S�S�W�W�J�J�L�L�P�P�Q�Q�>�>�M�M�N�N�G�G�T�T�]�]�V�V�U�U�^�^�I�I�K�K�Z�Z�-�-���_�_�`�`�"�"�P�P�H�H�R�R�O�O�I�I�M�M�Q�Q�J�J�K�K�M�M�P�P�N�N�I�I�F�F�G�G�L�L�J�J�O�O�S�S�N�N�K�K�L�L�H�H�*�*�-�-�%�%�G�G�E�E�C�C�$�$�F�F�,�,�)�)�(�(�D�D�+�+�'�'�&�&jjww�V�V�X�X�Y�Yssll�Q�Qmmoorrkkqq�T�Tvv�S�Spp�W�W�R�Rttnn�U�Uuu�j�j�l�l�d�d�m�m�c�c�h�h�i�i�f�f�g�g�R�R�P�P�e�e�Q�Q�k�k�)�)ee�4�4�1�1�2�2�x�x�(�(�5�5�3�3�0�0�/�/�XZ�O�?�Tgf�}�}���|�|��� � �~�~�y�x�z�Z�Z�7�8�h�g�X�X��������,���A�A�;�;�<�<�?�?�>�>�@�@�=�=��Y�~�~�"[[�X��������YZ���O��\�\�}�}�]�]� � �y�y�b�b�^�^�z�z�"�"�#�#�$�$�#�"�$�5�5�5�Y�Y�����4�4�4[����@�@�8�8�8�������������{�{�!�!� � � �!����?iii�<�<�5�5�4�4�3�3�1�1�3�2�2�1�2�$�$�$�)�)�)�u�u�v�v�w�w�q�q�o�o�r�r�t�t�p�p�5�5�v�v�v�2�2�3�3�*�*�&�&�'�'�'�&�w�w�E�E�B�B�D�D�F�F�C�C�A�A�������(�(�(�9�9�t�t�s�s�9�9�s�t����:�:���gf�6�6�6�a�a�B�B�C�C�D�D�B�E�E�E�D�C�}�}\\�y�z�x\����S�S�������u�u�u�~�~�[�[�&�&�&�q�q�7�8�q�<�%�%�%�1�1�0�0�1�0����4�4�4�7�7�7�/�/�/�������������������_�_�e�e�\�\�[�[�^�^�f�f�Y�Y�a�a�c�c�`�`�d�d�Z�Z�]�]�b�b�6�6�r�r�rUUWWVV�hVUW�g����,�,�,�-�-�-�.�.�.���\�\��[�[�s�s�n�n�:�:�:������'�'�'�4�4�+�+�+�������T� � � �#�#�#�B�B�+�+����������6�6�2�2�2�!�!�!�7�7�6�6�8�8� � � �(�(�(�*�*�*����,�{�{�.�.�9�9�9�������|�|�1�w�x�y�z�H�{�|�}�~�� ���R�������	�
���
������������������3��� ��!��"��#��$��4�%��&��'��(��)��*��5�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�6��Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t��u�v�7�w�x�y�z�{�|�}�~�� ���������	�
���
������������������� �!�"�#�$�8�%@�&@�'@�(@�)@�*@�+@�,@�-@�.@�/@�0@�1@�2@�3@�4@�5@�6@�7@�8@�9@�:@�;@�<@�=@�>@�?@�@@�9���w�x�R�y�z���������}�~���������H���	�
�
����{�|���� ���:�A�#�B�#�C��D��E�#�F�#�G�#�H�#�I�#�J�#�K��L��M�#�N�#�O��P��Q��R��S�#�T�#�U�#�V�#�;�<�=�>�?�W�E�@�A�B�C�D�G�H�X�W�I�Y��J�K�L�M�N�O�P�Q�W�0�R�S�T�U�V�W�Z��X�Y�Z�[�\�X��^�c�X��d�e�f�g�h�i�j�k�l�o�X��p�Y��q�r�s�t�u�v�w�x�y�z�{�|�}�W�)�~�� �������Y�����
�\{�]{���X����������W�*��������� �!�"�#�$�%�]|�\|�&�j�i�k�i�l�i�'�X��(�)�*�W�+�+�,�-�.�/�0�1�3�4�5�0�j�j�k�j�l�j�6�@�6��6�7�8�9�:�;�<�=�>�\}�]}�?�@�o�	�p�	�A�j�k�k�k�l�k�B�C�D�E�G�X��I�J�M�j�l�k�l�l�l�O�P�Q�S�T�U�V�W�X�Y�Z�[�\�]�^�_�X��`�a�b�c�d�e�f��7�@�7�g�h�i�j�q��r��k�X��l�]��\��m��:�@�:�n�q�r�s�u�v�w�x�y�W�,�z�{�|�}�~�� ���������	�
�\~�]~���
������W�-����������� �!�"�o�
�p�
�#�l�m�k�m�j�m�$�]�\�%�X��&�'�(�)�*�+�,�-�.�/��8�@�8�0�1�2�3�\� �]� �4�X��5�6�7�8�W�.�9�:�;�<�=�>�?�q��r��@�X��A�]��\��B�l�n�j�n�k�n�C�p��o��D�E�Z��F�G�H�I�J�K�L�M�N�O�P�Q�R�]��\��S�X��T�q��r��U�V�W�X�@�9��9�Y�Z�[�
�[�\�]�^�_�`�a�q�	�r�	�b�]��\��c�d�X��e�f�p��o��i�\��]��j�r�
�q�
�k�X��l�m�n�o�p�q�r�s�t�u�v�w�x�X��z�\y�]y�{�r��q��|�}�� ���������	���
���r��q���]z�\z����X� �����v�{�w�{����|�1���W�/����!�"�#�$�%�&�'�(�)�*�+�,�r��q��-�\��]��.�/�0�1�2�3�4�X��5�r�
�q�
�6�\x�]x�7�8�9�[��:�;�<�=�?�@�j�o�l�o�k�o�A�B�C�D�k�p�j�p�l�p�E�F�G�H�I�J�K�L�M�N�O�P�Q�S�T�U�[��V�X�Z�[�}�=�~�=�F� F�F�F�F�F�F�F�F�F�F�F�F�	F�
F�F�F�F�
�=��=�F�2�E�F��W�]���_���m�n��������2�F�H���K�L�R�����t����������������~�� ����b��b�u����C�~�D�~�;��z�w�{�w�v�w�w�w�x�w�y�w��M��M��M��M��E��E��E�C��D��2�2�2� 2�#2�$2�2�2�2�2�	2�
2�2�2�2�2�w2�x2�
2�2�y2�z2�2�2�2�2�2�2�eI�fI�YI�ZI�kI�lI�mI�nI�]I�^I�qI�rI�uI�vI�[I�\I�sI�tI�iI�jI�7!�8!�/!�0!�O!�P!�I!�J!�M!�N!�G!�H!�Q!�R!�S!�T!�?!�@!�3!�4!�9!�:!�=!�>!�E!�F!�-!�.!��n��n��n��\��\��\��d��d��N��N��N��N��W��W� �W�!�W�"�W�#�W�$�W�%�W�&��'��(��)��*X�+X�,X�-X�.X�/X�0X�1X�2X�3X�4X�5X�6X�7X� X�X�8X�9X�/�=�.�=�:�T�;�T�<�T�=�T�>�T�?�T�@�T�A�T�B�T�C�e�D�e�E�e�F�|�G�|�H�|�I�|�J�|�K�|�`��L�`�M�`�N�`��0�?�0�O�0��0��0�P��Q��R��S��T��U��V��W��X�!�Y�!�Z�!�[�!�\�!�]�!�^�!�_�!�`�!�a�!�b�!�c�!�d�w�e�w�f�%�g�%�h�%�i�%�j�%�k�%�l��m��n��o��V�)�p�)�q�)�r�)�s�j�t�j��J��J��J��J�uc�vc�wc�xc�yc�zc�{c�|c�}c�~c�c� c�c�c��}��}��}�"��#���� ��!��$��%�����������l�	�l�
�l�]�]�
]�]�]�]�]�]�]�]�]�]�]�]�]�]�`��A��A��A� �A�a�&�;�#�;�'�;�$�;�b������� ��"��#����%����!����$����������C� �D� �3�3�3�3�3�3�3�3�
3�3�w3�x3�3�3�#3�$3�y3�z3�3�3�3�3�3�3�	3�
3�3� 3�9"�:"�/"�0"�-"�."�S"�T"�3"�4"�7"�8"�E"�F"�?"�@"�G"�H"�M"�N"�Q"�R"�I"�J"�O"�P"�="�>"�qJ�rJ�uJ�vJ�sJ�tJ�[J�\J�]J�^J�eJ�fJ�mJ�nJ�YJ�ZJ�kJ�lJ�iJ�jJ�d�x�e�x� �C�!�C�"�C�#�C��F��F��F��F�$�{�%�{��o��o��o��G��G��G��G���#��"��!���� ����%������$��&��'��)��(��&�#�'�#�(�#�)�#�*�#�+�#��H��H��H��H�h�7�i�7�^�7�_�7�d�7�e�7�`�7�a�7�f�7�g�7�b�7�c�7��I��I��I��I�4�4�4�4�4�4�4�4�
4�4�4�4�4�4�4� 4�#4�$4�	4�
4�y4�z4�4�4�w4�x4�4�4�G#�H#�9#�:#�Q#�R#�I#�J#�S#�T#�?#�@#�M#�N#�=#�>#�E#�F#�O#�P#�7#�8#�/#�0#�3#�4#�-#�.#�kK�lK�qK�rK�iK�jK�eK�fK�YK�ZK�mK�nK�]K�^K�[K�\K�uK�vK�sK�tK� d�|d�wd�xd�{d�}d�zd�~d�d�ud�vd�yd�d�d�@�1�,�1�-�1�A�1�.�<�/�<�0�<�1�<�2�<�3�<�4�<�5�<�6�<�7�<�8�<�9�<�V�*�p�*�q�*�r�*�^�"�Y�"�X�"�`�"�]�"�_�"�[�"�Z�"�\�"�a�"�b�"�c�"��)�O�)��)�?�)��)�:�(�;�(�<�(�=�(�>�(�?�(�d�y�e�y�N�a�M�a�L�a�@�x�A�x�B�x��K��K��K��K��[��[��[�C�e�D�e�yB�zB�B�B�B�uB�vB�EB�FB�}B�GB�HB�IB�JB�{B�|B� B�KB�~B�wB�xB�LB�#��$��u��(��)��'��&��M�Z�N�Z�O�Z�	�P�i�Q�i�
�z�x�{�x�x�x�y�x�v�x�w�x�R�j�S�j�T�j�C��D��U{�V{�W{�X{�Y{�Z{�[{�\{�]{�^{�_{��
��
�"��#���� ��$��%��������!����-�5�`�5�a�5�b�5�d�z�e�z�b�8�c�8�f�8�g�8�h�8�i�8�^�8�_�8�d�8�e�8�`�8�a�8�F��G��J��K��H��I��s��t���|��|�����C��D��O�*��*�?�*��*��*�=$�>$�-$�.$�O$�P$�3$�4$�Q$�R$�E$�F$�S$�T$�9$�:$�I$�J$�7$�8$�/$�0$�G$�H$�M$�N$�?$�@$�
5�5�5�5�w5�x5�5�5�5�5�5�5�5�5�5� 5�y5�z5�	5�
5�5�5�5�5�#5�$5�5�5�eL�fL�uL�vL�qL�rL�sL�tL�[L�\L�iL�jL�kL�lL�]L�^L�mL�nL�YL�ZL�C�C� C�|C�GC�HC�EC�FC�LC�~C�C�wC�xC�uC�vC�KC�IC�JC�{C�}C�zC�yC��L��L��L��L�����C��D��S��T��P��Q��R���}��}�C��D������c�c�d�c�eb�fb�gb�hb�ib�jb�kb�lb�mb�nb�ob�pb�qb�rb�U|�V|�Y|�Z|�^|�_|�[|�X|�]|�W|�\|�s�i�t�i�u�i�v�i�w�i�x�i�!��"��#����%���� ��$��������y�q�z�q�{�q�7�E�8�E�=�E�>�E�9�E�:�E��+��+��+�?�+�O�+�C��D��m�g�n�g�kM�lM�qM�rM�mM�nM�YM�ZM�sM�tM�iM�jM�eM�fM�uM�vM�[M�\M�]M�^M�7%�8%�G%�H%�/%�0%�9%�:%�S%�T%�E%�F%�=%�>%�-%�.%�?%�@%�I%�J%�Q%�R%�M%�N%�3%�4%�O%�P%�����6�6�6�6�	6�
6�y6�z6�6�6�6�6�6�6�6�6�
6�6�6�6�#6�$6�6� 6�6�6�w6�x6�|��}��~���� ��������C��D������w�j�s�j�t�j�x�j�v�j�u�j�,�6�-�6�A�6�r�+�q�+�V�+�p�+��W��W��W�`��������s��t��J��K��H��I������	�a�
�a�B�y�A�y�@�y��U��U�
�U�\}�V}�Y}�Z}�_}�^}�]}�W}�X}�[}�U}� �>�!�>�"�>�#�>��	��	��	��	��	�u�k�x�k�t�k�w�k�v�k�s�k��|�t�|�s�|��0��0��0�!�0�d�s�e�s��!��!��!��!��!��!��~��~��~� ��!��"���� ��$��%��������"��#����!��ID�JD�KD�HD�{D�|D�}D�zD�D�D�D�ED�FD�uD�vD�LD�wD�xD� D�~D�yD�GD�#��$��%��&��'��(��)G�*G�+G�,G�-G�.G�/G�0G�1G�2G�3G�4G�5G�6G�7G�8G�9G�:G�,�<�+�<�N�s�l�t�l�v�l�u�l�w�l�x�l�;7�<7�=7�>7�?7�@7�A7�B7�C7�D7�E7�F7�G7�H7�I7�J7�K7�L7�M7�N7�O7�P7�Q7�R7�S7�T7�U7�V7� E�|E�~E�E�GE�HE�IE�JE�wE�xE�KE�E�E�uE�vE�yE�zE�EE�FE�LE�}E�{E�|�	�}�	� �	��	�~�	�W��X������C��D��h�9�i�9�^�9�_�9�f�9�g�9�b�9�c�9�d�9�e�9�`�9�a�9�Y�f�Z�f�[�f�������W��X��C��D��I8�J8�A8�B8�;8�<8�?8�@8�E8�F8�U8�V8�M8�N8�C8�D8�S8�T8�=8�>8�Q8�R8�K8�L8�G8�H8�O8�P8�[N�\N�sN�tN�YN�ZN�mN�nN�eN�fN�iN�jN�qN�rN�uN�vN�]N�^N�kN�lN�=&�>&�I&�J&�M&�N&�E&�F&�3&�4&�-&�.&�7&�8&�S&�T&�G&�H&�/&�0&�9&�:&�Q&�R&�O&�P&�?&�@&�*�*�*� *�w*�x*�	*�
*�*�*�*�*�*�*�*�*�*�*�y*�z*�#*�$*�*�*�*�*�
*�*���#��!��"���� ����$��%����������C�	�D�	�W��X��f�:�g�:�d�:�e�:�h�:�i�:�b�:�c�:�`�:�a�:�^�:�_�:�L�b�M�b�N�b�\�U�]�U��U��U��U��U�,�7�-�7�A�7�d�.�e�.�b�.�c�.�^�.�_�.�:�.�`�.�a�.�f�.�g�.�h�.�i�.�;�
��V��V��V��V�\�V�]�V�^��_��`��a��b��c��d��e��f��g��h��!����%���� ����#����"��$����\��V��^��Z��Y��[��X��W��]��_��U��A�:�,�:�-�:�L�d�M�d�N�d�o�i�^�j�^�k�^�p�l�m�m�m�n�m�x�y�y�y�z�y�{�y�v�y�w�y�\�W�]�W��W��W��W��W�o�
�p�
�q�
�����W��X�� �?�!�?�"�?�#�?�������N�c�M�c�L�c�O�,��,�?�,��,��,�iO�jO�kO�lO�[O�\O�YO�ZO�sO�tO�mO�nO�eO�fO�]O�^O�qO�rO�uO�vO�M'�N'�-'�.'�3'�4'�9'�:'�O'�P'�E'�F'�?'�@'�7'�8'�S'�T'�I'�J'�/'�0'�Q'�R'�G'�H'�='�>'�+�+�+�+�w+�x+�	+�
+�+�+�#+�$+�+�+�+�+�+� +�+�+�y+�z+�+�+�+�+�
+�+�I9�J9�C9�D9�S9�T9�K9�L9�A9�B9�?9�@9�Q9�R9�E9�F9�=9�>9�;9�<9�O9�P9�G9�H9�U9�V9�M9�N9��X��X��X��
�V�,�p�,�q�,�r�,�i�]�j�]�k�]�r�	�s�	�t�	�u�
�v�
�w�
�x�
�y�
�z�
�{�
�>�'�=�'�<�'�:�'�;�'�?�'�J�>�K�>�H�>�I�>��>��>�@�2�,�2�-�2�A�2�������[�g�Z�g�Y�g�d�t�e�t�[~�X~�_~�U~�V~�W~�^~�Z~�]~�\~�Y~�(�$�)�$�+�$�'�$�*�$�&�$�|�D�}�D�~�D��D� �V��V��V�\�G�]�G��G��G��G��G�1H�*H�6H�5H�/H�,H�2H�3H�7H�8H�)H�+H�9H�-H�.H�0H�:H�4H��o��o�������"�;�%�;���B��B��B� �B���-��-��-�O�-�?�-�J�<�K�<�H�<�I�<��<��<���	��
���H��H�\�H�]�H��H��H�W��X������\�I�]�I��I��I��I��I�q^�r^�i^�j^�p^�h^�g^�k^�f^�n^�m^�l^�o^�e^� �
��
�|�
�}�
�~�
�\�J�]�J��J��J��J��J��� �@�!�@�"�@�#�@��k��k�;�	��
��
��
��
��
�w�m�s�m�t�m�u�m�x�m�v�m�[�X�W�]�\�V�_�^�Z�Y�U���#����%��!��$���� ����"�����K��K�\�K�]�K��K��K�C�
�D�
�W��X��]P�^P�qP�rP�iP�jP�uP�vP�YP�ZP�[P�\P�kP�lP�sP�tP�eP�fP�mP�nP�S(�T(�=(�>(�-(�.(�I(�J(�9(�:(�E(�F(�O(�P(�?(�@(�7(�8(�Q(�R(�M(�N(�G(�H(�3(�4(�/(�0(�
,�,�,�,�,�,�,�,�,�,�,�,�#,�$,�w,�x,�,� ,�y,�z,�,�,�,�,�	,�
,�,�,�S:�T:�;:�<:�C:�D:�E:�F:�G:�H:�U:�V:�I:�J:�=:�>:�A:�B:�O:�P:�M:�N:�Q:�R:�K:�L:�?:�@:��L��L��L��L�\�L�]�L��
��
��
�A�8�,�8�-�8�"�A�#�A� �A�!�A�
�u��u��u�J�=�K�=��=��=�H�=�I�=�^� �Z� �W� �X� �[� �U� �V� �Y� �\� �]� �_� ��� ����#����$��%����!����"��\�M�]�M��M��M��M��M�2�=�3�=�8�=�9�=�.�=�/�=�0�=�1�=�4�=�5�=�6�=�7�=��l��l��.��.�O�.��.�?�.�W��X��\�N�]�N��N��N��N��N�_��"�B�#�B� �B�!�B��O��O�\�O�]�O��O��O�h�;�i�;�d�;�e�;�f�;�g�;�^�;�_�;�b�;�c�;�`�;�a�;�`��a��f��_��g��d��b��c��e��h��^��!����"��#��$��%������ ������^��Z��W��X��\��V��U��_��[��Y��]��x�n�t�n�v�n�s�n�u�n�w�n�����������������n��m��o��l��\�P�]�P��P��P��P��P�y��v��w��x��z��{��u���Q��Q�\�Q�]�Q��Q��Q�T�k�S�k�R�k�C��D��W��X���{��{��{�[Q�\Q�qQ�rQ�eQ�fQ�sQ�tQ�YQ�ZQ�uQ�vQ�iQ�jQ�kQ�lQ�]Q�^Q�mQ�nQ�M)�N)�7)�8)�3)�4)�E)�F)�S)�T)�Q)�R)�I)�J)�?)�@)�=)�>)�/)�0)�9)�:)�-)�.)�O)�P)�G)�H)�-�-�-�-�-�-�-�-�w-�x-�#-�$-�-�-�-�-�	-�
-�-� -�
-�-�y-�z-�-�-�-�-�;;�<;�A;�B;�M;�N;�U;�V;�E;�F;�?;�@;�I;�J;�K;�L;�G;�H;�=;�>;�C;�D;�S;�T;�Q;�R;�O;�P;��R��R��R��R�\�R�]�R�]��_��Y��Z��\��V��^��W��X��U��[����%��"��#����$���� ��!������`��a��g��b��c��f��_��d��e��h��^��\�S�]�S��S��S��S��S�������d�u�e�u�,�9�-�9�A�9�@�3�,�3�-�3�A�3��
��
��
��
�V�-�p�-�q�-�r�-�H�?�I�?��?��?�J�?�K�?�ah�bh�ch�Zh�[h�Xh�Yh�`h�]h�*h�^h�_h�\h��t��t��t��r��r��Y� �Y��Y�g�	�a�	�f�	�_�	�b�	�c�	�d�	�h�	�`�	�^�	�e�	�[��X��_��\��V��^��Z��]��Y��W��U��!�v�"�v�#�v�!��"��#������ ������%����$��$��%��&��'��(��)��g��C��C� �C��C�h�����������[��X��\��V��U��Y��Z��W��]��^��_��`�
�a�
�d�
�f�
�_�
�e�
�c�
�^�
�g�
�b�
�h�
���%��"��#���� ��$��!��������*�$�+�$��������T��T��T��T�\�T�]�T�y�r�z�r�{�r��X��X��X��X�\�X�]�X�,�z�-�z�.�z���#�w�"�w�!�w�#.�$.�.�.�.�.�
.�.�.�.�.�.�.� .�.�.�.�.�w.�x.�y.�z.�.�.�.�.�	.�
.�O<�P<�;<�<<�C<�D<�E<�F<�M<�N<�=<�><�G<�H<�A<�B<�Q<�R<�?<�@<�K<�L<�S<�T<�U<�V<�I<�J<��Y��Y��Y��Y�\�Y�]�Y�7�F�8�F�=�F�>�F�9�F�:�F��D� �D��D��D�y�$��%������#������ ����!��"��^y�Zy�]y�[y�Xy�Wy�Yy�Uy�Vy�_y�\y�`��a��f��_��d��g��b��c��h��e��^���f��f�\�f�]�f��f��f�/�p�0�p�1�p��g��g��g��g�\�g�]�g�kS�lS�uS�vS�]S�^S�iS�jS�mS�nS�YS�ZS�[S�\S�qS�rS�eS�fS�sS�tS�
0�0�0�0�	0�
0�0�0�w0�x0�0�0�#0�$0�0�0�0� 0�0�0�0�0�0�0�0�0�y0�z0�C>�D>�;>�<>�?>�@>�S>�T>�O>�P>�=>�>>�M>�N>�G>�H>�K>�L>�I>�J>�A>�B>�Q>�R>�E>�F>�U>�V>�� �� �� ��h��h�\�h�]�h��h��h�N�_�M�_�L�_�\�i�]�i��i��i��i��i��Z��Z��Z��Z�\�Z�]�Z�\�j�]�j��j��j��j��j�_��2�@�3�@�4�@�5�@�6�@�7�@�
�8�"�9�"�:�"�;�"�<�"�=�"�\�k�]�k��k��k��k��k��l��l��l��l�\�l�]�l��m��m��m��m�\�m�]�m�`�0�a�0�d�0�e�0�^�0�_�0�:�0�b�0�c�0�h�0�i�0�f�0�g�0�g��a��f��_��d��`��^��e��c��b��h��Yz�Zz�_z�[z�Xz�\z�Vz�Wz�^z�Uz�]z��n��n��n��n�\�n�]�n�>��?��@��� � � �"� �#� �!� �� �� �� �� �%� �$� ��o��o��o��o�\�o�]�o��p��p��p��p�\�p�]�p�\�q�]�q��q��q��q��q�z�{�{�{�x�{�y�{�\�r�]�r��r��r��r��r��[��[�\�[�]�[��[��[�A�1�B�1��1�C�1�D�1�z�z�{�z�v�z�w�z�x�z�y�z�?�/��/��/�O�/��/��s��s�\�s�]�s��s��s���E�h�F�h� ��t��t��t��t�\�t�]�t�h�/�i�/�:�/�^�/�_�/�f�/�g�/�`�/�a�/�b�/�c�/�d�/�e�/��u��u�\�u�]�u��u��u�W�#�X�#��v��v��v��v�\�v�]�v�mT�nT�uT�vT�qT�rT�eT�fT�iT�jT�]T�^T�kT�lT�YT�ZT�sT�tT�[T�\T�1� 1�1�1�1�1�w1�x1�1�1�1�1�	1�
1�y1�z1�#1�$1�1�1�1�1�1�1�1�1�
1�1�M?�N?�G?�H?�;?�<?�O?�P?�K?�L?�E?�F?�Q?�R?�A?�B?�C?�D?�??�@?�=?�>?�S?�T?�I?�J?�U?�V?�d�v�e�v�\�\�]�\��\��\��\��\�*�%�+�%�W� �X� �h��b��c��f��_��d��`��a��e��^��g��Y��Z��^��[��X��U��V��_��W��\��]��uR�vR�eR�fR�kR�lR�[R�\R�]R�^R�mR�nR�YR�ZR�sR�tR�iR�jR�qR�rR�/�/�w/�x/�/�/�#/�$/�/�/�	/�
/�y/�z/�/� /�/�/�/�/�
/�/�/�/�/�/�/�/�K=�L=�O=�P=�A=�B=�C=�D=�I=�J=�M=�N=�G=�H=�==�>=�?=�@=�S=�T=�U=�V=�;=�<=�E=�F=�Q=�R=��]��]��]��]�\�]�]�]�k_�f_�q_�r_�i_�j_�p_�h_�g_�l_�m_�e_�o_�n_��m��m���#���� ��"����%��!��$������f�
�_�
�d�
�e�
�c�
�`�
�a�
�h�
�^�
�b�
�g�
�Ux�Vx�[x�Xx�]x�\x�^x�Zx�Wx�_x�Yx�>�U�?�U�A�U�;�U�@�U�=�U�<�U�:�U�B�U�V�.�r�.�q�.�p�.���������[�h�Z�h�Y�h�G�q�H�q�k�&�g�&�j�&�i�&�h�&�f�&�)��>��n��n�m�p�n�p�u�o�s�o�t�o�x�o�v�o�w�o�\�^�]�^��^��^��^��^�I��J��K��) �* �7 �8 �4 �5 �/ �, �2 �3 �L �M �+ �N �9 �O �P �: �6 �0 �. �Q �1 �- �v�p�x�p�t�p�u�p�w�p�s�p�W�!�X�!�*�&�+�&��_��_��_��_�\�_�]�_�\�`�]�`��`��`��`��`�[�i�Z�i�Y�i��a��a�\�a�]�a��a��a��������b��b��b��b�\�b�]�b�i`�j`�n`�m`�q`�r`�p`�h`�k`�f`�g`�l`�o`�e`�W�"�X�"�*�'�+�'��c��c��c��c�\�c�]�c���R�{�s�z�s�y�s���\�d�]�d��d��d��d��d�������r�/�q�/�V�/���p�/�R�f�S�f�W�������(��Y�qa�ra�pa�ha�oa�ja�ga�ia�na�ma�ea�fa�ka�la�\�e�]�e��e��e��e��e�d�% �_�% �c�% �h�% �f�\�V�a�\�4�^��e�3 �v�% �g�3 �t�% �u�% �b�3��#�p�3 �q�3 �r�3 �s�% �o� �m�% �k�% �j�% �l�3 �i� �n� �`�]  NOPSTUABCDEFHIJKLMRWX�f��h�+�1	��dbugfix Important: qatzip bug fix and enhancement update  yhttps://access.redhat.com/errata/RHBA-2022:8256 RHBA-2022:8256 RHBA-2022:8256 
https://access.redhat.com/security/cve/CVE-2022-36369 CVE-2022-36369 CVE-2022-36369 https://bugzilla.redhat.com/2170784 2170784  https://errata.almalinux.org/9/ALBA-2022-8256.html ALBA-2022:8256 ALBA-2022:8256 �~�bqatzip-devel-1.0.9-1.el9.x86_64.rpm �~�bqatzip-devel-1.0.9-1.el9.x86_64.rpm ����|�2	��jBBBBBBBBBBBBBBBBBBBBBsecurity Important: grub2, mokutil, shim, and shim-unsigned-x64 security update Ay�|https://access.redhat.com/errata/RHSA-2022:5099 RHSA-2022:5099 RHSA-2022:5099 
https://access.redhat.com/security/cve/CVE-2021-3695 CVE-2021-3695 CVE-2021-3695 https://access.redhat.com/security/cve/CVE-2021-3696 CVE-2021-3696 CVE-2021-3696 https://access.redhat.com/security/cve/CVE-2021-3697 CVE-2021-3697 CVE-2021-3697 https://access.redhat.com/security/cve/CVE-2022-28733 CVE-2022-28733 CVE-2022-28733 https://access.redhat.com/security/cve/CVE-2022-28734 CVE-2022-28734 CVE-2022-28734 https://access.redhat.com/security/cve/CVE-2022-28735 CVE-2022-28735 CVE-2022-28735 https://access.redhat.com/security/cve/CVE-2022-28736 CVE-2022-28736 CVE-2022-28736 https://access.redhat.com/security/cve/CVE-2022-28737 CVE-2022-28737 CVE-2022-28737 https://bugzilla.redhat.com/1991685 1991685  https://bugzilla.redhat.com/1991686 1991686  https://bugzilla.redhat.com/1991687 1991687  https://bugzilla.redhat.com/2083339 2083339  https://bugzilla.redhat.com/2090463 2090463  https://bugzilla.redhat.com/2090857 2090857  https://bugzilla.redhat.com/2090899 2090899  https://bugzilla.redhat.com/2092613 2092613  https://errata.almalinux.org/9/ALSA-2022-5099.html ALSA-2022:5099 ALSA-2022:5099 ��=shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �AFgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �;Fgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �<Fgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �?Fgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �>Fgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �Fgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �Fgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm �Fgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �@Fgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �=Fgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �Fgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm ��=shim-x64-15.6-1.el9.alma.x86_64.rpm �Fgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm ��=shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �AFgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �;Fgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �<Fgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �?Fgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �>Fgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �Fgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �Fgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm �Fgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �@Fgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �=Fgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �Fgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm ��=shim-x64-15.6-1.el9.alma.x86_64.rpm �Fgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm ����1�3	� �VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update A�u�
https://access.redhat.com/errata/RHSA-2022:5249 RHSA-2022:5249 RHSA-2022:5249 
https://access.redhat.com/security/cve/CVE-2022-1012 CVE-2022-1012 CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 CVE-2022-1729 CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 CVE-2022-1966 CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 CVE-2022-27666 CVE-2022-27666 https://bugzilla.redhat.com/2061633 2061633  https://bugzilla.redhat.com/2064604 2064604  https://bugzilla.redhat.com/2086753 2086753  https://bugzilla.redhat.com/2092427 2092427  https://errata.almalinux.org/9/ALSA-2022-5249.html ALSA-2022:5249 ALSA-2022:5249 �Okernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �Skernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �Hkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm �Wkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm �Jkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �Lkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �Rkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Pkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Qkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �>bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �Mkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �Nkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �Gkernel-5.14.0-70.17.1.el9_0.x86_64.rpm �Tkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �]perf-5.14.0-70.17.1.el9_0.x86_64.rpm �Vkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm �Ukernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �^python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm �Ikernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm �Kkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm �Okernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �Skernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �Hkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm �Wkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm �Jkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �Lkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �Rkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Pkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Qkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �>bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �Mkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �Nkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �Gkernel-5.14.0-70.17.1.el9_0.x86_64.rpm �Tkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �]perf-5.14.0-70.17.1.el9_0.x86_64.rpm �Vkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm �Ukernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �^python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm �Ikernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm �Kkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm �����4	��ABBBBB�!security Moderate: libarchive security update A
�
�Xhttps://access.redhat.com/errata/RHSA-2022:5252 RHSA-2022:5252 RHSA-2022:5252 
https://access.redhat.com/security/cve/CVE-2022-26280 CVE-2022-26280 CVE-2022-26280 https://bugzilla.redhat.com/2071931 2071931  https://errata.almalinux.org/9/ALSA-2022-5252.html ALSA-2022:5252 ALSA-2022:5252 �Z�libarchive-3.5.3-2.el9_0.x86_64.rpm �-�bsdtar-3.5.3-2.el9_0.x86_64.rpm ��libarchive-devel-3.5.3-2.el9_0.i686.rpm ��libarchive-devel-3.5.3-2.el9_0.x86_64.rpm �Z�libarchive-3.5.3-2.el9_0.x86_64.rpm �-�bsdtar-3.5.3-2.el9_0.x86_64.rpm ��libarchive-devel-3.5.3-2.el9_0.i686.rpm ��libarchive-devel-3.5.3-2.el9_0.x86_64.rpm ���
�5	��HBBBBB�security Moderate: libinput security update A
�b�3https://access.redhat.com/errata/RHSA-2022:5257 RHSA-2022:5257 RHSA-2022:5257 
https://access.redhat.com/security/cve/CVE-2022-1215 CVE-2022-1215 CVE-2022-1215 https://bugzilla.redhat.com/2074952 2074952  https://errata.almalinux.org/9/ALSA-2022-5257.html ALSA-2022:5257 ALSA-2022:5257 �_�libinput-1.19.3-2.el9_0.x86_64.rpm �`�libinput-utils-1.19.3-2.el9_0.x86_64.rpm �"�libinput-devel-1.19.3-2.el9_0.i686.rpm �"�libinput-devel-1.19.3-2.el9_0.x86_64.rpm �_�libinput-1.19.3-2.el9_0.x86_64.rpm �`�libinput-utils-1.19.3-2.el9_0.x86_64.rpm �"�libinput-devel-1.19.3-2.el9_0.i686.rpm �"�libinput-devel-1.19.3-2.el9_0.x86_64.rpm ����6	�=�OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security, bug fix, and enhancement update A��+https://access.redhat.com/errata/RHSA-2022:5695 RHSA-2022:5695 RHSA-2022:5695 
https://access.redhat.com/security/cve/CVE-2022-21540 CVE-2022-21540 CVE-2022-21540 https://access.redhat.com/security/cve/CVE-2022-21541 CVE-2022-21541 CVE-2022-21541 https://access.redhat.com/security/cve/CVE-2022-34169 CVE-2022-34169 CVE-2022-34169 https://bugzilla.redhat.com/2108540 2108540  https://bugzilla.redhat.com/2108543 2108543  https://bugzilla.redhat.com/2108554 2108554  https://errata.almalinux.org/9/ALSA-2022-5695.html ALSA-2022:5695 ALSA-2022:5695 �Pjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm �Hjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Rjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Ojava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm �Ijava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Mjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm �Qjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Jjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Kjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm �Mjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Pjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Njava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm �Ijava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm �Fjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Gjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Ljava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Jjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm �Ojava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Sjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Njava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Kjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Ljava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm �Hjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm �Pjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm �Hjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Rjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Ojava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm �Ijava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Mjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm �Qjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Jjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Kjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm �Mjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Pjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Njava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm �Ijava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm �Fjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Gjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Ljava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Jjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm �Ojava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Sjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Njava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Kjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �Ljava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm �Hjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm �����7	��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security, bug fix, and enhancement update A�@�.https://access.redhat.com/errata/RHSA-2022:5709 RHSA-2022:5709 RHSA-2022:5709 
https://access.redhat.com/security/cve/CVE-2022-21540 CVE-2022-21540 CVE-2022-21540 https://access.redhat.com/security/cve/CVE-2022-21541 CVE-2022-21541 CVE-2022-21541 https://access.redhat.com/security/cve/CVE-2022-34169 CVE-2022-34169 CVE-2022-34169 https://bugzilla.redhat.com/2108540 2108540  https://bugzilla.redhat.com/2108543 2108543  https://bugzilla.redhat.com/2108554 2108554  https://errata.almalinux.org/9/ALSA-2022-5709.html ALSA-2022:5709 ALSA-2022:5709 �java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm �*java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �-java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �%java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �Gjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm �Ejava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm �Cjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm �$java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �Fjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm �,java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �)java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �(java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �Djava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm �+java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �'java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm �&java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm �*java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �-java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �%java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �Gjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm �Ejava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm �Cjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm �$java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �Fjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm �,java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �)java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �(java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �Djava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm �+java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �'java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm �&java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �����8	�
�_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security, bug fix, and enhancement update A�n�e
https://access.redhat.com/errata/RHSA-2022:5736 RHSA-2022:5736 RHSA-2022:5736 
https://access.redhat.com/security/cve/CVE-2022-21540 CVE-2022-21540 CVE-2022-21540 https://access.redhat.com/security/cve/CVE-2022-21541 CVE-2022-21541 CVE-2022-21541 https://access.redhat.com/security/cve/CVE-2022-21549 CVE-2022-21549 CVE-2022-21549 https://access.redhat.com/security/cve/CVE-2022-34169 CVE-2022-34169 CVE-2022-34169 https://bugzilla.redhat.com/2108540 2108540  https://bugzilla.redhat.com/2108543 2108543  https://bugzilla.redhat.com/2108547 2108547  https://bugzilla.redhat.com/2108554 2108554  https://errata.almalinux.org/9/ALSA-2022-5736.html ALSA-2022:5736 ALSA-2022:5736 jjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm wjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Vjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm �Xjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm �Yjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm sjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm ljava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Qjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm mjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm ojava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm rjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm kjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm qjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Tjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm vjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Sjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm pjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Wjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm �Rjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm tjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm njava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Ujava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm ujava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm jjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm wjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Vjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm �Xjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm �Yjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm sjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm ljava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Qjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm mjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm ojava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm rjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm kjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm qjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Tjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm vjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Sjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm pjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Wjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm �Rjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm tjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm njava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �Ujava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm ujava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �����9	�*�NBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update A
�S�iJhttps://access.redhat.com/errata/RHSA-2022:5948 RHSA-2022:5948 RHSA-2022:5948 
https://access.redhat.com/security/cve/CVE-2021-46659 CVE-2021-46659 CVE-2021-46659 https://access.redhat.com/security/cve/CVE-2021-46661 CVE-2021-46661 CVE-2021-46661 https://access.redhat.com/security/cve/CVE-2021-46663 CVE-2021-46663 CVE-2021-46663 https://access.redhat.com/security/cve/CVE-2021-46664 CVE-2021-46664 CVE-2021-46664 https://access.redhat.com/security/cve/CVE-2021-46665 CVE-2021-46665 CVE-2021-46665 https://access.redhat.com/security/cve/CVE-2021-46668 CVE-2021-46668 CVE-2021-46668 https://access.redhat.com/security/cve/CVE-2021-46669 CVE-2021-46669 CVE-2021-46669 https://access.redhat.com/security/cve/CVE-2022-24048 CVE-2022-24048 CVE-2022-24048 https://access.redhat.com/security/cve/CVE-2022-24050 CVE-2022-24050 CVE-2022-24050 https://access.redhat.com/security/cve/CVE-2022-24051 CVE-2022-24051 CVE-2022-24051 https://access.redhat.com/security/cve/CVE-2022-24052 CVE-2022-24052 CVE-2022-24052 https://access.redhat.com/security/cve/CVE-2022-27376 CVE-2022-27376 CVE-2022-27376 https://access.redhat.com/security/cve/CVE-2022-27377 CVE-2022-27377 CVE-2022-27377 https://access.redhat.com/security/cve/CVE-2022-27378 CVE-2022-27378 CVE-2022-27378 https://access.redhat.com/security/cve/CVE-2022-27379 CVE-2022-27379 CVE-2022-27379 https://access.redhat.com/security/cve/CVE-2022-27380 CVE-2022-27380 CVE-2022-27380 https://access.redhat.com/security/cve/CVE-2022-27381 CVE-2022-27381 CVE-2022-27381 https://access.redhat.com/security/cve/CVE-2022-27382 CVE-2022-27382 CVE-2022-27382 https://access.redhat.com/security/cve/CVE-2022-27383 CVE-2022-27383 CVE-2022-27383 https://access.redhat.com/security/cve/CVE-2022-27384 CVE-2022-27384 CVE-2022-27384 https://access.redhat.com/security/cve/CVE-2022-27386 CVE-2022-27386 CVE-2022-27386 https://access.redhat.com/security/cve/CVE-2022-27387 CVE-2022-27387 CVE-2022-27387 https://access.redhat.com/security/cve/CVE-2022-27444 CVE-2022-27444 CVE-2022-27444 https://access.redhat.com/security/cve/CVE-2022-27445 CVE-2022-27445 CVE-2022-27445 https://access.redhat.com/security/cve/CVE-2022-27446 CVE-2022-27446 CVE-2022-27446 https://access.redhat.com/security/cve/CVE-2022-27447 CVE-2022-27447 CVE-2022-27447 https://access.redhat.com/security/cve/CVE-2022-27448 CVE-2022-27448 CVE-2022-27448 https://access.redhat.com/security/cve/CVE-2022-27449 CVE-2022-27449 CVE-2022-27449 https://access.redhat.com/security/cve/CVE-2022-27451 CVE-2022-27451 CVE-2022-27451 https://access.redhat.com/security/cve/CVE-2022-27452 CVE-2022-27452 CVE-2022-27452 https://access.redhat.com/security/cve/CVE-2022-27455 CVE-2022-27455 CVE-2022-27455 https://access.redhat.com/security/cve/CVE-2022-27456 CVE-2022-27456 CVE-2022-27456 https://access.redhat.com/security/cve/CVE-2022-27457 CVE-2022-27457 CVE-2022-27457 https://access.redhat.com/security/cve/CVE-2022-27458 CVE-2022-27458 CVE-2022-27458 https://access.redhat.com/security/cve/CVE-2022-31622 CVE-2022-31622 CVE-2022-31622 https://access.redhat.com/security/cve/CVE-2022-31623 CVE-2022-31623 CVE-2022-31623 https://bugzilla.redhat.com/2049302 2049302  https://bugzilla.redhat.com/2050017 2050017  https://bugzilla.redhat.com/2050022 2050022  https://bugzilla.redhat.com/2050024 2050024  https://bugzilla.redhat.com/2050026 2050026  https://bugzilla.redhat.com/2050032 2050032  https://bugzilla.redhat.com/2050034 2050034  https://bugzilla.redhat.com/2068211 2068211  https://bugzilla.redhat.com/2068233 2068233  https://bugzilla.redhat.com/2068234 2068234  https://bugzilla.redhat.com/2069833 2069833  https://bugzilla.redhat.com/2074817 2074817  https://bugzilla.redhat.com/2074947 2074947  https://bugzilla.redhat.com/2074949 2074949  https://bugzilla.redhat.com/2074951 2074951  https://bugzilla.redhat.com/2074966 2074966  https://bugzilla.redhat.com/2074981 2074981  https://bugzilla.redhat.com/2074987 2074987  https://bugzilla.redhat.com/2074996 2074996  https://bugzilla.redhat.com/2074999 2074999  https://bugzilla.redhat.com/2075005 2075005  https://bugzilla.redhat.com/2075006 2075006  https://bugzilla.redhat.com/2075691 2075691  https://bugzilla.redhat.com/2075692 2075692  https://bugzilla.redhat.com/2075693 2075693  https://bugzilla.redhat.com/2075694 2075694  https://bugzilla.redhat.com/2075695 2075695  https://bugzilla.redhat.com/2075696 2075696  https://bugzilla.redhat.com/2075697 2075697  https://bugzilla.redhat.com/2075699 2075699  https://bugzilla.redhat.com/2075700 2075700  https://bugzilla.redhat.com/2075701 2075701  https://bugzilla.redhat.com/2076144 2076144  https://bugzilla.redhat.com/2076145 2076145  https://bugzilla.redhat.com/2092354 2092354  https://bugzilla.redhat.com/2092360 2092360  https://errata.almalinux.org/9/ALSA-2022-5948.html ALSA-2022:5948 ALSA-2022:5948 �j@mariadb-pam-10.5.16-2.el9_0.x86_64.rpm �l@mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm �d@mariadb-backup-10.5.16-2.el9_0.x86_64.rpm �m@mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm �c@mariadb-10.5.16-2.el9_0.x86_64.rpm �h@mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm �i@mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm �f@mariadb-embedded-10.5.16-2.el9_0.x86_64.rpm �g@mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm �R@mariadb-test-10.5.16-2.el9_0.x86_64.rpm �P@mariadb-devel-10.5.16-2.el9_0.x86_64.rpm �e@mariadb-common-10.5.16-2.el9_0.x86_64.rpm �Q@mariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm �k@mariadb-server-10.5.16-2.el9_0.x86_64.rpm �j@mariadb-pam-10.5.16-2.el9_0.x86_64.rpm �l@mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm �d@mariadb-backup-10.5.16-2.el9_0.x86_64.rpm �m@mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm �c@mariadb-10.5.16-2.el9_0.x86_64.rpm �h@mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm �i@mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm �f@mariadb-embedded-10.5.16-2.el9_0.x86_64.rpm �g@mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm �R@mariadb-test-10.5.16-2.el9_0.x86_64.rpm �P@mariadb-devel-10.5.16-2.el9_0.x86_64.rpm �e@mariadb-common-10.5.16-2.el9_0.x86_64.rpm �Q@mariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm �k@mariadb-server-10.5.16-2.el9_0.x86_64.rpm ��ͯo�:	��kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security, bug fix, and enhancement update A
�<�qhttps://access.redhat.com/errata/RHSA-2022:6003 RHSA-2022:6003 RHSA-2022:6003 
https://access.redhat.com/security/cve/CVE-2022-0494 CVE-2022-0494 CVE-2022-0494 https://access.redhat.com/security/cve/CVE-2022-1055 CVE-2022-1055 CVE-2022-1055 https://bugzilla.redhat.com/2039448 2039448  https://bugzilla.redhat.com/2070220 2070220  https://errata.almalinux.org/9/ALSA-2022-6003.html ALSA-2022:6003 ALSA-2022:6003 �Vkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm �Okernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �Rkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �Skernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �Tkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �Ikernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �]perf-5.14.0-70.22.1.el9_0.x86_64.rpm �Gkernel-5.14.0-70.22.1.el9_0.x86_64.rpm �Jkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �Mkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �Ukernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �Hkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �Qkernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �>bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm �Nkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �Pkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �Wkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm �^python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �Lkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �Kkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm �Vkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm �Okernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �Rkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �Skernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �Tkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �Ikernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �]perf-5.14.0-70.22.1.el9_0.x86_64.rpm �Gkernel-5.14.0-70.22.1.el9_0.x86_64.rpm �Jkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �Mkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �Ukernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �Hkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �Qkernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �>bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm �Nkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �Pkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �Wkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm �^python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �Lkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �Kkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm ����B�;	�,�VBBBBBBBBBBBBBBBBBBBBsecurity Moderate: .NET 6.0 security, bug fix, and enhancement update A
�-�Jhttps://access.redhat.com/errata/RHSA-2022:6043 RHSA-2022:6043 RHSA-2022:6043 
https://access.redhat.com/security/cve/CVE-2022-34716 CVE-2022-34716 CVE-2022-34716 https://bugzilla.redhat.com/2115183 2115183  https://errata.almalinux.org/9/ALSA-2022-6043.html ALSA-2022:6043 ALSA-2022:6043 �)�#aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm �4�#dotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm �1�#dotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm �2�#dotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm �x�netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm �(�#aspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm �5�dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm �3�dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm �0�#dotnet-host-6.0.8-1.el9_0.x86_64.rpm �/�#dotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm �)�#aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm �4�#dotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm �1�#dotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm �2�#dotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm �x�netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm �(�#aspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm �5�dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm �3�dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm �0�#dotnet-host-6.0.8-1.el9_0.x86_64.rpm �/�#dotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm ��нi�<	�-�hsecurity Moderate: .NET 6.0 security and bugfix update A
�w�xhttps://access.redhat.com/errata/RHSA-2022:6521 RHSA-2022:6521 RHSA-2022:6521 
https://access.redhat.com/security/cve/CVE-2022-38013 CVE-2022-38013 CVE-2022-38013 https://bugzilla.redhat.com/2125124 2125124  https://errata.almalinux.org/9/ALSA-2022-6521.html ALSA-2022:6521 ALSA-2022:6521 e�~dotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm e�~dotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm �����=	�.�*security Moderate: ruby security, bug fix, and enhancement update A
�o�Mhttps://access.redhat.com/errata/RHSA-2022:6585 RHSA-2022:6585 RHSA-2022:6585 
https://access.redhat.com/security/cve/CVE-2022-28738 CVE-2022-28738 CVE-2022-28738 https://access.redhat.com/security/cve/CVE-2022-28739 CVE-2022-28739 CVE-2022-28739 https://bugzilla.redhat.com/2075685 2075685  https://bugzilla.redhat.com/2075687 2075687  https://errata.almalinux.org/9/ALSA-2022-6585.html ALSA-2022:6585 ALSA-2022:6585 �;�ruby-doc-3.0.4-160.el9_0.noarch.rpm �;�ruby-doc-3.0.4-160.el9_0.noarch.rpm �����>	�/�kBBBBsecurity Moderate: mysql security, bug fix, and enhancement update A
�<�eZhttps://access.redhat.com/errata/RHSA-2022:6590 RHSA-2022:6590 RHSA-2022:6590 
https://access.redhat.com/security/cve/CVE-2022-21412 CVE-2022-21412 CVE-2022-21412 https://access.redhat.com/security/cve/CVE-2022-21413 CVE-2022-21413 CVE-2022-21413 https://access.redhat.com/security/cve/CVE-2022-21414 CVE-2022-21414 CVE-2022-21414 https://access.redhat.com/security/cve/CVE-2022-21415 CVE-2022-21415 CVE-2022-21415 https://access.redhat.com/security/cve/CVE-2022-21417 CVE-2022-21417 CVE-2022-21417 https://access.redhat.com/security/cve/CVE-2022-21418 CVE-2022-21418 CVE-2022-21418 https://access.redhat.com/security/cve/CVE-2022-21423 CVE-2022-21423 CVE-2022-21423 https://access.redhat.com/security/cve/CVE-2022-21425 CVE-2022-21425 CVE-2022-21425 https://access.redhat.com/security/cve/CVE-2022-21427 CVE-2022-21427 CVE-2022-21427 https://access.redhat.com/security/cve/CVE-2022-21435 CVE-2022-21435 CVE-2022-21435 https://access.redhat.com/security/cve/CVE-2022-21436 CVE-2022-21436 CVE-2022-21436 https://access.redhat.com/security/cve/CVE-2022-21437 CVE-2022-21437 CVE-2022-21437 https://access.redhat.com/security/cve/CVE-2022-21438 CVE-2022-21438 CVE-2022-21438 https://access.redhat.com/security/cve/CVE-2022-21440 CVE-2022-21440 CVE-2022-21440 https://access.redhat.com/security/cve/CVE-2022-21444 CVE-2022-21444 CVE-2022-21444 https://access.redhat.com/security/cve/CVE-2022-21451 CVE-2022-21451 CVE-2022-21451 https://access.redhat.com/security/cve/CVE-2022-21452 CVE-2022-21452 CVE-2022-21452 https://access.redhat.com/security/cve/CVE-2022-21454 CVE-2022-21454 CVE-2022-21454 https://access.redhat.com/security/cve/CVE-2022-21455 CVE-2022-21455 CVE-2022-21455 https://access.redhat.com/security/cve/CVE-2022-21457 CVE-2022-21457 CVE-2022-21457 https://access.redhat.com/security/cve/CVE-2022-21459 CVE-2022-21459 CVE-2022-21459 https://access.redhat.com/security/cve/CVE-2022-21460 CVE-2022-21460 CVE-2022-21460 https://access.redhat.com/security/cve/CVE-2022-21462 CVE-2022-21462 CVE-2022-21462 https://access.redhat.com/security/cve/CVE-2022-21478 CVE-2022-21478 CVE-2022-21478 https://access.redhat.com/security/cve/CVE-2022-21479 CVE-2022-21479 CVE-2022-21479 https://access.redhat.com/security/cve/CVE-2022-21509 CVE-2022-21509 CVE-2022-21509 https://access.redhat.com/security/cve/CVE-2022-21515 CVE-2022-21515 CVE-2022-21515 https://access.redhat.com/security/cve/CVE-2022-21517 CVE-2022-21517 CVE-2022-21517 https://access.redhat.com/security/cve/CVE-2022-21522 CVE-2022-21522 CVE-2022-21522 https://access.redhat.com/security/cve/CVE-2022-21525 CVE-2022-21525 CVE-2022-21525 https://access.redhat.com/security/cve/CVE-2022-21526 CVE-2022-21526 CVE-2022-21526 https://access.redhat.com/security/cve/CVE-2022-21527 CVE-2022-21527 CVE-2022-21527 https://access.redhat.com/security/cve/CVE-2022-21528 CVE-2022-21528 CVE-2022-21528 https://access.redhat.com/security/cve/CVE-2022-21529 CVE-2022-21529 CVE-2022-21529 https://access.redhat.com/security/cve/CVE-2022-21530 CVE-2022-21530 CVE-2022-21530 https://access.redhat.com/security/cve/CVE-2022-21531 CVE-2022-21531 CVE-2022-21531 https://access.redhat.com/security/cve/CVE-2022-21534 CVE-2022-21534 CVE-2022-21534 https://access.redhat.com/security/cve/CVE-2022-21537 CVE-2022-21537 CVE-2022-21537 https://access.redhat.com/security/cve/CVE-2022-21538 CVE-2022-21538 CVE-2022-21538 https://access.redhat.com/security/cve/CVE-2022-21539 CVE-2022-21539 CVE-2022-21539 https://access.redhat.com/security/cve/CVE-2022-21547 CVE-2022-21547 CVE-2022-21547 https://access.redhat.com/security/cve/CVE-2022-21553 CVE-2022-21553 CVE-2022-21553 https://access.redhat.com/security/cve/CVE-2022-21556 CVE-2022-21556 CVE-2022-21556 https://access.redhat.com/security/cve/CVE-2022-21569 CVE-2022-21569 CVE-2022-21569 https://bugzilla.redhat.com/2082636 2082636  https://bugzilla.redhat.com/2082637 2082637  https://bugzilla.redhat.com/2082638 2082638  https://bugzilla.redhat.com/2082639 2082639  https://bugzilla.redhat.com/2082640 2082640  https://bugzilla.redhat.com/2082641 2082641  https://bugzilla.redhat.com/2082642 2082642  https://bugzilla.redhat.com/2082643 2082643  https://bugzilla.redhat.com/2082644 2082644  https://bugzilla.redhat.com/2082645 2082645  https://bugzilla.redhat.com/2082646 2082646  https://bugzilla.redhat.com/2082647 2082647  https://bugzilla.redhat.com/2082648 2082648  https://bugzilla.redhat.com/2082649 2082649  https://bugzilla.redhat.com/2082650 2082650  https://bugzilla.redhat.com/2082651 2082651  https://bugzilla.redhat.com/2082652 2082652  https://bugzilla.redhat.com/2082653 2082653  https://bugzilla.redhat.com/2082654 2082654  https://bugzilla.redhat.com/2082655 2082655  https://bugzilla.redhat.com/2082656 2082656  https://bugzilla.redhat.com/2082657 2082657  https://bugzilla.redhat.com/2082658 2082658  https://bugzilla.redhat.com/2082659 2082659  https://bugzilla.redhat.com/2115282 2115282  https://bugzilla.redhat.com/2115283 2115283  https://bugzilla.redhat.com/2115284 2115284  https://bugzilla.redhat.com/2115285 2115285  https://bugzilla.redhat.com/2115286 2115286  https://bugzilla.redhat.com/2115287 2115287  https://bugzilla.redhat.com/2115288 2115288  https://bugzilla.redhat.com/2115289 2115289  https://bugzilla.redhat.com/2115290 2115290  https://bugzilla.redhat.com/2115291 2115291  https://bugzilla.redhat.com/2115292 2115292  https://bugzilla.redhat.com/2115293 2115293  https://bugzilla.redhat.com/2115294 2115294  https://bugzilla.redhat.com/2115295 2115295  https://bugzilla.redhat.com/2115296 2115296  https://bugzilla.redhat.com/2115297 2115297  https://bugzilla.redhat.com/2115298 2115298  https://bugzilla.redhat.com/2115299 2115299  https://bugzilla.redhat.com/2115300 2115300  https://bugzilla.redhat.com/2115301 2115301  https://errata.almalinux.org/9/ALSA-2022-6590.html ALSA-2022:6590 ALSA-2022:6590 ��wmysql-devel-8.0.30-3.el9_0.x86_64.rpm ��wmysql-libs-8.0.30-3.el9_0.x86_64.rpm ��wmysql-test-8.0.30-3.el9_0.x86_64.rpm ��wmysql-devel-8.0.30-3.el9_0.x86_64.rpm ��wmysql-libs-8.0.30-3.el9_0.x86_64.rpm ��wmysql-test-8.0.30-3.el9_0.x86_64.rpm ����O�?	�0�qBBsecurity Important: kernel security, bug fix, and enhancement update A��!�=https://access.redhat.com/errata/RHSA-2022:6610 RHSA-2022:6610 RHSA-2022:6610 
https://access.redhat.com/security/cve/CVE-2022-2078 CVE-2022-2078 CVE-2022-2078 https://access.redhat.com/security/cve/CVE-2022-34918 CVE-2022-34918 CVE-2022-34918 https://bugzilla.redhat.com/2096178 2096178  https://bugzilla.redhat.com/2104423 2104423  https://errata.almalinux.org/9/ALSA-2022-6610.html ALSA-2022:6610 ALSA-2022:6610 �Mkernel-tools-libs-devel-5.14.0-70.26.1.el9_0.x86_64.rpm �Mkernel-cross-headers-5.14.0-70.26.1.el9_0.x86_64.rpm �Mkernel-tools-libs-devel-5.14.0-70.26.1.el9_0.x86_64.rpm �Mkernel-cross-headers-5.14.0-70.26.1.el9_0.x86_64.rpm �����@	�2�q�EBsecurity Important: bind security update A��^�https://access.redhat.com/errata/RHSA-2022:6763 RHSA-2022:6763 RHSA-2022:6763 
https://access.redhat.com/security/cve/CVE-2022-3080 CVE-2022-3080 CVE-2022-3080 https://access.redhat.com/security/cve/CVE-2022-38177 CVE-2022-38177 CVE-2022-38177 https://access.redhat.com/security/cve/CVE-2022-38178 CVE-2022-38178 CVE-2022-38178 https://bugzilla.redhat.com/2128600 2128600  https://bugzilla.redhat.com/2128601 2128601  https://bugzilla.redhat.com/2128602 2128602  https://errata.almalinux.org/9/ALSA-2022-6763.html ALSA-2022:6763 ALSA-2022:6763 [�Ebind-devel-9.16.23-1.el9_0.1.i686.rpm �X�Ebind-libs-9.16.23-1.el9_0.1.i686.rpm [�Ebind-devel-9.16.23-1.el9_0.1.i686.rpm �X�Ebind-libs-9.16.23-1.el9_0.1.i686.rpm ����~�A	�3�xsecurity Moderate: .NET 6.0 security and bugfix update A
��d�Vhttps://access.redhat.com/errata/RHSA-2022:6913 RHSA-2022:6913 RHSA-2022:6913 
https://access.redhat.com/security/cve/CVE-2022-41032 CVE-2022-41032 CVE-2022-41032 https://bugzilla.redhat.com/2132614 2132614  https://errata.almalinux.org/9/ALSA-2022-6913.html ALSA-2022:6913 ALSA-2022:6913 e�dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0.x86_64.rpm ����3�B	�4�zBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update A
��:�
https://access.redhat.com/errata/RHSA-2022:6999 RHSA-2022:6999 RHSA-2022:6999 
https://access.redhat.com/security/cve/CVE-2022-21618 CVE-2022-21618 CVE-2022-21618 https://access.redhat.com/security/cve/CVE-2022-21619 CVE-2022-21619 CVE-2022-21619 https://access.redhat.com/security/cve/CVE-2022-21624 CVE-2022-21624 CVE-2022-21624 https://access.redhat.com/security/cve/CVE-2022-21626 CVE-2022-21626 CVE-2022-21626 https://access.redhat.com/security/cve/CVE-2022-21628 CVE-2022-21628 CVE-2022-21628 https://access.redhat.com/security/cve/CVE-2022-39399 CVE-2022-39399 CVE-2022-39399 https://bugzilla.redhat.com/2133745 2133745  https://bugzilla.redhat.com/2133753 2133753  https://bugzilla.redhat.com/2133765 2133765  https://bugzilla.redhat.com/2133769 2133769  https://bugzilla.redhat.com/2133776 2133776  https://bugzilla.redhat.com/2133817 2133817  https://errata.almalinux.org/9/ALSA-2022-6999.html ALSA-2022:6999 ALSA-2022:6999 s2java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm n2java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm u2java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm p2java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm q2java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm o2java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm l2java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm r2java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm j2java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm k2java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm w2java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm t2java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm m2java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm v2java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm s2java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm n2java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm u2java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm p2java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm q2java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm o2java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm l2java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm r2java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm j2java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm k2java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm w2java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm t2java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm m2java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm v2java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm �����C	�5�VBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update A
��D�_
https://access.redhat.com/errata/RHSA-2022:7007 RHSA-2022:7007 RHSA-2022:7007 
https://access.redhat.com/security/cve/CVE-2022-21619 CVE-2022-21619 CVE-2022-21619 https://access.redhat.com/security/cve/CVE-2022-21624 CVE-2022-21624 CVE-2022-21624 https://access.redhat.com/security/cve/CVE-2022-21626 CVE-2022-21626 CVE-2022-21626 https://access.redhat.com/security/cve/CVE-2022-21628 CVE-2022-21628 CVE-2022-21628 https://bugzilla.redhat.com/2133745 2133745  https://bugzilla.redhat.com/2133753 2133753  https://bugzilla.redhat.com/2133765 2133765  https://bugzilla.redhat.com/2133769 2133769  https://errata.almalinux.org/9/ALSA-2022-7007.html ALSA-2022:7007 ALSA-2022:7007 
�$Ijava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �*Ijava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �)Ijava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �(Ijava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �%Ijava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �+Ijava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �&Ijava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �-Ijava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �'Ijava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �,Ijava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm 
�$Ijava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �*Ijava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �)Ijava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �(Ijava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �%Ijava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �+Ijava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �&Ijava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �-Ijava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �'Ijava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �,Ijava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm ��ɷ�D	�6�jBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update A
��#�https://access.redhat.com/errata/RHSA-2022:7013 RHSA-2022:7013 RHSA-2022:7013 
https://access.redhat.com/security/cve/CVE-2022-21618 CVE-2022-21618 CVE-2022-21618 https://access.redhat.com/security/cve/CVE-2022-21619 CVE-2022-21619 CVE-2022-21619 https://access.redhat.com/security/cve/CVE-2022-21624 CVE-2022-21624 CVE-2022-21624 https://access.redhat.com/security/cve/CVE-2022-21626 CVE-2022-21626 CVE-2022-21626 https://access.redhat.com/security/cve/CVE-2022-21628 CVE-2022-21628 CVE-2022-21628 https://access.redhat.com/security/cve/CVE-2022-39399 CVE-2022-39399 CVE-2022-39399 https://bugzilla.redhat.com/2133745 2133745  https://bugzilla.redhat.com/2133753 2133753  https://bugzilla.redhat.com/2133765 2133765  https://bugzilla.redhat.com/2133769 2133769  https://bugzilla.redhat.com/2133776 2133776  https://bugzilla.redhat.com/2133817 2133817  https://errata.almalinux.org/9/ALSA-2022-7013.html ALSA-2022:7013 ALSA-2022:7013 �Q!java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �R!java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �S!java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �L!java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �O!java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �G!java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �N!java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �K!java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �P!java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �I!java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �J!java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �M!java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �F!java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �H!java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �Q!java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �R!java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �S!java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �L!java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �O!java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �G!java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �N!java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �K!java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �P!java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �I!java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �J!java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �M!java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �F!java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �H!java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �����E	��FBsecurity Important: libksba security update A��.�Yhttps://access.redhat.com/errata/RHSA-2022:7090 RHSA-2022:7090 RHSA-2022:7090 
https://access.redhat.com/security/cve/CVE-2022-3515 CVE-2022-3515 CVE-2022-3515 https://bugzilla.redhat.com/2135610 2135610  https://errata.almalinux.org/9/ALSA-2022-7090.html ALSA-2022:7090 ALSA-2022:7090 ��nlibksba-devel-1.5.1-5.el9_0.i686.rpm ��nlibksba-devel-1.5.1-5.el9_0.x86_64.rpm ��nlibksba-devel-1.5.1-5.el9_0.i686.rpm ��nlibksba-devel-1.5.1-5.el9_0.x86_64.rpm ����_�F	��IBsecurity Important: device-mapper-multipath security update A���chttps://access.redhat.com/errata/RHSA-2022:7185 RHSA-2022:7185 RHSA-2022:7185 
https://access.redhat.com/security/cve/CVE-2022-41974 CVE-2022-41974 CVE-2022-41974 https://bugzilla.redhat.com/2133988 2133988  https://errata.almalinux.org/9/ALSA-2022-7185.html ALSA-2022:7185 ALSA-2022:7185 ��\device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpm ��\device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpm ��\device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpm ��\device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpm ����h�G	�7�Lsecurity Moderate: zlib security update A
��j�Ohttps://access.redhat.com/errata/RHSA-2022:7314 RHSA-2022:7314 RHSA-2022:7314 
https://access.redhat.com/security/cve/CVE-2022-37434 CVE-2022-37434 CVE-2022-37434 https://bugzilla.redhat.com/2116639 2116639  https://errata.almalinux.org/9/ALSA-2022-7314.html ALSA-2022:7314 ALSA-2022:7314 ��dzlib-static-1.2.11-32.el9_0.i686.rpm ��dzlib-static-1.2.11-32.el9_0.i686.rpm ����S�H	�8�NBBsecurity Important: kernel security, bug fix, and enhancement update A��9�https://access.redhat.com/errata/RHSA-2022:7318 RHSA-2022:7318 RHSA-2022:7318 
https://access.redhat.com/security/cve/CVE-2022-2585 CVE-2022-2585 CVE-2022-2585 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://bugzilla.redhat.com/2085300 2085300  https://bugzilla.redhat.com/2114874 2114874  https://errata.almalinux.org/9/ALSA-2022-7318.html ALSA-2022:7318 ALSA-2022:7318 �Nkernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpm �Nkernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpm �Nkernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpm �Nkernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpm ����S�I	�:�y�L�OBBBBBBsecurity Moderate: python3.9 security update A
��<�nhttps://access.redhat.com/errata/RHSA-2022:7323 RHSA-2022:7323 RHSA-2022:7323 
https://access.redhat.com/security/cve/CVE-2020-10735 CVE-2020-10735 CVE-2020-10735 https://bugzilla.redhat.com/1834423 1834423  https://errata.almalinux.org/9/ALSA-2022-7323.html ALSA-2022:7323 ALSA-2022:7323 Y�Wpython3-3.9.10-3.el9_0.i686.rpm �Wpython3-debug-3.9.10-3.el9_0.x86_64.rpm Z�Wpython3-tkinter-3.9.10-3.el9_0.i686.rpm �Wpython3-idle-3.9.10-3.el9_0.x86_64.rpm �Wpython3-test-3.9.10-3.el9_0.i686.rpm Y�Wpython3-3.9.10-3.el9_0.i686.rpm �Wpython3-debug-3.9.10-3.el9_0.x86_64.rpm Z�Wpython3-tkinter-3.9.10-3.el9_0.i686.rpm �Wpython3-idle-3.9.10-3.el9_0.x86_64.rpm �Wpython3-test-3.9.10-3.el9_0.i686.rpm �����J	�<�{�`BBsecurity Moderate: lua security update A
��*�https://access.redhat.com/errata/RHSA-2022:7329 RHSA-2022:7329 RHSA-2022:7329 
https://access.redhat.com/security/cve/CVE-2022-33099 CVE-2022-33099 CVE-2022-33099 https://bugzilla.redhat.com/2104427 2104427  https://errata.almalinux.org/9/ALSA-2022-7329.html ALSA-2022:7329 ALSA-2022:7329 ��lua-devel-5.4.2-4.el9_0.3.i686.rpm �O�lua-5.4.2-4.el9_0.3.i686.rpm ��lua-devel-5.4.2-4.el9_0.3.x86_64.rpm ��lua-devel-5.4.2-4.el9_0.3.i686.rpm �O�lua-5.4.2-4.el9_0.3.i686.rpm ��lua-devel-5.4.2-4.el9_0.3.x86_64.rpm ����t�K	�=�^BBBBBBBBBBBBBBBBsecurity Low: libguestfs security, bug fix, and enhancement update A�>��<�https://access.redhat.com/errata/RHSA-2022:7958 RHSA-2022:7958 RHSA-2022:7958 
https://access.redhat.com/security/cve/CVE-2022-2211 CVE-2022-2211 CVE-2022-2211 https://bugzilla.redhat.com/2100862 2100862  https://errata.almalinux.org/9/ALSA-2022-7958.html ALSA-2022:7958 ALSA-2022:7958 
�\Xlibguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm �}Xphp-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �]Xlibguestfs-gobject-1.48.4-2.el9.alma.x86_64.rpm � Xruby-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �yXocaml-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �bXlua-guestfs-1.48.4-2.el9.alma.x86_64.rpm �^Xlibguestfs-gobject-devel-1.48.4-2.el9.alma.x86_64.rpm � Xlibguestfs-man-pages-uk-1.48.4-2.el9.alma.noarch.rpm �Xlibguestfs-man-pages-ja-1.48.4-2.el9.alma.noarch.rpm �zXocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm 
�\Xlibguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm �}Xphp-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �]Xlibguestfs-gobject-1.48.4-2.el9.alma.x86_64.rpm � Xruby-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �yXocaml-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �bXlua-guestfs-1.48.4-2.el9.alma.x86_64.rpm �^Xlibguestfs-gobject-devel-1.48.4-2.el9.alma.x86_64.rpm � Xlibguestfs-man-pages-uk-1.48.4-2.el9.alma.noarch.rpm �Xlibguestfs-man-pages-ja-1.48.4-2.el9.alma.noarch.rpm �zXocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm ��ܵh�L	�>�psecurity Low: virt-v2v security, bug fix, and enhancement update A�>��L�lhttps://access.redhat.com/errata/RHSA-2022:7968 RHSA-2022:7968 RHSA-2022:7968 
https://access.redhat.com/security/cve/CVE-2022-2211 CVE-2022-2211 CVE-2022-2211 https://bugzilla.redhat.com/2100862 2100862  https://errata.almalinux.org/9/ALSA-2022-7968.html ALSA-2022:7968 ALSA-2022:7968 �/�=virt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpm �.�=virt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpm �/�=virt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpm �.�=virt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpm ��ܲ�M	�?�rBBBBBBBsecurity Moderate: protobuf security update A
��8�Nhttps://access.redhat.com/errata/RHSA-2022:7970 RHSA-2022:7970 RHSA-2022:7970 
https://access.redhat.com/security/cve/CVE-2021-22570 CVE-2021-22570 CVE-2021-22570 https://bugzilla.redhat.com/2049429 2049429  https://errata.almalinux.org/9/ALSA-2022-7970.html ALSA-2022:7970 ALSA-2022:7970 �"�Tprotobuf-compiler-3.14.0-13.el9.x86_64.rpm �#�Tprotobuf-devel-3.14.0-13.el9.x86_64.rpm �$�Tprotobuf-lite-devel-3.14.0-13.el9.x86_64.rpm �#�Tprotobuf-devel-3.14.0-13.el9.i686.rpm �"�Tprotobuf-compiler-3.14.0-13.el9.i686.rpm �$�Tprotobuf-lite-devel-3.14.0-13.el9.i686.rpm �"�Tprotobuf-compiler-3.14.0-13.el9.x86_64.rpm �#�Tprotobuf-devel-3.14.0-13.el9.x86_64.rpm �$�Tprotobuf-lite-devel-3.14.0-13.el9.x86_64.rpm �#�Tprotobuf-devel-3.14.0-13.el9.i686.rpm �"�Tprotobuf-compiler-3.14.0-13.el9.i686.rpm �$�Tprotobuf-lite-devel-3.14.0-13.el9.i686.rpm ��ނv�N	� �{Bsecurity Low: speex security update A�>���8https://access.redhat.com/errata/RHSA-2022:7979 RHSA-2022:7979 RHSA-2022:7979 
https://access.redhat.com/security/cve/CVE-2020-23903 CVE-2020-23903 CVE-2020-23903 https://bugzilla.redhat.com/2024250 2024250  https://errata.almalinux.org/9/ALSA-2022-7979.html ALSA-2022:7979 ALSA-2022:7979 �5�espeex-devel-1.2.0-11.el9.x86_64.rpm �5�espeex-devel-1.2.0-11.el9.i686.rpm �5�espeex-devel-1.2.0-11.el9.x86_64.rpm �5�espeex-devel-1.2.0-11.el9.i686.rpm ��ރ�O	��~BBBBsecurity Low: libvirt security, bug fix, and enhancement update A�>��>�https://access.redhat.com/errata/RHSA-2022:8003 RHSA-2022:8003 RHSA-2022:8003 
https://access.redhat.com/security/cve/CVE-2022-0897 CVE-2022-0897 CVE-2022-0897 https://bugzilla.redhat.com/2063883 2063883  https://errata.almalinux.org/9/ALSA-2022-8003.html ALSA-2022:8003 ALSA-2022:8003 �Y�|libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm ��|libvirt-docs-8.5.0-7.el9_1.x86_64.rpm ��|libvirt-devel-8.5.0-7.el9_1.x86_64.rpm �Y�|libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm ��|libvirt-docs-8.5.0-7.el9_1.x86_64.rpm ��|libvirt-devel-8.5.0-7.el9_1.x86_64.rpm ��ܩK�P	��security Moderate: qt5 security and bug fix update A
��N�9https://access.redhat.com/errata/RHSA-2022:8022 RHSA-2022:8022 RHSA-2022:8022 
https://access.redhat.com/security/cve/CVE-2022-25255 CVE-2022-25255 CVE-2022-25255 https://bugzilla.redhat.com/2055505 2055505  https://errata.almalinux.org/9/ALSA-2022-8022.html ALSA-2022:8022 ALSA-2022:8022 �`�qt5-devel-5.15.3-1.el9.noarch.rpm �`�qt5-devel-5.15.3-1.el9.noarch.rpm ��ܣP�Q	��EBsecurity Moderate: unbound security, bug fix, and enhancement update A
���5https://access.redhat.com/errata/RHSA-2022:8062 RHSA-2022:8062 RHSA-2022:8062 
https://access.redhat.com/security/cve/CVE-2022-30698 CVE-2022-30698 CVE-2022-30698 https://access.redhat.com/security/cve/CVE-2022-30699 CVE-2022-30699 CVE-2022-30699 https://bugzilla.redhat.com/2116725 2116725  https://bugzilla.redhat.com/2116729 2116729  https://errata.almalinux.org/9/ALSA-2022-8062.html ALSA-2022:8062 ALSA-2022:8062 �4�`unbound-devel-1.16.2-2.el9.i686.rpm �4�`unbound-devel-1.16.2-2.el9.x86_64.rpm �4�`unbound-devel-1.16.2-2.el9.i686.rpm �4�`unbound-devel-1.16.2-2.el9.x86_64.rpm ��ބ{�R	��D�EBBBsecurity Moderate: bind security update A
��<�
https://access.redhat.com/errata/RHSA-2022:8068 RHSA-2022:8068 RHSA-2022:8068 
https://access.redhat.com/security/cve/CVE-2021-25220 CVE-2021-25220 CVE-2021-25220 https://access.redhat.com/security/cve/CVE-2022-0396 CVE-2022-0396 CVE-2022-0396 https://bugzilla.redhat.com/2064512 2064512  https://bugzilla.redhat.com/2064513 2064513  https://errata.almalinux.org/9/ALSA-2022-8068.html ALSA-2022:8068 ALSA-2022:8068 �X�0bind-libs-9.16.23-5.el9_1.i686.rpm �?�0bind-doc-9.16.23-5.el9_1.noarch.rpm [�0bind-devel-9.16.23-5.el9_1.x86_64.rpm [�0bind-devel-9.16.23-5.el9_1.i686.rpm �X�0bind-libs-9.16.23-5.el9_1.i686.rpm �?�0bind-doc-9.16.23-5.el9_1.noarch.rpm [�0bind-devel-9.16.23-5.el9_1.x86_64.rpm [�0bind-devel-9.16.23-5.el9_1.i686.rpm ��ކ�S	��MBBBsecurity Moderate: flac security update A
��I�jhttps://access.redhat.com/errata/RHSA-2022:8078 RHSA-2022:8078 RHSA-2022:8078 
https://access.redhat.com/security/cve/CVE-2021-0561 CVE-2021-0561 CVE-2021-0561 https://bugzilla.redhat.com/2057776 2057776  https://errata.almalinux.org/9/ALSA-2022-8078.html ALSA-2022:8078 ALSA-2022:8078 ��flac-devel-1.3.3-10.el9.i686.rpm ��flac-devel-1.3.3-10.el9.x86_64.rpm �@�flac-1.3.3-10.el9.x86_64.rpm ��flac-devel-1.3.3-10.el9.i686.rpm ��flac-devel-1.3.3-10.el9.x86_64.rpm �@�flac-1.3.3-10.el9.x86_64.rpm ��ކG�T	��RBsecurity Low: wavpack security update A�>��3�2https://access.redhat.com/errata/RHSA-2022:8139 RHSA-2022:8139 RHSA-2022:8139 
https://access.redhat.com/security/cve/CVE-2021-44269 CVE-2021-44269 CVE-2021-44269 https://bugzilla.redhat.com/2064457 2064457  https://errata.almalinux.org/9/ALSA-2022-8139.html ALSA-2022:8139 ALSA-2022:8139 �8�wavpack-devel-5.4.0-5.el9.x86_64.rpm �8�wavpack-devel-5.4.0-5.el9.i686.rpm �8�wavpack-devel-5.4.0-5.el9.x86_64.rpm �8�wavpack-devel-5.4.0-5.el9.i686.rpm ��އC�U	��UBBBBBBBBBBsecurity Moderate: poppler security and bug fix update A
��e�(https://access.redhat.com/errata/RHSA-2022:8151 RHSA-2022:8151 RHSA-2022:8151 
https://access.redhat.com/security/cve/CVE-2022-27337 CVE-2022-27337 CVE-2022-27337 https://bugzilla.redhat.com/2087190 2087190  https://errata.almalinux.org/9/ALSA-2022-8151.html ALSA-2022:8151 ALSA-2022:8151 ��!poppler-qt5-devel-21.01.0-13.el9.x86_64.rpm ��!poppler-cpp-devel-21.01.0-13.el9.x86_64.rpm ��!poppler-devel-21.01.0-13.el9.i686.rpm ��!poppler-qt5-devel-21.01.0-13.el9.i686.rpm ��!poppler-cpp-devel-21.01.0-13.el9.i686.rpm ��!poppler-devel-21.01.0-13.el9.x86_64.rpm ��!poppler-glib-devel-21.01.0-13.el9.i686.rpm ��!poppler-glib-devel-21.01.0-13.el9.x86_64.rpm ��!poppler-qt5-devel-21.01.0-13.el9.x86_64.rpm ��!poppler-cpp-devel-21.01.0-13.el9.x86_64.rpm ��!poppler-devel-21.01.0-13.el9.i686.rpm ��!poppler-qt5-devel-21.01.0-13.el9.i686.rpm ��!poppler-cpp-devel-21.01.0-13.el9.i686.rpm ��!poppler-devel-21.01.0-13.el9.x86_64.rpm ��!poppler-glib-devel-21.01.0-13.el9.i686.rpm ��!poppler-glib-devel-21.01.0-13.el9.x86_64.rpm ��އc�V	�	�asecurity Moderate: libtiff security update A
��
�@https://access.redhat.com/errata/RHSA-2022:8194 RHSA-2022:8194 RHSA-2022:8194 
https://access.redhat.com/security/cve/CVE-2022-0561 CVE-2022-0561 CVE-2022-0561 https://access.redhat.com/security/cve/CVE-2022-0562 CVE-2022-0562 CVE-2022-0562 https://access.redhat.com/security/cve/CVE-2022-0865 CVE-2022-0865 CVE-2022-0865 https://access.redhat.com/security/cve/CVE-2022-0891 CVE-2022-0891 CVE-2022-0891 https://access.redhat.com/security/cve/CVE-2022-0908 CVE-2022-0908 CVE-2022-0908 https://access.redhat.com/security/cve/CVE-2022-0909 CVE-2022-0909 CVE-2022-0909 https://access.redhat.com/security/cve/CVE-2022-0924 CVE-2022-0924 CVE-2022-0924 https://access.redhat.com/security/cve/CVE-2022-1354 CVE-2022-1354 CVE-2022-1354 https://access.redhat.com/security/cve/CVE-2022-1355 CVE-2022-1355 CVE-2022-1355 https://access.redhat.com/security/cve/CVE-2022-22844 CVE-2022-22844 CVE-2022-22844 https://bugzilla.redhat.com/2042603 2042603  https://bugzilla.redhat.com/2054494 2054494  https://bugzilla.redhat.com/2054495 2054495  https://bugzilla.redhat.com/2064145 2064145  https://bugzilla.redhat.com/2064146 2064146  https://bugzilla.redhat.com/2064148 2064148  https://bugzilla.redhat.com/2064406 2064406  https://bugzilla.redhat.com/2064411 2064411  https://bugzilla.redhat.com/2074404 2074404  https://bugzilla.redhat.com/2074415 2074415  https://errata.almalinux.org/9/ALSA-2022-8194.html ALSA-2022:8194 ALSA-2022:8194 �{�wlibtiff-tools-4.4.0-2.el9.x86_64.rpm �{�wlibtiff-tools-4.4.0-2.el9.x86_64.rpm ��܀Z�W	�
�cBBBBsecurity Low: openjpeg2 security update A�>��M�https://access.redhat.com/errata/RHSA-2022:8207 RHSA-2022:8207 RHSA-2022:8207 
https://access.redhat.com/security/cve/CVE-2022-1122 CVE-2022-1122 CVE-2022-1122 https://bugzilla.redhat.com/2067052 2067052  https://errata.almalinux.org/9/ALSA-2022-8207.html ALSA-2022:8207 ALSA-2022:8207 �!�%openjpeg2-tools-2.4.0-7.el9.x86_64.rpm � �%openjpeg2-devel-2.4.0-7.el9.i686.rpm � �%openjpeg2-devel-2.4.0-7.el9.x86_64.rpm �!�%openjpeg2-tools-2.4.0-7.el9.i686.rpm �!�%openjpeg2-tools-2.4.0-7.el9.x86_64.rpm � �%openjpeg2-devel-2.4.0-7.el9.i686.rpm � �%openjpeg2-devel-2.4.0-7.el9.x86_64.rpm �!�%openjpeg2-tools-2.4.0-7.el9.i686.rpm ��ވ`�X	��K�_BBsecurity Moderate: dovecot security and enhancement update A
��h�Zhttps://access.redhat.com/errata/RHSA-2022:8208 RHSA-2022:8208 RHSA-2022:8208 
https://access.redhat.com/security/cve/CVE-2022-30550 CVE-2022-30550 CVE-2022-30550 https://bugzilla.redhat.com/2105070 2105070  https://errata.almalinux.org/9/ALSA-2022-8208.html ALSA-2022:8208 ALSA-2022:8208 ��dovecot-devel-2.3.16-7.el9.x86_64.rpm ��dovecot-devel-2.3.16-7.el9.i686.rpm �?�dovecot-2.3.16-7.el9.i686.rpm ��dovecot-devel-2.3.16-7.el9.x86_64.rpm ��dovecot-devel-2.3.16-7.el9.i686.rpm �?�dovecot-2.3.16-7.el9.i686.rpm ��ވo�Y	�
�mBBsecurity Moderate: xorg-x11-server security and bug fix update A
��B�Zhttps://access.redhat.com/errata/RHSA-2022:8221 RHSA-2022:8221 RHSA-2022:8221 
https://access.redhat.com/security/cve/CVE-2022-2319 CVE-2022-2319 CVE-2022-2319 https://access.redhat.com/security/cve/CVE-2022-2320 CVE-2022-2320 CVE-2022-2320 https://bugzilla.redhat.com/2106671 2106671  https://bugzilla.redhat.com/2106683 2106683  https://errata.almalinux.org/9/ALSA-2022-8221.html ALSA-2022:8221 ALSA-2022:8221 �V�)xorg-x11-server-source-1.20.11-11.el9.noarch.rpm i�)xorg-x11-server-devel-1.20.11-11.el9.x86_64.rpm i�)xorg-x11-server-devel-1.20.11-11.el9.i686.rpm �V�)xorg-x11-server-source-1.20.11-11.el9.noarch.rpm i�)xorg-x11-server-devel-1.20.11-11.el9.x86_64.rpm i�)xorg-x11-server-devel-1.20.11-11.el9.i686.rpm ��މ(�Z	��qsecurity Moderate: yajl security update A
���Uhttps://access.redhat.com/errata/RHSA-2022:8252 RHSA-2022:8252 RHSA-2022:8252 
https://access.redhat.com/security/cve/CVE-2022-24795 CVE-2022-24795 CVE-2022-24795 https://bugzilla.redhat.com/2072912 2072912  https://errata.almalinux.org/9/ALSA-2022-8252.html ALSA-2022:8252 ALSA-2022:8252 �<�jyajl-devel-2.1.0-21.el9.x86_64.rpm �<�jyajl-devel-2.1.0-21.el9.x86_64.rpm ����3�[	��sBBsecurity Moderate: kernel security, bug fix, and enhancement update A
��q�?https://access.redhat.com/errata/RHSA-2022:8267 RHSA-2022:8267 RHSA-2022:8267 
https://access.redhat.com/security/cve/CVE-2020-36516 CVE-2020-36516 CVE-2020-36516 https://access.redhat.com/security/cve/CVE-2021-3640 CVE-2021-3640 CVE-2021-3640 https://access.redhat.com/security/cve/CVE-2022-0168 CVE-2022-0168 CVE-2022-0168 https://access.redhat.com/security/cve/CVE-2022-0617 CVE-2022-0617 CVE-2022-0617 https://access.redhat.com/security/cve/CVE-2022-0854 CVE-2022-0854 CVE-2022-0854 https://access.redhat.com/security/cve/CVE-2022-1016 CVE-2022-1016 CVE-2022-1016 https://access.redhat.com/security/cve/CVE-2022-1048 CVE-2022-1048 CVE-2022-1048 https://access.redhat.com/security/cve/CVE-2022-1184 CVE-2022-1184 CVE-2022-1184 https://access.redhat.com/security/cve/CVE-2022-1280 CVE-2022-1280 CVE-2022-1280 https://access.redhat.com/security/cve/CVE-2022-1353 CVE-2022-1353 CVE-2022-1353 https://access.redhat.com/security/cve/CVE-2022-1679 CVE-2022-1679 CVE-2022-1679 https://access.redhat.com/security/cve/CVE-2022-1852 CVE-2022-1852 CVE-2022-1852 https://access.redhat.com/security/cve/CVE-2022-1998 CVE-2022-1998 CVE-2022-1998 https://access.redhat.com/security/cve/CVE-2022-20368 CVE-2022-20368 CVE-2022-20368 https://access.redhat.com/security/cve/CVE-2022-21123 CVE-2022-21123 CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 CVE-2022-21125 CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 CVE-2022-21166 CVE-2022-21166 https://access.redhat.com/security/cve/CVE-2022-21499 CVE-2022-21499 CVE-2022-21499 https://access.redhat.com/security/cve/CVE-2022-23816 CVE-2022-23816 CVE-2022-23816 https://access.redhat.com/security/cve/CVE-2022-23825 CVE-2022-23825 CVE-2022-23825 https://access.redhat.com/security/cve/CVE-2022-24448 CVE-2022-24448 CVE-2022-24448 https://access.redhat.com/security/cve/CVE-2022-2586 CVE-2022-2586 CVE-2022-2586 https://access.redhat.com/security/cve/CVE-2022-26373 CVE-2022-26373 CVE-2022-26373 https://access.redhat.com/security/cve/CVE-2022-2639 CVE-2022-2639 CVE-2022-2639 https://access.redhat.com/security/cve/CVE-2022-28390 CVE-2022-28390 CVE-2022-28390 https://access.redhat.com/security/cve/CVE-2022-28893 CVE-2022-28893 CVE-2022-28893 https://access.redhat.com/security/cve/CVE-2022-29581 CVE-2022-29581 CVE-2022-29581 https://access.redhat.com/security/cve/CVE-2022-29900 CVE-2022-29900 CVE-2022-29900 https://access.redhat.com/security/cve/CVE-2022-29901 CVE-2022-29901 CVE-2022-29901 https://access.redhat.com/security/cve/CVE-2022-36946 CVE-2022-36946 CVE-2022-36946 https://access.redhat.com/security/cve/CVE-2022-39190 CVE-2022-39190 CVE-2022-39190 https://bugzilla.redhat.com/1980646 1980646  https://bugzilla.redhat.com/2037386 2037386  https://bugzilla.redhat.com/2051444 2051444  https://bugzilla.redhat.com/2052312 2052312  https://bugzilla.redhat.com/2053632 2053632  https://bugzilla.redhat.com/2058395 2058395  https://bugzilla.redhat.com/2059928 2059928  https://bugzilla.redhat.com/2066614 2066614  https://bugzilla.redhat.com/2066706 2066706  https://bugzilla.redhat.com/2066819 2066819  https://bugzilla.redhat.com/2070205 2070205  https://bugzilla.redhat.com/2071022 2071022  https://bugzilla.redhat.com/2073064 2073064  https://bugzilla.redhat.com/2074208 2074208  https://bugzilla.redhat.com/2084125 2084125  https://bugzilla.redhat.com/2084183 2084183  https://bugzilla.redhat.com/2084479 2084479  https://bugzilla.redhat.com/2088021 2088021  https://bugzilla.redhat.com/2089815 2089815  https://bugzilla.redhat.com/2090226 2090226  https://bugzilla.redhat.com/2090237 2090237  https://bugzilla.redhat.com/2090240 2090240  https://bugzilla.redhat.com/2090241 2090241  https://bugzilla.redhat.com/2103148 2103148  https://bugzilla.redhat.com/2103153 2103153  https://bugzilla.redhat.com/2114878 2114878  https://bugzilla.redhat.com/2115065 2115065  https://bugzilla.redhat.com/2115278 2115278  https://bugzilla.redhat.com/2123695 2123695  https://bugzilla.redhat.com/2129152 2129152  https://errata.almalinux.org/9/ALSA-2022-8267.html ALSA-2022:8267 ALSA-2022:8267 �Jkernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpm �Jkernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm �Jkernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpm �Jkernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm ��۰E�\	��wBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update A
��t�mhttps://access.redhat.com/errata/RHSA-2022:8317 RHSA-2022:8317 RHSA-2022:8317 
https://access.redhat.com/security/cve/CVE-2022-32742 CVE-2022-32742 CVE-2022-32742 https://bugzilla.redhat.com/2108196 2108196  https://errata.almalinux.org/9/ALSA-2022-8317.html ALSA-2022:8317 ALSA-2022:8317 	�5csamba-test-libs-4.16.4-101.el9.x86_64.rpm �4csamba-test-4.16.4-101.el9.x86_64.rpm �3csamba-devel-4.16.4-101.el9.x86_64.rpm �1clibsmbclient-devel-4.16.4-101.el9.x86_64.rpm �3csamba-devel-4.16.4-101.el9.i686.rpm �2clibwbclient-devel-4.16.4-101.el9.x86_64.rpm �1clibsmbclient-devel-4.16.4-101.el9.i686.rpm �2clibwbclient-devel-4.16.4-101.el9.i686.rpm �csamba-pidl-4.16.4-101.el9.noarch.rpm 	�5csamba-test-libs-4.16.4-101.el9.x86_64.rpm �4csamba-test-4.16.4-101.el9.x86_64.rpm �3csamba-devel-4.16.4-101.el9.x86_64.rpm �1clibsmbclient-devel-4.16.4-101.el9.x86_64.rpm �3csamba-devel-4.16.4-101.el9.i686.rpm �2clibwbclient-devel-4.16.4-101.el9.x86_64.rpm �1clibsmbclient-devel-4.16.4-101.el9.i686.rpm �2clibwbclient-devel-4.16.4-101.el9.i686.rpm �csamba-pidl-4.16.4-101.el9.noarch.rpm ��ދr�]	��EBsecurity Moderate: libldb security, bug fix, and enhancement update A
��a�Lhttps://access.redhat.com/errata/RHSA-2022:8318 RHSA-2022:8318 RHSA-2022:8318 
https://access.redhat.com/security/cve/CVE-2022-32746 CVE-2022-32746 CVE-2022-32746 https://bugzilla.redhat.com/2108215 2108215  https://errata.almalinux.org/9/ALSA-2022-8318.html ALSA-2022:8318 ALSA-2022:8318 �$�}libldb-devel-2.5.2-1.el9.x86_64.rpm �$�}libldb-devel-2.5.2-1.el9.i686.rpm �$�}libldb-devel-2.5.2-1.el9.x86_64.rpm �$�}libldb-devel-2.5.2-1.el9.i686.rpm ��ތ�^	��Q�v�CBBBBBBBBBsecurity Moderate: python3.9 security, bug fix, and enhancement update A
��-�5https://access.redhat.com/errata/RHSA-2022:8353 RHSA-2022:8353 RHSA-2022:8353 
https://access.redhat.com/security/cve/CVE-2015-20107 CVE-2015-20107 CVE-2015-20107 https://access.redhat.com/security/cve/CVE-2021-28861 CVE-2021-28861 CVE-2021-28861 https://bugzilla.redhat.com/2075390 2075390  https://bugzilla.redhat.com/2120642 2120642  https://errata.almalinux.org/9/ALSA-2022-8353.html ALSA-2022:8353 ALSA-2022:8353 �python3-idle-3.9.14-1.el9.x86_64.rpm �python3-debug-3.9.14-1.el9.x86_64.rpm Z�python3-tkinter-3.9.14-1.el9.i686.rpm �python3-test-3.9.14-1.el9.i686.rpm �python3-idle-3.9.14-1.el9.i686.rpm �python3-test-3.9.14-1.el9.x86_64.rpm �python3-debug-3.9.14-1.el9.i686.rpm Y�python3-3.9.14-1.el9.i686.rpm �python3-idle-3.9.14-1.el9.x86_64.rpm �python3-debug-3.9.14-1.el9.x86_64.rpm Z�python3-tkinter-3.9.14-1.el9.i686.rpm �python3-test-3.9.14-1.el9.i686.rpm �python3-idle-3.9.14-1.el9.i686.rpm �python3-test-3.9.14-1.el9.x86_64.rpm �python3-debug-3.9.14-1.el9.i686.rpm Y�python3-3.9.14-1.el9.i686.rpm ��ތ[�_	��SBsecurity Moderate: libtirpc security update A
��b�{https://access.redhat.com/errata/RHSA-2022:8400 RHSA-2022:8400 RHSA-2022:8400 
https://access.redhat.com/security/cve/CVE-2021-46828 CVE-2021-46828 CVE-2021-46828 https://bugzilla.redhat.com/2109352 2109352  https://errata.almalinux.org/9/ALSA-2022-8400.html ALSA-2022:8400 ALSA-2022:8400 �)�llibtirpc-devel-1.3.3-0.el9.i686.rpm �)�llibtirpc-devel-1.3.3-0.el9.x86_64.rpm �)�llibtirpc-devel-1.3.3-0.el9.i686.rpm �)�llibtirpc-devel-1.3.3-0.el9.x86_64.rpm ��ލW�`	�&�VBBBBBBBBBBBBBBsecurity Low: mingw-gcc security and bug fix update A�>��]�.https://access.redhat.com/errata/RHSA-2022:8415 RHSA-2022:8415 RHSA-2022:8415 
https://access.redhat.com/security/cve/CVE-2021-46195 CVE-2021-46195 CVE-2021-46195 https://bugzilla.redhat.com/2046300 2046300  https://errata.almalinux.org/9/ALSA-2022-8415.html ALSA-2022:8415 ALSA-2022:8415 �u]mingw64-gcc-12.0.1-11.2.el9.x86_64.rpm �v]mingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �w]mingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm �q]mingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �o]mingw32-cpp-12.0.1-11.2.el9.x86_64.rpm �r]mingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm �t]mingw64-cpp-12.0.1-11.2.el9.x86_64.rpm �p]mingw32-gcc-12.0.1-11.2.el9.x86_64.rpm �u]mingw64-gcc-12.0.1-11.2.el9.x86_64.rpm �v]mingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �w]mingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm �q]mingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �o]mingw32-cpp-12.0.1-11.2.el9.x86_64.rpm �r]mingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm �t]mingw64-cpp-12.0.1-11.2.el9.x86_64.rpm �p]mingw32-gcc-12.0.1-11.2.el9.x86_64.rpm ����x�a	�+�gBBsecurity Low: mingw-glib2 security and bug fix update A�>���Yhttps://access.redhat.com/errata/RHSA-2022:8418 RHSA-2022:8418 RHSA-2022:8418 
https://access.redhat.com/security/cve/CVE-2021-28153 CVE-2021-28153 CVE-2021-28153 https://bugzilla.redhat.com/1938291 1938291  https://errata.almalinux.org/9/ALSA-2022-8418.html ALSA-2022:8418 ALSA-2022:8418 ��Amingw64-glib2-static-2.70.1-2.el9.noarch.rpm ��Amingw32-glib2-2.70.1-2.el9.noarch.rpm ��Amingw64-glib2-2.70.1-2.el9.noarch.rpm � �Amingw32-glib2-static-2.70.1-2.el9.noarch.rpm ��Amingw64-glib2-static-2.70.1-2.el9.noarch.rpm ��Amingw32-glib2-2.70.1-2.el9.noarch.rpm ��Amingw64-glib2-2.70.1-2.el9.noarch.rpm � �Amingw32-glib2-static-2.70.1-2.el9.noarch.rpm ���� �b	�0�lBBsecurity Important: mingw-zlib security update A��d�:https://access.redhat.com/errata/RHSA-2022:8420 RHSA-2022:8420 RHSA-2022:8420 
https://access.redhat.com/security/cve/CVE-2018-25032 CVE-2018-25032 CVE-2018-25032 https://bugzilla.redhat.com/2067945 2067945  https://errata.almalinux.org/9/ALSA-2022-8420.html ALSA-2022:8420 ALSA-2022:8420 �&�;mingw64-zlib-1.2.12-2.el9.noarch.rpm �#�;mingw32-zlib-1.2.12-2.el9.noarch.rpm �'�;mingw64-zlib-static-1.2.12-2.el9.noarch.rpm �$�;mingw32-zlib-static-1.2.12-2.el9.noarch.rpm �&�;mingw64-zlib-1.2.12-2.el9.noarch.rpm �#�;mingw32-zlib-1.2.12-2.el9.noarch.rpm �'�;mingw64-zlib-static-1.2.12-2.el9.noarch.rpm �$�;mingw32-zlib-static-1.2.12-2.el9.noarch.rpm ����@�c	��qsecurity Moderate: dotnet7.0 security, bug fix, and enhancement update A
���Ihttps://access.redhat.com/errata/RHSA-2022:8434 RHSA-2022:8434 RHSA-2022:8434 
https://access.redhat.com/security/cve/CVE-2022-41032 CVE-2022-41032 CVE-2022-41032 https://bugzilla.redhat.com/2132614 2132614  https://errata.almalinux.org/9/ALSA-2022-8434.html ALSA-2022:8434 ALSA-2022:8434 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpm ����Z�d	��T�u�lBBBBBBBBBsecurity Important: python3.9 security update A��g�Qhttps://access.redhat.com/errata/RHSA-2022:8493 RHSA-2022:8493 RHSA-2022:8493 
https://access.redhat.com/security/cve/CVE-2022-42919 CVE-2022-42919 CVE-2022-42919 https://bugzilla.redhat.com/2138705 2138705  https://errata.almalinux.org/9/ALSA-2022-8493.html ALSA-2022:8493 ALSA-2022:8493 �python3-debug-3.9.14-1.el9_1.1.i686.rpm �python3-idle-3.9.14-1.el9_1.1.x86_64.rpm �python3-test-3.9.14-1.el9_1.1.x86_64.rpm Y�python3-3.9.14-1.el9_1.1.i686.rpm Z�python3-tkinter-3.9.14-1.el9_1.1.i686.rpm �python3-idle-3.9.14-1.el9_1.1.i686.rpm �python3-test-3.9.14-1.el9_1.1.i686.rpm �python3-debug-3.9.14-1.el9_1.1.x86_64.rpm �python3-debug-3.9.14-1.el9_1.1.i686.rpm �python3-idle-3.9.14-1.el9_1.1.x86_64.rpm �python3-test-3.9.14-1.el9_1.1.x86_64.rpm Y�python3-3.9.14-1.el9_1.1.i686.rpm Z�python3-tkinter-3.9.14-1.el9_1.1.i686.rpm �python3-idle-3.9.14-1.el9_1.1.i686.rpm �python3-test-3.9.14-1.el9_1.1.i686.rpm �python3-debug-3.9.14-1.el9_1.1.x86_64.rpm ����}�e	��~Bsecurity Important: varnish security update A��8�Vhttps://access.redhat.com/errata/RHSA-2022:8643 RHSA-2022:8643 RHSA-2022:8643 
https://access.redhat.com/security/cve/CVE-2022-45060 CVE-2022-45060 CVE-2022-45060 https://bugzilla.redhat.com/2141844 2141844  https://errata.almalinux.org/9/ALSA-2022-8643.html ALSA-2022:8643 ALSA-2022:8643 �v�varnish-devel-6.6.2-2.el9_1.1.i686.rpm �v�varnish-devel-6.6.2-2.el9_1.1.x86_64.rpm �v�varnish-devel-6.6.2-2.el9_1.1.i686.rpm �v�varnish-devel-6.6.2-2.el9_1.1.x86_64.rpm �����f	��Asecurity Moderate: .NET 6.0 security, bug fix, and enhancement update 
���`https://access.redhat.com/errata/RHSA-2023:0077 RHSA-2023:0077 RHSA-2023:0077 
https://access.redhat.com/security/cve/CVE-2023-21538 CVE-2023-21538 CVE-2023-21538 https://bugzilla.redhat.com/2158342 2158342  https://errata.almalinux.org/9/ALSA-2023-0077.html ALSA-2023:0077 ALSA-2023:0077 e� dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm e� dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm �����g	��CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update 
��n�Hhttps://access.redhat.com/errata/RHSA-2023:0194 RHSA-2023:0194 RHSA-2023:0194 
https://access.redhat.com/security/cve/CVE-2023-21835 CVE-2023-21835 CVE-2023-21835 https://access.redhat.com/security/cve/CVE-2023-21843 CVE-2023-21843 CVE-2023-21843 https://bugzilla.redhat.com/2160421 2160421  https://bugzilla.redhat.com/2160475 2160475  https://errata.almalinux.org/9/ALSA-2023-0194.html ALSA-2023:0194 ALSA-2023:0194 l3java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm m3java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm r3java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm q3java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm k3java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm j3java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm v3java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm u3java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm w3java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm t3java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm s3java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm p3java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm o3java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm n3java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm l3java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm m3java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm r3java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm q3java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm k3java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm j3java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm v3java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm u3java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm w3java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm t3java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm s3java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm p3java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm o3java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm n3java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm �����h	��_BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update 
��6�lhttps://access.redhat.com/errata/RHSA-2023:0202 RHSA-2023:0202 RHSA-2023:0202 
https://access.redhat.com/security/cve/CVE-2023-21835 CVE-2023-21835 CVE-2023-21835 https://access.redhat.com/security/cve/CVE-2023-21843 CVE-2023-21843 CVE-2023-21843 https://bugzilla.redhat.com/2160421 2160421  https://bugzilla.redhat.com/2160475 2160475  https://errata.almalinux.org/9/ALSA-2023-0202.html ALSA-2023:0202 ALSA-2023:0202 �J"java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �R"java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �H"java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �K"java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �I"java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �Q"java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �F"java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �P"java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �G"java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �O"java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �N"java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �L"java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �S"java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �M"java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �J"java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �R"java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �H"java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �K"java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �I"java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �Q"java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �F"java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �P"java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �G"java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �O"java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �N"java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �L"java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �S"java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �M"java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �����i	��{BBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security and bug fix update 
��"�xhttps://access.redhat.com/errata/RHSA-2023:0210 RHSA-2023:0210 RHSA-2023:0210 
https://access.redhat.com/security/cve/CVE-2023-21830 CVE-2023-21830 CVE-2023-21830 https://access.redhat.com/security/cve/CVE-2023-21843 CVE-2023-21843 CVE-2023-21843 https://bugzilla.redhat.com/2160475 2160475  https://bugzilla.redhat.com/2160490 2160490  https://errata.almalinux.org/9/ALSA-2023-0210.html ALSA-2023:0210 ALSA-2023:0210 
�+Jjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �&Jjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �'Jjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �-Jjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �%Jjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �$Jjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �(Jjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �*Jjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �)Jjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �,Jjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm 
�+Jjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �&Jjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �'Jjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �-Jjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �%Jjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �$Jjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �(Jjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �*Jjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �)Jjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �,Jjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �����j	��Osecurity Moderate: libtiff security update 
���{https://access.redhat.com/errata/RHSA-2023:0302 RHSA-2023:0302 RHSA-2023:0302 
https://access.redhat.com/security/cve/CVE-2022-2056 CVE-2022-2056 CVE-2022-2056 https://access.redhat.com/security/cve/CVE-2022-2057 CVE-2022-2057 CVE-2022-2057 https://access.redhat.com/security/cve/CVE-2022-2058 CVE-2022-2058 CVE-2022-2058 https://access.redhat.com/security/cve/CVE-2022-2519 CVE-2022-2519 CVE-2022-2519 https://access.redhat.com/security/cve/CVE-2022-2520 CVE-2022-2520 CVE-2022-2520 https://access.redhat.com/security/cve/CVE-2022-2521 CVE-2022-2521 CVE-2022-2521 https://access.redhat.com/security/cve/CVE-2022-2953 CVE-2022-2953 CVE-2022-2953 https://bugzilla.redhat.com/2103222 2103222  https://bugzilla.redhat.com/2122789 2122789  https://bugzilla.redhat.com/2122792 2122792  https://bugzilla.redhat.com/2122799 2122799  https://bugzilla.redhat.com/2134432 2134432  https://errata.almalinux.org/9/ALSA-2023-0302.html ALSA-2023:0302 ALSA-2023:0302 �{�xlibtiff-tools-4.4.0-5.el9_1.x86_64.rpm �{�xlibtiff-tools-4.4.0-5.el9_1.x86_64.rpm ����K�k	��QBBsecurity Moderate: libreoffice security update 
���z
https://access.redhat.com/errata/RHSA-2023:0304 RHSA-2023:0304 RHSA-2023:0304 
https://access.redhat.com/security/cve/CVE-2022-26305 CVE-2022-26305 CVE-2022-26305 https://access.redhat.com/security/cve/CVE-2022-26306 CVE-2022-26306 CVE-2022-26306 https://access.redhat.com/security/cve/CVE-2022-26307 CVE-2022-26307 CVE-2022-26307 https://access.redhat.com/security/cve/CVE-2022-3140 CVE-2022-3140 CVE-2022-3140 https://bugzilla.redhat.com/2118610 2118610  https://bugzilla.redhat.com/2118611 2118611  https://bugzilla.redhat.com/2118613 2118613  https://bugzilla.redhat.com/2134697 2134697  https://errata.almalinux.org/9/ALSA-2023-0304.html ALSA-2023:0304 ALSA-2023:0304 �2�Clibreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpm �3�Clibreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpm �2�Clibreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpm �3�Clibreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpm ����Y�l	��UBBsecurity Important: kernel security and bug fix update ���;https://access.redhat.com/errata/RHSA-2023:0334 RHSA-2023:0334 RHSA-2023:0334 
https://access.redhat.com/security/cve/CVE-2022-2959 CVE-2022-2959 CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 CVE-2022-2964 CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://access.redhat.com/security/cve/CVE-2022-3077 CVE-2022-3077 CVE-2022-3077 https://access.redhat.com/security/cve/CVE-2022-4139 CVE-2022-4139 CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945 CVE-2022-43945 CVE-2022-43945 https://bugzilla.redhat.com/2067482 2067482  https://bugzilla.redhat.com/2085300 2085300  https://bugzilla.redhat.com/2103681 2103681  https://bugzilla.redhat.com/2123309 2123309  https://bugzilla.redhat.com/2141752 2141752  https://bugzilla.redhat.com/2147572 2147572  https://errata.almalinux.org/9/ALSA-2023-0334.html ALSA-2023:0334 ALSA-2023:0334 �Fkernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm �Fkernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm �Fkernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm �Fkernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm ����M�m	�	�Ysecurity Moderate: bash security update 
��J�}https://access.redhat.com/errata/RHSA-2023:0340 RHSA-2023:0340 RHSA-2023:0340 
https://access.redhat.com/security/cve/CVE-2022-3715 CVE-2022-3715 CVE-2022-3715 https://bugzilla.redhat.com/2126720 2126720  https://errata.almalinux.org/9/ALSA-2023-0340.html ALSA-2023:0340 ALSA-2023:0340 �*�{bash-devel-5.1.8-6.el9_1.x86_64.rpm �*�{bash-devel-5.1.8-6.el9_1.x86_64.rpm �����n	�
�[Bsecurity Important: libksba security update ��G�Jhttps://access.redhat.com/errata/RHSA-2023:0626 RHSA-2023:0626 RHSA-2023:0626 
https://access.redhat.com/security/cve/CVE-2022-47629 CVE-2022-47629 CVE-2022-47629 https://bugzilla.redhat.com/2161571 2161571  https://errata.almalinux.org/9/ALSA-2023-0626.html ALSA-2023:0626 ALSA-2023:0626 ��olibksba-devel-1.5.1-6.el9_1.i686.rpm ��olibksba-devel-1.5.1-6.el9_1.x86_64.rpm ��olibksba-devel-1.5.1-6.el9_1.i686.rpm ��olibksba-devel-1.5.1-6.el9_1.x86_64.rpm ����x�o	��^BBsecurity Important: kernel security and bug fix update ���~https://access.redhat.com/errata/RHSA-2023:0951 RHSA-2023:0951 RHSA-2023:0951 
https://access.redhat.com/security/cve/CVE-2022-2873 CVE-2022-2873 CVE-2022-2873 https://access.redhat.com/security/cve/CVE-2022-3564 CVE-2022-3564 CVE-2022-3564 https://access.redhat.com/security/cve/CVE-2022-4378 CVE-2022-4378 CVE-2022-4378 https://access.redhat.com/security/cve/CVE-2022-4379 CVE-2022-4379 CVE-2022-4379 https://access.redhat.com/security/cve/CVE-2023-0179 CVE-2023-0179 CVE-2023-0179 https://bugzilla.redhat.com/2119048 2119048  https://bugzilla.redhat.com/2150999 2150999  https://bugzilla.redhat.com/2152548 2152548  https://bugzilla.redhat.com/2152807 2152807  https://bugzilla.redhat.com/2161713 2161713  https://errata.almalinux.org/9/ALSA-2023-0951.html ALSA-2023:0951 ALSA-2023:0951 �Gkernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpm �Gkernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpm �Gkernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpm �Gkernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpm �����p	� �_�m�XBBBBBBBBBsecurity Moderate: python3.9 security update 
���9https://access.redhat.com/errata/RHSA-2023:0953 RHSA-2023:0953 RHSA-2023:0953 
https://access.redhat.com/security/cve/CVE-2022-45061 CVE-2022-45061 CVE-2022-45061 https://bugzilla.redhat.com/2144072 2144072  https://errata.almalinux.org/9/ALSA-2023-0953.html ALSA-2023:0953 ALSA-2023:0953 �python3-idle-3.9.14-1.el9_1.2.i686.rpm �python3-idle-3.9.14-1.el9_1.2.x86_64.rpm Z�python3-tkinter-3.9.14-1.el9_1.2.i686.rpm �python3-debug-3.9.14-1.el9_1.2.x86_64.rpm �python3-test-3.9.14-1.el9_1.2.x86_64.rpm Y�python3-3.9.14-1.el9_1.2.i686.rpm �python3-debug-3.9.14-1.el9_1.2.i686.rpm �python3-test-3.9.14-1.el9_1.2.i686.rpm �python3-idle-3.9.14-1.el9_1.2.i686.rpm �python3-idle-3.9.14-1.el9_1.2.x86_64.rpm Z�python3-tkinter-3.9.14-1.el9_1.2.i686.rpm �python3-debug-3.9.14-1.el9_1.2.x86_64.rpm �python3-test-3.9.14-1.el9_1.2.x86_64.rpm Y�python3-3.9.14-1.el9_1.2.i686.rpm �python3-debug-3.9.14-1.el9_1.2.i686.rpm �python3-test-3.9.14-1.el9_1.2.i686.rpm ����E�q	�"�a�MBBsecurity Moderate: lua security update 
��H�8https://access.redhat.com/errata/RHSA-2023:0957 RHSA-2023:0957 RHSA-2023:0957 
https://access.redhat.com/security/cve/CVE-2021-43519 CVE-2021-43519 CVE-2021-43519 https://access.redhat.com/security/cve/CVE-2021-44964 CVE-2021-44964 CVE-2021-44964 https://bugzilla.redhat.com/2047672 2047672  https://bugzilla.redhat.com/2064772 2064772  https://errata.almalinux.org/9/ALSA-2023-0957.html ALSA-2023:0957 ALSA-2023:0957 ��lua-devel-5.4.4-2.el9_1.i686.rpm ��lua-devel-5.4.4-2.el9_1.x86_64.rpm �O�lua-5.4.4-2.el9_1.i686.rpm ��lua-devel-5.4.4-2.el9_1.i686.rpm ��lua-devel-5.4.4-2.el9_1.x86_64.rpm �O�lua-5.4.4-2.el9_1.i686.rpm ����Z�r	�#�qBBBBsecurity Moderate: libjpeg-turbo security update 
�� �.https://access.redhat.com/errata/RHSA-2023:1068 RHSA-2023:1068 RHSA-2023:1068 
https://access.redhat.com/security/cve/CVE-2021-46822 CVE-2021-46822 CVE-2021-46822 https://bugzilla.redhat.com/2100044 2100044  https://errata.almalinux.org/9/ALSA-2023-1068.html ALSA-2023:1068 ALSA-2023:1068 �&�#turbojpeg-2.0.90-6.el9_1.x86_64.rpm �'�#turbojpeg-devel-2.0.90-6.el9_1.x86_64.rpm �'�#turbojpeg-devel-2.0.90-6.el9_1.i686.rpm �&�#turbojpeg-2.0.90-6.el9_1.i686.rpm �&�#turbojpeg-2.0.90-6.el9_1.x86_64.rpm �'�#turbojpeg-devel-2.0.90-6.el9_1.x86_64.rpm �'�#turbojpeg-devel-2.0.90-6.el9_1.i686.rpm �&�#turbojpeg-2.0.90-6.el9_1.i686.rpm �����s	�$�wBBsecurity Important: kernel security, bug fix, and enhancement update ��.�Yhttps://access.redhat.com/errata/RHSA-2023:1470 RHSA-2023:1470 RHSA-2023:1470 
https://access.redhat.com/security/cve/CVE-2022-4269 CVE-2022-4269 CVE-2022-4269 https://access.redhat.com/security/cve/CVE-2022-4744 CVE-2022-4744 CVE-2022-4744 https://access.redhat.com/security/cve/CVE-2023-0266 CVE-2023-0266 CVE-2023-0266 https://bugzilla.redhat.com/2150272 2150272  https://bugzilla.redhat.com/2156322 2156322  https://bugzilla.redhat.com/2163379 2163379  https://errata.almalinux.org/9/ALSA-2023-1470.html ALSA-2023:1470 ALSA-2023:1470 �Hkernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpm �Hkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm �Hkernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpm �Hkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm ����8�t	�%�{BBBBBBBBBBsecurity Moderate: postgresql security update 
���jhttps://access.redhat.com/errata/RHSA-2023:1693 RHSA-2023:1693 RHSA-2023:1693 
https://access.redhat.com/security/cve/CVE-2022-2625 CVE-2022-2625 CVE-2022-2625 https://access.redhat.com/security/cve/CVE-2022-41862 CVE-2022-41862 CVE-2022-41862 https://bugzilla.redhat.com/2113825 2113825  https://bugzilla.redhat.com/2165722 2165722  https://errata.almalinux.org/9/ALSA-2023-1693.html ALSA-2023:1693 ALSA-2023:1693 �~�7postgresql-server-devel-13.10-1.el9_1.x86_64.rpm �}�7postgresql-private-devel-13.10-1.el9_1.x86_64.rpm ��7postgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm ��7postgresql-static-13.10-1.el9_1.x86_64.rpm � �7postgresql-test-13.10-1.el9_1.x86_64.rpm �|�7postgresql-docs-13.10-1.el9_1.x86_64.rpm �~�7postgresql-server-devel-13.10-1.el9_1.x86_64.rpm �}�7postgresql-private-devel-13.10-1.el9_1.x86_64.rpm ��7postgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm ��7postgresql-static-13.10-1.el9_1.x86_64.rpm � �7postgresql-test-13.10-1.el9_1.x86_64.rpm �|�7postgresql-docs-13.10-1.el9_1.x86_64.rpm �����u	�&�GBBsecurity Important: kernel security and bug fix update ��q�4https://access.redhat.com/errata/RHSA-2023:1703 RHSA-2023:1703 RHSA-2023:1703 
https://access.redhat.com/security/cve/CVE-2023-0386 CVE-2023-0386 CVE-2023-0386 https://bugzilla.redhat.com/2159505 2159505  https://errata.almalinux.org/9/ALSA-2023-1703.html ALSA-2023:1703 ALSA-2023:1703 �Ikernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpm �Ikernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpm �Ikernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpm �Ikernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpm �����v	�'�KBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security and bug fix update ��%�https://access.redhat.com/errata/RHSA-2023:1879 RHSA-2023:1879 RHSA-2023:1879 
https://access.redhat.com/security/cve/CVE-2023-21930 CVE-2023-21930 CVE-2023-21930 https://access.redhat.com/security/cve/CVE-2023-21937 CVE-2023-21937 CVE-2023-21937 https://access.redhat.com/security/cve/CVE-2023-21938 CVE-2023-21938 CVE-2023-21938 https://access.redhat.com/security/cve/CVE-2023-21939 CVE-2023-21939 CVE-2023-21939 https://access.redhat.com/security/cve/CVE-2023-21954 CVE-2023-21954 CVE-2023-21954 https://access.redhat.com/security/cve/CVE-2023-21967 CVE-2023-21967 CVE-2023-21967 https://access.redhat.com/security/cve/CVE-2023-21968 CVE-2023-21968 CVE-2023-21968 https://bugzilla.redhat.com/2187435 2187435  https://bugzilla.redhat.com/2187441 2187441  https://bugzilla.redhat.com/2187704 2187704  https://bugzilla.redhat.com/2187724 2187724  https://bugzilla.redhat.com/2187758 2187758  https://bugzilla.redhat.com/2187790 2187790  https://bugzilla.redhat.com/2187802 2187802  https://errata.almalinux.org/9/ALSA-2023-1879.html ALSA-2023:1879 ALSA-2023:1879 v4java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm m4java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm p4java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm r4java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm k4java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm s4java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm t4java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm n4java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm u4java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm o4java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm w4java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm q4java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm j4java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm l4java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm v4java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm m4java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm p4java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm r4java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm k4java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm s4java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm t4java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm n4java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm u4java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm o4java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm w4java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm q4java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm j4java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm l4java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm �����w	�(�gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security update ��A�2https://access.redhat.com/errata/RHSA-2023:1880 RHSA-2023:1880 RHSA-2023:1880 
https://access.redhat.com/security/cve/CVE-2023-21930 CVE-2023-21930 CVE-2023-21930 https://access.redhat.com/security/cve/CVE-2023-21937 CVE-2023-21937 CVE-2023-21937 https://access.redhat.com/security/cve/CVE-2023-21938 CVE-2023-21938 CVE-2023-21938 https://access.redhat.com/security/cve/CVE-2023-21939 CVE-2023-21939 CVE-2023-21939 https://access.redhat.com/security/cve/CVE-2023-21954 CVE-2023-21954 CVE-2023-21954 https://access.redhat.com/security/cve/CVE-2023-21967 CVE-2023-21967 CVE-2023-21967 https://access.redhat.com/security/cve/CVE-2023-21968 CVE-2023-21968 CVE-2023-21968 https://bugzilla.redhat.com/2187435 2187435  https://bugzilla.redhat.com/2187441 2187441  https://bugzilla.redhat.com/2187704 2187704  https://bugzilla.redhat.com/2187724 2187724  https://bugzilla.redhat.com/2187758 2187758  https://bugzilla.redhat.com/2187790 2187790  https://bugzilla.redhat.com/2187802 2187802  https://errata.almalinux.org/9/ALSA-2023-1880.html ALSA-2023:1880 ALSA-2023:1880 �G#java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �J#java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �N#java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �L#java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �K#java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �P#java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �O#java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �M#java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �F#java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �S#java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �Q#java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �R#java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �I#java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �H#java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �G#java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �J#java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �N#java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �L#java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �K#java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �P#java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �O#java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �M#java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �F#java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �S#java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �Q#java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �R#java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �I#java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �H#java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm ����w�x	�)�CBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security and bug fix update ��s�Thttps://access.redhat.com/errata/RHSA-2023:1909 RHSA-2023:1909 RHSA-2023:1909 
https://access.redhat.com/security/cve/CVE-2023-21930 CVE-2023-21930 CVE-2023-21930 https://access.redhat.com/security/cve/CVE-2023-21937 CVE-2023-21937 CVE-2023-21937 https://access.redhat.com/security/cve/CVE-2023-21938 CVE-2023-21938 CVE-2023-21938 https://access.redhat.com/security/cve/CVE-2023-21939 CVE-2023-21939 CVE-2023-21939 https://access.redhat.com/security/cve/CVE-2023-21954 CVE-2023-21954 CVE-2023-21954 https://access.redhat.com/security/cve/CVE-2023-21967 CVE-2023-21967 CVE-2023-21967 https://access.redhat.com/security/cve/CVE-2023-21968 CVE-2023-21968 CVE-2023-21968 https://bugzilla.redhat.com/2187435 2187435  https://bugzilla.redhat.com/2187441 2187441  https://bugzilla.redhat.com/2187704 2187704  https://bugzilla.redhat.com/2187724 2187724  https://bugzilla.redhat.com/2187758 2187758  https://bugzilla.redhat.com/2187790 2187790  https://bugzilla.redhat.com/2187802 2187802  https://errata.almalinux.org/9/ALSA-2023-1909.html ALSA-2023:1909 ALSA-2023:1909 
�)Kjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �+Kjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �,Kjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �$Kjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �*Kjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �(Kjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �%Kjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �-Kjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �&Kjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �'Kjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm 
�)Kjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �+Kjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �,Kjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �$Kjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �*Kjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �(Kjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �%Kjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �-Kjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �&Kjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �'Kjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm ��ƷI�y	�*�WBBBBBBBBBBBBsecurity Important: samba security update ��G�https://access.redhat.com/errata/RHSA-2023:2127 RHSA-2023:2127 RHSA-2023:2127 
https://access.redhat.com/security/cve/CVE-2022-38023 CVE-2022-38023 CVE-2022-38023 https://bugzilla.redhat.com/2154362 2154362  https://errata.almalinux.org/9/ALSA-2023-2127.html ALSA-2023:2127 ALSA-2023:2127 	�1dlibsmbclient-devel-4.16.4-103.el9_1.i686.rpm �4dsamba-test-4.16.4-103.el9_1.x86_64.rpm �1dlibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpm �3dsamba-devel-4.16.4-103.el9_1.i686.rpm �2dlibwbclient-devel-4.16.4-103.el9_1.x86_64.rpm �5dsamba-test-libs-4.16.4-103.el9_1.x86_64.rpm �3dsamba-devel-4.16.4-103.el9_1.x86_64.rpm �2dlibwbclient-devel-4.16.4-103.el9_1.i686.rpm �dsamba-pidl-4.16.4-103.el9_1.noarch.rpm 	�1dlibsmbclient-devel-4.16.4-103.el9_1.i686.rpm �4dsamba-test-4.16.4-103.el9_1.x86_64.rpm �1dlibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpm �3dsamba-devel-4.16.4-103.el9_1.i686.rpm �2dlibwbclient-devel-4.16.4-103.el9_1.x86_64.rpm �5dsamba-test-libs-4.16.4-103.el9_1.x86_64.rpm �3dsamba-devel-4.16.4-103.el9_1.x86_64.rpm �2dlibwbclient-devel-4.16.4-103.el9_1.i686.rpm �dsamba-pidl-4.16.4-103.el9_1.noarch.rpm ��ӿ(�z	�+�eBBsecurity Important: edk2 security, bug fix, and enhancement update ��[�https://access.redhat.com/errata/RHSA-2023:2165 RHSA-2023:2165 RHSA-2023:2165 
https://access.redhat.com/security/cve/CVE-2021-38578 CVE-2021-38578 CVE-2021-38578 https://access.redhat.com/security/cve/CVE-2022-4304 CVE-2022-4304 CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 CVE-2022-4450 CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 CVE-2023-0215 CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0286 CVE-2023-0286 CVE-2023-0286 https://bugzilla.redhat.com/1960321 1960321  https://bugzilla.redhat.com/2164440 2164440  https://bugzilla.redhat.com/2164487 2164487  https://bugzilla.redhat.com/2164492 2164492  https://bugzilla.redhat.com/2164494 2164494  https://errata.almalinux.org/9/ALSA-2023-2165.html ALSA-2023:2165 ALSA-2023:2165 �@�1edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm �w�1edk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm �A�1edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm �@�1edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm �w�1edk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm �A�1edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm �����{	�,�iBBBBBBBBBBsecurity Moderate: freeradius security and bug fix update 
��j�fhttps://access.redhat.com/errata/RHSA-2023:2166 RHSA-2023:2166 RHSA-2023:2166 
https://access.redhat.com/security/cve/CVE-2022-41859 CVE-2022-41859 CVE-2022-41859 https://access.redhat.com/security/cve/CVE-2022-41860 CVE-2022-41860 CVE-2022-41860 https://access.redhat.com/security/cve/CVE-2022-41861 CVE-2022-41861 CVE-2022-41861 https://bugzilla.redhat.com/2078483 2078483  https://bugzilla.redhat.com/2078485 2078485  https://bugzilla.redhat.com/2078487 2078487  https://errata.almalinux.org/9/ALSA-2023-2166.html ALSA-2023:2166 ALSA-2023:2166 �E�<freeradius-sqlite-3.0.21-37.el9.x86_64.rpm �B�<freeradius-perl-3.0.21-37.el9.x86_64.rpm �D�<freeradius-rest-3.0.21-37.el9.x86_64.rpm �F�<freeradius-unixODBC-3.0.21-37.el9.x86_64.rpm �C�<freeradius-postgresql-3.0.21-37.el9.x86_64.rpm �A�<freeradius-mysql-3.0.21-37.el9.x86_64.rpm �E�<freeradius-sqlite-3.0.21-37.el9.x86_64.rpm �B�<freeradius-perl-3.0.21-37.el9.x86_64.rpm �D�<freeradius-rest-3.0.21-37.el9.x86_64.rpm �F�<freeradius-unixODBC-3.0.21-37.el9.x86_64.rpm �C�<freeradius-postgresql-3.0.21-37.el9.x86_64.rpm �A�<freeradius-mysql-3.0.21-37.el9.x86_64.rpm ����:�|	�-�uBBsecurity Moderate: xorg-x11-server security and bug fix update 
��P�Ohttps://access.redhat.com/errata/RHSA-2023:2248 RHSA-2023:2248 RHSA-2023:2248 
https://access.redhat.com/security/cve/CVE-2022-3550 CVE-2022-3550 CVE-2022-3550 https://access.redhat.com/security/cve/CVE-2022-3551 CVE-2022-3551 CVE-2022-3551 https://access.redhat.com/security/cve/CVE-2022-4283 CVE-2022-4283 CVE-2022-4283 https://access.redhat.com/security/cve/CVE-2022-46340 CVE-2022-46340 CVE-2022-46340 https://access.redhat.com/security/cve/CVE-2022-46341 CVE-2022-46341 CVE-2022-46341 https://access.redhat.com/security/cve/CVE-2022-46342 CVE-2022-46342 CVE-2022-46342 https://access.redhat.com/security/cve/CVE-2022-46343 CVE-2022-46343 CVE-2022-46343 https://access.redhat.com/security/cve/CVE-2022-46344 CVE-2022-46344 CVE-2022-46344 https://access.redhat.com/security/cve/CVE-2023-0494 CVE-2023-0494 CVE-2023-0494 https://bugzilla.redhat.com/2140698 2140698  https://bugzilla.redhat.com/2140701 2140701  https://bugzilla.redhat.com/2151755 2151755  https://bugzilla.redhat.com/2151756 2151756  https://bugzilla.redhat.com/2151757 2151757  https://bugzilla.redhat.com/2151758 2151758  https://bugzilla.redhat.com/2151760 2151760  https://bugzilla.redhat.com/2151761 2151761  https://bugzilla.redhat.com/2165995 2165995  https://errata.almalinux.org/9/ALSA-2023-2248.html ALSA-2023:2248 ALSA-2023:2248 �V�*xorg-x11-server-source-1.20.11-17.el9.noarch.rpm i�*xorg-x11-server-devel-1.20.11-17.el9.x86_64.rpm i�*xorg-x11-server-devel-1.20.11-17.el9.i686.rpm �V�*xorg-x11-server-source-1.20.11-17.el9.noarch.rpm i�*xorg-x11-server-devel-1.20.11-17.el9.x86_64.rpm i�*xorg-x11-server-devel-1.20.11-17.el9.i686.rpm ����>�}	�.�yBBBBBBBBBBsecurity Moderate: poppler security and bug fix update 
���https://access.redhat.com/errata/RHSA-2023:2259 RHSA-2023:2259 RHSA-2023:2259 
https://access.redhat.com/security/cve/CVE-2022-38784 CVE-2022-38784 CVE-2022-38784 https://bugzilla.redhat.com/2124527 2124527  https://errata.almalinux.org/9/ALSA-2023-2259.html ALSA-2023:2259 ALSA-2023:2259 ��"poppler-qt5-devel-21.01.0-14.el9.i686.rpm ��"poppler-qt5-devel-21.01.0-14.el9.x86_64.rpm ��"poppler-devel-21.01.0-14.el9.x86_64.rpm ��"poppler-cpp-devel-21.01.0-14.el9.i686.rpm ��"poppler-cpp-devel-21.01.0-14.el9.x86_64.rpm ��"poppler-devel-21.01.0-14.el9.i686.rpm ��"poppler-glib-devel-21.01.0-14.el9.i686.rpm ��"poppler-glib-devel-21.01.0-14.el9.x86_64.rpm ��"poppler-qt5-devel-21.01.0-14.el9.i686.rpm ��"poppler-qt5-devel-21.01.0-14.el9.x86_64.rpm ��"poppler-devel-21.01.0-14.el9.x86_64.rpm ��"poppler-cpp-devel-21.01.0-14.el9.i686.rpm ��"poppler-cpp-devel-21.01.0-14.el9.x86_64.rpm ��"poppler-devel-21.01.0-14.el9.i686.rpm ��"poppler-glib-devel-21.01.0-14.el9.i686.rpm ��"poppler-glib-devel-21.01.0-14.el9.x86_64.rpm ����S�~	�0�o�WBBBsecurity Moderate: bind security and bug fix update 
��8�J
https://access.redhat.com/errata/RHSA-2023:2261 RHSA-2023:2261 RHSA-2023:2261 
https://access.redhat.com/security/cve/CVE-2022-2795 CVE-2022-2795 CVE-2022-2795 https://access.redhat.com/security/cve/CVE-2022-3094 CVE-2022-3094 CVE-2022-3094 https://access.redhat.com/security/cve/CVE-2022-3736 CVE-2022-3736 CVE-2022-3736 https://access.redhat.com/security/cve/CVE-2022-3924 CVE-2022-3924 CVE-2022-3924 https://bugzilla.redhat.com/2128584 2128584  https://bugzilla.redhat.com/2164032 2164032  https://bugzilla.redhat.com/2164038 2164038  https://bugzilla.redhat.com/2164039 2164039  https://errata.almalinux.org/9/ALSA-2023-2261.html ALSA-2023:2261 ALSA-2023:2261 �X�)bind-libs-9.16.23-11.el9.i686.rpm [�)bind-devel-9.16.23-11.el9.x86_64.rpm �?�)bind-doc-9.16.23-11.el9.noarch.rpm [�)bind-devel-9.16.23-11.el9.i686.rpm �X�)bind-libs-9.16.23-11.el9.i686.rpm [�)bind-devel-9.16.23-11.el9.x86_64.rpm �?�)bind-doc-9.16.23-11.el9.noarch.rpm [�)bind-devel-9.16.23-11.el9.i686.rpm ����[�	�1�JBBBBsecurity Moderate: freerdp security update 
���fhttps://access.redhat.com/errata/RHSA-2023:2326 RHSA-2023:2326 RHSA-2023:2326 
https://access.redhat.com/security/cve/CVE-2022-39282 CVE-2022-39282 CVE-2022-39282 https://access.redhat.com/security/cve/CVE-2022-39283 CVE-2022-39283 CVE-2022-39283 https://access.redhat.com/security/cve/CVE-2022-39316 CVE-2022-39316 CVE-2022-39316 https://access.redhat.com/security/cve/CVE-2022-39317 CVE-2022-39317 CVE-2022-39317 https://access.redhat.com/security/cve/CVE-2022-39318 CVE-2022-39318 CVE-2022-39318 https://access.redhat.com/security/cve/CVE-2022-39319 CVE-2022-39319 CVE-2022-39319 https://access.redhat.com/security/cve/CVE-2022-39320 CVE-2022-39320 CVE-2022-39320 https://access.redhat.com/security/cve/CVE-2022-39347 CVE-2022-39347 CVE-2022-39347 https://access.redhat.com/security/cve/CVE-2022-41877 CVE-2022-41877 CVE-2022-41877 https://bugzilla.redhat.com/2134713 2134713  https://bugzilla.redhat.com/2134717 2134717  https://bugzilla.redhat.com/2143642 2143642  https://bugzilla.redhat.com/2143643 2143643  https://bugzilla.redhat.com/2143644 2143644  https://bugzilla.redhat.com/2143645 2143645  https://bugzilla.redhat.com/2143646 2143646  https://bugzilla.redhat.com/2143647 2143647  https://bugzilla.redhat.com/2143648 2143648  https://errata.almalinux.org/9/ALSA-2023-2326.html ALSA-2023:2326 ALSA-2023:2326 ��(freerdp-devel-2.4.1-5.el9.x86_64.rpm ��(libwinpr-devel-2.4.1-5.el9.x86_64.rpm ��(libwinpr-devel-2.4.1-5.el9.i686.rpm ��(freerdp-devel-2.4.1-5.el9.i686.rpm ��(freerdp-devel-2.4.1-5.el9.x86_64.rpm ��(libwinpr-devel-2.4.1-5.el9.x86_64.rpm ��(libwinpr-devel-2.4.1-5.el9.i686.rpm ��(freerdp-devel-2.4.1-5.el9.i686.rpm ����%� 	�2�Psecurity Moderate: libtiff security update 
��h�>https://access.redhat.com/errata/RHSA-2023:2340 RHSA-2023:2340 RHSA-2023:2340 
https://access.redhat.com/security/cve/CVE-2022-3570 CVE-2022-3570 CVE-2022-3570 https://access.redhat.com/security/cve/CVE-2022-3597 CVE-2022-3597 CVE-2022-3597 https://access.redhat.com/security/cve/CVE-2022-3598 CVE-2022-3598 CVE-2022-3598 https://access.redhat.com/security/cve/CVE-2022-3599 CVE-2022-3599 CVE-2022-3599 https://access.redhat.com/security/cve/CVE-2022-3626 CVE-2022-3626 CVE-2022-3626 https://access.redhat.com/security/cve/CVE-2022-3627 CVE-2022-3627 CVE-2022-3627 https://access.redhat.com/security/cve/CVE-2022-3970 CVE-2022-3970 CVE-2022-3970 https://access.redhat.com/security/cve/CVE-2022-4645 CVE-2022-4645 CVE-2022-4645 https://access.redhat.com/security/cve/CVE-2023-30774 CVE-2023-30774 CVE-2023-30774 https://access.redhat.com/security/cve/CVE-2023-30775 CVE-2023-30775 CVE-2023-30775 https://bugzilla.redhat.com/2142734 2142734  https://bugzilla.redhat.com/2142736 2142736  https://bugzilla.redhat.com/2142738 2142738  https://bugzilla.redhat.com/2142740 2142740  https://bugzilla.redhat.com/2142741 2142741  https://bugzilla.redhat.com/2142742 2142742  https://bugzilla.redhat.com/2148918 2148918  https://bugzilla.redhat.com/2176220 2176220  https://bugzilla.redhat.com/2187139 2187139  https://bugzilla.redhat.com/2187141 2187141  https://errata.almalinux.org/9/ALSA-2023-2340.html ALSA-2023:2340 ALSA-2023:2340 �{�ylibtiff-tools-4.4.0-7.el9.x86_64.rpm �{�ylibtiff-tools-4.4.0-7.el9.x86_64.rpm ����4�	�3�RBsecurity Moderate: unbound security update 
��&�9https://access.redhat.com/errata/RHSA-2023:2370 RHSA-2023:2370 RHSA-2023:2370 
https://access.redhat.com/security/cve/CVE-2022-3204 CVE-2022-3204 CVE-2022-3204 https://bugzilla.redhat.com/2128947 2128947  https://errata.almalinux.org/9/ALSA-2023-2370.html ALSA-2023:2370 ALSA-2023:2370 �4�aunbound-devel-1.16.2-3.el9.x86_64.rpm �4�aunbound-devel-1.16.2-3.el9.i686.rpm �4�aunbound-devel-1.16.2-3.el9.x86_64.rpm �4�aunbound-devel-1.16.2-3.el9.i686.rpm ����E�	�4�UBsecurity Moderate: wireshark security and bug fix update 
��_�4https://access.redhat.com/errata/RHSA-2023:2373 RHSA-2023:2373 RHSA-2023:2373 
https://access.redhat.com/security/cve/CVE-2022-3190 CVE-2022-3190 CVE-2022-3190 https://bugzilla.redhat.com/2152061 2152061  https://errata.almalinux.org/9/ALSA-2023-2373.html ALSA-2023:2373 ALSA-2023:2373 �(�xwireshark-devel-3.4.10-4.el9.i686.rpm �(�xwireshark-devel-3.4.10-4.el9.x86_64.rpm �(�xwireshark-devel-3.4.10-4.el9.i686.rpm �(�xwireshark-devel-3.4.10-4.el9.x86_64.rpm �����	�5�XBBsecurity Important: kernel security, bug fix, and enhancement update ���SRhttps://access.redhat.com/errata/RHSA-2023:2458 RHSA-2023:2458 RHSA-2023:2458 
https://access.redhat.com/security/cve/CVE-2021-26341 CVE-2021-26341 CVE-2021-26341 https://access.redhat.com/security/cve/CVE-2021-33655 CVE-2021-33655 CVE-2021-33655 https://access.redhat.com/security/cve/CVE-2022-1462 CVE-2022-1462 CVE-2022-1462 https://access.redhat.com/security/cve/CVE-2022-1789 CVE-2022-1789 CVE-2022-1789 https://access.redhat.com/security/cve/CVE-2022-1882 CVE-2022-1882 CVE-2022-1882 https://access.redhat.com/security/cve/CVE-2022-20141 CVE-2022-20141 CVE-2022-20141 https://access.redhat.com/security/cve/CVE-2022-21505 CVE-2022-21505 CVE-2022-21505 https://access.redhat.com/security/cve/CVE-2022-2196 CVE-2022-2196 CVE-2022-2196 https://access.redhat.com/security/cve/CVE-2022-2663 CVE-2022-2663 CVE-2022-2663 https://access.redhat.com/security/cve/CVE-2022-28388 CVE-2022-28388 CVE-2022-28388 https://access.redhat.com/security/cve/CVE-2022-3028 CVE-2022-3028 CVE-2022-3028 https://access.redhat.com/security/cve/CVE-2022-33743 CVE-2022-33743 CVE-2022-33743 https://access.redhat.com/security/cve/CVE-2022-3435 CVE-2022-3435 CVE-2022-3435 https://access.redhat.com/security/cve/CVE-2022-3522 CVE-2022-3522 CVE-2022-3522 https://access.redhat.com/security/cve/CVE-2022-3524 CVE-2022-3524 CVE-2022-3524 https://access.redhat.com/security/cve/CVE-2022-3566 CVE-2022-3566 CVE-2022-3566 https://access.redhat.com/security/cve/CVE-2022-3567 CVE-2022-3567 CVE-2022-3567 https://access.redhat.com/security/cve/CVE-2022-3619 CVE-2022-3619 CVE-2022-3619 https://access.redhat.com/security/cve/CVE-2022-3623 CVE-2022-3623 CVE-2022-3623 https://access.redhat.com/security/cve/CVE-2022-3625 CVE-2022-3625 CVE-2022-3625 https://access.redhat.com/security/cve/CVE-2022-3628 CVE-2022-3628 CVE-2022-3628 https://access.redhat.com/security/cve/CVE-2022-3640 CVE-2022-3640 CVE-2022-3640 https://access.redhat.com/security/cve/CVE-2022-3707 CVE-2022-3707 CVE-2022-3707 https://access.redhat.com/security/cve/CVE-2022-39188 CVE-2022-39188 CVE-2022-39188 https://access.redhat.com/security/cve/CVE-2022-39189 CVE-2022-39189 CVE-2022-39189 https://access.redhat.com/security/cve/CVE-2022-4128 CVE-2022-4128 CVE-2022-4128 https://access.redhat.com/security/cve/CVE-2022-4129 CVE-2022-4129 CVE-2022-4129 https://access.redhat.com/security/cve/CVE-2022-41674 CVE-2022-41674 CVE-2022-41674 https://access.redhat.com/security/cve/CVE-2022-42703 CVE-2022-42703 CVE-2022-42703 https://access.redhat.com/security/cve/CVE-2022-42720 CVE-2022-42720 CVE-2022-42720 https://access.redhat.com/security/cve/CVE-2022-42721 CVE-2022-42721 CVE-2022-42721 https://access.redhat.com/security/cve/CVE-2022-42722 CVE-2022-42722 CVE-2022-42722 https://access.redhat.com/security/cve/CVE-2022-42896 CVE-2022-42896 CVE-2022-42896 https://access.redhat.com/security/cve/CVE-2022-43750 CVE-2022-43750 CVE-2022-43750 https://access.redhat.com/security/cve/CVE-2022-47929 CVE-2022-47929 CVE-2022-47929 https://access.redhat.com/security/cve/CVE-2023-0394 CVE-2023-0394 CVE-2023-0394 https://access.redhat.com/security/cve/CVE-2023-0461 CVE-2023-0461 CVE-2023-0461 https://access.redhat.com/security/cve/CVE-2023-0590 CVE-2023-0590 CVE-2023-0590 https://access.redhat.com/security/cve/CVE-2023-1195 CVE-2023-1195 CVE-2023-1195 https://access.redhat.com/security/cve/CVE-2023-1382 CVE-2023-1382 CVE-2023-1382 https://bugzilla.redhat.com/2061703 2061703  https://bugzilla.redhat.com/2073091 2073091  https://bugzilla.redhat.com/2078466 2078466  https://bugzilla.redhat.com/2089701 2089701  https://bugzilla.redhat.com/2090723 2090723  https://bugzilla.redhat.com/2106830 2106830  https://bugzilla.redhat.com/2107924 2107924  https://bugzilla.redhat.com/2108691 2108691  https://bugzilla.redhat.com/2114937 2114937  https://bugzilla.redhat.com/2122228 2122228  https://bugzilla.redhat.com/2123056 2123056  https://bugzilla.redhat.com/2124788 2124788  https://bugzilla.redhat.com/2130141 2130141  https://bugzilla.redhat.com/2133483 2133483  https://bugzilla.redhat.com/2133490 2133490  https://bugzilla.redhat.com/2134377 2134377  https://bugzilla.redhat.com/2134380 2134380  https://bugzilla.redhat.com/2134451 2134451  https://bugzilla.redhat.com/2134506 2134506  https://bugzilla.redhat.com/2134517 2134517  https://bugzilla.redhat.com/2134528 2134528  https://bugzilla.redhat.com/2137979 2137979  https://bugzilla.redhat.com/2139610 2139610  https://bugzilla.redhat.com/2143893 2143893  https://bugzilla.redhat.com/2143943 2143943  https://bugzilla.redhat.com/2144720 2144720  https://bugzilla.redhat.com/2147364 2147364  https://bugzilla.redhat.com/2150947 2150947  https://bugzilla.redhat.com/2150960 2150960  https://bugzilla.redhat.com/2150979 2150979  https://bugzilla.redhat.com/2151270 2151270  https://bugzilla.redhat.com/2154171 2154171  https://bugzilla.redhat.com/2154235 2154235  https://bugzilla.redhat.com/2160023 2160023  https://bugzilla.redhat.com/2162120 2162120  https://bugzilla.redhat.com/2165721 2165721  https://bugzilla.redhat.com/2165741 2165741  https://bugzilla.redhat.com/2168246 2168246  https://bugzilla.redhat.com/2176192 2176192  https://bugzilla.redhat.com/2177371 2177371  https://errata.almalinux.org/9/ALSA-2023-2458.html ALSA-2023:2458 ALSA-2023:2458 �Kkernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm �Kkernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm �Kkernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm �Kkernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm ����C�	��\Bsecurity Moderate: device-mapper-multipath security and bug fix update 
��f�]https://access.redhat.com/errata/RHSA-2023:2459 RHSA-2023:2459 RHSA-2023:2459 
https://access.redhat.com/security/cve/CVE-2022-41973 CVE-2022-41973 CVE-2022-41973 https://bugzilla.redhat.com/2123894 2123894  https://errata.almalinux.org/9/ALSA-2023-2459.html ALSA-2023:2459 ALSA-2023:2459 ��[device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm ��[device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm ��[device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm ��[device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm �����	�6�_security Moderate: fwupd security and bug fix update 
��C�M
https://access.redhat.com/errata/RHSA-2023:2487 RHSA-2023:2487 RHSA-2023:2487 
https://access.redhat.com/security/cve/CVE-2022-3287 CVE-2022-3287 CVE-2022-3287 https://access.redhat.com/security/cve/CVE-2022-34301 CVE-2022-34301 CVE-2022-34301 https://access.redhat.com/security/cve/CVE-2022-34302 CVE-2022-34302 CVE-2022-34302 https://access.redhat.com/security/cve/CVE-2022-34303 CVE-2022-34303 CVE-2022-34303 https://bugzilla.redhat.com/2120687 2120687  https://bugzilla.redhat.com/2120699 2120699  https://bugzilla.redhat.com/2120701 2120701  https://bugzilla.redhat.com/2129904 2129904  https://errata.almalinux.org/9/ALSA-2023-2487.html ALSA-2023:2487 ALSA-2023:2487 �9�efwupd-devel-1.8.10-2.el9.alma.x86_64.rpm �9�efwupd-devel-1.8.10-2.el9.alma.x86_64.rpm ����}�	�7�aBBBBBBBBBBBBBBBBBBBBsecurity Low: samba security, bug fix, and enhancement update �>���https://access.redhat.com/errata/RHSA-2023:2519 RHSA-2023:2519 RHSA-2023:2519 
https://access.redhat.com/security/cve/CVE-2022-1615 CVE-2022-1615 CVE-2022-1615 https://bugzilla.redhat.com/2122649 2122649  https://errata.almalinux.org/9/ALSA-2023-2519.html ALSA-2023:2519 ALSA-2023:2519 �3Bsamba-devel-4.17.5-102.el9.x86_64.rpm �2Blibwbclient-devel-4.17.5-102.el9.i686.rpm �Bsamba-pidl-4.17.5-102.el9.noarch.rpm �5Bsamba-test-libs-4.17.5-102.el9.x86_64.rpm �tBpython3-samba-devel-4.17.5-102.el9.i686.rpm �3Bsamba-devel-4.17.5-102.el9.i686.rpm �sBlibnetapi-devel-4.17.5-102.el9.x86_64.rpm �9Bpython3-samba-test-4.17.5-102.el9.x86_64.rpm �1Blibsmbclient-devel-4.17.5-102.el9.x86_64.rpm �1Blibsmbclient-devel-4.17.5-102.el9.i686.rpm �sBlibnetapi-devel-4.17.5-102.el9.i686.rpm �2Blibwbclient-devel-4.17.5-102.el9.x86_64.rpm �4Bsamba-test-4.17.5-102.el9.x86_64.rpm �tBpython3-samba-devel-4.17.5-102.el9.x86_64.rpm �3Bsamba-devel-4.17.5-102.el9.x86_64.rpm �2Blibwbclient-devel-4.17.5-102.el9.i686.rpm �Bsamba-pidl-4.17.5-102.el9.noarch.rpm �5Bsamba-test-libs-4.17.5-102.el9.x86_64.rpm �tBpython3-samba-devel-4.17.5-102.el9.i686.rpm �3Bsamba-devel-4.17.5-102.el9.i686.rpm �sBlibnetapi-devel-4.17.5-102.el9.x86_64.rpm �9Bpython3-samba-test-4.17.5-102.el9.x86_64.rpm �1Blibsmbclient-devel-4.17.5-102.el9.x86_64.rpm �1Blibsmbclient-devel-4.17.5-102.el9.i686.rpm �sBlibnetapi-devel-4.17.5-102.el9.i686.rpm �2Blibwbclient-devel-4.17.5-102.el9.x86_64.rpm �4Bsamba-test-4.17.5-102.el9.x86_64.rpm �tBpython3-samba-devel-4.17.5-102.el9.x86_64.rpm ����f�	�8�wBsecurity Low: libarchive security update �>���Yhttps://access.redhat.com/errata/RHSA-2023:2532 RHSA-2023:2532 RHSA-2023:2532 
https://access.redhat.com/security/cve/CVE-2022-36227 CVE-2022-36227 CVE-2022-36227 https://bugzilla.redhat.com/2144972 2144972  https://errata.almalinux.org/9/ALSA-2023-2532.html ALSA-2023:2532 ALSA-2023:2532 ��libarchive-devel-3.5.3-4.el9.x86_64.rpm ��libarchive-devel-3.5.3-4.el9.i686.rpm ��libarchive-devel-3.5.3-4.el9.x86_64.rpm ��libarchive-devel-3.5.3-4.el9.i686.rpm �����	�:�y�BBBsecurity Low: lua security update �>��m�Rhttps://access.redhat.com/errata/RHSA-2023:2582 RHSA-2023:2582 RHSA-2023:2582 
https://access.redhat.com/security/cve/CVE-2022-28805 CVE-2022-28805 CVE-2022-28805 https://bugzilla.redhat.com/2073884 2073884  https://errata.almalinux.org/9/ALSA-2023-2582.html ALSA-2023:2582 ALSA-2023:2582 �O�lua-5.4.4-3.el9.i686.rpm ��lua-devel-5.4.4-3.el9.x86_64.rpm ��lua-devel-5.4.4-3.el9.i686.rpm �O�lua-5.4.4-3.el9.i686.rpm ��lua-devel-5.4.4-3.el9.x86_64.rpm ��lua-devel-5.4.4-3.el9.i686.rpm ����o�		��~Bsecurity Moderate: autotrace security update 
��?�yhttps://access.redhat.com/errata/RHSA-2023:2589 RHSA-2023:2589 RHSA-2023:2589 
https://access.redhat.com/security/cve/CVE-2022-32323 CVE-2022-32323 CVE-2022-32323 https://bugzilla.redhat.com/2107471 2107471  https://errata.almalinux.org/9/ALSA-2023-2589.html ALSA-2023:2589 ALSA-2023:2589 ��Zautotrace-0.31.1-65.el9.x86_64.rpm ��Zautotrace-0.31.1-65.el9.i686.rpm ��Zautotrace-0.31.1-65.el9.x86_64.rpm ��Zautotrace-0.31.1-65.el9.i686.rpm ����`�
	��Bsecurity Moderate: golang-github-cpuguy83-md2man security, bug fix, and enhancement update 
��8�chttps://access.redhat.com/errata/RHSA-2023:2592 RHSA-2023:2592 RHSA-2023:2592 
https://access.redhat.com/security/cve/CVE-2022-41715 CVE-2022-41715 CVE-2022-41715 https://bugzilla.redhat.com/2132872 2132872  https://errata.almalinux.org/9/ALSA-2023-2592.html ALSA-2023:2592 ALSA-2023:2592 �:�igolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpm �:�igolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpm ����o�	�;�EBBBBsecurity Important: mysql security update ���Lhttps://access.redhat.com/errata/RHSA-2023:2621 RHSA-2023:2621 RHSA-2023:2621 
https://access.redhat.com/security/cve/CVE-2022-21594 CVE-2022-21594 CVE-2022-21594 https://access.redhat.com/security/cve/CVE-2022-21599 CVE-2022-21599 CVE-2022-21599 https://access.redhat.com/security/cve/CVE-2022-21604 CVE-2022-21604 CVE-2022-21604 https://access.redhat.com/security/cve/CVE-2022-21608 CVE-2022-21608 CVE-2022-21608 https://access.redhat.com/security/cve/CVE-2022-21611 CVE-2022-21611 CVE-2022-21611 https://access.redhat.com/security/cve/CVE-2022-21617 CVE-2022-21617 CVE-2022-21617 https://access.redhat.com/security/cve/CVE-2022-21625 CVE-2022-21625 CVE-2022-21625 https://access.redhat.com/security/cve/CVE-2022-21632 CVE-2022-21632 CVE-2022-21632 https://access.redhat.com/security/cve/CVE-2022-21633 CVE-2022-21633 CVE-2022-21633 https://access.redhat.com/security/cve/CVE-2022-21637 CVE-2022-21637 CVE-2022-21637 https://access.redhat.com/security/cve/CVE-2022-21640 CVE-2022-21640 CVE-2022-21640 https://access.redhat.com/security/cve/CVE-2022-39400 CVE-2022-39400 CVE-2022-39400 https://access.redhat.com/security/cve/CVE-2022-39408 CVE-2022-39408 CVE-2022-39408 https://access.redhat.com/security/cve/CVE-2022-39410 CVE-2022-39410 CVE-2022-39410 https://access.redhat.com/security/cve/CVE-2023-21836 CVE-2023-21836 CVE-2023-21836 https://access.redhat.com/security/cve/CVE-2023-21863 CVE-2023-21863 CVE-2023-21863 https://access.redhat.com/security/cve/CVE-2023-21864 CVE-2023-21864 CVE-2023-21864 https://access.redhat.com/security/cve/CVE-2023-21865 CVE-2023-21865 CVE-2023-21865 https://access.redhat.com/security/cve/CVE-2023-21867 CVE-2023-21867 CVE-2023-21867 https://access.redhat.com/security/cve/CVE-2023-21868 CVE-2023-21868 CVE-2023-21868 https://access.redhat.com/security/cve/CVE-2023-21869 CVE-2023-21869 CVE-2023-21869 https://access.redhat.com/security/cve/CVE-2023-21870 CVE-2023-21870 CVE-2023-21870 https://access.redhat.com/security/cve/CVE-2023-21871 CVE-2023-21871 CVE-2023-21871 https://access.redhat.com/security/cve/CVE-2023-21873 CVE-2023-21873 CVE-2023-21873 https://access.redhat.com/security/cve/CVE-2023-21874 CVE-2023-21874 CVE-2023-21874 https://access.redhat.com/security/cve/CVE-2023-21875 CVE-2023-21875 CVE-2023-21875 https://access.redhat.com/security/cve/CVE-2023-21876 CVE-2023-21876 CVE-2023-21876 https://access.redhat.com/security/cve/CVE-2023-21877 CVE-2023-21877 CVE-2023-21877 https://access.redhat.com/security/cve/CVE-2023-21878 CVE-2023-21878 CVE-2023-21878 https://access.redhat.com/security/cve/CVE-2023-21879 CVE-2023-21879 CVE-2023-21879 https://access.redhat.com/security/cve/CVE-2023-21880 CVE-2023-21880 CVE-2023-21880 https://access.redhat.com/security/cve/CVE-2023-21881 CVE-2023-21881 CVE-2023-21881 https://access.redhat.com/security/cve/CVE-2023-21882 CVE-2023-21882 CVE-2023-21882 https://access.redhat.com/security/cve/CVE-2023-21883 CVE-2023-21883 CVE-2023-21883 https://access.redhat.com/security/cve/CVE-2023-21887 CVE-2023-21887 CVE-2023-21887 https://access.redhat.com/security/cve/CVE-2023-21912 CVE-2023-21912 CVE-2023-21912 https://access.redhat.com/security/cve/CVE-2023-21917 CVE-2023-21917 CVE-2023-21917 https://bugzilla.redhat.com/2142861 2142861  https://bugzilla.redhat.com/2142863 2142863  https://bugzilla.redhat.com/2142865 2142865  https://bugzilla.redhat.com/2142868 2142868  https://bugzilla.redhat.com/2142869 2142869  https://bugzilla.redhat.com/2142870 2142870  https://bugzilla.redhat.com/2142871 2142871  https://bugzilla.redhat.com/2142872 2142872  https://bugzilla.redhat.com/2142873 2142873  https://bugzilla.redhat.com/2142875 2142875  https://bugzilla.redhat.com/2142877 2142877  https://bugzilla.redhat.com/2142879 2142879  https://bugzilla.redhat.com/2142880 2142880  https://bugzilla.redhat.com/2142881 2142881  https://bugzilla.redhat.com/2162268 2162268  https://bugzilla.redhat.com/2162270 2162270  https://bugzilla.redhat.com/2162271 2162271  https://bugzilla.redhat.com/2162272 2162272  https://bugzilla.redhat.com/2162274 2162274  https://bugzilla.redhat.com/2162275 2162275  https://bugzilla.redhat.com/2162276 2162276  https://bugzilla.redhat.com/2162277 2162277  https://bugzilla.redhat.com/2162278 2162278  https://bugzilla.redhat.com/2162280 2162280  https://bugzilla.redhat.com/2162281 2162281  https://bugzilla.redhat.com/2162282 2162282  https://bugzilla.redhat.com/2162283 2162283  https://bugzilla.redhat.com/2162284 2162284  https://bugzilla.redhat.com/2162285 2162285  https://bugzilla.redhat.com/2162286 2162286  https://bugzilla.redhat.com/2162287 2162287  https://bugzilla.redhat.com/2162288 2162288  https://bugzilla.redhat.com/2162289 2162289  https://bugzilla.redhat.com/2162290 2162290  https://bugzilla.redhat.com/2162291 2162291  https://bugzilla.redhat.com/2188110 2188110  https://bugzilla.redhat.com/2188112 2188112  https://errata.almalinux.org/9/ALSA-2023-2621.html ALSA-2023:2621 ALSA-2023:2621 ��xmysql-devel-8.0.32-1.el9_2.x86_64.rpm ��xmysql-test-8.0.32-1.el9_2.x86_64.rpm ��xmysql-libs-8.0.32-1.el9_2.x86_64.rpm ��xmysql-devel-8.0.32-1.el9_2.x86_64.rpm ��xmysql-test-8.0.32-1.el9_2.x86_64.rpm ��xmysql-libs-8.0.32-1.el9_2.x86_64.rpm ����h�	�<�KBsecurity Important: cups-filters security update ���ihttps://access.redhat.com/errata/RHSA-2023:3423 RHSA-2023:3423 RHSA-2023:3423 
https://access.redhat.com/security/cve/CVE-2023-24805 CVE-2023-24805 CVE-2023-24805 https://bugzilla.redhat.com/2203051 2203051  https://errata.almalinux.org/9/ALSA-2023-3423.html ALSA-2023:3423 ALSA-2023:3423 ��jcups-filters-devel-1.28.7-11.el9_2.1.i686.rpm ��jcups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm ��jcups-filters-devel-1.28.7-11.el9_2.1.i686.rpm ��jcups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm �����
	�=�Nsecurity Important: .NET 6.0 security, bug fix, and enhancement update ���
https://access.redhat.com/errata/RHSA-2023:3581 RHSA-2023:3581 RHSA-2023:3581 
https://access.redhat.com/security/cve/CVE-2023-24936 CVE-2023-24936 CVE-2023-24936 https://access.redhat.com/security/cve/CVE-2023-29331 CVE-2023-29331 CVE-2023-29331 https://access.redhat.com/security/cve/CVE-2023-29337 CVE-2023-29337 CVE-2023-29337 https://access.redhat.com/security/cve/CVE-2023-33128 CVE-2023-33128 CVE-2023-33128 https://bugzilla.redhat.com/2192438 2192438  https://bugzilla.redhat.com/2212617 2212617  https://bugzilla.redhat.com/2212618 2212618  https://bugzilla.redhat.com/2213703 2213703  https://errata.almalinux.org/9/ALSA-2023-3581.html ALSA-2023:3581 ALSA-2023:3581 e�dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm ����.�	� �~B�RBBBBBBBBBsecurity Important: python3.11 security update ���yhttps://access.redhat.com/errata/RHSA-2023:3585 RHSA-2023:3585 RHSA-2023:3585 
https://access.redhat.com/security/cve/CVE-2023-24329 CVE-2023-24329 CVE-2023-24329 https://bugzilla.redhat.com/2173917 2173917  https://errata.almalinux.org/9/ALSA-2023-3585.html ALSA-2023:3585 ALSA-2023:3585 {python3.11-idle-3.11.2-2.el9_2.1.i686.rpm {python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm {python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm {python3.11-test-3.11.2-2.el9_2.1.i686.rpm {python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpm g{python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm {python3.11-debug-3.11.2-2.el9_2.1.i686.rpm f{python3.11-3.11.2-2.el9_2.1.i686.rpm {python3.11-idle-3.11.2-2.el9_2.1.i686.rpm {python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm {python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm {python3.11-test-3.11.2-2.el9_2.1.i686.rpm {python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpm g{python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm {python3.11-debug-3.11.2-2.el9_2.1.i686.rpm f{python3.11-3.11.2-2.el9_2.1.i686.rpm �����	��[security Important: .NET 7.0 security, bug fix, and enhancement update ���https://access.redhat.com/errata/RHSA-2023:3592 RHSA-2023:3592 RHSA-2023:3592 
https://access.redhat.com/security/cve/CVE-2023-24936 CVE-2023-24936 CVE-2023-24936 https://access.redhat.com/security/cve/CVE-2023-29331 CVE-2023-29331 CVE-2023-29331 https://access.redhat.com/security/cve/CVE-2023-29337 CVE-2023-29337 CVE-2023-29337 https://access.redhat.com/security/cve/CVE-2023-32032 CVE-2023-32032 CVE-2023-32032 https://access.redhat.com/security/cve/CVE-2023-33128 CVE-2023-33128 CVE-2023-33128 https://bugzilla.redhat.com/2192438 2192438  https://bugzilla.redhat.com/2212615 2212615  https://bugzilla.redhat.com/2212617 2212617  https://bugzilla.redhat.com/2212618 2212618  https://bugzilla.redhat.com/2213703 2213703  https://errata.almalinux.org/9/ALSA-2023-3592.html ALSA-2023:3592 ALSA-2023:3592 �5�
dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm �5�
dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm �����	��B�L�QBBBBBBBBBsecurity Important: python3.9 security update ���+https://access.redhat.com/errata/RHSA-2023:3595 RHSA-2023:3595 RHSA-2023:3595 
https://access.redhat.com/security/cve/CVE-2023-24329 CVE-2023-24329 CVE-2023-24329 https://bugzilla.redhat.com/2173917 2173917  https://errata.almalinux.org/9/ALSA-2023-3595.html ALSA-2023:3595 ALSA-2023:3595 �python3-idle-3.9.16-1.el9_2.1.x86_64.rpm �python3-debug-3.9.16-1.el9_2.1.x86_64.rpm �python3-test-3.9.16-1.el9_2.1.i686.rpm �python3-test-3.9.16-1.el9_2.1.x86_64.rpm �python3-debug-3.9.16-1.el9_2.1.i686.rpm �python3-idle-3.9.16-1.el9_2.1.i686.rpm Z�python3-tkinter-3.9.16-1.el9_2.1.i686.rpm Y�python3-3.9.16-1.el9_2.1.i686.rpm �python3-idle-3.9.16-1.el9_2.1.x86_64.rpm �python3-debug-3.9.16-1.el9_2.1.x86_64.rpm �python3-test-3.9.16-1.el9_2.1.i686.rpm �python3-test-3.9.16-1.el9_2.1.x86_64.rpm �python3-debug-3.9.16-1.el9_2.1.i686.rpm �python3-idle-3.9.16-1.el9_2.1.i686.rpm Z�python3-tkinter-3.9.16-1.el9_2.1.i686.rpm Y�python3-3.9.16-1.el9_2.1.i686.rpm ����x�	��hBBsecurity Important: texlive security update ��A�
https://access.redhat.com/errata/RHSA-2023:3661 RHSA-2023:3661 RHSA-2023:3661 
https://access.redhat.com/security/cve/CVE-2023-32700 CVE-2023-32700 CVE-2023-32700 https://bugzilla.redhat.com/2208943 2208943  https://errata.almalinux.org/9/ALSA-2023-3661.html ALSA-2023:3661 ALSA-2023:3661 �-�5texlive-gnu-freefont-20200406-26.el9_2.noarch.rpm �6�5texlive-lib-devel-20200406-26.el9_2.x86_64.rpm �6�5texlive-lib-devel-20200406-26.el9_2.i686.rpm �-�5texlive-gnu-freefont-20200406-26.el9_2.noarch.rpm �6�5texlive-lib-devel-20200406-26.el9_2.x86_64.rpm �6�5texlive-lib-devel-20200406-26.el9_2.i686.rpm ��y�	��lsecurity Moderate: libtiff security update 
��N�phttps://access.redhat.com/errata/RHSA-2023:3711 RHSA-2023:3711 RHSA-2023:3711 
https://access.redhat.com/security/cve/CVE-2022-48281 CVE-2022-48281 CVE-2022-48281 https://access.redhat.com/security/cve/CVE-2023-0795 CVE-2023-0795 CVE-2023-0795 https://access.redhat.com/security/cve/CVE-2023-0796 CVE-2023-0796 CVE-2023-0796 https://access.redhat.com/security/cve/CVE-2023-0797 CVE-2023-0797 CVE-2023-0797 https://access.redhat.com/security/cve/CVE-2023-0798 CVE-2023-0798 CVE-2023-0798 https://access.redhat.com/security/cve/CVE-2023-0799 CVE-2023-0799 CVE-2023-0799 https://access.redhat.com/security/cve/CVE-2023-0800 CVE-2023-0800 CVE-2023-0800 https://access.redhat.com/security/cve/CVE-2023-0801 CVE-2023-0801 CVE-2023-0801 https://access.redhat.com/security/cve/CVE-2023-0802 CVE-2023-0802 CVE-2023-0802 https://access.redhat.com/security/cve/CVE-2023-0803 CVE-2023-0803 CVE-2023-0803 https://access.redhat.com/security/cve/CVE-2023-0804 CVE-2023-0804 CVE-2023-0804 https://bugzilla.redhat.com/2163606 2163606  https://bugzilla.redhat.com/2170119 2170119  https://bugzilla.redhat.com/2170146 2170146  https://bugzilla.redhat.com/2170151 2170151  https://bugzilla.redhat.com/2170157 2170157  https://bugzilla.redhat.com/2170162 2170162  https://bugzilla.redhat.com/2170167 2170167  https://bugzilla.redhat.com/2170172 2170172  https://bugzilla.redhat.com/2170178 2170178  https://bugzilla.redhat.com/2170187 2170187  https://bugzilla.redhat.com/2170192 2170192  https://errata.almalinux.org/9/ALSA-2023-3711.html ALSA-2023:3711 ALSA-2023:3711 �{�zlibtiff-tools-4.4.0-8.el9_2.x86_64.rpm �{�zlibtiff-tools-4.4.0-8.el9_2.x86_64.rpm ���i�	��nBBBBBBBBBBsecurity Moderate: postgresql security update 
��>�Shttps://access.redhat.com/errata/RHSA-2023:3714 RHSA-2023:3714 RHSA-2023:3714 
https://access.redhat.com/security/cve/CVE-2023-2454 CVE-2023-2454 CVE-2023-2454 https://access.redhat.com/security/cve/CVE-2023-2455 CVE-2023-2455 CVE-2023-2455 https://bugzilla.redhat.com/2207568 2207568  https://bugzilla.redhat.com/2207569 2207569  https://errata.almalinux.org/9/ALSA-2023-3714.html ALSA-2023:3714 ALSA-2023:3714 �|�8postgresql-docs-13.11-1.el9_2.x86_64.rpm � �8postgresql-test-13.11-1.el9_2.x86_64.rpm �~�8postgresql-server-devel-13.11-1.el9_2.x86_64.rpm �}�8postgresql-private-devel-13.11-1.el9_2.x86_64.rpm ��8postgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm ��8postgresql-static-13.11-1.el9_2.x86_64.rpm �|�8postgresql-docs-13.11-1.el9_2.x86_64.rpm � �8postgresql-test-13.11-1.el9_2.x86_64.rpm �~�8postgresql-server-devel-13.11-1.el9_2.x86_64.rpm �}�8postgresql-private-devel-13.11-1.el9_2.x86_64.rpm ��8postgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm ��8postgresql-static-13.11-1.el9_2.x86_64.rpm �����	��zBBBBBBsecurity Moderate: libvirt security update 
���}https://access.redhat.com/errata/RHSA-2023:3715 RHSA-2023:3715 RHSA-2023:3715 
https://access.redhat.com/security/cve/CVE-2023-2700 CVE-2023-2700 CVE-2023-2700 https://bugzilla.redhat.com/2203653 2203653  https://errata.almalinux.org/9/ALSA-2023-3715.html ALSA-2023:3715 ALSA-2023:3715 �Y�libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm ��libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm ��libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm �X�libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm �Y�libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm ��libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm ��libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm �X�libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm �����	��Bsecurity Important: kernel security and bug fix update ���https://access.redhat.com/errata/RHSA-2023:3723 RHSA-2023:3723 RHSA-2023:3723 
https://access.redhat.com/security/cve/CVE-2023-2002 CVE-2023-2002 CVE-2023-2002 https://access.redhat.com/security/cve/CVE-2023-2124 CVE-2023-2124 CVE-2023-2124 https://access.redhat.com/security/cve/CVE-2023-2194 CVE-2023-2194 CVE-2023-2194 https://access.redhat.com/security/cve/CVE-2023-2235 CVE-2023-2235 CVE-2023-2235 https://access.redhat.com/security/cve/CVE-2023-28466 CVE-2023-28466 CVE-2023-28466 https://access.redhat.com/security/cve/CVE-2023-32233 CVE-2023-32233 CVE-2023-32233 https://bugzilla.redhat.com/2179000 2179000  https://bugzilla.redhat.com/2187308 2187308  https://bugzilla.redhat.com/2187439 2187439  https://bugzilla.redhat.com/2188396 2188396  https://bugzilla.redhat.com/2192589 2192589  https://bugzilla.redhat.com/2196105 2196105  https://errata.almalinux.org/9/ALSA-2023-3723.html ALSA-2023:3723 ALSA-2023:3723 �|kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm �|kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm ����V�	�	�Dsecurity Important: .NET 7.0 security, bug fix, and enhancement update ���Ehttps://access.redhat.com/errata/RHSA-2023:4057 RHSA-2023:4057 RHSA-2023:4057 
https://access.redhat.com/security/cve/CVE-2023-33170 CVE-2023-33170 CVE-2023-33170 https://bugzilla.redhat.com/2221854 2221854  https://errata.almalinux.org/9/ALSA-2023-4057.html ALSA-2023:4057 ALSA-2023:4057 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpm ����B�	�
�Fsecurity Important: .NET 6.0 security, bug fix, and enhancement update ��a�Fhttps://access.redhat.com/errata/RHSA-2023:4060 RHSA-2023:4060 RHSA-2023:4060 
https://access.redhat.com/security/cve/CVE-2023-33170 CVE-2023-33170 CVE-2023-33170 https://bugzilla.redhat.com/2221854 2221854  https://errata.almalinux.org/9/ALSA-2023-4060.html ALSA-2023:4060 ALSA-2023:4060 e�dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm ����9�	��K�~BBBsecurity Important: bind security update ��'�Nhttps://access.redhat.com/errata/RHSA-2023:4099 RHSA-2023:4099 RHSA-2023:4099 
https://access.redhat.com/security/cve/CVE-2023-2828 CVE-2023-2828 CVE-2023-2828 https://bugzilla.redhat.com/2216227 2216227  https://errata.almalinux.org/9/ALSA-2023-4099.html ALSA-2023:4099 ALSA-2023:4099 [�*bind-devel-9.16.23-11.el9_2.1.x86_64.rpm �?�*bind-doc-9.16.23-11.el9_2.1.noarch.rpm �X�*bind-libs-9.16.23-11.el9_2.1.i686.rpm [�*bind-devel-9.16.23-11.el9_2.1.i686.rpm [�*bind-devel-9.16.23-11.el9_2.1.x86_64.rpm �?�*bind-doc-9.16.23-11.el9_2.1.noarch.rpm �X�*bind-libs-9.16.23-11.el9_2.1.i686.rpm [�*bind-devel-9.16.23-11.el9_2.1.i686.rpm ��ٟ
�	�
�MBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update 
��u�"https://access.redhat.com/errata/RHSA-2023:4158 RHSA-2023:4158 RHSA-2023:4158 
https://access.redhat.com/security/cve/CVE-2023-22006 CVE-2023-22006 CVE-2023-22006 https://access.redhat.com/security/cve/CVE-2023-22036 CVE-2023-22036 CVE-2023-22036 https://access.redhat.com/security/cve/CVE-2023-22041 CVE-2023-22041 CVE-2023-22041 https://access.redhat.com/security/cve/CVE-2023-22045 CVE-2023-22045 CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 CVE-2023-22049 CVE-2023-22049 https://access.redhat.com/security/cve/CVE-2023-25193 CVE-2023-25193 CVE-2023-25193 https://bugzilla.redhat.com/2167254 2167254  https://bugzilla.redhat.com/2221626 2221626  https://bugzilla.redhat.com/2221634 2221634  https://bugzilla.redhat.com/2221645 2221645  https://bugzilla.redhat.com/2221647 2221647  https://bugzilla.redhat.com/2223207 2223207  https://errata.almalinux.org/9/ALSA-2023-4158.html ALSA-2023:4158 ALSA-2023:4158 �M$java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �H$java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �S$java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �I$java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �N$java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �F$java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �K$java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �J$java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �L$java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �Q$java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �R$java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �G$java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �O$java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �P$java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �M$java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �H$java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �S$java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �I$java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �N$java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �F$java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �K$java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �J$java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �L$java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �Q$java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �R$java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �G$java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �O$java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �P$java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm ��� �	��iBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update 
���Nhttps://access.redhat.com/errata/RHSA-2023:4177 RHSA-2023:4177 RHSA-2023:4177 
https://access.redhat.com/security/cve/CVE-2023-22006 CVE-2023-22006 CVE-2023-22006 https://access.redhat.com/security/cve/CVE-2023-22036 CVE-2023-22036 CVE-2023-22036 https://access.redhat.com/security/cve/CVE-2023-22041 CVE-2023-22041 CVE-2023-22041 https://access.redhat.com/security/cve/CVE-2023-22044 CVE-2023-22044 CVE-2023-22044 https://access.redhat.com/security/cve/CVE-2023-22045 CVE-2023-22045 CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 CVE-2023-22049 CVE-2023-22049 https://access.redhat.com/security/cve/CVE-2023-25193 CVE-2023-25193 CVE-2023-25193 https://bugzilla.redhat.com/2167254 2167254  https://bugzilla.redhat.com/2221626 2221626  https://bugzilla.redhat.com/2221634 2221634  https://bugzilla.redhat.com/2221642 2221642  https://bugzilla.redhat.com/2221645 2221645  https://bugzilla.redhat.com/2221647 2221647  https://bugzilla.redhat.com/2223207 2223207  https://errata.almalinux.org/9/ALSA-2023-4177.html ALSA-2023:4177 ALSA-2023:4177 k5java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm t5java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm j5java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm q5java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm m5java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm r5java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm v5java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm n5java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm w5java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm o5java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm s5java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm p5java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm u5java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm l5java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm k5java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm t5java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm j5java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm q5java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm m5java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm r5java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm v5java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm n5java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm w5java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm o5java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm s5java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm p5java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm u5java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm l5java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm ���{�	��EBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security and bug fix update 
��e�yhttps://access.redhat.com/errata/RHSA-2023:4178 RHSA-2023:4178 RHSA-2023:4178 
https://access.redhat.com/security/cve/CVE-2023-22045 CVE-2023-22045 CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 CVE-2023-22049 CVE-2023-22049 https://bugzilla.redhat.com/2221645 2221645  https://bugzilla.redhat.com/2221647 2221647  https://errata.almalinux.org/9/ALSA-2023-4178.html ALSA-2023:4178 ALSA-2023:4178 
�$Ljava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �&Ljava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �+Ljava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �'Ljava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �-Ljava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �,Ljava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �)Ljava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �%Ljava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �(Ljava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �*Ljava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm 
�$Ljava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �&Ljava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �+Ljava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �'Ljava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �-Ljava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �,Ljava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �)Ljava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �%Ljava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �(Ljava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �*Ljava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm ���-�	��YBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security and bug fix update 
��^�https://access.redhat.com/errata/RHSA-2023:4325 RHSA-2023:4325 RHSA-2023:4325 
https://access.redhat.com/security/cve/CVE-2023-3347 CVE-2023-3347 CVE-2023-3347 https://bugzilla.redhat.com/2222792 2222792  https://errata.almalinux.org/9/ALSA-2023-4325.html ALSA-2023:4325 ALSA-2023:4325 �2Clibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �1Clibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �sClibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm �tCpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm �tCpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpm �2Clibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �Csamba-pidl-4.17.5-103.el9_2.alma.noarch.rpm �4Csamba-test-4.17.5-103.el9_2.alma.x86_64.rpm �5Csamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm �sClibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm �9Cpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpm �1Clibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �3Csamba-devel-4.17.5-103.el9_2.alma.i686.rpm �3Csamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm �2Clibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �1Clibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �sClibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm �tCpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm �tCpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpm �2Clibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �Csamba-pidl-4.17.5-103.el9_2.alma.noarch.rpm �4Csamba-test-4.17.5-103.el9_2.alma.x86_64.rpm �5Csamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm �sClibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm �9Cpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpm �1Clibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �3Csamba-devel-4.17.5-103.el9_2.alma.i686.rpm �3Csamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm ����<�	��oBBsecurity Important: kernel security, bug fix, and enhancement update ��f�0https://access.redhat.com/errata/RHSA-2023:4377 RHSA-2023:4377 RHSA-2023:4377 
https://access.redhat.com/security/cve/CVE-2022-45869 CVE-2022-45869 CVE-2022-45869 https://access.redhat.com/security/cve/CVE-2023-0458 CVE-2023-0458 CVE-2023-0458 https://access.redhat.com/security/cve/CVE-2023-1998 CVE-2023-1998 CVE-2023-1998 https://access.redhat.com/security/cve/CVE-2023-3090 CVE-2023-3090 CVE-2023-3090 https://access.redhat.com/security/cve/CVE-2023-35788 CVE-2023-35788 CVE-2023-35788 https://bugzilla.redhat.com/2151317 2151317  https://bugzilla.redhat.com/2187257 2187257  https://bugzilla.redhat.com/2193219 2193219  https://bugzilla.redhat.com/2215768 2215768  https://bugzilla.redhat.com/2218672 2218672  https://errata.almalinux.org/9/ALSA-2023-4377.html ALSA-2023:4377 ALSA-2023:4377 �Lkernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm �Lkernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm �Lkernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm �Lkernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm ���0�	��ssecurity Important: .NET 7.0 security, bug fix, and enhancement update ���https://access.redhat.com/errata/RHSA-2023:4642 RHSA-2023:4642 RHSA-2023:4642 
https://access.redhat.com/security/cve/CVE-2023-35390 CVE-2023-35390 CVE-2023-35390 https://access.redhat.com/security/cve/CVE-2023-38180 CVE-2023-38180 CVE-2023-38180 https://bugzilla.redhat.com/2228621 2228621  https://bugzilla.redhat.com/2228622 2228622  https://errata.almalinux.org/9/ALSA-2023-4642.html ALSA-2023:4642 ALSA-2023:4642 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm ����	��usecurity Important: .NET 6.0 security, bug fix, and enhancement update ��-�https://access.redhat.com/errata/RHSA-2023:4644 RHSA-2023:4644 RHSA-2023:4644 
https://access.redhat.com/security/cve/CVE-2023-35390 CVE-2023-35390 CVE-2023-35390 https://access.redhat.com/security/cve/CVE-2023-38180 CVE-2023-38180 CVE-2023-38180 https://bugzilla.redhat.com/2228621 2228621  https://bugzilla.redhat.com/2228622 2228622  https://errata.almalinux.org/9/ALSA-2023-4644.html ALSA-2023:4644 ALSA-2023:4644 e�dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm ����/� 	��wBBBsecurity Important: flac security update ��D�whttps://access.redhat.com/errata/RHSA-2023:5048 RHSA-2023:5048 RHSA-2023:5048 
https://access.redhat.com/security/cve/CVE-2020-22219 CVE-2020-22219 CVE-2020-22219 https://bugzilla.redhat.com/2235489 2235489  https://errata.almalinux.org/9/ALSA-2023-5048.html ALSA-2023:5048 ALSA-2023:5048 �@�flac-1.3.3-10.el9_2.1.x86_64.rpm ��flac-devel-1.3.3-10.el9_2.1.i686.rpm ��flac-devel-1.3.3-10.el9_2.1.x86_64.rpm �@�flac-1.3.3-10.el9_2.1.x86_64.rpm ��flac-devel-1.3.3-10.el9_2.1.i686.rpm ��flac-devel-1.3.3-10.el9_2.1.x86_64.rpm ����5�!	��|security Important: kernel security, bug fix, and enhancement update ��;�_https://access.redhat.com/errata/RHSA-2023:5069 RHSA-2023:5069 RHSA-2023:5069 
https://access.redhat.com/security/cve/CVE-2023-1637 CVE-2023-1637 CVE-2023-1637 https://access.redhat.com/security/cve/CVE-2023-20593 CVE-2023-20593 CVE-2023-20593 https://access.redhat.com/security/cve/CVE-2023-21102 CVE-2023-21102 CVE-2023-21102 https://access.redhat.com/security/cve/CVE-2023-31248 CVE-2023-31248 CVE-2023-31248 https://access.redhat.com/security/cve/CVE-2023-3390 CVE-2023-3390 CVE-2023-3390 https://access.redhat.com/security/cve/CVE-2023-35001 CVE-2023-35001 CVE-2023-35001 https://access.redhat.com/security/cve/CVE-2023-3610 CVE-2023-3610 CVE-2023-3610 https://access.redhat.com/security/cve/CVE-2023-3776 CVE-2023-3776 CVE-2023-3776 https://access.redhat.com/security/cve/CVE-2023-4004 CVE-2023-4004 CVE-2023-4004 https://access.redhat.com/security/cve/CVE-2023-4147 CVE-2023-4147 CVE-2023-4147 https://bugzilla.redhat.com/2181891 2181891  https://bugzilla.redhat.com/2213260 2213260  https://bugzilla.redhat.com/2213455 2213455  https://bugzilla.redhat.com/2217845 2217845  https://bugzilla.redhat.com/2220892 2220892  https://bugzilla.redhat.com/2220893 2220893  https://bugzilla.redhat.com/2225097 2225097  https://bugzilla.redhat.com/2225198 2225198  https://bugzilla.redhat.com/2225239 2225239  https://bugzilla.redhat.com/2225275 2225275  https://errata.almalinux.org/9/ALSA-2023-5069.html ALSA-2023:5069 ALSA-2023:5069 �}kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm �}kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm ����x�"	��~security Moderate: .NET 6.0 security update 
���Rhttps://access.redhat.com/errata/RHSA-2023:5143 RHSA-2023:5143 RHSA-2023:5143 
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317  https://errata.almalinux.org/9/ALSA-2023-5143.html ALSA-2023:5143 ALSA-2023:5143 e�dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm ����}�#	��@security Moderate: .NET 7.0 security update 
��l�Rhttps://access.redhat.com/errata/RHSA-2023:5146 RHSA-2023:5146 RHSA-2023:5146 
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317  https://errata.almalinux.org/9/ALSA-2023-5146.html ALSA-2023:5146 ALSA-2023:5146 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpm ����n�$	��Bsecurity Important: libwebp security update ��>�-https://access.redhat.com/errata/RHSA-2023:5214 RHSA-2023:5214 RHSA-2023:5214 
https://access.redhat.com/security/cve/CVE-2023-4863 CVE-2023-4863 CVE-2023-4863 https://bugzilla.redhat.com/2238431 2238431  https://errata.almalinux.org/9/ALSA-2023-5214.html ALSA-2023:5214 ALSA-2023:5214 �a�clibwebp-tools-1.2.0-7.el9_2.x86_64.rpm �a�clibwebp-tools-1.2.0-7.el9_2.x86_64.rpm ����]�%	��DBBBBBBBBBBBBsecurity Important: glibc security update ��k�
https://access.redhat.com/errata/RHSA-2023:5453 RHSA-2023:5453 RHSA-2023:5453 
https://access.redhat.com/security/cve/CVE-2023-4527 CVE-2023-4527 CVE-2023-4527 https://access.redhat.com/security/cve/CVE-2023-4806 CVE-2023-4806 CVE-2023-4806 https://access.redhat.com/security/cve/CVE-2023-4813 CVE-2023-4813 CVE-2023-4813 https://access.redhat.com/security/cve/CVE-2023-4911 CVE-2023-4911 CVE-2023-4911 https://bugzilla.redhat.com/2234712 2234712  https://bugzilla.redhat.com/2237782 2237782  https://bugzilla.redhat.com/2237798 2237798  https://bugzilla.redhat.com/2238352 2238352  https://errata.almalinux.org/9/ALSA-2023-5453.html ALSA-2023:5453 ALSA-2023:5453 	�Bbglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpm �Cbglibc-static-2.34-60.el9_2.7.i686.rpm �Dbnss_db-2.34-60.el9_2.7.i686.rpm �Bbglibc-nss-devel-2.34-60.el9_2.7.i686.rpm �Ebnss_hesiod-2.34-60.el9_2.7.x86_64.rpm �Ebnss_hesiod-2.34-60.el9_2.7.i686.rpm �Dbnss_db-2.34-60.el9_2.7.x86_64.rpm �Cbglibc-static-2.34-60.el9_2.7.x86_64.rpm �}bglibc-benchtests-2.34-60.el9_2.7.x86_64.rpm 	�Bbglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpm �Cbglibc-static-2.34-60.el9_2.7.i686.rpm �Dbnss_db-2.34-60.el9_2.7.i686.rpm �Bbglibc-nss-devel-2.34-60.el9_2.7.i686.rpm �Ebnss_hesiod-2.34-60.el9_2.7.x86_64.rpm �Ebnss_hesiod-2.34-60.el9_2.7.i686.rpm �Dbnss_db-2.34-60.el9_2.7.x86_64.rpm �Cbglibc-static-2.34-60.el9_2.7.x86_64.rpm �}bglibc-benchtests-2.34-60.el9_2.7.x86_64.rpm ����m�&	��ZB�xBBBBBBBBBsecurity Important: python3.11 security update ��w�ihttps://access.redhat.com/errata/RHSA-2023:5456 RHSA-2023:5456 RHSA-2023:5456 
https://access.redhat.com/security/cve/CVE-2023-40217 CVE-2023-40217 CVE-2023-40217 https://bugzilla.redhat.com/2235789 2235789  https://errata.almalinux.org/9/ALSA-2023-5456.html ALSA-2023:5456 ALSA-2023:5456 |python3.11-idle-3.11.2-2.el9_2.2.i686.rpm |python3.11-debug-3.11.2-2.el9_2.2.x86_64.rpm |python3.11-debug-3.11.2-2.el9_2.2.i686.rpm f|python3.11-3.11.2-2.el9_2.2.i686.rpm |python3.11-test-3.11.2-2.el9_2.2.i686.rpm g|python3.11-tkinter-3.11.2-2.el9_2.2.i686.rpm |python3.11-test-3.11.2-2.el9_2.2.x86_64.rpm |python3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm |python3.11-idle-3.11.2-2.el9_2.2.i686.rpm |python3.11-debug-3.11.2-2.el9_2.2.x86_64.rpm |python3.11-debug-3.11.2-2.el9_2.2.i686.rpm f|python3.11-3.11.2-2.el9_2.2.i686.rpm |python3.11-test-3.11.2-2.el9_2.2.i686.rpm g|python3.11-tkinter-3.11.2-2.el9_2.2.i686.rpm |python3.11-test-3.11.2-2.el9_2.2.x86_64.rpm |python3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm ����=�'	� �]BB�BBBBsecurity Important: ghostscript security update ��`�https://access.redhat.com/errata/RHSA-2023:5459 RHSA-2023:5459 RHSA-2023:5459 
https://access.redhat.com/security/cve/CVE-2023-36664 CVE-2023-36664 CVE-2023-36664 https://bugzilla.redhat.com/2217798 2217798  https://errata.almalinux.org/9/ALSA-2023-5459.html ALSA-2023:5459 ALSA-2023:5459 \�ilibgs-devel-9.54.0-10.el9_2.i686.rpm �y�ighostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm �z�ighostscript-tools-printing-9.54.0-10.el9_2.i686.rpm �x�ighostscript-9.54.0-10.el9_2.i686.rpm \�ilibgs-devel-9.54.0-10.el9_2.x86_64.rpm \�ilibgs-devel-9.54.0-10.el9_2.i686.rpm �y�ighostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm �z�ighostscript-tools-printing-9.54.0-10.el9_2.i686.rpm �x�ighostscript-9.54.0-10.el9_2.i686.rpm \�ilibgs-devel-9.54.0-10.el9_2.x86_64.rpm ����\�(	�"�a�n�VBBBBBBBBBsecurity Important: python3.9 security update ��q�https://access.redhat.com/errata/RHSA-2023:5462 RHSA-2023:5462 RHSA-2023:5462 
https://access.redhat.com/security/cve/CVE-2023-40217 CVE-2023-40217 CVE-2023-40217 https://bugzilla.redhat.com/2235789 2235789  https://errata.almalinux.org/9/ALSA-2023-5462.html ALSA-2023:5462 ALSA-2023:5462 Z�python3-tkinter-3.9.16-1.el9_2.2.i686.rpm �python3-idle-3.9.16-1.el9_2.2.x86_64.rpm �python3-test-3.9.16-1.el9_2.2.x86_64.rpm �python3-debug-3.9.16-1.el9_2.2.i686.rpm �python3-test-3.9.16-1.el9_2.2.i686.rpm �python3-idle-3.9.16-1.el9_2.2.i686.rpm �python3-debug-3.9.16-1.el9_2.2.x86_64.rpm Y�python3-3.9.16-1.el9_2.2.i686.rpm Z�python3-tkinter-3.9.16-1.el9_2.2.i686.rpm �python3-idle-3.9.16-1.el9_2.2.x86_64.rpm �python3-test-3.9.16-1.el9_2.2.x86_64.rpm �python3-debug-3.9.16-1.el9_2.2.i686.rpm �python3-test-3.9.16-1.el9_2.2.i686.rpm �python3-idle-3.9.16-1.el9_2.2.i686.rpm �python3-debug-3.9.16-1.el9_2.2.x86_64.rpm Y�python3-3.9.16-1.el9_2.2.i686.rpm ����I�)	�#�nBsecurity Important: libvpx security update ���https://access.redhat.com/errata/RHSA-2023:5539 RHSA-2023:5539 RHSA-2023:5539 
https://access.redhat.com/security/cve/CVE-2023-44488 CVE-2023-44488 CVE-2023-44488 https://access.redhat.com/security/cve/CVE-2023-5217 CVE-2023-5217 CVE-2023-5217 https://bugzilla.redhat.com/2241191 2241191  https://bugzilla.redhat.com/2241806 2241806  https://errata.almalinux.org/9/ALSA-2023-5539.html ALSA-2023:5539 ALSA-2023:5539 ��qlibvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm ��qlibvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpm ��qlibvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm ��qlibvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpm ����x�*	�$�qBBBBsecurity Important: galera and mariadb security update ���Uhttps://access.redhat.com/errata/RHSA-2023:5684 RHSA-2023:5684 RHSA-2023:5684 
https://access.redhat.com/security/cve/CVE-2022-32081 CVE-2022-32081 CVE-2022-32081 https://access.redhat.com/security/cve/CVE-2022-32082 CVE-2022-32082 CVE-2022-32082 https://access.redhat.com/security/cve/CVE-2022-32084 CVE-2022-32084 CVE-2022-32084 https://access.redhat.com/security/cve/CVE-2022-32089 CVE-2022-32089 CVE-2022-32089 https://access.redhat.com/security/cve/CVE-2022-32091 CVE-2022-32091 CVE-2022-32091 https://access.redhat.com/security/cve/CVE-2022-38791 CVE-2022-38791 CVE-2022-38791 https://access.redhat.com/security/cve/CVE-2022-47015 CVE-2022-47015 CVE-2022-47015 https://access.redhat.com/security/cve/CVE-2023-5157 CVE-2023-5157 CVE-2023-5157 https://bugzilla.redhat.com/2106028 2106028  https://bugzilla.redhat.com/2106030 2106030  https://bugzilla.redhat.com/2106034 2106034  https://bugzilla.redhat.com/2106035 2106035  https://bugzilla.redhat.com/2106042 2106042  https://bugzilla.redhat.com/2130105 2130105  https://bugzilla.redhat.com/2163609 2163609  https://bugzilla.redhat.com/2240246 2240246  https://errata.almalinux.org/9/ALSA-2023-5684.html ALSA-2023:5684 ALSA-2023:5684 �R�Emariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm �Q�Emariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm �P�Emariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm �R�Emariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm �Q�Emariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm �P�Emariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm ����0�+	�&�e�SBBBsecurity Important: bind security update ��e�Ehttps://access.redhat.com/errata/RHSA-2023:5689 RHSA-2023:5689 RHSA-2023:5689 
https://access.redhat.com/security/cve/CVE-2023-3341 CVE-2023-3341 CVE-2023-3341 https://bugzilla.redhat.com/2239621 2239621  https://errata.almalinux.org/9/ALSA-2023-5689.html ALSA-2023:5689 ALSA-2023:5689 [�+bind-devel-9.16.23-11.el9_2.2.i686.rpm �X�+bind-libs-9.16.23-11.el9_2.2.i686.rpm �?�+bind-doc-9.16.23-11.el9_2.2.noarch.rpm [�+bind-devel-9.16.23-11.el9_2.2.x86_64.rpm [�+bind-devel-9.16.23-11.el9_2.2.i686.rpm �X�+bind-libs-9.16.23-11.el9_2.2.i686.rpm �?�+bind-doc-9.16.23-11.el9_2.2.noarch.rpm [�+bind-devel-9.16.23-11.el9_2.2.x86_64.rpm ����~�,	�'�|security Important: dotnet6.0 security update ��*�ohttps://access.redhat.com/errata/RHSA-2023:5708 RHSA-2023:5708 RHSA-2023:5708 
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803  https://errata.almalinux.org/9/ALSA-2023-5708.html ALSA-2023:5708 ALSA-2023:5708 e�dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpm ����p�-	�(�~security Moderate: nginx security update 
���Qhttps://access.redhat.com/errata/RHSA-2023:5711 RHSA-2023:5711 RHSA-2023:5711 
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803  https://errata.almalinux.org/9/ALSA-2023-5711.html ALSA-2023:5711 ALSA-2023:5711 �Z�gnginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm �Z�gnginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm ����;�.	�)�@BBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update 
��j�Ehttps://access.redhat.com/errata/RHSA-2023:5733 RHSA-2023:5733 RHSA-2023:5733 
https://access.redhat.com/security/cve/CVE-2022-40433 CVE-2022-40433 CVE-2022-40433 https://access.redhat.com/security/cve/CVE-2023-22067 CVE-2023-22067 CVE-2023-22067 https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2237709 2237709  https://bugzilla.redhat.com/2243627 2243627  https://bugzilla.redhat.com/2243637 2243637  https://errata.almalinux.org/9/ALSA-2023-5733.html ALSA-2023:5733 ALSA-2023:5733 
�)Mjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �+Mjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �(Mjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �*Mjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �'Mjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �,Mjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �$Mjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �&Mjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �-Mjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �%Mjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm 
�)Mjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �+Mjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �(Mjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �*Mjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �'Mjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �,Mjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �$Mjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �&Mjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �-Mjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �%Mjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm ����/	�*�TBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update 
��/�&https://access.redhat.com/errata/RHSA-2023:5744 RHSA-2023:5744 RHSA-2023:5744 
https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2243627 2243627  https://errata.almalinux.org/9/ALSA-2023-5744.html ALSA-2023:5744 ALSA-2023:5744 �Q%java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �G%java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �R%java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �J%java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �K%java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �F%java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �M%java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �H%java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �P%java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �L%java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �N%java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �O%java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �I%java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �S%java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �Q%java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �G%java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �R%java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �J%java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �K%java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �F%java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �M%java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �H%java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �P%java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �L%java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �N%java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �O%java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �I%java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �S%java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm ��˶
�0	�+�psecurity Important: .NET 7.0 security update ��U�ohttps://access.redhat.com/errata/RHSA-2023:5749 RHSA-2023:5749 RHSA-2023:5749 
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803  https://errata.almalinux.org/9/ALSA-2023-5749.html ALSA-2023:5749 ALSA-2023:5749 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm �����1	�,�rBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update 
��D�<https://access.redhat.com/errata/RHSA-2023:5753 RHSA-2023:5753 RHSA-2023:5753 
https://access.redhat.com/security/cve/CVE-2023-22025 CVE-2023-22025 CVE-2023-22025 https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2243627 2243627  https://bugzilla.redhat.com/2243805 2243805  https://errata.almalinux.org/9/ALSA-2023-5753.html ALSA-2023:5753 ALSA-2023:5753 v6java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm m6java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm o6java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm w6java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm r6java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm t6java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm p6java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm l6java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm k6java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm q6java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm u6java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm n6java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm s6java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm j6java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm v6java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm m6java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm o6java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm w6java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm r6java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm t6java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm p6java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm l6java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm k6java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm q6java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm u6java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm n6java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm s6java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm j6java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm ��˩n�2	��NBBBsecurity Important: nghttp2 security update �� �-https://access.redhat.com/errata/RHSA-2023:5838 RHSA-2023:5838 RHSA-2023:5838 
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803  https://errata.almalinux.org/9/ALSA-2023-5838.html ALSA-2023:5838 ALSA-2023:5838 �S�nghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��libnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm ��libnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm �S�nghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��libnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm ��libnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm ��Ù1�3	�-�SBsecurity Important: varnish security update ��-�https://access.redhat.com/errata/RHSA-2023:5924 RHSA-2023:5924 RHSA-2023:5924 
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803  https://errata.almalinux.org/9/ALSA-2023-5924.html ALSA-2023:5924 ALSA-2023:5924 �v�varnish-devel-6.6.2-3.el9_2.1.i686.rpm �v�varnish-devel-6.6.2-3.el9_2.1.x86_64.rpm �v�varnish-devel-6.6.2-3.el9_2.1.i686.rpm �v�varnish-devel-6.6.2-3.el9_2.1.x86_64.rpm ����z�4	�.�Vsecurity Moderate: .NET 6.0 security update 
��=�Qhttps://access.redhat.com/errata/RHSA-2023:6242 RHSA-2023:6242 RHSA-2023:6242 
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317  https://errata.almalinux.org/9/ALSA-2023-6242.html ALSA-2023:6242 ALSA-2023:6242 e�dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm �����5�0	�/�Xsecurity Moderate: .NET 7.0 security update 
���Qhttps://access.redhat.com/errata/RHSA-2023:6246 RHSA-2023:6246 RHSA-2023:6246 
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317  https://errata.almalinux.org/9/ALSA-2023-6246.html ALSA-2023:6246 ALSA-2023:6246 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpm ����I�6	�3�pBB�iBBBBsecurity Important: ghostscript security update ��_�https://access.redhat.com/errata/RHSA-2023:6265 RHSA-2023:6265 RHSA-2023:6265 
https://access.redhat.com/security/cve/CVE-2023-43115 CVE-2023-43115 CVE-2023-43115 https://bugzilla.redhat.com/2241108 2241108  https://errata.almalinux.org/9/ALSA-2023-6265.html ALSA-2023:6265 ALSA-2023:6265 �x�jghostscript-9.54.0-11.el9_2.i686.rpm \�jlibgs-devel-9.54.0-11.el9_2.i686.rpm \�jlibgs-devel-9.54.0-11.el9_2.x86_64.rpm �z�jghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm �y�jghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm �x�jghostscript-9.54.0-11.el9_2.i686.rpm \�jlibgs-devel-9.54.0-11.el9_2.i686.rpm \�jlibgs-devel-9.54.0-11.el9_2.x86_64.rpm �z�jghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm �y�jghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm ����~�7	�6�tB�lBsecurity Moderate: edk2 security, bug fix, and enhancement update 
��`�Bhttps://access.redhat.com/errata/RHSA-2023:6330 RHSA-2023:6330 RHSA-2023:6330 
https://access.redhat.com/security/cve/CVE-2019-14560 CVE-2019-14560 CVE-2019-14560 https://access.redhat.com/security/cve/CVE-2023-2650 CVE-2023-2650 CVE-2023-2650 https://bugzilla.redhat.com/1858038 1858038  https://bugzilla.redhat.com/2207947 2207947  https://errata.almalinux.org/9/ALSA-2023-6330.html ALSA-2023:6330 ALSA-2023:6330 �w�6edk2-tools-20230524-3.el9.x86_64.rpm �@�6edk2-aarch64-20230524-3.el9.noarch.rpm �A�6edk2-tools-doc-20230524-3.el9.noarch.rpm ��6edk2-ovmf-20230524-3.el9.noarch.rpm �w�6edk2-tools-20230524-3.el9.x86_64.rpm �@�6edk2-aarch64-20230524-3.el9.noarch.rpm �A�6edk2-tools-doc-20230524-3.el9.noarch.rpm ��6edk2-ovmf-20230524-3.el9.noarch.rpm ����8	�7�cBBsecurity Moderate: xorg-x11-server security and bug fix update 
��"�https://access.redhat.com/errata/RHSA-2023:6340 RHSA-2023:6340 RHSA-2023:6340 
https://access.redhat.com/security/cve/CVE-2023-1393 CVE-2023-1393 CVE-2023-1393 https://bugzilla.redhat.com/2180288 2180288  https://errata.almalinux.org/9/ALSA-2023-6340.html ALSA-2023:6340 ALSA-2023:6340 i�+xorg-x11-server-devel-1.20.11-19.el9.i686.rpm �V�+xorg-x11-server-source-1.20.11-19.el9.noarch.rpm i�+xorg-x11-server-devel-1.20.11-19.el9.x86_64.rpm i�+xorg-x11-server-devel-1.20.11-19.el9.i686.rpm �V�+xorg-x11-server-source-1.20.11-19.el9.noarch.rpm i�+xorg-x11-server-devel-1.20.11-19.el9.x86_64.rpm ����P�9	�8�gBsecurity Moderate: LibRaw security update 
��&�Ghttps://access.redhat.com/errata/RHSA-2023:6343 RHSA-2023:6343 RHSA-2023:6343 
https://access.redhat.com/security/cve/CVE-2021-32142 CVE-2021-32142 CVE-2021-32142 https://bugzilla.redhat.com/2172004 2172004  https://errata.almalinux.org/9/ALSA-2023-6343.html ALSA-2023:6343 ALSA-2023:6343 ��WLibRaw-devel-0.20.2-6.el9.x86_64.rpm ��WLibRaw-devel-0.20.2-6.el9.i686.rpm ��WLibRaw-devel-0.20.2-6.el9.x86_64.rpm ��WLibRaw-devel-0.20.2-6.el9.i686.rpm �����:	�9�jBBsecurity Moderate: qt5 security and bug fix update 
��m�https://access.redhat.com/errata/RHSA-2023:6369 RHSA-2023:6369 RHSA-2023:6369 
https://access.redhat.com/security/cve/CVE-2023-32573 CVE-2023-32573 CVE-2023-32573 https://access.redhat.com/security/cve/CVE-2023-33285 CVE-2023-33285 CVE-2023-33285 https://access.redhat.com/security/cve/CVE-2023-34410 CVE-2023-34410 CVE-2023-34410 https://access.redhat.com/security/cve/CVE-2023-37369 CVE-2023-37369 CVE-2023-37369 https://access.redhat.com/security/cve/CVE-2023-38197 CVE-2023-38197 CVE-2023-38197 https://bugzilla.redhat.com/2208135 2208135  https://bugzilla.redhat.com/2209488 2209488  https://bugzilla.redhat.com/2212747 2212747  https://bugzilla.redhat.com/2222767 2222767  https://bugzilla.redhat.com/2232173 2232173  https://errata.almalinux.org/9/ALSA-2023-6369.html ALSA-2023:6369 ALSA-2023:6369 �`�qt5-devel-5.15.9-1.el9.noarch.rpm �u�qt5-qtbase-static-5.15.9-7.el9.x86_64.rpm �u�qt5-qtbase-static-5.15.9-7.el9.i686.rpm �`�qt5-devel-5.15.9-1.el9.noarch.rpm �u�qt5-qtbase-static-5.15.9-7.el9.x86_64.rpm �u�qt5-qtbase-static-5.15.9-7.el9.i686.rpm ����]�;	�:�nBBBBBBsecurity Moderate: libvirt security, bug fix, and enhancement update 
��
�https://access.redhat.com/errata/RHSA-2023:6409 RHSA-2023:6409 RHSA-2023:6409 
https://access.redhat.com/security/cve/CVE-2023-3750 CVE-2023-3750 CVE-2023-3750 https://bugzilla.redhat.com/2222210 2222210  https://errata.almalinux.org/9/ALSA-2023-6409.html ALSA-2023:6409 ALSA-2023:6409 �X�libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm ��libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm ��libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm �~�libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpm �X�libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm ��libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm ��libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm �~�libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpm ����O�<	�;�vsecurity Moderate: libfastjson security update 
���[https://access.redhat.com/errata/RHSA-2023:6431 RHSA-2023:6431 RHSA-2023:6431 
https://access.redhat.com/security/cve/CVE-2020-12762 CVE-2020-12762 CVE-2020-12762 https://bugzilla.redhat.com/1835253 1835253  https://errata.almalinux.org/9/ALSA-2023-6431.html ALSA-2023:6431 ALSA-2023:6431 �[�alibfastjson-devel-0.99.9-5.el9.x86_64.rpm �[�alibfastjson-devel-0.99.9-5.el9.x86_64.rpm ����v�=	�<�xBsecurity Moderate: wireshark security update 
��t�Ghttps://access.redhat.com/errata/RHSA-2023:6469 RHSA-2023:6469 RHSA-2023:6469 
https://access.redhat.com/security/cve/CVE-2023-0666 CVE-2023-0666 CVE-2023-0666 https://access.redhat.com/security/cve/CVE-2023-0668 CVE-2023-0668 CVE-2023-0668 https://access.redhat.com/security/cve/CVE-2023-2855 CVE-2023-2855 CVE-2023-2855 https://access.redhat.com/security/cve/CVE-2023-2856 CVE-2023-2856 CVE-2023-2856 https://access.redhat.com/security/cve/CVE-2023-2858 CVE-2023-2858 CVE-2023-2858 https://access.redhat.com/security/cve/CVE-2023-2952 CVE-2023-2952 CVE-2023-2952 https://bugzilla.redhat.com/2210822 2210822  https://bugzilla.redhat.com/2210824 2210824  https://bugzilla.redhat.com/2210829 2210829  https://bugzilla.redhat.com/2210832 2210832  https://bugzilla.redhat.com/2210835 2210835  https://bugzilla.redhat.com/2211406 2211406  https://errata.almalinux.org/9/ALSA-2023-6469.html ALSA-2023:6469 ALSA-2023:6469 �(�ywireshark-devel-3.4.10-6.el9.x86_64.rpm �(�ywireshark-devel-3.4.10-6.el9.i686.rpm �(�ywireshark-devel-3.4.10-6.el9.x86_64.rpm �(�ywireshark-devel-3.4.10-6.el9.i686.rpm �����>	�=�{Bsecurity Moderate: librabbitmq security update 
��;�Whttps://access.redhat.com/errata/RHSA-2023:6482 RHSA-2023:6482 RHSA-2023:6482 
https://access.redhat.com/security/cve/CVE-2023-35789 CVE-2023-35789 CVE-2023-35789 https://bugzilla.redhat.com/2215762 2215762  https://errata.almalinux.org/9/ALSA-2023-6482.html ALSA-2023:6482 ALSA-2023:6482 �&�Ulibrabbitmq-devel-0.11.0-7.el9.i686.rpm �&�Ulibrabbitmq-devel-0.11.0-7.el9.x86_64.rpm �&�Ulibrabbitmq-devel-0.11.0-7.el9.i686.rpm �&�Ulibrabbitmq-devel-0.11.0-7.el9.x86_64.rpm �����?	� �~B�@BBBBBBBBBsecurity Moderate: python3.11 security update 
���bhttps://access.redhat.com/errata/RHSA-2023:6494 RHSA-2023:6494 RHSA-2023:6494 
https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://access.redhat.com/security/cve/CVE-2023-41105 CVE-2023-41105 CVE-2023-41105 https://bugzilla.redhat.com/2235795 2235795  https://bugzilla.redhat.com/263261 263261  https://errata.almalinux.org/9/ALSA-2023-6494.html ALSA-2023:6494 ALSA-2023:6494 }python3.11-idle-3.11.5-1.el9_3.x86_64.rpm }python3.11-debug-3.11.5-1.el9_3.x86_64.rpm f}python3.11-3.11.5-1.el9_3.i686.rpm }python3.11-debug-3.11.5-1.el9_3.i686.rpm g}python3.11-tkinter-3.11.5-1.el9_3.i686.rpm }python3.11-test-3.11.5-1.el9_3.x86_64.rpm }python3.11-test-3.11.5-1.el9_3.i686.rpm }python3.11-idle-3.11.5-1.el9_3.i686.rpm }python3.11-idle-3.11.5-1.el9_3.x86_64.rpm }python3.11-debug-3.11.5-1.el9_3.x86_64.rpm f}python3.11-3.11.5-1.el9_3.i686.rpm }python3.11-debug-3.11.5-1.el9_3.i686.rpm g}python3.11-tkinter-3.11.5-1.el9_3.i686.rpm }python3.11-test-3.11.5-1.el9_3.x86_64.rpm }python3.11-test-3.11.5-1.el9_3.i686.rpm }python3.11-idle-3.11.5-1.el9_3.i686.rpm ����?�@	��IBBsecurity Moderate: libreoffice security update 
��t�/
https://access.redhat.com/errata/RHSA-2023:6508 RHSA-2023:6508 RHSA-2023:6508 
https://access.redhat.com/security/cve/CVE-2022-38745 CVE-2022-38745 CVE-2022-38745 https://access.redhat.com/security/cve/CVE-2023-0950 CVE-2023-0950 CVE-2023-0950 https://access.redhat.com/security/cve/CVE-2023-1183 CVE-2023-1183 CVE-2023-1183 https://access.redhat.com/security/cve/CVE-2023-2255 CVE-2023-2255 CVE-2023-2255 https://bugzilla.redhat.com/2182044 2182044  https://bugzilla.redhat.com/2208506 2208506  https://bugzilla.redhat.com/2210185 2210185  https://bugzilla.redhat.com/2210186 2210186  https://errata.almalinux.org/9/ALSA-2023-6508.html ALSA-2023:6508 ALSA-2023:6508 �2�>libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpm �3�>libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm �2�>libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpm �3�>libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm �����A	��BB�KBBBsecurity Moderate: flatpak security, bug fix, and enhancement update 
��#�whttps://access.redhat.com/errata/RHSA-2023:6518 RHSA-2023:6518 RHSA-2023:6518 
https://access.redhat.com/security/cve/CVE-2023-28100 CVE-2023-28100 CVE-2023-28100 https://access.redhat.com/security/cve/CVE-2023-28101 CVE-2023-28101 CVE-2023-28101 https://bugzilla.redhat.com/2179219 2179219  https://bugzilla.redhat.com/2179220 2179220  https://errata.almalinux.org/9/ALSA-2023-6518.html ALSA-2023:6518 ALSA-2023:6518 �q�	flatpak-devel-1.12.8-1.el9.i686.rpm �7�	flatpak-1.12.8-1.el9.i686.rpm �8�	flatpak-session-helper-1.12.8-1.el9.i686.rpm �q�	flatpak-devel-1.12.8-1.el9.x86_64.rpm �q�	flatpak-devel-1.12.8-1.el9.i686.rpm �7�	flatpak-1.12.8-1.el9.i686.rpm �8�	flatpak-session-helper-1.12.8-1.el9.i686.rpm �q�	flatpak-devel-1.12.8-1.el9.x86_64.rpm ����T�B	��EBB�LBBBBsecurity Moderate: ghostscript security and bug fix update 
���rhttps://access.redhat.com/errata/RHSA-2023:6544 RHSA-2023:6544 RHSA-2023:6544 
https://access.redhat.com/security/cve/CVE-2023-28879 CVE-2023-28879 CVE-2023-28879 https://access.redhat.com/security/cve/CVE-2023-38559 CVE-2023-38559 CVE-2023-38559 https://bugzilla.redhat.com/2184585 2184585  https://bugzilla.redhat.com/2224367 2224367  https://errata.almalinux.org/9/ALSA-2023-6544.html ALSA-2023:6544 ALSA-2023:6544 �y�kghostscript-tools-fonts-9.54.0-13.el9.i686.rpm \�klibgs-devel-9.54.0-13.el9.x86_64.rpm �x�kghostscript-9.54.0-13.el9.i686.rpm �z�kghostscript-tools-printing-9.54.0-13.el9.i686.rpm \�klibgs-devel-9.54.0-13.el9.i686.rpm �y�kghostscript-tools-fonts-9.54.0-13.el9.i686.rpm \�klibgs-devel-9.54.0-13.el9.x86_64.rpm �x�kghostscript-9.54.0-13.el9.i686.rpm �z�kghostscript-tools-printing-9.54.0-13.el9.i686.rpm \�klibgs-devel-9.54.0-13.el9.i686.rpm �����C	�	�XBsecurity Moderate: yajl security update 
���,https://access.redhat.com/errata/RHSA-2023:6551 RHSA-2023:6551 RHSA-2023:6551 
https://access.redhat.com/security/cve/CVE-2023-33460 CVE-2023-33460 CVE-2023-33460 https://bugzilla.redhat.com/2221249 2221249  https://errata.almalinux.org/9/ALSA-2023-6551.html ALSA-2023:6551 ALSA-2023:6551 �<�|yajl-devel-2.1.0-22.el9.i686.rpm �<�|yajl-devel-2.1.0-22.el9.x86_64.rpm �<�|yajl-devel-2.1.0-22.el9.i686.rpm �<�|yajl-devel-2.1.0-22.el9.x86_64.rpm �����D	�
�[BBsecurity Moderate: libmicrohttpd security update 
��8�~https://access.redhat.com/errata/RHSA-2023:6566 RHSA-2023:6566 RHSA-2023:6566 
https://access.redhat.com/security/cve/CVE-2023-27371 CVE-2023-27371 CVE-2023-27371 https://bugzilla.redhat.com/2174313 2174313  https://errata.almalinux.org/9/ALSA-2023-6566.html ALSA-2023:6566 ALSA-2023:6566 �%�0libmicrohttpd-devel-0.9.72-5.el9.i686.rpm �%�0libmicrohttpd-devel-0.9.72-5.el9.x86_64.rpm �!�0libmicrohttpd-doc-0.9.72-5.el9.noarch.rpm �%�0libmicrohttpd-devel-0.9.72-5.el9.i686.rpm �%�0libmicrohttpd-devel-0.9.72-5.el9.x86_64.rpm �!�0libmicrohttpd-doc-0.9.72-5.el9.noarch.rpm ����V�E	��_security Moderate: libtiff security update 
��6�Nhttps://access.redhat.com/errata/RHSA-2023:6575 RHSA-2023:6575 RHSA-2023:6575 
https://access.redhat.com/security/cve/CVE-2023-26965 CVE-2023-26965 CVE-2023-26965 https://access.redhat.com/security/cve/CVE-2023-26966 CVE-2023-26966 CVE-2023-26966 https://access.redhat.com/security/cve/CVE-2023-2731 CVE-2023-2731 CVE-2023-2731 https://access.redhat.com/security/cve/CVE-2023-3316 CVE-2023-3316 CVE-2023-3316 https://access.redhat.com/security/cve/CVE-2023-3576 CVE-2023-3576 CVE-2023-3576 https://bugzilla.redhat.com/2207635 2207635  https://bugzilla.redhat.com/2215206 2215206  https://bugzilla.redhat.com/2216080 2216080  https://bugzilla.redhat.com/2218749 2218749  https://bugzilla.redhat.com/2219340 2219340  https://errata.almalinux.org/9/ALSA-2023-6575.html ALSA-2023:6575 ALSA-2023:6575 �{�slibtiff-tools-4.4.0-10.el9.x86_64.rpm �{�slibtiff-tools-4.4.0-10.el9.x86_64.rpm ����}�F	��aBBBBsecurity Moderate: protobuf-c security update 
���}https://access.redhat.com/errata/RHSA-2023:6621 RHSA-2023:6621 RHSA-2023:6621 
https://access.redhat.com/security/cve/CVE-2022-48468 CVE-2022-48468 CVE-2022-48468 https://bugzilla.redhat.com/2186673 2186673  https://errata.almalinux.org/9/ALSA-2023-6621.html ALSA-2023:6621 ALSA-2023:6621 �1�!protobuf-c-devel-1.3.3-13.el9.i686.rpm �0�!protobuf-c-compiler-1.3.3-13.el9.x86_64.rpm �1�!protobuf-c-devel-1.3.3-13.el9.x86_64.rpm �0�!protobuf-c-compiler-1.3.3-13.el9.i686.rpm �1�!protobuf-c-devel-1.3.3-13.el9.i686.rpm �0�!protobuf-c-compiler-1.3.3-13.el9.x86_64.rpm �1�!protobuf-c-devel-1.3.3-13.el9.x86_64.rpm �0�!protobuf-c-compiler-1.3.3-13.el9.i686.rpm ����_�G	��gBsecurity Low: glib2 security and bug fix update �>���ohttps://access.redhat.com/errata/RHSA-2023:6631 RHSA-2023:6631 RHSA-2023:6631 
https://access.redhat.com/security/cve/CVE-2023-29499 CVE-2023-29499 CVE-2023-29499 https://access.redhat.com/security/cve/CVE-2023-32611 CVE-2023-32611 CVE-2023-32611 https://access.redhat.com/security/cve/CVE-2023-32665 CVE-2023-32665 CVE-2023-32665 https://bugzilla.redhat.com/2211827 2211827  https://bugzilla.redhat.com/2211828 2211828  https://bugzilla.redhat.com/2211829 2211829  https://errata.almalinux.org/9/ALSA-2023-6631.html ALSA-2023:6631 ALSA-2023:6631 ��~glib2-static-2.68.4-11.el9.x86_64.rpm ��~glib2-static-2.68.4-11.el9.i686.rpm ��~glib2-static-2.68.4-11.el9.x86_64.rpm ��~glib2-static-2.68.4-11.el9.i686.rpm �����H	��jBsecurity Low: shadow-utils security and bug fix update �>��p�Yhttps://access.redhat.com/errata/RHSA-2023:6632 RHSA-2023:6632 RHSA-2023:6632 
https://access.redhat.com/security/cve/CVE-2023-4641 CVE-2023-4641 CVE-2023-4641 https://bugzilla.redhat.com/2215945 2215945  https://errata.almalinux.org/9/ALSA-2023-6632.html ALSA-2023:6632 ALSA-2023:6632 �4�shadow-utils-subid-devel-4.9-8.el9.i686.rpm �4�shadow-utils-subid-devel-4.9-8.el9.x86_64.rpm �4�shadow-utils-subid-devel-4.9-8.el9.i686.rpm �4�shadow-utils-subid-devel-4.9-8.el9.x86_64.rpm �����I	��M�F�\BBBBBBBBBsecurity Moderate: python3.9 security update 
��I� https://access.redhat.com/errata/RHSA-2023:6659 RHSA-2023:6659 RHSA-2023:6659 
https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://bugzilla.redhat.com/263261 263261  https://errata.almalinux.org/9/ALSA-2023-6659.html ALSA-2023:6659 ALSA-2023:6659 �python3-debug-3.9.18-1.el9_3.x86_64.rpm �python3-test-3.9.18-1.el9_3.i686.rpm �python3-test-3.9.18-1.el9_3.x86_64.rpm �python3-debug-3.9.18-1.el9_3.i686.rpm Y�python3-3.9.18-1.el9_3.i686.rpm �python3-idle-3.9.18-1.el9_3.x86_64.rpm �python3-idle-3.9.18-1.el9_3.i686.rpm Z�python3-tkinter-3.9.18-1.el9_3.i686.rpm �python3-debug-3.9.18-1.el9_3.x86_64.rpm �python3-test-3.9.18-1.el9_3.i686.rpm �python3-test-3.9.18-1.el9_3.x86_64.rpm �python3-debug-3.9.18-1.el9_3.i686.rpm Y�python3-3.9.18-1.el9_3.i686.rpm �python3-idle-3.9.18-1.el9_3.x86_64.rpm �python3-idle-3.9.18-1.el9_3.i686.rpm Z�python3-tkinter-3.9.18-1.el9_3.i686.rpm ����E�J	��xBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update 
��i�K
https://access.redhat.com/errata/RHSA-2023:6667 RHSA-2023:6667 RHSA-2023:6667 
https://access.redhat.com/security/cve/CVE-2022-2127 CVE-2022-2127 CVE-2022-2127 https://access.redhat.com/security/cve/CVE-2023-34966 CVE-2023-34966 CVE-2023-34966 https://access.redhat.com/security/cve/CVE-2023-34967 CVE-2023-34967 CVE-2023-34967 https://access.redhat.com/security/cve/CVE-2023-34968 CVE-2023-34968 CVE-2023-34968 https://bugzilla.redhat.com/2222791 2222791  https://bugzilla.redhat.com/2222793 2222793  https://bugzilla.redhat.com/2222794 2222794  https://bugzilla.redhat.com/2222795 2222795  https://errata.almalinux.org/9/ALSA-2023-6667.html ALSA-2023:6667 ALSA-2023:6667 �9Dpython3-samba-test-4.18.6-100.el9.x86_64.rpm �sDlibnetapi-devel-4.18.6-100.el9.i686.rpm �1Dlibsmbclient-devel-4.18.6-100.el9.x86_64.rpm �3Dsamba-devel-4.18.6-100.el9.i686.rpm �2Dlibwbclient-devel-4.18.6-100.el9.i686.rpm �Dsamba-pidl-4.18.6-100.el9.noarch.rpm �tDpython3-samba-devel-4.18.6-100.el9.i686.rpm �5Dsamba-test-libs-4.18.6-100.el9.x86_64.rpm �tDpython3-samba-devel-4.18.6-100.el9.x86_64.rpm �4Dsamba-test-4.18.6-100.el9.x86_64.rpm �1Dlibsmbclient-devel-4.18.6-100.el9.i686.rpm �2Dlibwbclient-devel-4.18.6-100.el9.x86_64.rpm �3Dsamba-devel-4.18.6-100.el9.x86_64.rpm �sDlibnetapi-devel-4.18.6-100.el9.x86_64.rpm �9Dpython3-samba-test-4.18.6-100.el9.x86_64.rpm �sDlibnetapi-devel-4.18.6-100.el9.i686.rpm �1Dlibsmbclient-devel-4.18.6-100.el9.x86_64.rpm �3Dsamba-devel-4.18.6-100.el9.i686.rpm �2Dlibwbclient-devel-4.18.6-100.el9.i686.rpm �Dsamba-pidl-4.18.6-100.el9.noarch.rpm �tDpython3-samba-devel-4.18.6-100.el9.i686.rpm �5Dsamba-test-libs-4.18.6-100.el9.x86_64.rpm �tDpython3-samba-devel-4.18.6-100.el9.x86_64.rpm �4Dsamba-test-4.18.6-100.el9.x86_64.rpm �1Dlibsmbclient-devel-4.18.6-100.el9.i686.rpm �2Dlibwbclient-devel-4.18.6-100.el9.x86_64.rpm �3Dsamba-devel-4.18.6-100.el9.x86_64.rpm �sDlibnetapi-devel-4.18.6-100.el9.x86_64.rpm ����0�K	��NBsecurity Low: tpm2-tss security and enhancement update �>��4�Rhttps://access.redhat.com/errata/RHSA-2023:6685 RHSA-2023:6685 RHSA-2023:6685 
https://access.redhat.com/security/cve/CVE-2023-22745 CVE-2023-22745 CVE-2023-22745 https://bugzilla.redhat.com/2162610 2162610  https://errata.almalinux.org/9/ALSA-2023-6685.html ALSA-2023:6685 ALSA-2023:6685 �7�tpm2-tss-devel-3.2.2-2.el9.i686.rpm �7�tpm2-tss-devel-3.2.2-2.el9.x86_64.rpm �7�tpm2-tss-devel-3.2.2-2.el9.i686.rpm �7�tpm2-tss-devel-3.2.2-2.el9.x86_64.rpm ���� �L	��QBsecurity Low: procps-ng security and bug fix update �>���Hhttps://access.redhat.com/errata/RHSA-2023:6705 RHSA-2023:6705 RHSA-2023:6705 
https://access.redhat.com/security/cve/CVE-2023-4016 CVE-2023-4016 CVE-2023-4016 https://bugzilla.redhat.com/2228494 2228494  https://errata.almalinux.org/9/ALSA-2023-6705.html ALSA-2023:6705 ALSA-2023:6705 �/�procps-ng-devel-3.3.17-13.el9.x86_64.rpm �/�procps-ng-devel-3.3.17-13.el9.i686.rpm �/�procps-ng-devel-3.3.17-13.el9.x86_64.rpm �/�procps-ng-devel-3.3.17-13.el9.i686.rpm ����#�M	��TBBBBBBBBBBBBBBBBsecurity Moderate: avahi security update 
��N�https://access.redhat.com/errata/RHSA-2023:6707 RHSA-2023:6707 RHSA-2023:6707 
https://access.redhat.com/security/cve/CVE-2021-3468 CVE-2021-3468 CVE-2021-3468 https://access.redhat.com/security/cve/CVE-2021-3502 CVE-2021-3502 CVE-2021-3502 https://access.redhat.com/security/cve/CVE-2023-1981 CVE-2023-1981 CVE-2023-1981 https://bugzilla.redhat.com/1939614 1939614  https://bugzilla.redhat.com/1946914 1946914  https://bugzilla.redhat.com/2185911 2185911  https://errata.almalinux.org/9/ALSA-2023-6707.html ALSA-2023:6707 ALSA-2023:6707 �Gavahi-devel-0.8-15.el9.x86_64.rpm �Gavahi-compat-libdns_sd-0.8-15.el9.i686.rpm �Gavahi-compat-howl-devel-0.8-15.el9.i686.rpm �Gavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm �Gavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm �Gavahi-devel-0.8-15.el9.i686.rpm �Gavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm �Gavahi-glib-devel-0.8-15.el9.i686.rpm �Gavahi-glib-devel-0.8-15.el9.x86_64.rpm �Gavahi-compat-howl-0.8-15.el9.i686.rpm �Gavahi-compat-howl-0.8-15.el9.x86_64.rpm �Gavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm �Gavahi-devel-0.8-15.el9.x86_64.rpm �Gavahi-compat-libdns_sd-0.8-15.el9.i686.rpm �Gavahi-compat-howl-devel-0.8-15.el9.i686.rpm �Gavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm �Gavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm �Gavahi-devel-0.8-15.el9.i686.rpm �Gavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm �Gavahi-glib-devel-0.8-15.el9.i686.rpm �Gavahi-glib-devel-0.8-15.el9.x86_64.rpm �Gavahi-compat-howl-0.8-15.el9.i686.rpm �Gavahi-compat-howl-0.8-15.el9.x86_64.rpm �Gavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm �����N	�(�fsecurity Moderate: python-wheel security update 
��_�?https://access.redhat.com/errata/RHSA-2023:6712 RHSA-2023:6712 RHSA-2023:6712 
https://access.redhat.com/security/cve/CVE-2022-40898 CVE-2022-40898 CVE-2022-40898 https://bugzilla.redhat.com/2165864 2165864  https://errata.almalinux.org/9/ALSA-2023-6712.html ALSA-2023:6712 ALSA-2023:6712 �,�<python3-wheel-wheel-0.36.2-8.el9.noarch.rpm �+�<python3-wheel-0.36.2-8.el9.noarch.rpm �,�<python3-wheel-wheel-0.36.2-8.el9.noarch.rpm �+�<python3-wheel-0.36.2-8.el9.noarch.rpm ����&�O	��QBB�WBBBBsecurity Important: ghostscript security update ���https://access.redhat.com/errata/RHSA-2023:6732 RHSA-2023:6732 RHSA-2023:6732 
https://access.redhat.com/security/cve/CVE-2023-43115 CVE-2023-43115 CVE-2023-43115 https://bugzilla.redhat.com/2241108 2241108  https://errata.almalinux.org/9/ALSA-2023-6732.html ALSA-2023:6732 ALSA-2023:6732 \�llibgs-devel-9.54.0-14.el9_3.i686.rpm �z�lghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm �y�lghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm �x�lghostscript-9.54.0-14.el9_3.i686.rpm \�llibgs-devel-9.54.0-14.el9_3.x86_64.rpm \�llibgs-devel-9.54.0-14.el9_3.i686.rpm �z�lghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm �y�lghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm �x�lghostscript-9.54.0-14.el9_3.i686.rpm \�llibgs-devel-9.54.0-14.el9_3.x86_64.rpm �����P	��oBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security and bug fix update 
���https://access.redhat.com/errata/RHSA-2023:6738 RHSA-2023:6738 RHSA-2023:6738 
https://access.redhat.com/security/cve/CVE-2023-22025 CVE-2023-22025 CVE-2023-22025 https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2243627 2243627  https://bugzilla.redhat.com/2243805 2243805  https://errata.almalinux.org/9/ALSA-2023-6738.html ALSA-2023:6738 ALSA-2023:6738 �_7java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �e7java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �\7java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �[7java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �^7java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �f7java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �Y7java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �a7java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �c7java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �`7java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �d7java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �Z7java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �]7java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �b7java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �_7java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �e7java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �\7java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �[7java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �^7java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �f7java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �Y7java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �a7java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �c7java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �`7java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �d7java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �Z7java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �]7java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �b7java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �����Q	��KBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security update 
��9�Yhttps://access.redhat.com/errata/RHSA-2023:6744 RHSA-2023:6744 RHSA-2023:6744 
https://access.redhat.com/security/cve/CVE-2023-3961 CVE-2023-3961 CVE-2023-3961 https://access.redhat.com/security/cve/CVE-2023-4091 CVE-2023-4091 CVE-2023-4091 https://access.redhat.com/security/cve/CVE-2023-42669 CVE-2023-42669 CVE-2023-42669 https://bugzilla.redhat.com/2241881 2241881  https://bugzilla.redhat.com/2241882 2241882  https://bugzilla.redhat.com/2241884 2241884  https://errata.almalinux.org/9/ALSA-2023-6744.html ALSA-2023:6744 ALSA-2023:6744 �1Elibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �2Elibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �sElibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �9Epython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �4Esamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �sElibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpm �2Elibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �Esamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpm �5Esamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �3Esamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �tEpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �tEpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �3Esamba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �1Elibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �1Elibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �2Elibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �sElibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �9Epython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �4Esamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �sElibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpm �2Elibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �Esamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpm �5Esamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �3Esamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �tEpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �tEpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �3Esamba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �1Elibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �����R	��aBBBsecurity Important: nghttp2 security update ���-https://access.redhat.com/errata/RHSA-2023:6746 RHSA-2023:6746 RHSA-2023:6746 
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803  https://errata.almalinux.org/9/ALSA-2023-6746.html ALSA-2023:6746 ALSA-2023:6746 �S�	nghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��	libnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm ��	libnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm �S�	nghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��	libnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm ��	libnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm ����l�S	��fsecurity Moderate: dotnet8.0 security update 
��?�https://access.redhat.com/errata/RHSA-2023:7253 RHSA-2023:7253 RHSA-2023:7253 
https://access.redhat.com/security/cve/CVE-2023-36049 CVE-2023-36049 CVE-2023-36049 https://access.redhat.com/security/cve/CVE-2023-36558 CVE-2023-36558 CVE-2023-36558 https://bugzilla.redhat.com/2247750 2247750  https://bugzilla.redhat.com/2248883 2248883  https://errata.almalinux.org/9/ALSA-2023-7253.html ALSA-2023:7253 ALSA-2023:7253 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpm ��ٍ�T	��hsecurity Moderate: dotnet7.0 security update 
��[�1https://access.redhat.com/errata/RHSA-2023:7255 RHSA-2023:7255 RHSA-2023:7255 
https://access.redhat.com/security/cve/CVE-2023-36049 CVE-2023-36049 CVE-2023-36049 https://access.redhat.com/security/cve/CVE-2023-36558 CVE-2023-36558 CVE-2023-36558 https://bugzilla.redhat.com/2247750 2247750  https://bugzilla.redhat.com/2248883 2248883  https://errata.almalinux.org/9/ALSA-2023-7255.html ALSA-2023:7255 ALSA-2023:7255 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpm ����r�U	��jsecurity Moderate: dotnet6.0 security update 
���.https://access.redhat.com/errata/RHSA-2023:7257 RHSA-2023:7257 RHSA-2023:7257 
https://access.redhat.com/security/cve/CVE-2023-36049 CVE-2023-36049 CVE-2023-36049 https://access.redhat.com/security/cve/CVE-2023-36558 CVE-2023-36558 CVE-2023-36558 https://bugzilla.redhat.com/2247750 2247750  https://bugzilla.redhat.com/2248883 2248883  https://errata.almalinux.org/9/ALSA-2023-7257.html ALSA-2023:7257 ALSA-2023:7257 e�dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpm ��و9�V	��lBBBBBBBBBBsecurity Important: postgresql security update ��:�
https://access.redhat.com/errata/RHSA-2023:7784 RHSA-2023:7784 RHSA-2023:7784 
https://access.redhat.com/security/cve/CVE-2023-39417 CVE-2023-39417 CVE-2023-39417 https://access.redhat.com/security/cve/CVE-2023-5868 CVE-2023-5868 CVE-2023-5868 https://access.redhat.com/security/cve/CVE-2023-5869 CVE-2023-5869 CVE-2023-5869 https://access.redhat.com/security/cve/CVE-2023-5870 CVE-2023-5870 CVE-2023-5870 https://bugzilla.redhat.com/2228111 2228111  https://bugzilla.redhat.com/2247168 2247168  https://bugzilla.redhat.com/2247169 2247169  https://bugzilla.redhat.com/2247170 2247170  https://errata.almalinux.org/9/ALSA-2023-7784.html ALSA-2023:7784 ALSA-2023:7784 �~�9postgresql-server-devel-13.13-1.el9_3.x86_64.rpm �}�9postgresql-private-devel-13.13-1.el9_3.x86_64.rpm � �9postgresql-test-13.13-1.el9_3.x86_64.rpm �|�9postgresql-docs-13.13-1.el9_3.x86_64.rpm ��9postgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm ��9postgresql-static-13.13-1.el9_3.x86_64.rpm �~�9postgresql-server-devel-13.13-1.el9_3.x86_64.rpm �}�9postgresql-private-devel-13.13-1.el9_3.x86_64.rpm � �9postgresql-test-13.13-1.el9_3.x86_64.rpm �|�9postgresql-docs-13.13-1.el9_3.x86_64.rpm ��9postgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm ��9postgresql-static-13.13-1.el9_3.x86_64.rpm ����b�W	��xBsecurity Important: gstreamer1-plugins-bad-free security update ��@�https://access.redhat.com/errata/RHSA-2023:7791 RHSA-2023:7791 RHSA-2023:7791 
https://access.redhat.com/security/cve/CVE-2023-44429 CVE-2023-44429 CVE-2023-44429 https://access.redhat.com/security/cve/CVE-2023-44446 CVE-2023-44446 CVE-2023-44446 https://bugzilla.redhat.com/2250247 2250247  https://bugzilla.redhat.com/2250249 2250249  https://errata.almalinux.org/9/ALSA-2023-7791.html ALSA-2023:7791 ALSA-2023:7791 �r�fgstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm �r�fgstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm �r�fgstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm �r�fgstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm ���M�X	��;security Moderate: ipa security update 
��]�4https://access.redhat.com/errata/RHSA-2024:0141 RHSA-2024:0141 RHSA-2024:0141 
https://access.redhat.com/security/cve/CVE-2023-5455 CVE-2023-5455 CVE-2023-5455 https://bugzilla.redhat.com/2242828 2242828  https://errata.almalinux.org/9/ALSA-2024-0141.html ALSA-2024:0141 ALSA-2024:0141 ��python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm ��python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm ����[�Y	��|security Important: .NET 7.0 security update ���ghttps://access.redhat.com/errata/RHSA-2024:0151 RHSA-2024:0151 RHSA-2024:0151 
https://access.redhat.com/security/cve/CVE-2024-0056 CVE-2024-0056 CVE-2024-0056 https://access.redhat.com/security/cve/CVE-2024-0057 CVE-2024-0057 CVE-2024-0057 https://access.redhat.com/security/cve/CVE-2024-21319 CVE-2024-21319 CVE-2024-21319 https://bugzilla.redhat.com/2255384 2255384  https://bugzilla.redhat.com/2255386 2255386  https://bugzilla.redhat.com/2257566 2257566  https://errata.almalinux.org/9/ALSA-2024-0151.html ALSA-2024:0151 ALSA-2024:0151 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpm ����S�Z	��~security Important: .NET 8.0 security update ��x�fhttps://access.redhat.com/errata/RHSA-2024:0152 RHSA-2024:0152 RHSA-2024:0152 
https://access.redhat.com/security/cve/CVE-2024-0056 CVE-2024-0056 CVE-2024-0056 https://access.redhat.com/security/cve/CVE-2024-0057 CVE-2024-0057 CVE-2024-0057 https://access.redhat.com/security/cve/CVE-2024-21319 CVE-2024-21319 CVE-2024-21319 https://bugzilla.redhat.com/2255384 2255384  https://bugzilla.redhat.com/2255386 2255386  https://bugzilla.redhat.com/2257566 2257566  https://errata.almalinux.org/9/ALSA-2024-0152.html ALSA-2024:0152 ALSA-2024:0152 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm �����[	��@security Important: .NET 6.0 security update ��^�ghttps://access.redhat.com/errata/RHSA-2024:0156 RHSA-2024:0156 RHSA-2024:0156 
https://access.redhat.com/security/cve/CVE-2024-0056 CVE-2024-0056 CVE-2024-0056 https://access.redhat.com/security/cve/CVE-2024-0057 CVE-2024-0057 CVE-2024-0057 https://access.redhat.com/security/cve/CVE-2024-21319 CVE-2024-21319 CVE-2024-21319 https://bugzilla.redhat.com/2255384 2255384  https://bugzilla.redhat.com/2255386 2255386  https://bugzilla.redhat.com/2257566 2257566  https://errata.almalinux.org/9/ALSA-2024-0156.html ALSA-2024:0156 ALSA-2024:0156 e�dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpm ����v�\	� �BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-21-openjdk security update ��E�!https://access.redhat.com/errata/RHSA-2024:0249 RHSA-2024:0249 RHSA-2024:0249 
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257728 2257728  https://bugzilla.redhat.com/2257837 2257837  https://bugzilla.redhat.com/2257853 2257853  https://bugzilla.redhat.com/2257859 2257859  https://bugzilla.redhat.com/2257874 2257874  https://errata.almalinux.org/9/ALSA-2024-0249.html ALSA-2024:0249 ALSA-2024:0249 �a8java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �[8java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �_8java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �\8java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �f8java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �b8java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �`8java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �^8java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �]8java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �e8java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �Z8java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �c8java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �Y8java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �d8java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �a8java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �[8java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �_8java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �\8java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �f8java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �b8java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �`8java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �^8java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �]8java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �e8java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �Z8java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �c8java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �Y8java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �d8java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �����]	�!�^BBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security and bug fix update ��f�1https://access.redhat.com/errata/RHSA-2024:0265 RHSA-2024:0265 RHSA-2024:0265 
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20926 CVE-2024-20926 CVE-2024-20926 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257728 2257728  https://bugzilla.redhat.com/2257837 2257837  https://bugzilla.redhat.com/2257850 2257850  https://bugzilla.redhat.com/2257853 2257853  https://bugzilla.redhat.com/2257859 2257859  https://bugzilla.redhat.com/2257874 2257874  https://errata.almalinux.org/9/ALSA-2024-0265.html ALSA-2024:0265 ALSA-2024:0265 
�-Njava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �'Njava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �*Njava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �(Njava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �$Njava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �,Njava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �+Njava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �&Njava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �%Njava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �)Njava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm 
�-Njava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �'Njava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �*Njava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �(Njava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �$Njava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �,Njava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �+Njava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �&Njava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �%Njava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �)Njava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �����^	�"�rBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security update ���phttps://access.redhat.com/errata/RHSA-2024:0266 RHSA-2024:0266 RHSA-2024:0266 
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20926 CVE-2024-20926 CVE-2024-20926 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257728 2257728  https://bugzilla.redhat.com/2257837 2257837  https://bugzilla.redhat.com/2257850 2257850  https://bugzilla.redhat.com/2257853 2257853  https://bugzilla.redhat.com/2257859 2257859  https://bugzilla.redhat.com/2257874 2257874  https://errata.almalinux.org/9/ALSA-2024-0266.html ALSA-2024:0266 ALSA-2024:0266 �M&java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �L&java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �O&java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �F&java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �I&java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �H&java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �Q&java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �K&java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �G&java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �R&java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �J&java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �N&java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �S&java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �P&java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �M&java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �L&java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �O&java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �F&java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �I&java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �H&java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �Q&java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �K&java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �G&java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �R&java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �J&java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �N&java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �S&java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �P&java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm ����C�_	�#�NBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security and bug fix update ���*https://access.redhat.com/errata/RHSA-2024:0267 RHSA-2024:0267 RHSA-2024:0267 
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20932 CVE-2024-20932 CVE-2024-20932 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257720 2257720  https://bugzilla.redhat.com/2257728 2257728  https://bugzilla.redhat.com/2257837 2257837  https://bugzilla.redhat.com/2257853 2257853  https://bugzilla.redhat.com/2257859 2257859  https://bugzilla.redhat.com/2257874 2257874  https://errata.almalinux.org/9/ALSA-2024-0267.html ALSA-2024:0267 ALSA-2024:0267 p*java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm n*java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm j*java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm o*java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm v*java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm t*java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm l*java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm s*java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm m*java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm w*java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm u*java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm q*java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm r*java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm k*java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm p*java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm n*java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm j*java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm o*java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm v*java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm t*java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm l*java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm s*java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm m*java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm w*java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm u*java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm q*java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm r*java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm k*java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm ����3�`	�%�d�s�UBBBBBBBBBsecurity Moderate: python3.9 security update 
��1�chttps://access.redhat.com/errata/RHSA-2024:0466 RHSA-2024:0466 RHSA-2024:0466 
https://access.redhat.com/security/cve/CVE-2023-27043 CVE-2023-27043 CVE-2023-27043 https://bugzilla.redhat.com/2196183 2196183  https://errata.almalinux.org/9/ALSA-2024-0466.html ALSA-2024:0466 ALSA-2024:0466 �python3-idle-3.9.18-1.el9_3.1.i686.rpm Z�python3-tkinter-3.9.18-1.el9_3.1.i686.rpm �python3-idle-3.9.18-1.el9_3.1.x86_64.rpm �python3-debug-3.9.18-1.el9_3.1.i686.rpm �python3-debug-3.9.18-1.el9_3.1.x86_64.rpm �python3-test-3.9.18-1.el9_3.1.i686.rpm Y�python3-3.9.18-1.el9_3.1.i686.rpm �python3-test-3.9.18-1.el9_3.1.x86_64.rpm �python3-idle-3.9.18-1.el9_3.1.i686.rpm Z�python3-tkinter-3.9.18-1.el9_3.1.i686.rpm �python3-idle-3.9.18-1.el9_3.1.x86_64.rpm �python3-debug-3.9.18-1.el9_3.1.i686.rpm �python3-debug-3.9.18-1.el9_3.1.x86_64.rpm �python3-test-3.9.18-1.el9_3.1.i686.rpm Y�python3-3.9.18-1.el9_3.1.i686.rpm �python3-test-3.9.18-1.el9_3.1.x86_64.rpm ��ˤ�a	�&�usecurity Important: dotnet7.0 security update ���xhttps://access.redhat.com/errata/RHSA-2024:0805 RHSA-2024:0805 RHSA-2024:0805 
https://access.redhat.com/security/cve/CVE-2024-21386 CVE-2024-21386 CVE-2024-21386 https://access.redhat.com/security/cve/CVE-2024-21404 CVE-2024-21404 CVE-2024-21404 https://bugzilla.redhat.com/2263085 2263085  https://bugzilla.redhat.com/2263086 2263086  https://errata.almalinux.org/9/ALSA-2024-0805.html ALSA-2024:0805 ALSA-2024:0805 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm ����@�b	�'�wsecurity Important: dotnet6.0 security update ���xhttps://access.redhat.com/errata/RHSA-2024:0807 RHSA-2024:0807 RHSA-2024:0807 
https://access.redhat.com/security/cve/CVE-2024-21386 CVE-2024-21386 CVE-2024-21386 https://access.redhat.com/security/cve/CVE-2024-21404 CVE-2024-21404 CVE-2024-21404 https://bugzilla.redhat.com/2263085 2263085  https://bugzilla.redhat.com/2263086 2263086  https://errata.almalinux.org/9/ALSA-2024-0807.html ALSA-2024:0807 ALSA-2024:0807 e�	dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm e�	dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm ����2�c	�(�ysecurity Important: .NET 8.0 security update ���whttps://access.redhat.com/errata/RHSA-2024:0848 RHSA-2024:0848 RHSA-2024:0848 
https://access.redhat.com/security/cve/CVE-2024-21386 CVE-2024-21386 CVE-2024-21386 https://access.redhat.com/security/cve/CVE-2024-21404 CVE-2024-21404 CVE-2024-21404 https://bugzilla.redhat.com/2263085 2263085  https://bugzilla.redhat.com/2263086 2263086  https://errata.almalinux.org/9/ALSA-2024-0848.html ALSA-2024:0848 ALSA-2024:0848 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm ����
�d	�)�{BBBBBBBBBBsecurity Important: postgresql security update ��{�	https://access.redhat.com/errata/RHSA-2024:0951 RHSA-2024:0951 RHSA-2024:0951 
https://access.redhat.com/security/cve/CVE-2024-0985 CVE-2024-0985 CVE-2024-0985 https://bugzilla.redhat.com/2263384 2263384  https://errata.almalinux.org/9/ALSA-2024-0951.html ALSA-2024:0951 ALSA-2024:0951 � �:postgresql-test-13.14-1.el9_3.x86_64.rpm ��:postgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm �~�:postgresql-server-devel-13.14-1.el9_3.x86_64.rpm �|�:postgresql-docs-13.14-1.el9_3.x86_64.rpm ��:postgresql-static-13.14-1.el9_3.x86_64.rpm �}�:postgresql-private-devel-13.14-1.el9_3.x86_64.rpm � �:postgresql-test-13.14-1.el9_3.x86_64.rpm ��:postgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm �~�:postgresql-server-devel-13.14-1.el9_3.x86_64.rpm �|�:postgresql-docs-13.14-1.el9_3.x86_64.rpm ��:postgresql-static-13.14-1.el9_3.x86_64.rpm �}�:postgresql-private-devel-13.14-1.el9_3.x86_64.rpm ���� �e	�*�GBsecurity Important: unbound security update ���[https://access.redhat.com/errata/RHSA-2024:0977 RHSA-2024:0977 RHSA-2024:0977 
https://access.redhat.com/security/cve/CVE-2023-50387 CVE-2023-50387 CVE-2023-50387 https://access.redhat.com/security/cve/CVE-2023-50868 CVE-2023-50868 CVE-2023-50868 https://bugzilla.redhat.com/2263914 2263914  https://bugzilla.redhat.com/2263917 2263917  https://errata.almalinux.org/9/ALSA-2024-0977.html ALSA-2024:0977 ALSA-2024:0977 �4�bunbound-devel-1.16.2-3.el9_3.1.i686.rpm �4�bunbound-devel-1.16.2-3.el9_3.1.x86_64.rpm �4�bunbound-devel-1.16.2-3.el9_3.1.i686.rpm �4�bunbound-devel-1.16.2-3.el9_3.1.x86_64.rpm �����f	�+�JBBBBsecurity Moderate: kernel security update 
��_�https://access.redhat.com/errata/RHSA-2024:10274 RHSA-2024:10274 RHSA-2024:10274 
https://access.redhat.com/security/cve/CVE-2024-41009 CVE-2024-41009 CVE-2024-41009 https://access.redhat.com/security/cve/CVE-2024-42244 CVE-2024-42244 CVE-2024-42244 https://access.redhat.com/security/cve/CVE-2024-50226 CVE-2024-50226 CVE-2024-50226 https://bugzilla.redhat.com/2298412 2298412  https://bugzilla.redhat.com/2324876 2324876  https://errata.almalinux.org/9/ALSA-2024-10274.html ALSA-2024:10274 ALSA-2024:10274 �Ulibperf-5.14.0-503.15.1.el9_5.x86_64.rpm �Ukernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpm �Ukernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpm �Ulibperf-5.14.0-503.15.1.el9_5.x86_64.rpm �Ukernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpm �Ukernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpm ����n�g	�.�lB�dBsecurity Important: edk2 security update ��~�6https://access.redhat.com/errata/RHSA-2024:1075 RHSA-2024:1075 RHSA-2024:1075 
https://access.redhat.com/security/cve/CVE-2023-45230 CVE-2023-45230 CVE-2023-45230 https://access.redhat.com/security/cve/CVE-2023-45234 CVE-2023-45234 CVE-2023-45234 https://bugzilla.redhat.com/2258685 2258685  https://bugzilla.redhat.com/2258697 2258697  https://errata.almalinux.org/9/ALSA-2024-1075.html ALSA-2024:1075 ALSA-2024:1075 �w�7edk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm ��7edk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm �A�7edk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm �@�7edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm �w�7edk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm ��7edk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm �A�7edk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm �@�7edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm ����O�h	�/�SBBBBBBBBBBBsecurity Important: postgresql security update ��4�`https://access.redhat.com/errata/RHSA-2024:10791 RHSA-2024:10791 RHSA-2024:10791 
https://access.redhat.com/security/cve/CVE-2024-10976 CVE-2024-10976 CVE-2024-10976 https://access.redhat.com/security/cve/CVE-2024-10978 CVE-2024-10978 CVE-2024-10978 https://access.redhat.com/security/cve/CVE-2024-10979 CVE-2024-10979 CVE-2024-10979 https://bugzilla.redhat.com/2326251 2326251  https://bugzilla.redhat.com/2326253 2326253  https://bugzilla.redhat.com/2326263 2326263  https://errata.almalinux.org/9/ALSA-2024-10791.html ALSA-2024:10791 ALSA-2024:10791 ��.postgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpm �|�.postgresql-docs-13.18-1.el9_5.x86_64.rpm �}�.postgresql-private-devel-13.18-1.el9_5.x86_64.rpm �:�.postgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm ��.postgresql-static-13.18-1.el9_5.x86_64.rpm � �.postgresql-test-13.18-1.el9_5.x86_64.rpm �~�.postgresql-server-devel-13.18-1.el9_5.x86_64.rpm ��.postgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpm �|�.postgresql-docs-13.18-1.el9_5.x86_64.rpm �}�.postgresql-private-devel-13.18-1.el9_5.x86_64.rpm �:�.postgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm ��.postgresql-static-13.18-1.el9_5.x86_64.rpm � �.postgresql-test-13.18-1.el9_5.x86_64.rpm �~�.postgresql-server-devel-13.18-1.el9_5.x86_64.rpm ����y�i	�0� security Important: ruby security update ���%https://access.redhat.com/errata/RHSA-2024:10858 RHSA-2024:10858 RHSA-2024:10858 
https://access.redhat.com/security/cve/CVE-2024-49761 CVE-2024-49761 CVE-2024-49761 https://bugzilla.redhat.com/2322153 2322153  https://errata.almalinux.org/9/ALSA-2024-10858.html ALSA-2024:10858 ALSA-2024:10858 �;�
ruby-doc-3.0.7-163.el9_5.noarch.rpm �;�
ruby-doc-3.0.7-163.el9_5.noarch.rpm ���
�j	�1�aBBBBsecurity Moderate: kernel security update 
��9�Ahttps://access.redhat.com/errata/RHSA-2024:10939 RHSA-2024:10939 RHSA-2024:10939 
https://access.redhat.com/security/cve/CVE-2024-26615 CVE-2024-26615 CVE-2024-26615 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-44994 CVE-2024-44994 CVE-2024-44994 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://access.redhat.com/security/cve/CVE-2024-46695 CVE-2024-46695 CVE-2024-46695 https://access.redhat.com/security/cve/CVE-2024-49949 CVE-2024-49949 CVE-2024-49949 https://access.redhat.com/security/cve/CVE-2024-50251 CVE-2024-50251 CVE-2024-50251 https://bugzilla.redhat.com/2267355 2267355  https://bugzilla.redhat.com/2309857 2309857  https://bugzilla.redhat.com/2311715 2311715  https://bugzilla.redhat.com/2312083 2312083  https://bugzilla.redhat.com/2320505 2320505  https://bugzilla.redhat.com/2324886 2324886  https://errata.almalinux.org/9/ALSA-2024-10939.html ALSA-2024:10939 ALSA-2024:10939 �Vkernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpm �Vkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpm �Vlibperf-5.14.0-503.16.1.el9_5.x86_64.rpm �Vkernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpm �Vkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpm �Vlibperf-5.14.0-503.16.1.el9_5.x86_64.rpm ����(�k	�4�rB�uBBBBBBBBBsecurity Important: python3.12 security update ��z�-https://access.redhat.com/errata/RHSA-2024:10978 RHSA-2024:10978 RHSA-2024:10978 
https://access.redhat.com/security/cve/CVE-2024-12254 CVE-2024-12254 CVE-2024-12254 https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440  https://bugzilla.redhat.com/2330804 2330804  https://errata.almalinux.org/9/ALSA-2024-10978.html ALSA-2024:10978 ALSA-2024:10978 U�python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm W�python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm V�python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm �h�python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm V�python3.12-idle-3.12.5-2.el9_5.2.i686.rpm U�python3.12-debug-3.12.5-2.el9_5.2.i686.rpm W�python3.12-test-3.12.5-2.el9_5.2.i686.rpm �g�python3.12-3.12.5-2.el9_5.2.i686.rpm U�python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm W�python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm V�python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm �h�python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm V�python3.12-idle-3.12.5-2.el9_5.2.i686.rpm U�python3.12-debug-3.12.5-2.el9_5.2.i686.rpm W�python3.12-test-3.12.5-2.el9_5.2.i686.rpm �g�python3.12-3.12.5-2.el9_5.2.i686.rpm �����l	�6�u�c�\BBBBBBBBBsecurity Moderate: python3.9:3.9.21 security update 
��'�https://access.redhat.com/errata/RHSA-2024:10983 RHSA-2024:10983 RHSA-2024:10983 
https://access.redhat.com/security/cve/CVE-2024-11168 CVE-2024-11168 CVE-2024-11168 https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440  https://bugzilla.redhat.com/2325776 2325776  https://errata.almalinux.org/9/ALSA-2024-10983.html ALSA-2024:10983 ALSA-2024:10983 Z�python3-tkinter-3.9.21-1.el9_5.i686.rpm �python3-test-3.9.21-1.el9_5.x86_64.rpm �python3-debug-3.9.21-1.el9_5.x86_64.rpm �python3-idle-3.9.21-1.el9_5.i686.rpm Y�python3-3.9.21-1.el9_5.i686.rpm �python3-idle-3.9.21-1.el9_5.x86_64.rpm �python3-test-3.9.21-1.el9_5.i686.rpm �python3-debug-3.9.21-1.el9_5.i686.rpm Z�python3-tkinter-3.9.21-1.el9_5.i686.rpm �python3-test-3.9.21-1.el9_5.x86_64.rpm �python3-debug-3.9.21-1.el9_5.x86_64.rpm �python3-idle-3.9.21-1.el9_5.i686.rpm Y�python3-3.9.21-1.el9_5.i686.rpm �python3-idle-3.9.21-1.el9_5.x86_64.rpm �python3-test-3.9.21-1.el9_5.i686.rpm �python3-debug-3.9.21-1.el9_5.i686.rpm ����I�m	�9�wB�FBBBBBBBBBsecurity Moderate: python3.11 security update 
��E�Mhttps://access.redhat.com/errata/RHSA-2024:11111 RHSA-2024:11111 RHSA-2024:11111 
https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440  https://errata.almalinux.org/9/ALSA-2024-11111.html ALSA-2024:11111 ALSA-2024:11111 �python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.2.i686.rpm �python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.2.i686.rpm �python3.11-test-3.11.9-7.el9_5.2.x86_64.rpm g�python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpm f�python3.11-3.11.9-7.el9_5.2.i686.rpm �python3.11-idle-3.11.9-7.el9_5.2.i686.rpm �python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.2.i686.rpm �python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.2.i686.rpm �python3.11-test-3.11.9-7.el9_5.2.x86_64.rpm g�python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpm f�python3.11-3.11.9-7.el9_5.2.i686.rpm �python3.11-idle-3.11.9-7.el9_5.2.i686.rpm ����}�n	�<�zB�NBsecurity Moderate: edk2:20240524 security update 
���Bhttps://access.redhat.com/errata/RHSA-2024:11219 RHSA-2024:11219 RHSA-2024:11219 
https://access.redhat.com/security/cve/CVE-2024-38796 CVE-2024-38796 CVE-2024-38796 https://bugzilla.redhat.com/2315390 2315390  https://errata.almalinux.org/9/ALSA-2024-11219.html ALSA-2024:11219 ALSA-2024:11219 �A�:edk2-tools-doc-20240524-6.el9_5.3.noarch.rpm ��:edk2-ovmf-20240524-6.el9_5.3.noarch.rpm �@�:edk2-aarch64-20240524-6.el9_5.3.noarch.rpm �w�:edk2-tools-20240524-6.el9_5.3.x86_64.rpm �A�:edk2-tools-doc-20240524-6.el9_5.3.noarch.rpm ��:edk2-ovmf-20240524-6.el9_5.3.noarch.rpm �@�:edk2-aarch64-20240524-6.el9_5.3.noarch.rpm �w�:edk2-tools-20240524-6.el9_5.3.x86_64.rpm ����V�o	��KBsecurity Moderate: unbound:1.16.2 security update 
��T�https://access.redhat.com/errata/RHSA-2024:11232 RHSA-2024:11232 RHSA-2024:11232 
https://access.redhat.com/security/cve/CVE-2024-8508 CVE-2024-8508 CVE-2024-8508 https://bugzilla.redhat.com/2316321 2316321  https://errata.almalinux.org/9/ALSA-2024-11232.html ALSA-2024:11232 ALSA-2024:11232 �4�dunbound-devel-1.16.2-8.el9_5.1.i686.rpm �4�dunbound-devel-1.16.2-8.el9_5.1.x86_64.rpm �4�dunbound-devel-1.16.2-8.el9_5.1.i686.rpm �4�dunbound-devel-1.16.2-8.el9_5.1.x86_64.rpm ����~�p	��OBsecurity Moderate: libsndfile:1.0.31 security update 
��_�+https://access.redhat.com/errata/RHSA-2024:11237 RHSA-2024:11237 RHSA-2024:11237 
https://access.redhat.com/security/cve/CVE-2024-50612 CVE-2024-50612 CVE-2024-50612 https://bugzilla.redhat.com/2322057 2322057  https://errata.almalinux.org/9/ALSA-2024-11237.html ALSA-2024:11237 ALSA-2024:11237 ��^libsndfile-devel-1.0.31-8.el9_5.2.i686.rpm ��^libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm ��^libsndfile-devel-1.0.31-8.el9_5.2.i686.rpm ��^libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm ����:�q	�=�SBsecurity Moderate: mpg123:1.32.9 security update 
��
�qhttps://access.redhat.com/errata/RHSA-2024:11242 RHSA-2024:11242 RHSA-2024:11242 
https://access.redhat.com/security/cve/CVE-2024-10573 CVE-2024-10573 CVE-2024-10573 https://bugzilla.redhat.com/2322980 2322980  https://errata.almalinux.org/9/ALSA-2024-11242.html ALSA-2024:11242 ALSA-2024:11242 �,�mmpg123-devel-1.32.9-1.el9_5.i686.rpm �,�mmpg123-devel-1.32.9-1.el9_5.x86_64.rpm �,�mmpg123-devel-1.32.9-1.el9_5.i686.rpm �,�mmpg123-devel-1.32.9-1.el9_5.x86_64.rpm �����r	�>�VBBBBsecurity Moderate: mysql security update 
��{�t�https://access.redhat.com/errata/RHSA-2024:1141 RHSA-2024:1141 RHSA-2024:1141 
https://access.redhat.com/security/cve/CVE-2022-4899 CVE-2022-4899 CVE-2022-4899 https://access.redhat.com/security/cve/CVE-2023-21911 CVE-2023-21911 CVE-2023-21911 https://access.redhat.com/security/cve/CVE-2023-21919 CVE-2023-21919 CVE-2023-21919 https://access.redhat.com/security/cve/CVE-2023-21920 CVE-2023-21920 CVE-2023-21920 https://access.redhat.com/security/cve/CVE-2023-21929 CVE-2023-21929 CVE-2023-21929 https://access.redhat.com/security/cve/CVE-2023-21933 CVE-2023-21933 CVE-2023-21933 https://access.redhat.com/security/cve/CVE-2023-21935 CVE-2023-21935 CVE-2023-21935 https://access.redhat.com/security/cve/CVE-2023-21940 CVE-2023-21940 CVE-2023-21940 https://access.redhat.com/security/cve/CVE-2023-21945 CVE-2023-21945 CVE-2023-21945 https://access.redhat.com/security/cve/CVE-2023-21946 CVE-2023-21946 CVE-2023-21946 https://access.redhat.com/security/cve/CVE-2023-21947 CVE-2023-21947 CVE-2023-21947 https://access.redhat.com/security/cve/CVE-2023-21953 CVE-2023-21953 CVE-2023-21953 https://access.redhat.com/security/cve/CVE-2023-21955 CVE-2023-21955 CVE-2023-21955 https://access.redhat.com/security/cve/CVE-2023-21962 CVE-2023-21962 CVE-2023-21962 https://access.redhat.com/security/cve/CVE-2023-21966 CVE-2023-21966 CVE-2023-21966 https://access.redhat.com/security/cve/CVE-2023-21972 CVE-2023-21972 CVE-2023-21972 https://access.redhat.com/security/cve/CVE-2023-21976 CVE-2023-21976 CVE-2023-21976 https://access.redhat.com/security/cve/CVE-2023-21977 CVE-2023-21977 CVE-2023-21977 https://access.redhat.com/security/cve/CVE-2023-21980 CVE-2023-21980 CVE-2023-21980 https://access.redhat.com/security/cve/CVE-2023-21982 CVE-2023-21982 CVE-2023-21982 https://access.redhat.com/security/cve/CVE-2023-22005 CVE-2023-22005 CVE-2023-22005 https://access.redhat.com/security/cve/CVE-2023-22007 CVE-2023-22007 CVE-2023-22007 https://access.redhat.com/security/cve/CVE-2023-22008 CVE-2023-22008 CVE-2023-22008 https://access.redhat.com/security/cve/CVE-2023-22032 CVE-2023-22032 CVE-2023-22032 https://access.redhat.com/security/cve/CVE-2023-22033 CVE-2023-22033 CVE-2023-22033 https://access.redhat.com/security/cve/CVE-2023-22038 CVE-2023-22038 CVE-2023-22038 https://access.redhat.com/security/cve/CVE-2023-22046 CVE-2023-22046 CVE-2023-22046 https://access.redhat.com/security/cve/CVE-2023-22048 CVE-2023-22048 CVE-2023-22048 https://access.redhat.com/security/cve/CVE-2023-22053 CVE-2023-22053 CVE-2023-22053 https://access.redhat.com/security/cve/CVE-2023-22054 CVE-2023-22054 CVE-2023-22054 https://access.redhat.com/security/cve/CVE-2023-22056 CVE-2023-22056 CVE-2023-22056 https://access.redhat.com/security/cve/CVE-2023-22057 CVE-2023-22057 CVE-2023-22057 https://access.redhat.com/security/cve/CVE-2023-22058 CVE-2023-22058 CVE-2023-22058 https://access.redhat.com/security/cve/CVE-2023-22059 CVE-2023-22059 CVE-2023-22059 https://access.redhat.com/security/cve/CVE-2023-22064 CVE-2023-22064 CVE-2023-22064 https://access.redhat.com/security/cve/CVE-2023-22065 CVE-2023-22065 CVE-2023-22065 https://access.redhat.com/security/cve/CVE-2023-22066 CVE-2023-22066 CVE-2023-22066 https://access.redhat.com/security/cve/CVE-2023-22068 CVE-2023-22068 CVE-2023-22068 https://access.redhat.com/security/cve/CVE-2023-22070 CVE-2023-22070 CVE-2023-22070 https://access.redhat.com/security/cve/CVE-2023-22078 CVE-2023-22078 CVE-2023-22078 https://access.redhat.com/security/cve/CVE-2023-22079 CVE-2023-22079 CVE-2023-22079 https://access.redhat.com/security/cve/CVE-2023-22084 CVE-2023-22084 CVE-2023-22084 https://access.redhat.com/security/cve/CVE-2023-22092 CVE-2023-22092 CVE-2023-22092 https://access.redhat.com/security/cve/CVE-2023-22097 CVE-2023-22097 CVE-2023-22097 https://access.redhat.com/security/cve/CVE-2023-22103 CVE-2023-22103 CVE-2023-22103 https://access.redhat.com/security/cve/CVE-2023-22104 CVE-2023-22104 CVE-2023-22104 https://access.redhat.com/security/cve/CVE-2023-22110 CVE-2023-22110 CVE-2023-22110 https://access.redhat.com/security/cve/CVE-2023-22111 CVE-2023-22111 CVE-2023-22111 https://access.redhat.com/security/cve/CVE-2023-22112 CVE-2023-22112 CVE-2023-22112 https://access.redhat.com/security/cve/CVE-2023-22113 CVE-2023-22113 CVE-2023-22113 https://access.redhat.com/security/cve/CVE-2023-22114 CVE-2023-22114 CVE-2023-22114 https://access.redhat.com/security/cve/CVE-2023-22115 CVE-2023-22115 CVE-2023-22115 https://access.redhat.com/security/cve/CVE-2024-20960 CVE-2024-20960 CVE-2024-20960 https://access.redhat.com/security/cve/CVE-2024-20961 CVE-2024-20961 CVE-2024-20961 https://access.redhat.com/security/cve/CVE-2024-20962 CVE-2024-20962 CVE-2024-20962 https://access.redhat.com/security/cve/CVE-2024-20963 CVE-2024-20963 CVE-2024-20963 https://access.redhat.com/security/cve/CVE-2024-20964 CVE-2024-20964 CVE-2024-20964 https://access.redhat.com/security/cve/CVE-2024-20965 CVE-2024-20965 CVE-2024-20965 https://access.redhat.com/security/cve/CVE-2024-20966 CVE-2024-20966 CVE-2024-20966 https://access.redhat.com/security/cve/CVE-2024-20967 CVE-2024-20967 CVE-2024-20967 https://access.redhat.com/security/cve/CVE-2024-20968 CVE-2024-20968 CVE-2024-20968 https://access.redhat.com/security/cve/CVE-2024-20969 CVE-2024-20969 CVE-2024-20969 https://access.redhat.com/security/cve/CVE-2024-20970 CVE-2024-20970 CVE-2024-20970 https://access.redhat.com/security/cve/CVE-2024-20971 CVE-2024-20971 CVE-2024-20971 https://access.redhat.com/security/cve/CVE-2024-20972 CVE-2024-20972 CVE-2024-20972 https://access.redhat.com/security/cve/CVE-2024-20973 CVE-2024-20973 CVE-2024-20973 https://access.redhat.com/security/cve/CVE-2024-20974 CVE-2024-20974 CVE-2024-20974 https://access.redhat.com/security/cve/CVE-2024-20976 CVE-2024-20976 CVE-2024-20976 https://access.redhat.com/security/cve/CVE-2024-20977 CVE-2024-20977 CVE-2024-20977 https://access.redhat.com/security/cve/CVE-2024-20978 CVE-2024-20978 CVE-2024-20978 https://access.redhat.com/security/cve/CVE-2024-20981 CVE-2024-20981 CVE-2024-20981 https://access.redhat.com/security/cve/CVE-2024-20982 CVE-2024-20982 CVE-2024-20982 https://access.redhat.com/security/cve/CVE-2024-20983 CVE-2024-20983 CVE-2024-20983 https://access.redhat.com/security/cve/CVE-2024-20984 CVE-2024-20984 CVE-2024-20984 https://access.redhat.com/security/cve/CVE-2024-20985 CVE-2024-20985 CVE-2024-20985 https://bugzilla.redhat.com/2179864 2179864  https://bugzilla.redhat.com/2188109 2188109  https://bugzilla.redhat.com/2188113 2188113  https://bugzilla.redhat.com/2188115 2188115  https://bugzilla.redhat.com/2188116 2188116  https://bugzilla.redhat.com/2188117 2188117  https://bugzilla.redhat.com/2188118 2188118  https://bugzilla.redhat.com/2188119 2188119  https://bugzilla.redhat.com/2188120 2188120  https://bugzilla.redhat.com/2188121 2188121  https://bugzilla.redhat.com/2188122 2188122  https://bugzilla.redhat.com/2188123 2188123  https://bugzilla.redhat.com/2188124 2188124  https://bugzilla.redhat.com/2188125 2188125  https://bugzilla.redhat.com/2188127 2188127  https://bugzilla.redhat.com/2188128 2188128  https://bugzilla.redhat.com/2188129 2188129  https://bugzilla.redhat.com/2188130 2188130  https://bugzilla.redhat.com/2188131 2188131  https://bugzilla.redhat.com/2188132 2188132  https://bugzilla.redhat.com/2224211 2224211  https://bugzilla.redhat.com/2224212 2224212  https://bugzilla.redhat.com/2224213 2224213  https://bugzilla.redhat.com/2224214 2224214  https://bugzilla.redhat.com/2224215 2224215  https://bugzilla.redhat.com/2224216 2224216  https://bugzilla.redhat.com/2224217 2224217  https://bugzilla.redhat.com/2224218 2224218  https://bugzilla.redhat.com/2224219 2224219  https://bugzilla.redhat.com/2224220 2224220  https://bugzilla.redhat.com/2224221 2224221  https://bugzilla.redhat.com/2224222 2224222  https://bugzilla.redhat.com/2245014 2245014  https://bugzilla.redhat.com/2245015 2245015  https://bugzilla.redhat.com/2245016 2245016  https://bugzilla.redhat.com/2245017 2245017  https://bugzilla.redhat.com/2245018 2245018  https://bugzilla.redhat.com/2245019 2245019  https://bugzilla.redhat.com/2245020 2245020  https://bugzilla.redhat.com/2245021 2245021  https://bugzilla.redhat.com/2245022 2245022  https://bugzilla.redhat.com/2245023 2245023  https://bugzilla.redhat.com/2245024 2245024  https://bugzilla.redhat.com/2245026 2245026  https://bugzilla.redhat.com/2245027 2245027  https://bugzilla.redhat.com/2245028 2245028  https://bugzilla.redhat.com/2245029 2245029  https://bugzilla.redhat.com/2245030 2245030  https://bugzilla.redhat.com/2245031 2245031  https://bugzilla.redhat.com/2245032 2245032  https://bugzilla.redhat.com/2245033 2245033  https://bugzilla.redhat.com/2245034 2245034  https://bugzilla.redhat.com/2258771 2258771  https://bugzilla.redhat.com/2258772 2258772  https://bugzilla.redhat.com/2258773 2258773  https://bugzilla.redhat.com/2258774 2258774  https://bugzilla.redhat.com/2258775 2258775  https://bugzilla.redhat.com/2258776 2258776  https://bugzilla.redhat.com/2258777 2258777  https://bugzilla.redhat.com/2258778 2258778  https://bugzilla.redhat.com/2258779 2258779  https://bugzilla.redhat.com/2258780 2258780  https://bugzilla.redhat.com/2258781 2258781  https://bugzilla.redhat.com/2258782 2258782  https://bugzilla.redhat.com/2258783 2258783  https://bugzilla.redhat.com/2258784 2258784  https://bugzilla.redhat.com/2258785 2258785  https://bugzilla.redhat.com/2258787 2258787  https://bugzilla.redhat.com/2258788 2258788  https://bugzilla.redhat.com/2258789 2258789  https://bugzilla.redhat.com/2258790 2258790  https://bugzilla.redhat.com/2258791 2258791  https://bugzilla.redhat.com/2258792 2258792  https://bugzilla.redhat.com/2258793 2258793  https://bugzilla.redhat.com/2258794 2258794  https://errata.almalinux.org/9/ALSA-2024-1141.html ALSA-2024:1141 ALSA-2024:1141 ��ymysql-test-8.0.36-1.el9_3.x86_64.rpm ��ymysql-devel-8.0.36-1.el9_3.x86_64.rpm ��ymysql-libs-8.0.36-1.el9_3.x86_64.rpm ��ymysql-test-8.0.36-1.el9_3.x86_64.rpm ��ymysql-devel-8.0.36-1.el9_3.x86_64.rpm ��ymysql-libs-8.0.36-1.el9_3.x86_64.rpm ����y�s	�?�\BBBBsecurity Moderate: kernel security update 
��o�c$https://access.redhat.com/errata/RHSA-2024:11486 RHSA-2024:11486 RHSA-2024:11486 
https://access.redhat.com/security/cve/CVE-2024-27399 CVE-2024-27399 CVE-2024-27399 https://access.redhat.com/security/cve/CVE-2024-38564 CVE-2024-38564 CVE-2024-38564 https://access.redhat.com/security/cve/CVE-2024-45020 CVE-2024-45020 CVE-2024-45020 https://access.redhat.com/security/cve/CVE-2024-46697 CVE-2024-46697 CVE-2024-46697 https://access.redhat.com/security/cve/CVE-2024-47675 CVE-2024-47675 CVE-2024-47675 https://access.redhat.com/security/cve/CVE-2024-49888 CVE-2024-49888 CVE-2024-49888 https://access.redhat.com/security/cve/CVE-2024-50099 CVE-2024-50099 CVE-2024-50099 https://access.redhat.com/security/cve/CVE-2024-50110 CVE-2024-50110 CVE-2024-50110 https://access.redhat.com/security/cve/CVE-2024-50115 CVE-2024-50115 CVE-2024-50115 https://access.redhat.com/security/cve/CVE-2024-50124 CVE-2024-50124 CVE-2024-50124 https://access.redhat.com/security/cve/CVE-2024-50125 CVE-2024-50125 CVE-2024-50125 https://access.redhat.com/security/cve/CVE-2024-50142 CVE-2024-50142 CVE-2024-50142 https://access.redhat.com/security/cve/CVE-2024-50148 CVE-2024-50148 CVE-2024-50148 https://access.redhat.com/security/cve/CVE-2024-50192 CVE-2024-50192 CVE-2024-50192 https://access.redhat.com/security/cve/CVE-2024-50223 CVE-2024-50223 CVE-2024-50223 https://access.redhat.com/security/cve/CVE-2024-50255 CVE-2024-50255 CVE-2024-50255 https://access.redhat.com/security/cve/CVE-2024-50262 CVE-2024-50262 CVE-2024-50262 https://bugzilla.redhat.com/2280462 2280462  https://bugzilla.redhat.com/2293429 2293429  https://bugzilla.redhat.com/2311717 2311717  https://bugzilla.redhat.com/2312085 2312085  https://bugzilla.redhat.com/2320254 2320254  https://bugzilla.redhat.com/2320517 2320517  https://bugzilla.redhat.com/2323904 2323904  https://bugzilla.redhat.com/2323930 2323930  https://bugzilla.redhat.com/2323937 2323937  https://bugzilla.redhat.com/2323944 2323944  https://bugzilla.redhat.com/2323955 2323955  https://bugzilla.redhat.com/2324315 2324315  https://bugzilla.redhat.com/2324332 2324332  https://bugzilla.redhat.com/2324612 2324612  https://bugzilla.redhat.com/2324867 2324867  https://bugzilla.redhat.com/2324868 2324868  https://bugzilla.redhat.com/2324892 2324892  https://errata.almalinux.org/9/ALSA-2024-11486.html ALSA-2024:11486 ALSA-2024:11486 �Wlibperf-5.14.0-503.19.1.el9_5.x86_64.rpm �Wkernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpm �Wkernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpm �Wlibperf-5.14.0-503.19.1.el9_5.x86_64.rpm �Wkernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpm �Wkernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpm ����a�t	��bBsecurity Moderate: opencryptoki security update 
��R�Whttps://access.redhat.com/errata/RHSA-2024:1239 RHSA-2024:1239 RHSA-2024:1239 
https://access.redhat.com/security/cve/CVE-2024-0914 CVE-2024-0914 CVE-2024-0914 https://bugzilla.redhat.com/2260407 2260407  https://errata.almalinux.org/9/ALSA-2024-1239.html ALSA-2024:1239 ALSA-2024:1239 �-�
opencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm �-�
opencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpm �-�
opencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm �-�
opencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpm ����D�u	� �esecurity Moderate: .NET 7.0 security update 
��)�Fhttps://access.redhat.com/errata/RHSA-2024:1309 RHSA-2024:1309 RHSA-2024:1309 
https://access.redhat.com/security/cve/CVE-2024-21392 CVE-2024-21392 CVE-2024-21392 https://bugzilla.redhat.com/2268266 2268266  https://errata.almalinux.org/9/ALSA-2024-1309.html ALSA-2024:1309 ALSA-2024:1309 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm ��˥s�v	��gsecurity Moderate: .NET 8.0 security update 
��o�Ehttps://access.redhat.com/errata/RHSA-2024:1310 RHSA-2024:1310 RHSA-2024:1310 
https://access.redhat.com/security/cve/CVE-2024-21392 CVE-2024-21392 CVE-2024-21392 https://bugzilla.redhat.com/2268266 2268266  https://errata.almalinux.org/9/ALSA-2024-1310.html ALSA-2024:1310 ALSA-2024:1310 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpm ����e�w	��iBBsecurity Important: libreoffice security update ��4�https://access.redhat.com/errata/RHSA-2024:1427 RHSA-2024:1427 RHSA-2024:1427 
https://access.redhat.com/security/cve/CVE-2023-6185 CVE-2023-6185 CVE-2023-6185 https://access.redhat.com/security/cve/CVE-2023-6186 CVE-2023-6186 CVE-2023-6186 https://bugzilla.redhat.com/2254003 2254003  https://bugzilla.redhat.com/2254005 2254005  https://errata.almalinux.org/9/ALSA-2024-1427.html ALSA-2024:1427 ALSA-2024:1427 �2�?libreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpm �3�?libreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpm �2�?libreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpm �3�?libreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpm ����z�x	��mBsecurity Important: varnish security update ��G�thttps://access.redhat.com/errata/RHSA-2024:1691 RHSA-2024:1691 RHSA-2024:1691 
https://access.redhat.com/security/cve/CVE-2024-30156 CVE-2024-30156 CVE-2024-30156 https://bugzilla.redhat.com/2271486 2271486  https://errata.almalinux.org/9/ALSA-2024-1691.html ALSA-2024:1691 ALSA-2024:1691 �v�varnish-devel-6.6.2-4.el9_3.1.x86_64.rpm �v�varnish-devel-6.6.2-4.el9_3.1.i686.rpm �v�varnish-devel-6.6.2-4.el9_3.1.x86_64.rpm �v�varnish-devel-6.6.2-4.el9_3.1.i686.rpm ����=�y	��pBsecurity Important: unbound security update ��;�6https://access.redhat.com/errata/RHSA-2024:1750 RHSA-2024:1750 RHSA-2024:1750 
https://access.redhat.com/security/cve/CVE-2024-1488 CVE-2024-1488 CVE-2024-1488 https://bugzilla.redhat.com/2264183 2264183  https://errata.almalinux.org/9/ALSA-2024-1750.html ALSA-2024:1750 ALSA-2024:1750 �4�cunbound-devel-1.16.2-3.el9_3.5.x86_64.rpm �4�cunbound-devel-1.16.2-3.el9_3.5.i686.rpm �4�cunbound-devel-1.16.2-3.el9_3.5.x86_64.rpm �4�cunbound-devel-1.16.2-3.el9_3.5.i686.rpm ���F�z	��E�oBBBsecurity Important: bind security update ��q�Ghttps://access.redhat.com/errata/RHSA-2024:1789 RHSA-2024:1789 RHSA-2024:1789 
https://access.redhat.com/security/cve/CVE-2023-4408 CVE-2023-4408 CVE-2023-4408 https://access.redhat.com/security/cve/CVE-2023-50387 CVE-2023-50387 CVE-2023-50387 https://access.redhat.com/security/cve/CVE-2023-50868 CVE-2023-50868 CVE-2023-50868 https://access.redhat.com/security/cve/CVE-2023-5517 CVE-2023-5517 CVE-2023-5517 https://access.redhat.com/security/cve/CVE-2023-5679 CVE-2023-5679 CVE-2023-5679 https://access.redhat.com/security/cve/CVE-2023-6516 CVE-2023-6516 CVE-2023-6516 https://bugzilla.redhat.com/2263896 2263896  https://bugzilla.redhat.com/2263897 2263897  https://bugzilla.redhat.com/2263909 2263909  https://bugzilla.redhat.com/2263911 2263911  https://bugzilla.redhat.com/2263914 2263914  https://bugzilla.redhat.com/2263917 2263917  https://errata.almalinux.org/9/ALSA-2024-1789.html ALSA-2024:1789 ALSA-2024:1789 [�,bind-devel-9.16.23-14.el9_3.4.x86_64.rpm �?�,bind-doc-9.16.23-14.el9_3.4.noarch.rpm [�,bind-devel-9.16.23-14.el9_3.4.i686.rpm �X�,bind-libs-9.16.23-14.el9_3.4.i686.rpm [�,bind-devel-9.16.23-14.el9_3.4.x86_64.rpm �?�,bind-doc-9.16.23-14.el9_3.4.noarch.rpm [�,bind-devel-9.16.23-14.el9_3.4.i686.rpm �X�,bind-libs-9.16.23-14.el9_3.4.i686.rpm �����{	��xBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update 
��8�
https://access.redhat.com/errata/RHSA-2024:1818 RHSA-2024:1818 RHSA-2024:1818 
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://access.redhat.com/security/cve/CVE-2024-21085 CVE-2024-21085 CVE-2024-21085 https://access.redhat.com/security/cve/CVE-2024-21094 CVE-2024-21094 CVE-2024-21094 https://bugzilla.redhat.com/2274977 2274977  https://bugzilla.redhat.com/2275001 2275001  https://bugzilla.redhat.com/2275003 2275003  https://bugzilla.redhat.com/2275005 2275005  https://errata.almalinux.org/9/ALSA-2024-1818.html ALSA-2024:1818 ALSA-2024:1818 
�,Ojava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �)Ojava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �-Ojava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �*Ojava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �'Ojava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �(Ojava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �$Ojava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �%Ojava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �+Ojava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �&Ojava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm 
�,Ojava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �)Ojava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �-Ojava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �*Ojava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �'Ojava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �(Ojava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �$Ojava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �%Ojava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �+Ojava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �&Ojava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm ����h�|	��LBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security update 
��W�nhttps://access.redhat.com/errata/RHSA-2024:1822 RHSA-2024:1822 RHSA-2024:1822 
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21012 CVE-2024-21012 CVE-2024-21012 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://access.redhat.com/security/cve/CVE-2024-21085 CVE-2024-21085 CVE-2024-21085 https://access.redhat.com/security/cve/CVE-2024-21094 CVE-2024-21094 CVE-2024-21094 https://bugzilla.redhat.com/2274975 2274975  https://bugzilla.redhat.com/2274977 2274977  https://bugzilla.redhat.com/2275001 2275001  https://bugzilla.redhat.com/2275003 2275003  https://bugzilla.redhat.com/2275005 2275005  https://errata.almalinux.org/9/ALSA-2024-1822.html ALSA-2024:1822 ALSA-2024:1822 �O'java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �H'java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �I'java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �J'java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �S'java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �F'java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �P'java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �Q'java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �K'java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �L'java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �R'java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �N'java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �G'java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �M'java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �O'java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �H'java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �I'java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �J'java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �S'java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �F'java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �P'java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �Q'java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �K'java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �L'java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �R'java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �N'java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �G'java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �M'java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm ����Q�}	�	�hBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update 
��E�$
https://access.redhat.com/errata/RHSA-2024:1825 RHSA-2024:1825 RHSA-2024:1825 
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21012 CVE-2024-21012 CVE-2024-21012 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://access.redhat.com/security/cve/CVE-2024-21094 CVE-2024-21094 CVE-2024-21094 https://bugzilla.redhat.com/2274975 2274975  https://bugzilla.redhat.com/2274977 2274977  https://bugzilla.redhat.com/2275003 2275003  https://bugzilla.redhat.com/2275005 2275005  https://errata.almalinux.org/9/ALSA-2024-1825.html ALSA-2024:1825 ALSA-2024:1825 l+java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm v+java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm j+java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm o+java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm t+java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm u+java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm r+java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm m+java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm n+java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm q+java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm w+java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm s+java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm p+java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm k+java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm l+java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm v+java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm j+java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm o+java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm t+java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm u+java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm r+java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm m+java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm n+java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm q+java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm w+java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm s+java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm p+java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm k+java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm ����(�~	�
�DBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update 
��i�Hhttps://access.redhat.com/errata/RHSA-2024:1828 RHSA-2024:1828 RHSA-2024:1828 
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21012 CVE-2024-21012 CVE-2024-21012 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://bugzilla.redhat.com/2274975 2274975  https://bugzilla.redhat.com/2274977 2274977  https://bugzilla.redhat.com/2275003 2275003  https://errata.almalinux.org/9/ALSA-2024-1828.html ALSA-2024:1828 ALSA-2024:1828 �a9java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �^9java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �]9java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �c9java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �[9java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �\9java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �Z9java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �f9java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �e9java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �_9java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �d9java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �Y9java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �b9java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �`9java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �a9java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �^9java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �]9java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �c9java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �[9java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �\9java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �Z9java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �f9java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �e9java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �_9java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �d9java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �Y9java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �b9java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �`9java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm ����V�	��`Bsecurity Low: LibRaw security update �>��1�https://access.redhat.com/errata/RHSA-2024:2137 RHSA-2024:2137 RHSA-2024:2137 
https://access.redhat.com/security/cve/CVE-2023-1729 CVE-2023-1729 CVE-2023-1729 https://bugzilla.redhat.com/2188240 2188240  https://errata.almalinux.org/9/ALSA-2024-2137.html ALSA-2024:2137 ALSA-2024:2137 ��XLibRaw-devel-0.21.1-1.el9.i686.rpm ��XLibRaw-devel-0.21.1-1.el9.x86_64.rpm ��XLibRaw-devel-0.21.1-1.el9.i686.rpm ��XLibRaw-devel-0.21.1-1.el9.x86_64.rpm ���I� 	��#security Moderate: ipa security update 
��I�uhttps://access.redhat.com/errata/RHSA-2024:2147 RHSA-2024:2147 RHSA-2024:2147 
https://access.redhat.com/security/cve/CVE-2024-1481 CVE-2024-1481 CVE-2024-1481 https://bugzilla.redhat.com/2262169 2262169  https://errata.almalinux.org/9/ALSA-2024-2147.html ALSA-2024:2147 ALSA-2024:2147 ��
python3-ipatests-4.11.0-9.el9_4.noarch.rpm ��
python3-ipatests-4.11.0-9.el9_4.noarch.rpm ����	�
�dBBsecurity Moderate: xorg-x11-server security update 
��>� https://access.redhat.com/errata/RHSA-2024:2169 RHSA-2024:2169 RHSA-2024:2169 
https://access.redhat.com/security/cve/CVE-2023-5367 CVE-2023-5367 CVE-2023-5367 https://access.redhat.com/security/cve/CVE-2023-5380 CVE-2023-5380 CVE-2023-5380 https://access.redhat.com/security/cve/CVE-2023-6377 CVE-2023-6377 CVE-2023-6377 https://access.redhat.com/security/cve/CVE-2023-6478 CVE-2023-6478 CVE-2023-6478 https://access.redhat.com/security/cve/CVE-2023-6816 CVE-2023-6816 CVE-2023-6816 https://access.redhat.com/security/cve/CVE-2024-0229 CVE-2024-0229 CVE-2024-0229 https://access.redhat.com/security/cve/CVE-2024-0408 CVE-2024-0408 CVE-2024-0408 https://access.redhat.com/security/cve/CVE-2024-0409 CVE-2024-0409 CVE-2024-0409 https://access.redhat.com/security/cve/CVE-2024-21885 CVE-2024-21885 CVE-2024-21885 https://access.redhat.com/security/cve/CVE-2024-21886 CVE-2024-21886 CVE-2024-21886 https://bugzilla.redhat.com/2243091 2243091  https://bugzilla.redhat.com/2244736 2244736  https://bugzilla.redhat.com/2253291 2253291  https://bugzilla.redhat.com/2253298 2253298  https://bugzilla.redhat.com/2256540 2256540  https://bugzilla.redhat.com/2256542 2256542  https://bugzilla.redhat.com/2256690 2256690  https://bugzilla.redhat.com/2257689 2257689  https://bugzilla.redhat.com/2257690 2257690  https://bugzilla.redhat.com/2257691 2257691  https://errata.almalinux.org/9/ALSA-2024-2169.html ALSA-2024:2169 ALSA-2024:2169 �V�,xorg-x11-server-source-1.20.11-24.el9.noarch.rpm i�,xorg-x11-server-devel-1.20.11-24.el9.x86_64.rpm i�,xorg-x11-server-devel-1.20.11-24.el9.i686.rpm �V�,xorg-x11-server-source-1.20.11-24.el9.noarch.rpm i�,xorg-x11-server-devel-1.20.11-24.el9.x86_64.rpm i�,xorg-x11-server-devel-1.20.11-24.el9.i686.rpm ���$�	��hBsecurity Moderate: libsndfile security update 
��>�&https://access.redhat.com/errata/RHSA-2024:2184 RHSA-2024:2184 RHSA-2024:2184 
https://access.redhat.com/security/cve/CVE-2022-33065 CVE-2022-33065 CVE-2022-33065 https://bugzilla.redhat.com/2238934 2238934  https://errata.almalinux.org/9/ALSA-2024-2184.html ALSA-2024:2184 ALSA-2024:2184 ��]libsndfile-devel-1.0.31-8.el9.i686.rpm ��]libsndfile-devel-1.0.31-8.el9.x86_64.rpm ��]libsndfile-devel-1.0.31-8.el9.i686.rpm ��]libsndfile-devel-1.0.31-8.el9.x86_64.rpm ���S�	��kBsecurity Important: pmix security update ��d�:https://access.redhat.com/errata/RHSA-2024:2199 RHSA-2024:2199 RHSA-2024:2199 
https://access.redhat.com/security/cve/CVE-2023-41915 CVE-2023-41915 CVE-2023-41915 https://bugzilla.redhat.com/2238898 2238898  https://errata.almalinux.org/9/ALSA-2024-2199.html ALSA-2024:2199 ALSA-2024:2199 �.�	pmix-pmi-devel-3.2.3-5.el9.i686.rpm �.�	pmix-pmi-devel-3.2.3-5.el9.x86_64.rpm �.�	pmix-pmi-devel-3.2.3-5.el9.i686.rpm �.�	pmix-pmi-devel-3.2.3-5.el9.x86_64.rpm ���W�	��nBBBBBsecurity Moderate: libnbd security update 
���<https://access.redhat.com/errata/RHSA-2024:2204 RHSA-2024:2204 RHSA-2024:2204 
https://access.redhat.com/security/cve/CVE-2023-5215 CVE-2023-5215 CVE-2023-5215 https://access.redhat.com/security/cve/CVE-2023-5871 CVE-2023-5871 CVE-2023-5871 https://bugzilla.redhat.com/2241041 2241041  https://bugzilla.redhat.com/2247308 2247308  https://errata.almalinux.org/9/ALSA-2024-2204.html ALSA-2024:2204 ALSA-2024:2204 ��
libnbd-devel-1.18.1-3.el9.x86_64.rpm �\�
ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpm ��
libnbd-devel-1.18.1-3.el9.i686.rpm �[�
ocaml-libnbd-1.18.1-3.el9.x86_64.rpm ��
libnbd-devel-1.18.1-3.el9.x86_64.rpm �\�
ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpm ��
libnbd-devel-1.18.1-3.el9.i686.rpm �[�
ocaml-libnbd-1.18.1-3.el9.x86_64.rpm ���L�	��uBBBBsecurity Moderate: freerdp security update 
��Z�ihttps://access.redhat.com/errata/RHSA-2024:2208 RHSA-2024:2208 RHSA-2024:2208 
https://access.redhat.com/security/cve/CVE-2023-39350 CVE-2023-39350 CVE-2023-39350 https://access.redhat.com/security/cve/CVE-2023-39351 CVE-2023-39351 CVE-2023-39351 https://access.redhat.com/security/cve/CVE-2023-39352 CVE-2023-39352 CVE-2023-39352 https://access.redhat.com/security/cve/CVE-2023-39353 CVE-2023-39353 CVE-2023-39353 https://access.redhat.com/security/cve/CVE-2023-39354 CVE-2023-39354 CVE-2023-39354 https://access.redhat.com/security/cve/CVE-2023-39356 CVE-2023-39356 CVE-2023-39356 https://access.redhat.com/security/cve/CVE-2023-40181 CVE-2023-40181 CVE-2023-40181 https://access.redhat.com/security/cve/CVE-2023-40186 CVE-2023-40186 CVE-2023-40186 https://access.redhat.com/security/cve/CVE-2023-40188 CVE-2023-40188 CVE-2023-40188 https://access.redhat.com/security/cve/CVE-2023-40567 CVE-2023-40567 CVE-2023-40567 https://access.redhat.com/security/cve/CVE-2023-40569 CVE-2023-40569 CVE-2023-40569 https://access.redhat.com/security/cve/CVE-2023-40589 CVE-2023-40589 CVE-2023-40589 https://bugzilla.redhat.com/2236606 2236606  https://bugzilla.redhat.com/2236650 2236650  https://bugzilla.redhat.com/2236656 2236656  https://bugzilla.redhat.com/2236669 2236669  https://bugzilla.redhat.com/2236730 2236730  https://bugzilla.redhat.com/2236750 2236750  https://bugzilla.redhat.com/2236759 2236759  https://bugzilla.redhat.com/2236763 2236763  https://bugzilla.redhat.com/2236766 2236766  https://bugzilla.redhat.com/2236774 2236774  https://bugzilla.redhat.com/2236779 2236779  https://bugzilla.redhat.com/2236784 2236784  https://errata.almalinux.org/9/ALSA-2024-2208.html ALSA-2024:2208 ALSA-2024:2208 ��'libwinpr-devel-2.11.2-1.el9.i686.rpm ��'libwinpr-devel-2.11.2-1.el9.x86_64.rpm ��'freerdp-devel-2.11.2-1.el9.x86_64.rpm ��'freerdp-devel-2.11.2-1.el9.i686.rpm ��'libwinpr-devel-2.11.2-1.el9.i686.rpm ��'libwinpr-devel-2.11.2-1.el9.x86_64.rpm ��'freerdp-devel-2.11.2-1.el9.x86_64.rpm ��'freerdp-devel-2.11.2-1.el9.i686.rpm ����	��{BBBBsecurity Moderate: libvirt security update 
��C�https://access.redhat.com/errata/RHSA-2024:2236 RHSA-2024:2236 RHSA-2024:2236 
https://access.redhat.com/security/cve/CVE-2024-2496 CVE-2024-2496 CVE-2024-2496 https://bugzilla.redhat.com/2269672 2269672  https://errata.almalinux.org/9/ALSA-2024-2236.html ALSA-2024:2236 ALSA-2024:2236 ��>libvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm ��>libvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm �~�>libvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm ��>libvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm ��>libvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm �~�>libvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm ���i�	��ABBsecurity Important: edk2 security update ��Y�jhttps://access.redhat.com/errata/RHSA-2024:2264 RHSA-2024:2264 RHSA-2024:2264 
https://access.redhat.com/security/cve/CVE-2022-36763 CVE-2022-36763 CVE-2022-36763 https://access.redhat.com/security/cve/CVE-2022-36764 CVE-2022-36764 CVE-2022-36764 https://access.redhat.com/security/cve/CVE-2023-3446 CVE-2023-3446 CVE-2023-3446 https://access.redhat.com/security/cve/CVE-2023-45229 CVE-2023-45229 CVE-2023-45229 https://access.redhat.com/security/cve/CVE-2023-45231 CVE-2023-45231 CVE-2023-45231 https://access.redhat.com/security/cve/CVE-2023-45232 CVE-2023-45232 CVE-2023-45232 https://access.redhat.com/security/cve/CVE-2023-45233 CVE-2023-45233 CVE-2023-45233 https://access.redhat.com/security/cve/CVE-2023-45235 CVE-2023-45235 CVE-2023-45235 https://bugzilla.redhat.com/2224962 2224962  https://bugzilla.redhat.com/2257582 2257582  https://bugzilla.redhat.com/2257583 2257583  https://bugzilla.redhat.com/2258677 2258677  https://bugzilla.redhat.com/2258688 2258688  https://bugzilla.redhat.com/2258691 2258691  https://bugzilla.redhat.com/2258694 2258694  https://bugzilla.redhat.com/2258700 2258700  https://errata.almalinux.org/9/ALSA-2024-2264.html ALSA-2024:2264 ALSA-2024:2264 �@�2edk2-aarch64-20231122-6.el9.noarch.rpm �w�2edk2-tools-20231122-6.el9.x86_64.rpm �A�2edk2-tools-doc-20231122-6.el9.noarch.rpm �@�2edk2-aarch64-20231122-6.el9.noarch.rpm �w�2edk2-tools-20231122-6.el9.x86_64.rpm �A�2edk2-tools-doc-20231122-6.el9.noarch.rpm ���h�	��EBsecurity Moderate: qt5-qtbase security update 
��C�shttps://access.redhat.com/errata/RHSA-2024:2276 RHSA-2024:2276 RHSA-2024:2276 
https://access.redhat.com/security/cve/CVE-2023-51714 CVE-2023-51714 CVE-2023-51714 https://access.redhat.com/security/cve/CVE-2024-25580 CVE-2024-25580 CVE-2024-25580 https://bugzilla.redhat.com/2255856 2255856  https://bugzilla.redhat.com/2264423 2264423  https://errata.almalinux.org/9/ALSA-2024-2276.html ALSA-2024:2276 ALSA-2024:2276 �u�qt5-qtbase-static-5.15.9-9.el9.i686.rpm �u�qt5-qtbase-static-5.15.9-9.el9.x86_64.rpm �u�qt5-qtbase-static-5.15.9-9.el9.i686.rpm �u�qt5-qtbase-static-5.15.9-9.el9.x86_64.rpm ���e�		��HBsecurity Moderate: gstreamer1-plugins-bad-free security update 
��6�P
https://access.redhat.com/errata/RHSA-2024:2287 RHSA-2024:2287 RHSA-2024:2287 
https://access.redhat.com/security/cve/CVE-2023-40474 CVE-2023-40474 CVE-2023-40474 https://access.redhat.com/security/cve/CVE-2023-40475 CVE-2023-40475 CVE-2023-40475 https://access.redhat.com/security/cve/CVE-2023-40476 CVE-2023-40476 CVE-2023-40476 https://access.redhat.com/security/cve/CVE-2023-50186 CVE-2023-50186 CVE-2023-50186 https://bugzilla.redhat.com/2254587 2254587  https://bugzilla.redhat.com/2254588 2254588  https://bugzilla.redhat.com/2254589 2254589  https://bugzilla.redhat.com/2255639 2255639  https://errata.almalinux.org/9/ALSA-2024-2287.html ALSA-2024:2287 ALSA-2024:2287 �r�ggstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm �r�ggstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm �r�ggstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm �r�ggstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm ���k�
	��Ksecurity Moderate: libtiff security update 
���:https://access.redhat.com/errata/RHSA-2024:2289 RHSA-2024:2289 RHSA-2024:2289 
https://access.redhat.com/security/cve/CVE-2022-40090 CVE-2022-40090 CVE-2022-40090 https://access.redhat.com/security/cve/CVE-2023-3618 CVE-2023-3618 CVE-2023-3618 https://access.redhat.com/security/cve/CVE-2023-40745 CVE-2023-40745 CVE-2023-40745 https://access.redhat.com/security/cve/CVE-2023-41175 CVE-2023-41175 CVE-2023-41175 https://access.redhat.com/security/cve/CVE-2023-6228 CVE-2023-6228 CVE-2023-6228 https://bugzilla.redhat.com/2215865 2215865  https://bugzilla.redhat.com/2234970 2234970  https://bugzilla.redhat.com/2235264 2235264  https://bugzilla.redhat.com/2235265 2235265  https://bugzilla.redhat.com/2240995 2240995  https://errata.almalinux.org/9/ALSA-2024-2289.html ALSA-2024:2289 ALSA-2024:2289 �{�tlibtiff-tools-4.4.0-12.el9.x86_64.rpm �{�tlibtiff-tools-4.4.0-12.el9.x86_64.rpm ����	��WB�vBBBBBBBBBsecurity Moderate: python3.11 security update 
��@�rhttps://access.redhat.com/errata/RHSA-2024:2292 RHSA-2024:2292 RHSA-2024:2292 
https://access.redhat.com/security/cve/CVE-2023-27043 CVE-2023-27043 CVE-2023-27043 https://bugzilla.redhat.com/2196183 2196183  https://errata.almalinux.org/9/ALSA-2024-2292.html ALSA-2024:2292 ALSA-2024:2292 ~python3.11-test-3.11.7-1.el9.i686.rpm f~python3.11-3.11.7-1.el9.i686.rpm ~python3.11-idle-3.11.7-1.el9.i686.rpm ~python3.11-test-3.11.7-1.el9.x86_64.rpm ~python3.11-debug-3.11.7-1.el9.i686.rpm g~python3.11-tkinter-3.11.7-1.el9.i686.rpm ~python3.11-idle-3.11.7-1.el9.x86_64.rpm ~python3.11-debug-3.11.7-1.el9.x86_64.rpm ~python3.11-test-3.11.7-1.el9.i686.rpm f~python3.11-3.11.7-1.el9.i686.rpm ~python3.11-idle-3.11.7-1.el9.i686.rpm ~python3.11-test-3.11.7-1.el9.x86_64.rpm ~python3.11-debug-3.11.7-1.el9.i686.rpm g~python3.11-tkinter-3.11.7-1.el9.i686.rpm ~python3.11-idle-3.11.7-1.el9.x86_64.rpm ~python3.11-debug-3.11.7-1.el9.x86_64.rpm ���9�	��XBBBBsecurity Moderate: libjpeg-turbo security update 
��2�Rhttps://access.redhat.com/errata/RHSA-2024:2295 RHSA-2024:2295 RHSA-2024:2295 
https://access.redhat.com/security/cve/CVE-2021-29390 CVE-2021-29390 CVE-2021-29390 https://bugzilla.redhat.com/2235521 2235521  https://errata.almalinux.org/9/ALSA-2024-2295.html ALSA-2024:2295 ALSA-2024:2295 �'�$turbojpeg-devel-2.0.90-7.el9.x86_64.rpm �&�$turbojpeg-2.0.90-7.el9.i686.rpm �'�$turbojpeg-devel-2.0.90-7.el9.i686.rpm �&�$turbojpeg-2.0.90-7.el9.x86_64.rpm �'�$turbojpeg-devel-2.0.90-7.el9.x86_64.rpm �&�$turbojpeg-2.0.90-7.el9.i686.rpm �'�$turbojpeg-devel-2.0.90-7.el9.i686.rpm �&�$turbojpeg-2.0.90-7.el9.x86_64.rpm ����
	��^BBsecurity Moderate: mingw components security update 
���Bhttps://access.redhat.com/errata/RHSA-2024:2353 RHSA-2024:2353 RHSA-2024:2353 
https://access.redhat.com/security/cve/CVE-2023-1579 CVE-2023-1579 CVE-2023-1579 https://bugzilla.redhat.com/2180905 2180905  https://errata.almalinux.org/9/ALSA-2024-2353.html ALSA-2024:2353 ALSA-2024:2353 �s�Dmingw64-binutils-2.41-3.el9.x86_64.rpm �n�Dmingw32-binutils-2.41-3.el9.x86_64.rpm �s�Dmingw64-binutils-2.41-3.el9.x86_64.rpm �n�Dmingw32-binutils-2.41-3.el9.x86_64.rpm ���/�	��bBsecurity Moderate: zziplib security update 
��F�https://access.redhat.com/errata/RHSA-2024:2377 RHSA-2024:2377 RHSA-2024:2377 
https://access.redhat.com/security/cve/CVE-2020-18770 CVE-2020-18770 CVE-2020-18770 https://bugzilla.redhat.com/2246907 2246907  https://errata.almalinux.org/9/ALSA-2024-2377.html ALSA-2024:2377 ALSA-2024:2377 �:�Vzziplib-devel-0.13.71-11.el9_4.x86_64.rpm �:�Vzziplib-devel-0.13.71-11.el9_4.i686.rpm �:�Vzziplib-devel-0.13.71-11.el9_4.x86_64.rpm �:�Vzziplib-devel-0.13.71-11.el9_4.i686.rpm ���/�	��eBBBBsecurity Important: kernel security, bug fix, and enhancement update ��T�%zhttps://access.redhat.com/errata/RHSA-2024:2394 RHSA-2024:2394 RHSA-2024:2394 
https://bugzilla.redhat.com/1918601 1918601  https://bugzilla.redhat.com/2049700 2049700  https://bugzilla.redhat.com/2133452 2133452  https://bugzilla.redhat.com/2151959 2151959  https://bugzilla.redhat.com/2177759 2177759  https://bugzilla.redhat.com/2185519 2185519  https://bugzilla.redhat.com/2188102 2188102  https://bugzilla.redhat.com/2210024 2210024  https://bugzilla.redhat.com/2213132 2213132  https://bugzilla.redhat.com/2218332 2218332  https://bugzilla.redhat.com/2219359 2219359  https://bugzilla.redhat.com/2221039 2221039  https://bugzilla.redhat.com/2221463 2221463  https://bugzilla.redhat.com/2221702 2221702  https://bugzilla.redhat.com/2226777 2226777  https://bugzilla.redhat.com/2226787 2226787  https://bugzilla.redhat.com/2226788 2226788  https://bugzilla.redhat.com/2231410 2231410  https://bugzilla.redhat.com/2239845 2239845  https://bugzilla.redhat.com/2239848 2239848  https://bugzilla.redhat.com/2244720 2244720  https://bugzilla.redhat.com/2246980 2246980  https://bugzilla.redhat.com/2250043 2250043  https://bugzilla.redhat.com/2252731 2252731  https://bugzilla.redhat.com/2253034 2253034  https://bugzilla.redhat.com/2253632 2253632  https://bugzilla.redhat.com/2254961 2254961  https://bugzilla.redhat.com/2254982 2254982  https://bugzilla.redhat.com/2255283 2255283  https://bugzilla.redhat.com/2255498 2255498  https://bugzilla.redhat.com/2256490 2256490  https://bugzilla.redhat.com/2256822 2256822  https://bugzilla.redhat.com/2257682 2257682  https://bugzilla.redhat.com/2258013 2258013  https://bugzilla.redhat.com/2258518 2258518  https://bugzilla.redhat.com/2260005 2260005  https://bugzilla.redhat.com/2262126 2262126  https://bugzilla.redhat.com/2262127 2262127  https://bugzilla.redhat.com/2265285 2265285  https://bugzilla.redhat.com/2265517 2265517  https://bugzilla.redhat.com/2265518 2265518  https://bugzilla.redhat.com/2265519 2265519  https://bugzilla.redhat.com/2265520 2265520  https://bugzilla.redhat.com/2265645 2265645  https://bugzilla.redhat.com/2265646 2265646  https://bugzilla.redhat.com/2265653 2265653  https://bugzilla.redhat.com/2267041 2267041  https://bugzilla.redhat.com/2267695 2267695  https://bugzilla.redhat.com/2267750 2267750  https://bugzilla.redhat.com/2267758 2267758  https://bugzilla.redhat.com/2267760 2267760  https://bugzilla.redhat.com/2267761 2267761  https://bugzilla.redhat.com/2267788 2267788  https://bugzilla.redhat.com/2267795 2267795  https://bugzilla.redhat.com/2269189 2269189  https://bugzilla.redhat.com/2269217 2269217  https://bugzilla.redhat.com/2270080 2270080  https://bugzilla.redhat.com/2270118 2270118  https://bugzilla.redhat.com/2270883 2270883  https://errata.almalinux.org/9/ALSA-2024-2394.html ALSA-2024:2394 ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.html CVE-2020-26555 CVE-2020-26555 https://www.redhat.com/security/data/cve/CVE-2022-0480.html CVE-2022-0480 CVE-2022-0480 https://www.redhat.com/security/data/cve/CVE-2022-38096.html CVE-2022-38096 CVE-2022-38096 https://www.redhat.com/security/data/cve/CVE-2022-45934.html CVE-2022-45934 CVE-2022-45934 https://www.redhat.com/security/data/cve/CVE-2023-24023.html CVE-2023-24023 CVE-2023-24023 https://www.redhat.com/security/data/cve/CVE-2023-25775.html CVE-2023-25775 CVE-2023-25775 https://www.redhat.com/security/data/cve/CVE-2023-28464.html CVE-2023-28464 CVE-2023-28464 https://www.redhat.com/security/data/cve/CVE-2023-28866.html CVE-2023-28866 CVE-2023-28866 https://www.redhat.com/security/data/cve/CVE-2023-31083.html CVE-2023-31083 CVE-2023-31083 https://www.redhat.com/security/data/cve/CVE-2023-3567.html CVE-2023-3567 CVE-2023-3567 https://www.redhat.com/security/data/cve/CVE-2023-37453.html CVE-2023-37453 CVE-2023-37453 https://www.redhat.com/security/data/cve/CVE-2023-39189.html CVE-2023-39189 CVE-2023-39189 https://www.redhat.com/security/data/cve/CVE-2023-39193.html CVE-2023-39193 CVE-2023-39193 https://www.redhat.com/security/data/cve/CVE-2023-39194.html CVE-2023-39194 CVE-2023-39194 https://www.redhat.com/security/data/cve/CVE-2023-39198.html CVE-2023-39198 CVE-2023-39198 https://www.redhat.com/security/data/cve/CVE-2023-4133.html CVE-2023-4133 CVE-2023-4133 https://www.redhat.com/security/data/cve/CVE-2023-42754.html CVE-2023-42754 CVE-2023-42754 https://www.redhat.com/security/data/cve/CVE-2023-42756.html CVE-2023-42756 CVE-2023-42756 https://www.redhat.com/security/data/cve/CVE-2023-45863.html CVE-2023-45863 CVE-2023-45863 https://www.redhat.com/security/data/cve/CVE-2023-46862.html CVE-2023-46862 CVE-2023-46862 https://www.redhat.com/security/data/cve/CVE-2023-51043.html CVE-2023-51043 CVE-2023-51043 https://www.redhat.com/security/data/cve/CVE-2023-51779.html CVE-2023-51779 CVE-2023-51779 https://www.redhat.com/security/data/cve/CVE-2023-51780.html CVE-2023-51780 CVE-2023-51780 https://www.redhat.com/security/data/cve/CVE-2023-52434.html CVE-2023-52434 CVE-2023-52434 https://www.redhat.com/security/data/cve/CVE-2023-52448.html CVE-2023-52448 CVE-2023-52448 https://www.redhat.com/security/data/cve/CVE-2023-52450.html CVE-2023-52450 CVE-2023-52450 https://www.redhat.com/security/data/cve/CVE-2023-52476.html CVE-2023-52476 CVE-2023-52476 https://www.redhat.com/security/data/cve/CVE-2023-52489.html CVE-2023-52489 CVE-2023-52489 https://www.redhat.com/security/data/cve/CVE-2023-52522.html CVE-2023-52522 CVE-2023-52522 https://www.redhat.com/security/data/cve/CVE-2023-52529.html CVE-2023-52529 CVE-2023-52529 https://www.redhat.com/security/data/cve/CVE-2023-52574.html CVE-2023-52574 CVE-2023-52574 https://www.redhat.com/security/data/cve/CVE-2023-52578.html CVE-2023-52578 CVE-2023-52578 https://www.redhat.com/security/data/cve/CVE-2023-52580.html CVE-2023-52580 CVE-2023-52580 https://www.redhat.com/security/data/cve/CVE-2023-52581.html CVE-2023-52581 CVE-2023-52581 https://www.redhat.com/security/data/cve/CVE-2023-52597.html CVE-2023-52597 CVE-2023-52597 https://www.redhat.com/security/data/cve/CVE-2023-52610.html CVE-2023-52610 CVE-2023-52610 https://www.redhat.com/security/data/cve/CVE-2023-52620.html CVE-2023-52620 CVE-2023-52620 https://www.redhat.com/security/data/cve/CVE-2023-6040.html CVE-2023-6040 CVE-2023-6040 https://www.redhat.com/security/data/cve/CVE-2023-6121.html CVE-2023-6121 CVE-2023-6121 https://www.redhat.com/security/data/cve/CVE-2023-6176.html CVE-2023-6176 CVE-2023-6176 https://www.redhat.com/security/data/cve/CVE-2023-6531.html CVE-2023-6531 CVE-2023-6531 https://www.redhat.com/security/data/cve/CVE-2023-6546.html CVE-2023-6546 CVE-2023-6546 https://www.redhat.com/security/data/cve/CVE-2023-6622.html CVE-2023-6622 CVE-2023-6622 https://www.redhat.com/security/data/cve/CVE-2023-6915.html CVE-2023-6915 CVE-2023-6915 https://www.redhat.com/security/data/cve/CVE-2023-6931.html CVE-2023-6931 CVE-2023-6931 https://www.redhat.com/security/data/cve/CVE-2023-6932.html CVE-2023-6932 CVE-2023-6932 https://www.redhat.com/security/data/cve/CVE-2024-0565.html CVE-2024-0565 CVE-2024-0565 https://www.redhat.com/security/data/cve/CVE-2024-0841.html CVE-2024-0841 CVE-2024-0841 https://www.redhat.com/security/data/cve/CVE-2024-1085.html CVE-2024-1085 CVE-2024-1085 https://www.redhat.com/security/data/cve/CVE-2024-1086.html CVE-2024-1086 CVE-2024-1086 https://www.redhat.com/security/data/cve/CVE-2024-25744.html CVE-2024-25744 CVE-2024-25744 https://www.redhat.com/security/data/cve/CVE-2024-26582.html CVE-2024-26582 CVE-2024-26582 https://www.redhat.com/security/data/cve/CVE-2024-26583.html CVE-2024-26583 CVE-2024-26583 https://www.redhat.com/security/data/cve/CVE-2024-26584.html CVE-2024-26584 CVE-2024-26584 https://www.redhat.com/security/data/cve/CVE-2024-26585.html CVE-2024-26585 CVE-2024-26585 https://www.redhat.com/security/data/cve/CVE-2024-26586.html CVE-2024-26586 CVE-2024-26586 https://www.redhat.com/security/data/cve/CVE-2024-26593.html CVE-2024-26593 CVE-2024-26593 https://www.redhat.com/security/data/cve/CVE-2024-26602.html CVE-2024-26602 CVE-2024-26602 https://www.redhat.com/security/data/cve/CVE-2024-26609.html CVE-2024-26609 CVE-2024-26609 https://www.redhat.com/security/data/cve/CVE-2024-26633.html CVE-2024-26633 CVE-2024-26633 https://www.redhat.com/security/data/cve/CVE-2024-26671.html CVE-2024-26671 CVE-2024-26671 �Glibperf-5.14.0-427.13.1.el9_4.x86_64.rpm �Gkernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpm �Gkernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm �Glibperf-5.14.0-427.13.1.el9_4.x86_64.rpm �Gkernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpm �Gkernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm �����	��kBBBBBBBBBBBBBBBBsecurity Moderate: avahi security update 
��y�Ohttps://access.redhat.com/errata/RHSA-2024:2433 RHSA-2024:2433 RHSA-2024:2433 
https://access.redhat.com/security/cve/CVE-2023-38469 CVE-2023-38469 CVE-2023-38469 https://access.redhat.com/security/cve/CVE-2023-38470 CVE-2023-38470 CVE-2023-38470 https://access.redhat.com/security/cve/CVE-2023-38471 CVE-2023-38471 CVE-2023-38471 https://access.redhat.com/security/cve/CVE-2023-38472 CVE-2023-38472 CVE-2023-38472 https://access.redhat.com/security/cve/CVE-2023-38473 CVE-2023-38473 CVE-2023-38473 https://bugzilla.redhat.com/2191687 2191687  https://bugzilla.redhat.com/2191690 2191690  https://bugzilla.redhat.com/2191691 2191691  https://bugzilla.redhat.com/2191692 2191692  https://bugzilla.redhat.com/2191694 2191694  https://errata.almalinux.org/9/ALSA-2024-2433.html ALSA-2024:2433 ALSA-2024:2433 �Havahi-devel-0.8-20.el9.i686.rpm �Havahi-glib-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-howl-0.8-20.el9.i686.rpm �Havahi-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-0.8-20.el9.i686.rpm �Havahi-compat-howl-0.8-20.el9.x86_64.rpm �Havahi-compat-howl-devel-0.8-20.el9.i686.rpm �Havahi-compat-howl-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm �Havahi-glib-devel-0.8-20.el9.i686.rpm �Havahi-devel-0.8-20.el9.i686.rpm �Havahi-glib-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-howl-0.8-20.el9.i686.rpm �Havahi-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-0.8-20.el9.i686.rpm �Havahi-compat-howl-0.8-20.el9.x86_64.rpm �Havahi-compat-howl-devel-0.8-20.el9.i686.rpm �Havahi-compat-howl-devel-0.8-20.el9.x86_64.rpm �Havahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm �Havahi-glib-devel-0.8-20.el9.i686.rpm ���t�	��}security Moderate: systemd security update 
��H�https://access.redhat.com/errata/RHSA-2024:2463 RHSA-2024:2463 RHSA-2024:2463 
https://access.redhat.com/security/cve/CVE-2023-7008 CVE-2023-7008 CVE-2023-7008 https://bugzilla.redhat.com/2222672 2222672  https://errata.almalinux.org/9/ALSA-2024-2463.html ALSA-2024:2463 ALSA-2024:2463 ��osystemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpm ��osystemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpm ����	� �Bsecurity Low: file security update �>��I�Bhttps://access.redhat.com/errata/RHSA-2024:2512 RHSA-2024:2512 RHSA-2024:2512 
https://access.redhat.com/security/cve/CVE-2022-48554 CVE-2022-48554 CVE-2022-48554 https://bugzilla.redhat.com/2235714 2235714  https://errata.almalinux.org/9/ALSA-2024-2512.html ALSA-2024:2512 ALSA-2024:2512 ��file-devel-5.39-16.el9.i686.rpm ��file-devel-5.39-16.el9.x86_64.rpm ��file-devel-5.39-16.el9.i686.rpm ��file-devel-5.39-16.el9.x86_64.rpm ����	��Bsecurity Moderate: mingw-pixman security update 
���https://access.redhat.com/errata/RHSA-2024:2525 RHSA-2024:2525 RHSA-2024:2525 
https://access.redhat.com/security/cve/CVE-2022-44638 CVE-2022-44638 CVE-2022-44638 https://bugzilla.redhat.com/2139988 2139988  https://errata.almalinux.org/9/ALSA-2024-2525.html ALSA-2024:2525 ALSA-2024:2525 �"�;mingw32-pixman-0.42.2-3.el9.noarch.rpm �%�;mingw64-pixman-0.42.2-3.el9.noarch.rpm �"�;mingw32-pixman-0.42.2-3.el9.noarch.rpm �%�;mingw64-pixman-0.42.2-3.el9.noarch.rpm ���u�	�	�EBBsecurity Low: mingw-glib2 security update �>���%
https://access.redhat.com/errata/RHSA-2024:2528 RHSA-2024:2528 RHSA-2024:2528 
https://access.redhat.com/security/cve/CVE-2023-29499 CVE-2023-29499 CVE-2023-29499 https://access.redhat.com/security/cve/CVE-2023-32611 CVE-2023-32611 CVE-2023-32611 https://access.redhat.com/security/cve/CVE-2023-32636 CVE-2023-32636 CVE-2023-32636 https://access.redhat.com/security/cve/CVE-2023-32665 CVE-2023-32665 CVE-2023-32665 https://bugzilla.redhat.com/2211827 2211827  https://bugzilla.redhat.com/2211828 2211828  https://bugzilla.redhat.com/2211829 2211829  https://bugzilla.redhat.com/2211833 2211833  https://errata.almalinux.org/9/ALSA-2024-2528.html ALSA-2024:2528 ALSA-2024:2528 ��Bmingw64-glib2-static-2.78.0-1.el9.noarch.rpm ��Bmingw64-glib2-2.78.0-1.el9.noarch.rpm ��Bmingw32-glib2-2.78.0-1.el9.noarch.rpm � �Bmingw32-glib2-static-2.78.0-1.el9.noarch.rpm ��Bmingw64-glib2-static-2.78.0-1.el9.noarch.rpm ��Bmingw64-glib2-2.78.0-1.el9.noarch.rpm ��Bmingw32-glib2-2.78.0-1.el9.noarch.rpm � �Bmingw32-glib2-static-2.78.0-1.el9.noarch.rpm ���T�	�"�a�jBBBsecurity Important: bind security update ��D�https://access.redhat.com/errata/RHSA-2024:2551 RHSA-2024:2551 RHSA-2024:2551 
https://access.redhat.com/security/cve/CVE-2023-4408 CVE-2023-4408 CVE-2023-4408 https://access.redhat.com/security/cve/CVE-2023-50387 CVE-2023-50387 CVE-2023-50387 https://access.redhat.com/security/cve/CVE-2023-50868 CVE-2023-50868 CVE-2023-50868 https://access.redhat.com/security/cve/CVE-2023-5517 CVE-2023-5517 CVE-2023-5517 https://access.redhat.com/security/cve/CVE-2023-5679 CVE-2023-5679 CVE-2023-5679 https://access.redhat.com/security/cve/CVE-2023-6516 CVE-2023-6516 CVE-2023-6516 https://bugzilla.redhat.com/2263896 2263896  https://bugzilla.redhat.com/2263897 2263897  https://bugzilla.redhat.com/2263909 2263909  https://bugzilla.redhat.com/2263911 2263911  https://bugzilla.redhat.com/2263914 2263914  https://bugzilla.redhat.com/2263917 2263917  https://errata.almalinux.org/9/ALSA-2024-2551.html ALSA-2024:2551 ALSA-2024:2551 �X�-bind-libs-9.16.23-18.el9_4.1.i686.rpm [�-bind-devel-9.16.23-18.el9_4.1.i686.rpm [�-bind-devel-9.16.23-18.el9_4.1.x86_64.rpm �?�-bind-doc-9.16.23-18.el9_4.1.noarch.rpm �X�-bind-libs-9.16.23-18.el9_4.1.i686.rpm [�-bind-devel-9.16.23-18.el9_4.1.i686.rpm [�-bind-devel-9.16.23-18.el9_4.1.x86_64.rpm �?�-bind-doc-9.16.23-18.el9_4.1.noarch.rpm ���)�	�#�OBBBBsecurity Moderate: libvirt security and bug fix update 
��R�2https://access.redhat.com/errata/RHSA-2024:2560 RHSA-2024:2560 RHSA-2024:2560 
https://access.redhat.com/security/cve/CVE-2024-1441 CVE-2024-1441 CVE-2024-1441 https://access.redhat.com/security/cve/CVE-2024-2494 CVE-2024-2494 CVE-2024-2494 https://bugzilla.redhat.com/2263841 2263841  https://bugzilla.redhat.com/2270115 2270115  https://errata.almalinux.org/9/ALSA-2024-2560.html ALSA-2024:2560 ALSA-2024:2560 ��<libvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm ��<libvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm �~�<libvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm ��<libvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm ��<libvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm �~�<libvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm ���!�	�$�UBsecurity Moderate: sssd security and bug fix update 
���Hhttps://access.redhat.com/errata/RHSA-2024:2571 RHSA-2024:2571 RHSA-2024:2571 
https://access.redhat.com/security/cve/CVE-2023-3758 CVE-2023-3758 CVE-2023-3758 https://bugzilla.redhat.com/2223762 2223762  https://errata.almalinux.org/9/ALSA-2024-2571.html ALSA-2024:2571 ALSA-2024:2571 �'�libsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpm �'�libsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpm �'�libsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpm �'�libsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpm ���C�	�%�XBBBBsecurity Moderate: kernel security and bug fix update 
��L�&https://access.redhat.com/errata/RHSA-2024:2758 RHSA-2024:2758 RHSA-2024:2758 
https://bugzilla.redhat.com/2250843 2250843  https://bugzilla.redhat.com/2270836 2270836  https://errata.almalinux.org/9/ALSA-2024-2758.html ALSA-2024:2758 ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.html CVE-2023-5090 CVE-2023-5090 https://www.redhat.com/security/data/cve/CVE-2023-6240.html CVE-2023-6240 CVE-2023-6240 https://www.redhat.com/security/data/cve/CVE-2024-25742.html CVE-2024-25742 CVE-2024-25742 https://www.redhat.com/security/data/cve/CVE-2024-25743.html CVE-2024-25743 CVE-2024-25743 �Hkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpm �Hlibperf-5.14.0-427.16.1.el9_4.x86_64.rpm �Hkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpm �Hkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpm �Hlibperf-5.14.0-427.16.1.el9_4.x86_64.rpm �Hkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpm ����h�	�&�^security Important: .NET 8.0 security update ��r�"https://access.redhat.com/errata/RHSA-2024:2842 RHSA-2024:2842 RHSA-2024:2842 
https://access.redhat.com/security/cve/CVE-2024-30045 CVE-2024-30045 CVE-2024-30045 https://access.redhat.com/security/cve/CVE-2024-30046 CVE-2024-30046 CVE-2024-30046 https://bugzilla.redhat.com/2279695 2279695  https://bugzilla.redhat.com/2279697 2279697  https://errata.almalinux.org/9/ALSA-2024-2842.html ALSA-2024:2842 ALSA-2024:2842 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpm ����C�	�'�`security Important: .NET 7.0 security update ���#https://access.redhat.com/errata/RHSA-2024:2843 RHSA-2024:2843 RHSA-2024:2843 
https://access.redhat.com/security/cve/CVE-2024-30045 CVE-2024-30045 CVE-2024-30045 https://access.redhat.com/security/cve/CVE-2024-30046 CVE-2024-30046 CVE-2024-30046 https://bugzilla.redhat.com/2279695 2279695  https://bugzilla.redhat.com/2279697 2279697  https://errata.almalinux.org/9/ALSA-2024-2843.html ALSA-2024:2843 ALSA-2024:2843 �5�dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpm �5�dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpm ����l�	�(�bBBBBsecurity Moderate: kernel security and bug fix update 
��7�xhttps://access.redhat.com/errata/RHSA-2024:3306 RHSA-2024:3306 RHSA-2024:3306 
https://bugzilla.redhat.com/2270879 2270879  https://bugzilla.redhat.com/2270881 2270881  https://bugzilla.redhat.com/2272816 2272816  https://bugzilla.redhat.com/2273423 2273423  https://errata.almalinux.org/9/ALSA-2024-3306.html ALSA-2024:3306 ALSA-2024:3306 https://www.redhat.com/security/data/cve/CVE-2024-26642.html CVE-2024-26642 CVE-2024-26642 https://www.redhat.com/security/data/cve/CVE-2024-26643.html CVE-2024-26643 CVE-2024-26643 https://www.redhat.com/security/data/cve/CVE-2024-26673.html CVE-2024-26673 CVE-2024-26673 https://www.redhat.com/security/data/cve/CVE-2024-26804.html CVE-2024-26804 CVE-2024-26804 https://www.redhat.com/security/data/cve/CVE-2024-35890.html CVE-2024-35890 CVE-2024-35890 �Ilibperf-5.14.0-427.18.1.el9_4.x86_64.rpm �Ikernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpm �Ikernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpm �Ilibperf-5.14.0-427.18.1.el9_4.x86_64.rpm �Ikernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpm �Ikernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpm �����	�)�hBBBBBBBBBBBBsecurity Important: glibc security update ��/�https://access.redhat.com/errata/RHSA-2024:3339 RHSA-2024:3339 RHSA-2024:3339 
https://access.redhat.com/security/cve/CVE-2024-2961 CVE-2024-2961 CVE-2024-2961 https://access.redhat.com/security/cve/CVE-2024-33599 CVE-2024-33599 CVE-2024-33599 https://access.redhat.com/security/cve/CVE-2024-33600 CVE-2024-33600 CVE-2024-33600 https://access.redhat.com/security/cve/CVE-2024-33601 CVE-2024-33601 CVE-2024-33601 https://access.redhat.com/security/cve/CVE-2024-33602 CVE-2024-33602 CVE-2024-33602 https://bugzilla.redhat.com/2273404 2273404  https://bugzilla.redhat.com/2277202 2277202  https://bugzilla.redhat.com/2277204 2277204  https://bugzilla.redhat.com/2277205 2277205  https://bugzilla.redhat.com/2277206 2277206  https://errata.almalinux.org/9/ALSA-2024-3339.html ALSA-2024:3339 ALSA-2024:3339 	�}^glibc-benchtests-2.34-100.el9_4.2.x86_64.rpm �D^nss_db-2.34-100.el9_4.2.i686.rpm �C^glibc-static-2.34-100.el9_4.2.x86_64.rpm �C^glibc-static-2.34-100.el9_4.2.i686.rpm �B^glibc-nss-devel-2.34-100.el9_4.2.i686.rpm �E^nss_hesiod-2.34-100.el9_4.2.i686.rpm �E^nss_hesiod-2.34-100.el9_4.2.x86_64.rpm �D^nss_db-2.34-100.el9_4.2.x86_64.rpm �B^glibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm 	�}^glibc-benchtests-2.34-100.el9_4.2.x86_64.rpm �D^nss_db-2.34-100.el9_4.2.i686.rpm �C^glibc-static-2.34-100.el9_4.2.x86_64.rpm �C^glibc-static-2.34-100.el9_4.2.i686.rpm �B^glibc-nss-devel-2.34-100.el9_4.2.i686.rpm �E^nss_hesiod-2.34-100.el9_4.2.i686.rpm �E^nss_hesiod-2.34-100.el9_4.2.x86_64.rpm �D^nss_db-2.34-100.el9_4.2.x86_64.rpm �B^glibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm ����t�	��vBBBsecurity Moderate: nghttp2 security update 
��?�mhttps://access.redhat.com/errata/RHSA-2024:3501 RHSA-2024:3501 RHSA-2024:3501 
https://access.redhat.com/security/cve/CVE-2024-28182 CVE-2024-28182 CVE-2024-28182 https://bugzilla.redhat.com/2268639 2268639  https://errata.almalinux.org/9/ALSA-2024-3501.html ALSA-2024:3501 ALSA-2024:3501 ��
libnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm �S�
nghttp2-1.43.0-5.el9_4.3.x86_64.rpm ��
libnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm ��
libnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm �S�
nghttp2-1.43.0-5.el9_4.3.x86_64.rpm ��
libnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm ���>�	�*�{BBBBsecurity Moderate: kernel security and bug fix update 
��,�bhttps://access.redhat.com/errata/RHSA-2024:3619 RHSA-2024:3619 RHSA-2024:3619 
https://access.redhat.com/security/cve/CVE-2024-26735 CVE-2024-26735 CVE-2024-26735 https://access.redhat.com/security/cve/CVE-2024-26993 CVE-2024-26993 CVE-2024-26993 https://bugzilla.redhat.com/2273278 2273278  https://bugzilla.redhat.com/2278314 2278314  https://errata.almalinux.org/9/ALSA-2024-3619.html ALSA-2024:3619 ALSA-2024:3619 �Jlibperf-5.14.0-427.20.1.el9_4.x86_64.rpm �Jkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpm �Jkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpm �Jlibperf-5.14.0-427.20.1.el9_4.x86_64.rpm �Jkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpm �Jkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpm ����F�	�+�security Important: ipa security update ���whttps://access.redhat.com/errata/RHSA-2024:3754 RHSA-2024:3754 RHSA-2024:3754 
https://access.redhat.com/security/cve/CVE-2024-2698 CVE-2024-2698 CVE-2024-2698 https://access.redhat.com/security/cve/CVE-2024-3183 CVE-2024-3183 CVE-2024-3183 https://bugzilla.redhat.com/2270353 2270353  https://bugzilla.redhat.com/2270685 2270685  https://errata.almalinux.org/9/ALSA-2024-3754.html ALSA-2024:3754 ALSA-2024:3754 ��python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpm ��python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpm ��ѧm� 	�,�BBBsecurity Important: libreoffice security update ���Xhttps://access.redhat.com/errata/RHSA-2024:3835 RHSA-2024:3835 RHSA-2024:3835 
https://access.redhat.com/security/cve/CVE-2023-6185 CVE-2023-6185 CVE-2023-6185 https://access.redhat.com/security/cve/CVE-2023-6186 CVE-2023-6186 CVE-2023-6186 https://bugzilla.redhat.com/2254003 2254003  https://bugzilla.redhat.com/2254005 2254005  https://errata.almalinux.org/9/ALSA-2024-3835.html ALSA-2024:3835 ALSA-2024:3835 �2�@libreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm �3�@libreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm �2�@libreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm �3�@libreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm �����!	�-�Fsecurity Important: 389-ds-base security update ��]�mhttps://access.redhat.com/errata/RHSA-2024:3837 RHSA-2024:3837 RHSA-2024:3837 
https://access.redhat.com/security/cve/CVE-2024-2199 CVE-2024-2199 CVE-2024-2199 https://access.redhat.com/security/cve/CVE-2024-3657 CVE-2024-3657 CVE-2024-3657 https://bugzilla.redhat.com/2267976 2267976  https://bugzilla.redhat.com/2274401 2274401  https://errata.almalinux.org/9/ALSA-2024-3837.html ALSA-2024:3837 ALSA-2024:3837 �4�k389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm �4�k389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm �����"	�.�security Moderate: ruby security update 
��J�Xhttps://access.redhat.com/errata/RHSA-2024:3838 RHSA-2024:3838 RHSA-2024:3838 
https://access.redhat.com/security/cve/CVE-2021-33621 CVE-2021-33621 CVE-2021-33621 https://access.redhat.com/security/cve/CVE-2023-28755 CVE-2023-28755 CVE-2023-28755 https://access.redhat.com/security/cve/CVE-2023-28756 CVE-2023-28756 CVE-2023-28756 https://access.redhat.com/security/cve/CVE-2024-27280 CVE-2024-27280 CVE-2024-27280 https://access.redhat.com/security/cve/CVE-2024-27281 CVE-2024-27281 CVE-2024-27281 https://access.redhat.com/security/cve/CVE-2024-27282 CVE-2024-27282 CVE-2024-27282 https://bugzilla.redhat.com/2149706 2149706  https://bugzilla.redhat.com/2184059 2184059  https://bugzilla.redhat.com/2184061 2184061  https://bugzilla.redhat.com/2270749 2270749  https://bugzilla.redhat.com/2270750 2270750  https://bugzilla.redhat.com/2276810 2276810  https://errata.almalinux.org/9/ALSA-2024-3838.html ALSA-2024:3838 ALSA-2024:3838 �;�	ruby-doc-3.0.7-162.el9_4.noarch.rpm �;�	ruby-doc-3.0.7-162.el9_4.noarch.rpm �����#	�1�oB�ZBBBsecurity Important: flatpak security update ��"�|https://access.redhat.com/errata/RHSA-2024:3959 RHSA-2024:3959 RHSA-2024:3959 
https://access.redhat.com/security/cve/CVE-2024-32462 CVE-2024-32462 CVE-2024-32462 https://bugzilla.redhat.com/2275981 2275981  https://errata.almalinux.org/9/ALSA-2024-3959.html ALSA-2024:3959 ALSA-2024:3959 �7�
flatpak-1.12.9-1.el9_4.i686.rpm �q�
flatpak-devel-1.12.9-1.el9_4.x86_64.rpm �8�
flatpak-session-helper-1.12.9-1.el9_4.i686.rpm �q�
flatpak-devel-1.12.9-1.el9_4.i686.rpm �7�
flatpak-1.12.9-1.el9_4.i686.rpm �q�
flatpak-devel-1.12.9-1.el9_4.x86_64.rpm �8�
flatpak-session-helper-1.12.9-1.el9_4.i686.rpm �q�
flatpak-devel-1.12.9-1.el9_4.i686.rpm ����@�$	�5�rBB�[BBBBsecurity Important: ghostscript security update ���qhttps://access.redhat.com/errata/RHSA-2024:3999 RHSA-2024:3999 RHSA-2024:3999 
https://access.redhat.com/security/cve/CVE-2024-33871 CVE-2024-33871 CVE-2024-33871 https://bugzilla.redhat.com/2283508 2283508  https://errata.almalinux.org/9/ALSA-2024-3999.html ALSA-2024:3999 ALSA-2024:3999 �x�mghostscript-9.54.0-16.el9_4.i686.rpm \�mlibgs-devel-9.54.0-16.el9_4.i686.rpm �y�mghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm \�mlibgs-devel-9.54.0-16.el9_4.x86_64.rpm �z�mghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm �x�mghostscript-9.54.0-16.el9_4.i686.rpm \�mlibgs-devel-9.54.0-16.el9_4.i686.rpm �y�mghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm \�mlibgs-devel-9.54.0-16.el9_4.x86_64.rpm �z�mghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm ���%	�8�vB�^BBBBBBBBBsecurity Important: python3.11 security update ���0https://access.redhat.com/errata/RHSA-2024:4077 RHSA-2024:4077 RHSA-2024:4077 
https://access.redhat.com/security/cve/CVE-2023-6597 CVE-2023-6597 CVE-2023-6597 https://bugzilla.redhat.com/2276518 2276518  https://errata.almalinux.org/9/ALSA-2024-4077.html ALSA-2024:4077 ALSA-2024:4077 python3.11-test-3.11.7-1.el9_4.1.i686.rpm python3.11-test-3.11.7-1.el9_4.1.x86_64.rpm gpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpm python3.11-idle-3.11.7-1.el9_4.1.x86_64.rpm fpython3.11-3.11.7-1.el9_4.1.i686.rpm python3.11-debug-3.11.7-1.el9_4.1.i686.rpm python3.11-debug-3.11.7-1.el9_4.1.x86_64.rpm python3.11-idle-3.11.7-1.el9_4.1.i686.rpm python3.11-test-3.11.7-1.el9_4.1.i686.rpm python3.11-test-3.11.7-1.el9_4.1.x86_64.rpm gpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpm python3.11-idle-3.11.7-1.el9_4.1.x86_64.rpm fpython3.11-3.11.7-1.el9_4.1.i686.rpm python3.11-debug-3.11.7-1.el9_4.1.i686.rpm python3.11-debug-3.11.7-1.el9_4.1.x86_64.rpm python3.11-idle-3.11.7-1.el9_4.1.i686.rpm ���I�&	�:�y�b�FBBBBBBBBBsecurity Important: python3.9 security update ��?�https://access.redhat.com/errata/RHSA-2024:4078 RHSA-2024:4078 RHSA-2024:4078 
https://access.redhat.com/security/cve/CVE-2023-6597 CVE-2023-6597 CVE-2023-6597 https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://bugzilla.redhat.com/2276518 2276518  https://bugzilla.redhat.com/2276525 2276525  https://errata.almalinux.org/9/ALSA-2024-4078.html ALSA-2024:4078 ALSA-2024:4078 �python3-idle-3.9.18-3.el9_4.1.i686.rpm �python3-test-3.9.18-3.el9_4.1.x86_64.rpm Z�python3-tkinter-3.9.18-3.el9_4.1.i686.rpm �python3-test-3.9.18-3.el9_4.1.i686.rpm �python3-debug-3.9.18-3.el9_4.1.x86_64.rpm Y�python3-3.9.18-3.el9_4.1.i686.rpm �python3-idle-3.9.18-3.el9_4.1.x86_64.rpm �python3-debug-3.9.18-3.el9_4.1.i686.rpm �python3-idle-3.9.18-3.el9_4.1.i686.rpm �python3-test-3.9.18-3.el9_4.1.x86_64.rpm Z�python3-tkinter-3.9.18-3.el9_4.1.i686.rpm �python3-test-3.9.18-3.el9_4.1.i686.rpm �python3-debug-3.9.18-3.el9_4.1.x86_64.rpm Y�python3-3.9.18-3.el9_4.1.i686.rpm �python3-idle-3.9.18-3.el9_4.1.x86_64.rpm �python3-debug-3.9.18-3.el9_4.1.i686.rpm ���#�'	�;�jBBBBsecurity Moderate: kernel security and bug fix update 
��T�https://access.redhat.com/errata/RHSA-2024:4349 RHSA-2024:4349 RHSA-2024:4349 
https://access.redhat.com/security/cve/CVE-2021-47400 CVE-2021-47400 CVE-2021-47400 https://access.redhat.com/security/cve/CVE-2023-52626 CVE-2023-52626 CVE-2023-52626 https://access.redhat.com/security/cve/CVE-2023-52667 CVE-2023-52667 CVE-2023-52667 https://access.redhat.com/security/cve/CVE-2024-26801 CVE-2024-26801 CVE-2024-26801 https://access.redhat.com/security/cve/CVE-2024-26974 CVE-2024-26974 CVE-2024-26974 https://access.redhat.com/security/cve/CVE-2024-27393 CVE-2024-27393 CVE-2024-27393 https://access.redhat.com/security/cve/CVE-2024-35870 CVE-2024-35870 CVE-2024-35870 https://access.redhat.com/security/cve/CVE-2024-35960 CVE-2024-35960 CVE-2024-35960 https://bugzilla.redhat.com/2271680 2271680  https://bugzilla.redhat.com/2273429 2273429  https://bugzilla.redhat.com/2278354 2278354  https://bugzilla.redhat.com/2280745 2280745  https://bugzilla.redhat.com/2281350 2281350  https://bugzilla.redhat.com/2281740 2281740  https://bugzilla.redhat.com/2281920 2281920  https://bugzilla.redhat.com/2282336 2282336  https://errata.almalinux.org/9/ALSA-2024-4349.html ALSA-2024:4349 ALSA-2024:4349 �Kkernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpm �Klibperf-5.14.0-427.24.1.el9_4.x86_64.rpm �Kkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpm �Kkernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpm �Klibperf-5.14.0-427.24.1.el9_4.x86_64.rpm �Kkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpm ����r�(	�<�psecurity Moderate: dotnet6.0 security update 
��b�Jhttps://access.redhat.com/errata/RHSA-2024:4439 RHSA-2024:4439 RHSA-2024:4439 
https://access.redhat.com/security/cve/CVE-2024-38095 CVE-2024-38095 CVE-2024-38095 https://bugzilla.redhat.com/2295323 2295323  https://errata.almalinux.org/9/ALSA-2024-4439.html ALSA-2024:4439 ALSA-2024:4439 e�
dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpm e�
dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpm ����I�)	�=�rsecurity Important: dotnet8.0 security update ��,�&https://access.redhat.com/errata/RHSA-2024:4450 RHSA-2024:4450 RHSA-2024:4450 
https://access.redhat.com/security/cve/CVE-2024-30105 CVE-2024-30105 CVE-2024-30105 https://access.redhat.com/security/cve/CVE-2024-35264 CVE-2024-35264 CVE-2024-35264 https://access.redhat.com/security/cve/CVE-2024-38095 CVE-2024-38095 CVE-2024-38095 https://bugzilla.redhat.com/2295320 2295320  https://bugzilla.redhat.com/2295321 2295321  https://bugzilla.redhat.com/2295323 2295323  https://errata.almalinux.org/9/ALSA-2024-4450.html ALSA-2024:4450 ALSA-2024:4450 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm �����*	�>�tBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security update ��R�Phttps://access.redhat.com/errata/RHSA-2024:4563 RHSA-2024:4563 RHSA-2024:4563 
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21144 CVE-2024-21144 CVE-2024-21144 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961  https://bugzilla.redhat.com/2297962 2297962  https://bugzilla.redhat.com/2297963 2297963  https://bugzilla.redhat.com/2297964 2297964  https://bugzilla.redhat.com/2297976 2297976  https://bugzilla.redhat.com/2297977 2297977  https://errata.almalinux.org/9/ALSA-2024-4563.html ALSA-2024:4563 ALSA-2024:4563 
�%Pjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �+Pjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �,Pjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �&Pjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �*Pjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �-Pjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �)Pjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �'Pjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �$Pjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �(Pjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm 
�%Pjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �+Pjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �,Pjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �&Pjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �*Pjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �-Pjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �)Pjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �'Pjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �$Pjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �(Pjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm ����+�+	�?�HBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security update ��"�Ohttps://access.redhat.com/errata/RHSA-2024:4567 RHSA-2024:4567 RHSA-2024:4567 
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21144 CVE-2024-21144 CVE-2024-21144 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961  https://bugzilla.redhat.com/2297962 2297962  https://bugzilla.redhat.com/2297963 2297963  https://bugzilla.redhat.com/2297964 2297964  https://bugzilla.redhat.com/2297976 2297976  https://bugzilla.redhat.com/2297977 2297977  https://errata.almalinux.org/9/ALSA-2024-4567.html ALSA-2024:4567 ALSA-2024:4567 �K(java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �M(java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �H(java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �L(java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �J(java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �F(java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �S(java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �P(java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �Q(java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �N(java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �O(java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �G(java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �I(java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �R(java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �K(java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �M(java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �H(java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �L(java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �J(java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �F(java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �S(java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �P(java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �Q(java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �N(java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �O(java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �G(java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �I(java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �R(java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm ����w�,	� �dBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security update ��q�ihttps://access.redhat.com/errata/RHSA-2024:4568 RHSA-2024:4568 RHSA-2024:4568 
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961  https://bugzilla.redhat.com/2297962 2297962  https://bugzilla.redhat.com/2297963 2297963  https://bugzilla.redhat.com/2297976 2297976  https://bugzilla.redhat.com/2297977 2297977  https://errata.almalinux.org/9/ALSA-2024-4568.html ALSA-2024:4568 ALSA-2024:4568 k,java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm t,java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm m,java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm s,java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm r,java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm q,java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm u,java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm j,java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm n,java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm w,java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm l,java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm v,java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm o,java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm p,java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm k,java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm t,java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm m,java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm s,java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm r,java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm q,java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm u,java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm j,java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm n,java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm w,java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm l,java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm v,java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm o,java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm p,java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm ����n�-	��@BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-21-openjdk security update ��Z�ihttps://access.redhat.com/errata/RHSA-2024:4573 RHSA-2024:4573 RHSA-2024:4573 
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961  https://bugzilla.redhat.com/2297962 2297962  https://bugzilla.redhat.com/2297963 2297963  https://bugzilla.redhat.com/2297976 2297976  https://bugzilla.redhat.com/2297977 2297977  https://errata.almalinux.org/9/ALSA-2024-4573.html ALSA-2024:4573 ALSA-2024:4573 �]:java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �_:java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �^:java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �f:java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �Y:java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �b:java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �a:java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �e:java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �[:java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �d:java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �`:java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �Z:java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �c:java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �\:java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �]:java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �_:java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �^:java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �f:java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �Y:java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �b:java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �a:java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �e:java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �[:java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �d:java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �`:java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �Z:java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �c:java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �\:java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �����.	��\BBBBsecurity Important: kernel security update ��C�$https://access.redhat.com/errata/RHSA-2024:4583 RHSA-2024:4583 RHSA-2024:4583 
https://access.redhat.com/security/cve/CVE-2021-47548 CVE-2021-47548 CVE-2021-47548 https://access.redhat.com/security/cve/CVE-2021-47596 CVE-2021-47596 CVE-2021-47596 https://access.redhat.com/security/cve/CVE-2022-48627 CVE-2022-48627 CVE-2022-48627 https://access.redhat.com/security/cve/CVE-2023-52638 CVE-2023-52638 CVE-2023-52638 https://access.redhat.com/security/cve/CVE-2024-26783 CVE-2024-26783 CVE-2024-26783 https://access.redhat.com/security/cve/CVE-2024-26858 CVE-2024-26858 CVE-2024-26858 https://access.redhat.com/security/cve/CVE-2024-27397 CVE-2024-27397 CVE-2024-27397 https://access.redhat.com/security/cve/CVE-2024-27435 CVE-2024-27435 CVE-2024-27435 https://access.redhat.com/security/cve/CVE-2024-35958 CVE-2024-35958 CVE-2024-35958 https://access.redhat.com/security/cve/CVE-2024-36270 CVE-2024-36270 CVE-2024-36270 https://access.redhat.com/security/cve/CVE-2024-36886 CVE-2024-36886 CVE-2024-36886 https://access.redhat.com/security/cve/CVE-2024-36904 CVE-2024-36904 CVE-2024-36904 https://access.redhat.com/security/cve/CVE-2024-36957 CVE-2024-36957 CVE-2024-36957 https://access.redhat.com/security/cve/CVE-2024-38543 CVE-2024-38543 CVE-2024-38543 https://access.redhat.com/security/cve/CVE-2024-38586 CVE-2024-38586 CVE-2024-38586 https://access.redhat.com/security/cve/CVE-2024-38593 CVE-2024-38593 CVE-2024-38593 https://access.redhat.com/security/cve/CVE-2024-38663 CVE-2024-38663 CVE-2024-38663 https://bugzilla.redhat.com/2267509 2267509  https://bugzilla.redhat.com/2273082 2273082  https://bugzilla.redhat.com/2273466 2273466  https://bugzilla.redhat.com/2275735 2275735  https://bugzilla.redhat.com/2277238 2277238  https://bugzilla.redhat.com/2280434 2280434  https://bugzilla.redhat.com/2281131 2281131  https://bugzilla.redhat.com/2281925 2281925  https://bugzilla.redhat.com/2283401 2283401  https://bugzilla.redhat.com/2284541 2284541  https://bugzilla.redhat.com/2284581 2284581  https://bugzilla.redhat.com/2293230 2293230  https://bugzilla.redhat.com/2293380 2293380  https://bugzilla.redhat.com/2293402 2293402  https://bugzilla.redhat.com/2293456 2293456  https://bugzilla.redhat.com/2293653 2293653  https://bugzilla.redhat.com/2294225 2294225  https://errata.almalinux.org/9/ALSA-2024-4583.html ALSA-2024:4583 ALSA-2024:4583 �Lkernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpm �Lkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpm �Llibperf-5.14.0-427.26.1.el9_4.x86_64.rpm �Lkernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpm �Lkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpm �Llibperf-5.14.0-427.26.1.el9_4.x86_64.rpm �����/	��bBsecurity Important: qt5-qtbase security update ��]�@https://access.redhat.com/errata/RHSA-2024:4623 RHSA-2024:4623 RHSA-2024:4623 
https://access.redhat.com/security/cve/CVE-2024-39936 CVE-2024-39936 CVE-2024-39936 https://bugzilla.redhat.com/2295867 2295867  https://errata.almalinux.org/9/ALSA-2024-4623.html ALSA-2024:4623 ALSA-2024:4623 �u�
qt5-qtbase-static-5.15.9-10.el9_4.i686.rpm �u�
qt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm �u�
qt5-qtbase-static-5.15.9-10.el9_4.i686.rpm �u�
qt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm ����0	��DB�aBsecurity Moderate: edk2 security update 
���Lhttps://access.redhat.com/errata/RHSA-2024:4749 RHSA-2024:4749 RHSA-2024:4749 
https://access.redhat.com/security/cve/CVE-2022-36765 CVE-2022-36765 CVE-2022-36765 https://access.redhat.com/security/cve/CVE-2023-45236 CVE-2023-45236 CVE-2023-45236 https://access.redhat.com/security/cve/CVE-2023-45237 CVE-2023-45237 CVE-2023-45237 https://bugzilla.redhat.com/2257584 2257584  https://bugzilla.redhat.com/2258703 2258703  https://bugzilla.redhat.com/2258706 2258706  https://errata.almalinux.org/9/ALSA-2024-4749.html ALSA-2024:4749 ALSA-2024:4749 ��8edk2-ovmf-20231122-6.el9_4.2.noarch.rpm �@�8edk2-aarch64-20231122-6.el9_4.2.noarch.rpm �A�8edk2-tools-doc-20231122-6.el9_4.2.noarch.rpm �w�8edk2-tools-20231122-6.el9_4.2.x86_64.rpm ��8edk2-ovmf-20231122-6.el9_4.2.noarch.rpm �@�8edk2-aarch64-20231122-6.el9_4.2.noarch.rpm �A�8edk2-tools-doc-20231122-6.el9_4.2.noarch.rpm �w�8edk2-tools-20231122-6.el9_4.2.x86_64.rpm ����K�1	��hBBsecurity Moderate: libreoffice security update 
��i�https://access.redhat.com/errata/RHSA-2024:4755 RHSA-2024:4755 RHSA-2024:4755 
https://access.redhat.com/security/cve/CVE-2024-3044 CVE-2024-3044 CVE-2024-3044 https://bugzilla.redhat.com/2280542 2280542  https://errata.almalinux.org/9/ALSA-2024-4755.html ALSA-2024:4755 ALSA-2024:4755 �3�Alibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm �2�Alibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm �3�Alibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm �2�Alibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm ����%�2	��lBsecurity Moderate: libuv security update 
�� �whttps://access.redhat.com/errata/RHSA-2024:4756 RHSA-2024:4756 RHSA-2024:4756 
https://access.redhat.com/security/cve/CVE-2024-24806 CVE-2024-24806 CVE-2024-24806 https://bugzilla.redhat.com/2263292 2263292  https://errata.almalinux.org/9/ALSA-2024-4756.html ALSA-2024:4756 ALSA-2024:4756 �+�ulibuv-devel-1.42.0-2.el9_4.x86_64.rpm �+�ulibuv-devel-1.42.0-2.el9_4.i686.rpm �+�ulibuv-devel-1.42.0-2.el9_4.x86_64.rpm �+�ulibuv-devel-1.42.0-2.el9_4.i686.rpm ����5�3	�	�oBBBBsecurity Moderate: libvirt security update 
��w�\https://access.redhat.com/errata/RHSA-2024:4757 RHSA-2024:4757 RHSA-2024:4757 
https://access.redhat.com/security/cve/CVE-2024-4418 CVE-2024-4418 CVE-2024-4418 https://bugzilla.redhat.com/2278616 2278616  https://errata.almalinux.org/9/ALSA-2024-4757.html ALSA-2024:4757 ALSA-2024:4757 ��=libvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �~�=libvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm ��=libvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm ��=libvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �~�=libvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm ��=libvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �����4	��JB�kBBBBBBBBBsecurity Low: python3 security update �>��S�,https://access.redhat.com/errata/RHSA-2024:4766 RHSA-2024:4766 RHSA-2024:4766 
https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://bugzilla.redhat.com/2292921 2292921  https://errata.almalinux.org/9/ALSA-2024-4766.html ALSA-2024:4766 ALSA-2024:4766 � python3.11-debug-3.11.7-1.el9_4.3.i686.rpm � python3.11-test-3.11.7-1.el9_4.3.x86_64.rpm � python3.11-test-3.11.7-1.el9_4.3.i686.rpm � python3.11-idle-3.11.7-1.el9_4.3.i686.rpm � python3.11-debug-3.11.7-1.el9_4.3.x86_64.rpm � python3.11-idle-3.11.7-1.el9_4.3.x86_64.rpm g� python3.11-tkinter-3.11.7-1.el9_4.3.i686.rpm f� python3.11-3.11.7-1.el9_4.3.i686.rpm � python3.11-debug-3.11.7-1.el9_4.3.i686.rpm � python3.11-test-3.11.7-1.el9_4.3.x86_64.rpm � python3.11-test-3.11.7-1.el9_4.3.i686.rpm � python3.11-idle-3.11.7-1.el9_4.3.i686.rpm � python3.11-debug-3.11.7-1.el9_4.3.x86_64.rpm � python3.11-idle-3.11.7-1.el9_4.3.x86_64.rpm g� python3.11-tkinter-3.11.7-1.el9_4.3.i686.rpm f� python3.11-3.11.7-1.el9_4.3.i686.rpm �����5	��M�O�fBBBBBBBBBsecurity Low: python3 security update �>���,https://access.redhat.com/errata/RHSA-2024:4779 RHSA-2024:4779 RHSA-2024:4779 
https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://bugzilla.redhat.com/2292921 2292921  https://errata.almalinux.org/9/ALSA-2024-4779.html ALSA-2024:4779 ALSA-2024:4779 �python3-debug-3.9.18-3.el9_4.3.i686.rpm �python3-idle-3.9.18-3.el9_4.3.i686.rpm �python3-debug-3.9.18-3.el9_4.3.x86_64.rpm �python3-test-3.9.18-3.el9_4.3.i686.rpm Y�python3-3.9.18-3.el9_4.3.i686.rpm Z�python3-tkinter-3.9.18-3.el9_4.3.i686.rpm �python3-test-3.9.18-3.el9_4.3.x86_64.rpm �python3-idle-3.9.18-3.el9_4.3.x86_64.rpm �python3-debug-3.9.18-3.el9_4.3.i686.rpm �python3-idle-3.9.18-3.el9_4.3.i686.rpm �python3-debug-3.9.18-3.el9_4.3.x86_64.rpm �python3-test-3.9.18-3.el9_4.3.i686.rpm Y�python3-3.9.18-3.el9_4.3.i686.rpm Z�python3-tkinter-3.9.18-3.el9_4.3.i686.rpm �python3-test-3.9.18-3.el9_4.3.x86_64.rpm �python3-idle-3.9.18-3.el9_4.3.x86_64.rpm �����6	��KBBBBsecurity Moderate: kernel security update 
��+�1$https://access.redhat.com/errata/RHSA-2024:4928 RHSA-2024:4928 RHSA-2024:4928 
https://access.redhat.com/security/cve/CVE-2021-47459 CVE-2021-47459 CVE-2021-47459 https://access.redhat.com/security/cve/CVE-2022-48743 CVE-2022-48743 CVE-2022-48743 https://access.redhat.com/security/cve/CVE-2023-52458 CVE-2023-52458 CVE-2023-52458 https://access.redhat.com/security/cve/CVE-2023-52809 CVE-2023-52809 CVE-2023-52809 https://access.redhat.com/security/cve/CVE-2024-26737 CVE-2024-26737 CVE-2024-26737 https://access.redhat.com/security/cve/CVE-2024-26773 CVE-2024-26773 CVE-2024-26773 https://access.redhat.com/security/cve/CVE-2024-26852 CVE-2024-26852 CVE-2024-26852 https://access.redhat.com/security/cve/CVE-2024-26880 CVE-2024-26880 CVE-2024-26880 https://access.redhat.com/security/cve/CVE-2024-26982 CVE-2024-26982 CVE-2024-26982 https://access.redhat.com/security/cve/CVE-2024-27030 CVE-2024-27030 CVE-2024-27030 https://access.redhat.com/security/cve/CVE-2024-27046 CVE-2024-27046 CVE-2024-27046 https://access.redhat.com/security/cve/CVE-2024-35857 CVE-2024-35857 CVE-2024-35857 https://access.redhat.com/security/cve/CVE-2024-35885 CVE-2024-35885 CVE-2024-35885 https://access.redhat.com/security/cve/CVE-2024-35907 CVE-2024-35907 CVE-2024-35907 https://access.redhat.com/security/cve/CVE-2024-36924 CVE-2024-36924 CVE-2024-36924 https://access.redhat.com/security/cve/CVE-2024-36952 CVE-2024-36952 CVE-2024-36952 https://access.redhat.com/security/cve/CVE-2024-38580 CVE-2024-38580 CVE-2024-38580 https://bugzilla.redhat.com/2265794 2265794  https://bugzilla.redhat.com/2273236 2273236  https://bugzilla.redhat.com/2273274 2273274  https://bugzilla.redhat.com/2275690 2275690  https://bugzilla.redhat.com/2275761 2275761  https://bugzilla.redhat.com/2278337 2278337  https://bugzilla.redhat.com/2278435 2278435  https://bugzilla.redhat.com/2278473 2278473  https://bugzilla.redhat.com/2281247 2281247  https://bugzilla.redhat.com/2281647 2281647  https://bugzilla.redhat.com/2281700 2281700  https://bugzilla.redhat.com/2282669 2282669  https://bugzilla.redhat.com/2282898 2282898  https://bugzilla.redhat.com/2284506 2284506  https://bugzilla.redhat.com/2284598 2284598  https://bugzilla.redhat.com/2293316 2293316  https://bugzilla.redhat.com/2293412 2293412  https://errata.almalinux.org/9/ALSA-2024-4928.html ALSA-2024:4928 ALSA-2024:4928 �Mlibperf-5.14.0-427.28.1.el9_4.x86_64.rpm �Mkernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpm �Mkernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpm �Mlibperf-5.14.0-427.28.1.el9_4.x86_64.rpm �Mkernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpm �Mkernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpm ����G�7	��QBBBBBBBBBBsecurity Important: freeradius security update ��\�Ghttps://access.redhat.com/errata/RHSA-2024:4935 RHSA-2024:4935 RHSA-2024:4935 
https://access.redhat.com/security/cve/CVE-2024-3596 CVE-2024-3596 CVE-2024-3596 https://bugzilla.redhat.com/2263240 2263240  https://errata.almalinux.org/9/ALSA-2024-4935.html ALSA-2024:4935 ALSA-2024:4935 �D�=freeradius-rest-3.0.21-40.el9_4.x86_64.rpm �A�=freeradius-mysql-3.0.21-40.el9_4.x86_64.rpm �E�=freeradius-sqlite-3.0.21-40.el9_4.x86_64.rpm �B�=freeradius-perl-3.0.21-40.el9_4.x86_64.rpm �F�=freeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpm �C�=freeradius-postgresql-3.0.21-40.el9_4.x86_64.rpm �D�=freeradius-rest-3.0.21-40.el9_4.x86_64.rpm �A�=freeradius-mysql-3.0.21-40.el9_4.x86_64.rpm �E�=freeradius-sqlite-3.0.21-40.el9_4.x86_64.rpm �B�=freeradius-perl-3.0.21-40.el9_4.x86_64.rpm �F�=freeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpm �C�=freeradius-postgresql-3.0.21-40.el9_4.x86_64.rpm ��ʚN�8	��]security Moderate: 389-ds-base security update 
��#�jhttps://access.redhat.com/errata/RHSA-2024:5192 RHSA-2024:5192 RHSA-2024:5192 
https://access.redhat.com/security/cve/CVE-2024-5953 CVE-2024-5953 CVE-2024-5953 https://access.redhat.com/security/cve/CVE-2024-6237 CVE-2024-6237 CVE-2024-6237 https://bugzilla.redhat.com/2292104 2292104  https://bugzilla.redhat.com/2293579 2293579  https://errata.almalinux.org/9/ALSA-2024-5192.html ALSA-2024:5192 ALSA-2024:5192 �4�l389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm �4�l389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm ���2�9	��R�NBBBsecurity Important: bind and bind-dyndb-ldap security update ��
�"https://access.redhat.com/errata/RHSA-2024:5231 RHSA-2024:5231 RHSA-2024:5231 
https://access.redhat.com/security/cve/CVE-2024-1737 CVE-2024-1737 CVE-2024-1737 https://access.redhat.com/security/cve/CVE-2024-1975 CVE-2024-1975 CVE-2024-1975 https://access.redhat.com/security/cve/CVE-2024-4076 CVE-2024-4076 CVE-2024-4076 https://bugzilla.redhat.com/2298893 2298893  https://bugzilla.redhat.com/2298901 2298901  https://bugzilla.redhat.com/2298904 2298904  https://errata.almalinux.org/9/ALSA-2024-5231.html ALSA-2024:5231 ALSA-2024:5231 [�.bind-devel-9.16.23-18.el9_4.6.i686.rpm [�.bind-devel-9.16.23-18.el9_4.6.x86_64.rpm �X�.bind-libs-9.16.23-18.el9_4.6.i686.rpm �?�.bind-doc-9.16.23-18.el9_4.6.noarch.rpm [�.bind-devel-9.16.23-18.el9_4.6.i686.rpm [�.bind-devel-9.16.23-18.el9_4.6.x86_64.rpm �X�.bind-libs-9.16.23-18.el9_4.6.i686.rpm �?�.bind-doc-9.16.23-18.el9_4.6.noarch.rpm ����n�:	��dsecurity Moderate: .NET 8.0 security update 
��/�}https://access.redhat.com/errata/RHSA-2024:5334 RHSA-2024:5334 RHSA-2024:5334 
https://access.redhat.com/security/cve/CVE-2024-38167 CVE-2024-38167 CVE-2024-38167 https://bugzilla.redhat.com/2302428 2302428  https://errata.almalinux.org/9/ALSA-2024-5334.html ALSA-2024:5334 ALSA-2024:5334 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpm ����R�;	��fBBBBsecurity Important: kernel security update ��,�4^https://access.redhat.com/errata/RHSA-2024:5363 RHSA-2024:5363 RHSA-2024:5363 
https://access.redhat.com/security/cve/CVE-2021-47606 CVE-2021-47606 CVE-2021-47606 https://access.redhat.com/security/cve/CVE-2023-52651 CVE-2023-52651 CVE-2023-52651 https://access.redhat.com/security/cve/CVE-2023-52864 CVE-2023-52864 CVE-2023-52864 https://access.redhat.com/security/cve/CVE-2024-21823 CVE-2024-21823 CVE-2024-21823 https://access.redhat.com/security/cve/CVE-2024-26600 CVE-2024-26600 CVE-2024-26600 https://access.redhat.com/security/cve/CVE-2024-26808 CVE-2024-26808 CVE-2024-26808 https://access.redhat.com/security/cve/CVE-2024-26828 CVE-2024-26828 CVE-2024-26828 https://access.redhat.com/security/cve/CVE-2024-26853 CVE-2024-26853 CVE-2024-26853 https://access.redhat.com/security/cve/CVE-2024-26868 CVE-2024-26868 CVE-2024-26868 https://access.redhat.com/security/cve/CVE-2024-26897 CVE-2024-26897 CVE-2024-26897 https://access.redhat.com/security/cve/CVE-2024-27049 CVE-2024-27049 CVE-2024-27049 https://access.redhat.com/security/cve/CVE-2024-27052 CVE-2024-27052 CVE-2024-27052 https://access.redhat.com/security/cve/CVE-2024-27065 CVE-2024-27065 CVE-2024-27065 https://access.redhat.com/security/cve/CVE-2024-27417 CVE-2024-27417 CVE-2024-27417 https://access.redhat.com/security/cve/CVE-2024-27434 CVE-2024-27434 CVE-2024-27434 https://access.redhat.com/security/cve/CVE-2024-33621 CVE-2024-33621 CVE-2024-33621 https://access.redhat.com/security/cve/CVE-2024-35789 CVE-2024-35789 CVE-2024-35789 https://access.redhat.com/security/cve/CVE-2024-35800 CVE-2024-35800 CVE-2024-35800 https://access.redhat.com/security/cve/CVE-2024-35823 CVE-2024-35823 CVE-2024-35823 https://access.redhat.com/security/cve/CVE-2024-35845 CVE-2024-35845 CVE-2024-35845 https://access.redhat.com/security/cve/CVE-2024-35848 CVE-2024-35848 CVE-2024-35848 https://access.redhat.com/security/cve/CVE-2024-35852 CVE-2024-35852 CVE-2024-35852 https://access.redhat.com/security/cve/CVE-2024-35899 CVE-2024-35899 CVE-2024-35899 https://access.redhat.com/security/cve/CVE-2024-35911 CVE-2024-35911 CVE-2024-35911 https://access.redhat.com/security/cve/CVE-2024-35937 CVE-2024-35937 CVE-2024-35937 https://access.redhat.com/security/cve/CVE-2024-35969 CVE-2024-35969 CVE-2024-35969 https://access.redhat.com/security/cve/CVE-2024-36005 CVE-2024-36005 CVE-2024-36005 https://access.redhat.com/security/cve/CVE-2024-36017 CVE-2024-36017 CVE-2024-36017 https://access.redhat.com/security/cve/CVE-2024-36020 CVE-2024-36020 CVE-2024-36020 https://access.redhat.com/security/cve/CVE-2024-36489 CVE-2024-36489 CVE-2024-36489 https://access.redhat.com/security/cve/CVE-2024-36903 CVE-2024-36903 CVE-2024-36903 https://access.redhat.com/security/cve/CVE-2024-36921 CVE-2024-36921 CVE-2024-36921 https://access.redhat.com/security/cve/CVE-2024-36922 CVE-2024-36922 CVE-2024-36922 https://access.redhat.com/security/cve/CVE-2024-36929 CVE-2024-36929 CVE-2024-36929 https://access.redhat.com/security/cve/CVE-2024-36941 CVE-2024-36941 CVE-2024-36941 https://access.redhat.com/security/cve/CVE-2024-36971 CVE-2024-36971 CVE-2024-36971 https://access.redhat.com/security/cve/CVE-2024-37353 CVE-2024-37353 CVE-2024-37353 https://access.redhat.com/security/cve/CVE-2024-37356 CVE-2024-37356 CVE-2024-37356 https://access.redhat.com/security/cve/CVE-2024-38391 CVE-2024-38391 CVE-2024-38391 https://access.redhat.com/security/cve/CVE-2024-38558 CVE-2024-38558 CVE-2024-38558 https://access.redhat.com/security/cve/CVE-2024-38575 CVE-2024-38575 CVE-2024-38575 https://access.redhat.com/security/cve/CVE-2024-39487 CVE-2024-39487 CVE-2024-39487 https://access.redhat.com/security/cve/CVE-2024-40928 CVE-2024-40928 CVE-2024-40928 https://access.redhat.com/security/cve/CVE-2024-40954 CVE-2024-40954 CVE-2024-40954 https://access.redhat.com/security/cve/CVE-2024-40958 CVE-2024-40958 CVE-2024-40958 https://access.redhat.com/security/cve/CVE-2024-40961 CVE-2024-40961 CVE-2024-40961 https://bugzilla.redhat.com/2265838 2265838  https://bugzilla.redhat.com/2273405 2273405  https://bugzilla.redhat.com/2275600 2275600  https://bugzilla.redhat.com/2275655 2275655  https://bugzilla.redhat.com/2275715 2275715  https://bugzilla.redhat.com/2275748 2275748  https://bugzilla.redhat.com/2278380 2278380  https://bugzilla.redhat.com/2278417 2278417  https://bugzilla.redhat.com/2278429 2278429  https://bugzilla.redhat.com/2278519 2278519  https://bugzilla.redhat.com/2278989 2278989  https://bugzilla.redhat.com/2281057 2281057  https://bugzilla.redhat.com/2281097 2281097  https://bugzilla.redhat.com/2281133 2281133  https://bugzilla.redhat.com/2281190 2281190  https://bugzilla.redhat.com/2281237 2281237  https://bugzilla.redhat.com/2281257 2281257  https://bugzilla.redhat.com/2281265 2281265  https://bugzilla.redhat.com/2281272 2281272  https://bugzilla.redhat.com/2281639 2281639  https://bugzilla.redhat.com/2281667 2281667  https://bugzilla.redhat.com/2281821 2281821  https://bugzilla.redhat.com/2281900 2281900  https://bugzilla.redhat.com/2281949 2281949  https://bugzilla.redhat.com/2282719 2282719  https://bugzilla.redhat.com/2284400 2284400  https://bugzilla.redhat.com/2284417 2284417  https://bugzilla.redhat.com/2284474 2284474  https://bugzilla.redhat.com/2284496 2284496  https://bugzilla.redhat.com/2284511 2284511  https://bugzilla.redhat.com/2284513 2284513  https://bugzilla.redhat.com/2284543 2284543  https://bugzilla.redhat.com/2292331 2292331  https://bugzilla.redhat.com/2293208 2293208  https://bugzilla.redhat.com/2293418 2293418  https://bugzilla.redhat.com/2293441 2293441  https://bugzilla.redhat.com/2293657 2293657  https://bugzilla.redhat.com/2293658 2293658  https://bugzilla.redhat.com/2293686 2293686  https://bugzilla.redhat.com/2293687 2293687  https://bugzilla.redhat.com/2293688 2293688  https://bugzilla.redhat.com/2297056 2297056  https://bugzilla.redhat.com/2297512 2297512  https://bugzilla.redhat.com/2297538 2297538  https://bugzilla.redhat.com/2297542 2297542  https://bugzilla.redhat.com/2297545 2297545  https://errata.almalinux.org/9/ALSA-2024-5363.html ALSA-2024:5363 ALSA-2024:5363 �Nlibperf-5.14.0-427.31.1.el9_4.x86_64.rpm �Nkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpm �Nkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpm �Nlibperf-5.14.0-427.31.1.el9_4.x86_64.rpm �Nkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpm �Nkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpm ����s�<	��,security Important: python3.12-setuptools security update ��`�https://access.redhat.com/errata/RHSA-2024:5533 RHSA-2024:5533 RHSA-2024:5533 
https://access.redhat.com/security/cve/CVE-2024-6345 CVE-2024-6345 CVE-2024-6345 https://bugzilla.redhat.com/2297771 2297771  https://errata.almalinux.org/9/ALSA-2024-5533.html ALSA-2024:5533 ALSA-2024:5533 �_�python3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm �_�python3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm ����_�=	��mBBsecurity Moderate: libreoffice security update 
��w�{https://access.redhat.com/errata/RHSA-2024:5583 RHSA-2024:5583 RHSA-2024:5583 
https://access.redhat.com/security/cve/CVE-2024-6472 CVE-2024-6472 CVE-2024-6472 https://bugzilla.redhat.com/2302866 2302866  https://errata.almalinux.org/9/ALSA-2024-5583.html ALSA-2024:5583 ALSA-2024:5583 �3�Blibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm �2�Blibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm �3�Blibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm �2�Blibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm ����W�>	��qBBBBsecurity Important: kernel security update ��r�Thttps://access.redhat.com/errata/RHSA-2024:5928 RHSA-2024:5928 RHSA-2024:5928 
https://access.redhat.com/security/cve/CVE-2023-52771 CVE-2023-52771 CVE-2023-52771 https://access.redhat.com/security/cve/CVE-2023-52880 CVE-2023-52880 CVE-2023-52880 https://access.redhat.com/security/cve/CVE-2024-26581 CVE-2024-26581 CVE-2024-26581 https://access.redhat.com/security/cve/CVE-2024-26668 CVE-2024-26668 CVE-2024-26668 https://access.redhat.com/security/cve/CVE-2024-26810 CVE-2024-26810 CVE-2024-26810 https://access.redhat.com/security/cve/CVE-2024-26855 CVE-2024-26855 CVE-2024-26855 https://access.redhat.com/security/cve/CVE-2024-26908 CVE-2024-26908 CVE-2024-26908 https://access.redhat.com/security/cve/CVE-2024-26925 CVE-2024-26925 CVE-2024-26925 https://access.redhat.com/security/cve/CVE-2024-27016 CVE-2024-27016 CVE-2024-27016 https://access.redhat.com/security/cve/CVE-2024-27019 CVE-2024-27019 CVE-2024-27019 https://access.redhat.com/security/cve/CVE-2024-27020 CVE-2024-27020 CVE-2024-27020 https://access.redhat.com/security/cve/CVE-2024-27415 CVE-2024-27415 CVE-2024-27415 https://access.redhat.com/security/cve/CVE-2024-35839 CVE-2024-35839 CVE-2024-35839 https://access.redhat.com/security/cve/CVE-2024-35896 CVE-2024-35896 CVE-2024-35896 https://access.redhat.com/security/cve/CVE-2024-35897 CVE-2024-35897 CVE-2024-35897 https://access.redhat.com/security/cve/CVE-2024-35898 CVE-2024-35898 CVE-2024-35898 https://access.redhat.com/security/cve/CVE-2024-35962 CVE-2024-35962 CVE-2024-35962 https://access.redhat.com/security/cve/CVE-2024-36003 CVE-2024-36003 CVE-2024-36003 https://access.redhat.com/security/cve/CVE-2024-36025 CVE-2024-36025 CVE-2024-36025 https://access.redhat.com/security/cve/CVE-2024-38538 CVE-2024-38538 CVE-2024-38538 https://access.redhat.com/security/cve/CVE-2024-38540 CVE-2024-38540 CVE-2024-38540 https://access.redhat.com/security/cve/CVE-2024-38544 CVE-2024-38544 CVE-2024-38544 https://access.redhat.com/security/cve/CVE-2024-38579 CVE-2024-38579 CVE-2024-38579 https://access.redhat.com/security/cve/CVE-2024-38608 CVE-2024-38608 CVE-2024-38608 https://access.redhat.com/security/cve/CVE-2024-39476 CVE-2024-39476 CVE-2024-39476 https://access.redhat.com/security/cve/CVE-2024-40905 CVE-2024-40905 CVE-2024-40905 https://access.redhat.com/security/cve/CVE-2024-40911 CVE-2024-40911 CVE-2024-40911 https://access.redhat.com/security/cve/CVE-2024-40912 CVE-2024-40912 CVE-2024-40912 https://access.redhat.com/security/cve/CVE-2024-40914 CVE-2024-40914 CVE-2024-40914 https://access.redhat.com/security/cve/CVE-2024-40929 CVE-2024-40929 CVE-2024-40929 https://access.redhat.com/security/cve/CVE-2024-40939 CVE-2024-40939 CVE-2024-40939 https://access.redhat.com/security/cve/CVE-2024-40941 CVE-2024-40941 CVE-2024-40941 https://access.redhat.com/security/cve/CVE-2024-40957 CVE-2024-40957 CVE-2024-40957 https://access.redhat.com/security/cve/CVE-2024-40978 CVE-2024-40978 CVE-2024-40978 https://access.redhat.com/security/cve/CVE-2024-40983 CVE-2024-40983 CVE-2024-40983 https://access.redhat.com/security/cve/CVE-2024-41041 CVE-2024-41041 CVE-2024-41041 https://access.redhat.com/security/cve/CVE-2024-41076 CVE-2024-41076 CVE-2024-41076 https://access.redhat.com/security/cve/CVE-2024-41090 CVE-2024-41090 CVE-2024-41090 https://access.redhat.com/security/cve/CVE-2024-41091 CVE-2024-41091 CVE-2024-41091 https://access.redhat.com/security/cve/CVE-2024-42110 CVE-2024-42110 CVE-2024-42110 https://access.redhat.com/security/cve/CVE-2024-42152 CVE-2024-42152 CVE-2024-42152 https://bugzilla.redhat.com/2265185 2265185  https://bugzilla.redhat.com/2272797 2272797  https://bugzilla.redhat.com/2273654 2273654  https://bugzilla.redhat.com/2275742 2275742  https://bugzilla.redhat.com/2275744 2275744  https://bugzilla.redhat.com/2277166 2277166  https://bugzilla.redhat.com/2278256 2278256  https://bugzilla.redhat.com/2278258 2278258  https://bugzilla.redhat.com/2278264 2278264  https://bugzilla.redhat.com/2281101 2281101  https://bugzilla.redhat.com/2281284 2281284  https://bugzilla.redhat.com/2281669 2281669  https://bugzilla.redhat.com/2281672 2281672  https://bugzilla.redhat.com/2281675 2281675  https://bugzilla.redhat.com/2281916 2281916  https://bugzilla.redhat.com/2281958 2281958  https://bugzilla.redhat.com/2282720 2282720  https://bugzilla.redhat.com/2283468 2283468  https://bugzilla.redhat.com/2284421 2284421  https://bugzilla.redhat.com/2293356 2293356  https://bugzilla.redhat.com/2293414 2293414  https://bugzilla.redhat.com/2293455 2293455  https://bugzilla.redhat.com/2293459 2293459  https://bugzilla.redhat.com/2293461 2293461  https://bugzilla.redhat.com/2295914 2295914  https://bugzilla.redhat.com/2297489 2297489  https://bugzilla.redhat.com/2297495 2297495  https://bugzilla.redhat.com/2297496 2297496  https://bugzilla.redhat.com/2297498 2297498  https://bugzilla.redhat.com/2297513 2297513  https://bugzilla.redhat.com/2297523 2297523  https://bugzilla.redhat.com/2297525 2297525  https://bugzilla.redhat.com/2297541 2297541  https://bugzilla.redhat.com/2297562 2297562  https://bugzilla.redhat.com/2297567 2297567  https://bugzilla.redhat.com/2299240 2299240  https://bugzilla.redhat.com/2299336 2299336  https://bugzilla.redhat.com/2300410 2300410  https://bugzilla.redhat.com/2300453 2300453  https://bugzilla.redhat.com/2301473 2301473  https://bugzilla.redhat.com/2301519 2301519  https://errata.almalinux.org/9/ALSA-2024-5928.html ALSA-2024:5928 ALSA-2024:5928 �Okernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpm �Olibperf-5.14.0-427.33.1.el9_4.x86_64.rpm �Okernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm �Okernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpm �Olibperf-5.14.0-427.33.1.el9_4.x86_64.rpm �Okernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm ���� �?	��wBBBBBBBBBBsecurity Important: postgresql security update ��
�https://access.redhat.com/errata/RHSA-2024:5999 RHSA-2024:5999 RHSA-2024:5999 
https://access.redhat.com/security/cve/CVE-2024-7348 CVE-2024-7348 CVE-2024-7348 https://bugzilla.redhat.com/2303682 2303682  https://errata.almalinux.org/9/ALSA-2024-5999.html ALSA-2024:5999 ALSA-2024:5999 �~�;postgresql-server-devel-13.16-1.el9_4.x86_64.rpm ��;postgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm � �;postgresql-test-13.16-1.el9_4.x86_64.rpm �}�;postgresql-private-devel-13.16-1.el9_4.x86_64.rpm �|�;postgresql-docs-13.16-1.el9_4.x86_64.rpm ��;postgresql-static-13.16-1.el9_4.x86_64.rpm �~�;postgresql-server-devel-13.16-1.el9_4.x86_64.rpm ��;postgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm � �;postgresql-test-13.16-1.el9_4.x86_64.rpm �}�;postgresql-private-devel-13.16-1.el9_4.x86_64.rpm �|�;postgresql-docs-13.16-1.el9_4.x86_64.rpm ��;postgresql-static-13.16-1.el9_4.x86_64.rpm ����y�@	��ZB�iBBBBBBBBBsecurity Moderate: python3.12 security update 
���https://access.redhat.com/errata/RHSA-2024:6146 RHSA-2024:6146 RHSA-2024:6146 
https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255  https://errata.almalinux.org/9/ALSA-2024-6146.html ALSA-2024:6146 ALSA-2024:6146 W�python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm U�python3.12-debug-3.12.1-4.el9_4.3.i686.rpm W�python3.12-test-3.12.1-4.el9_4.3.i686.rpm �h�python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm V�python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm V�python3.12-idle-3.12.1-4.el9_4.3.i686.rpm �g�python3.12-3.12.1-4.el9_4.3.i686.rpm U�python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm W�python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm U�python3.12-debug-3.12.1-4.el9_4.3.i686.rpm W�python3.12-test-3.12.1-4.el9_4.3.i686.rpm �h�python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm V�python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm V�python3.12-idle-3.12.1-4.el9_4.3.i686.rpm �g�python3.12-3.12.1-4.el9_4.3.i686.rpm U�python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm ���'�A	��]�@�sBBBBBBBBBsecurity Moderate: python3.9 security update 
��+�hhttps://access.redhat.com/errata/RHSA-2024:6163 RHSA-2024:6163 RHSA-2024:6163 
https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255  https://errata.almalinux.org/9/ALSA-2024-6163.html ALSA-2024:6163 ALSA-2024:6163 Z�python3-tkinter-3.9.18-3.el9_4.5.i686.rpm Y�python3-3.9.18-3.el9_4.5.i686.rpm �python3-idle-3.9.18-3.el9_4.5.x86_64.rpm �python3-test-3.9.18-3.el9_4.5.i686.rpm �python3-test-3.9.18-3.el9_4.5.x86_64.rpm �python3-debug-3.9.18-3.el9_4.5.x86_64.rpm �python3-idle-3.9.18-3.el9_4.5.i686.rpm �python3-debug-3.9.18-3.el9_4.5.i686.rpm Z�python3-tkinter-3.9.18-3.el9_4.5.i686.rpm Y�python3-3.9.18-3.el9_4.5.i686.rpm �python3-idle-3.9.18-3.el9_4.5.x86_64.rpm �python3-test-3.9.18-3.el9_4.5.i686.rpm �python3-test-3.9.18-3.el9_4.5.x86_64.rpm �python3-debug-3.9.18-3.el9_4.5.x86_64.rpm �python3-idle-3.9.18-3.el9_4.5.i686.rpm �python3-debug-3.9.18-3.el9_4.5.i686.rpm ����B	�!�_B�zBBBBBBBBBsecurity Moderate: python3.11 security update 
���hhttps://access.redhat.com/errata/RHSA-2024:6179 RHSA-2024:6179 RHSA-2024:6179 
https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255  https://errata.almalinux.org/9/ALSA-2024-6179.html ALSA-2024:6179 ALSA-2024:6179 �python3.11-debug-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.i686.rpm f�python3.11-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.i686.rpm �python3.11-debug-3.11.7-1.el9_4.5.x86_64.rpm g�python3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm �python3.11-debug-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.i686.rpm f�python3.11-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.i686.rpm �python3.11-debug-3.11.7-1.el9_4.5.x86_64.rpm g�python3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm ���8�C	�%�bBB�ABBBBsecurity Moderate: ghostscript security update 
��{�Mhttps://access.redhat.com/errata/RHSA-2024:6197 RHSA-2024:6197 RHSA-2024:6197 
https://access.redhat.com/security/cve/CVE-2024-29510 CVE-2024-29510 CVE-2024-29510 https://access.redhat.com/security/cve/CVE-2024-33869 CVE-2024-33869 CVE-2024-33869 https://access.redhat.com/security/cve/CVE-2024-33870 CVE-2024-33870 CVE-2024-33870 https://bugzilla.redhat.com/2293950 2293950  https://bugzilla.redhat.com/2293958 2293958  https://bugzilla.redhat.com/2293959 2293959  https://errata.almalinux.org/9/ALSA-2024-6197.html ALSA-2024:6197 ALSA-2024:6197 \�nlibgs-devel-9.54.0-17.el9_4.x86_64.rpm �z�nghostscript-tools-printing-9.54.0-17.el9_4.i686.rpm \�nlibgs-devel-9.54.0-17.el9_4.i686.rpm �y�nghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm �x�nghostscript-9.54.0-17.el9_4.i686.rpm \�nlibgs-devel-9.54.0-17.el9_4.x86_64.rpm �z�nghostscript-tools-printing-9.54.0-17.el9_4.i686.rpm \�nlibgs-devel-9.54.0-17.el9_4.i686.rpm �y�nghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm �x�nghostscript-9.54.0-17.el9_4.i686.rpm ���/�D	�(�fB�DBBBsecurity Important: bubblewrap and flatpak security update ��H�Jhttps://access.redhat.com/errata/RHSA-2024:6356 RHSA-2024:6356 RHSA-2024:6356 
https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://bugzilla.redhat.com/2305202 2305202  https://errata.almalinux.org/9/ALSA-2024-6356.html ALSA-2024:6356 ALSA-2024:6356 �8�flatpak-session-helper-1.12.9-3.el9_4.i686.rpm �q�flatpak-devel-1.12.9-3.el9_4.x86_64.rpm �q�flatpak-devel-1.12.9-3.el9_4.i686.rpm �7�flatpak-1.12.9-3.el9_4.i686.rpm �8�flatpak-session-helper-1.12.9-3.el9_4.i686.rpm �q�flatpak-devel-1.12.9-3.el9_4.x86_64.rpm �q�flatpak-devel-1.12.9-3.el9_4.i686.rpm �7�flatpak-1.12.9-3.el9_4.i686.rpm ���c�E	�)�oBsecurity Moderate: glib2 security update 
���
https://access.redhat.com/errata/RHSA-2024:6464 RHSA-2024:6464 RHSA-2024:6464 
https://access.redhat.com/security/cve/CVE-2024-34397 CVE-2024-34397 CVE-2024-34397 https://bugzilla.redhat.com/2279632 2279632  https://errata.almalinux.org/9/ALSA-2024-6464.html ALSA-2024:6464 ALSA-2024:6464 ��glib2-static-2.68.4-14.el9_4.1.i686.rpm ��glib2-static-2.68.4-14.el9_4.1.x86_64.rpm ��glib2-static-2.68.4-14.el9_4.1.i686.rpm ��glib2-static-2.68.4-14.el9_4.1.x86_64.rpm ����0�F	�+�j�IBBsecurity Moderate: dovecot security update 
���,https://access.redhat.com/errata/RHSA-2024:6529 RHSA-2024:6529 RHSA-2024:6529 
https://access.redhat.com/security/cve/CVE-2024-23184 CVE-2024-23184 CVE-2024-23184 https://access.redhat.com/security/cve/CVE-2024-23185 CVE-2024-23185 CVE-2024-23185 https://bugzilla.redhat.com/2305909 2305909  https://bugzilla.redhat.com/2305910 2305910  https://errata.almalinux.org/9/ALSA-2024-6529.html ALSA-2024:6529 ALSA-2024:6529 ��dovecot-devel-2.3.16-11.el9_4.1.i686.rpm �?�dovecot-2.3.16-11.el9_4.1.i686.rpm ��dovecot-devel-2.3.16-11.el9_4.1.x86_64.rpm ��dovecot-devel-2.3.16-11.el9_4.1.i686.rpm �?�dovecot-2.3.16-11.el9_4.1.i686.rpm ��dovecot-devel-2.3.16-11.el9_4.1.x86_64.rpm ����Z�G	�,�vBBBBsecurity Moderate: kernel security update 
��K�l8https://access.redhat.com/errata/RHSA-2024:6567 RHSA-2024:6567 RHSA-2024:6567 
https://access.redhat.com/security/cve/CVE-2023-52463 CVE-2023-52463 CVE-2023-52463 https://access.redhat.com/security/cve/CVE-2023-52801 CVE-2023-52801 CVE-2023-52801 https://access.redhat.com/security/cve/CVE-2024-26629 CVE-2024-26629 CVE-2024-26629 https://access.redhat.com/security/cve/CVE-2024-26630 CVE-2024-26630 CVE-2024-26630 https://access.redhat.com/security/cve/CVE-2024-26720 CVE-2024-26720 CVE-2024-26720 https://access.redhat.com/security/cve/CVE-2024-26886 CVE-2024-26886 CVE-2024-26886 https://access.redhat.com/security/cve/CVE-2024-26946 CVE-2024-26946 CVE-2024-26946 https://access.redhat.com/security/cve/CVE-2024-35791 CVE-2024-35791 CVE-2024-35791 https://access.redhat.com/security/cve/CVE-2024-35797 CVE-2024-35797 CVE-2024-35797 https://access.redhat.com/security/cve/CVE-2024-35875 CVE-2024-35875 CVE-2024-35875 https://access.redhat.com/security/cve/CVE-2024-36000 CVE-2024-36000 CVE-2024-36000 https://access.redhat.com/security/cve/CVE-2024-36019 CVE-2024-36019 CVE-2024-36019 https://access.redhat.com/security/cve/CVE-2024-36883 CVE-2024-36883 CVE-2024-36883 https://access.redhat.com/security/cve/CVE-2024-36979 CVE-2024-36979 CVE-2024-36979 https://access.redhat.com/security/cve/CVE-2024-38559 CVE-2024-38559 CVE-2024-38559 https://access.redhat.com/security/cve/CVE-2024-38619 CVE-2024-38619 CVE-2024-38619 https://access.redhat.com/security/cve/CVE-2024-40927 CVE-2024-40927 CVE-2024-40927 https://access.redhat.com/security/cve/CVE-2024-40936 CVE-2024-40936 CVE-2024-40936 https://access.redhat.com/security/cve/CVE-2024-41040 CVE-2024-41040 CVE-2024-41040 https://access.redhat.com/security/cve/CVE-2024-41044 CVE-2024-41044 CVE-2024-41044 https://access.redhat.com/security/cve/CVE-2024-41055 CVE-2024-41055 CVE-2024-41055 https://access.redhat.com/security/cve/CVE-2024-41073 CVE-2024-41073 CVE-2024-41073 https://access.redhat.com/security/cve/CVE-2024-41096 CVE-2024-41096 CVE-2024-41096 https://access.redhat.com/security/cve/CVE-2024-42082 CVE-2024-42082 CVE-2024-42082 https://access.redhat.com/security/cve/CVE-2024-42096 CVE-2024-42096 CVE-2024-42096 https://access.redhat.com/security/cve/CVE-2024-42102 CVE-2024-42102 CVE-2024-42102 https://access.redhat.com/security/cve/CVE-2024-42131 CVE-2024-42131 CVE-2024-42131 https://bugzilla.redhat.com/2265797 2265797  https://bugzilla.redhat.com/2269434 2269434  https://bugzilla.redhat.com/2269436 2269436  https://bugzilla.redhat.com/2273141 2273141  https://bugzilla.redhat.com/2275678 2275678  https://bugzilla.redhat.com/2278206 2278206  https://bugzilla.redhat.com/2281052 2281052  https://bugzilla.redhat.com/2281151 2281151  https://bugzilla.redhat.com/2281727 2281727  https://bugzilla.redhat.com/2281968 2281968  https://bugzilla.redhat.com/2282709 2282709  https://bugzilla.redhat.com/2284271 2284271  https://bugzilla.redhat.com/2284402 2284402  https://bugzilla.redhat.com/2293273 2293273  https://bugzilla.redhat.com/2293276 2293276  https://bugzilla.redhat.com/2293440 2293440  https://bugzilla.redhat.com/2297511 2297511  https://bugzilla.redhat.com/2297520 2297520  https://bugzilla.redhat.com/2300409 2300409  https://bugzilla.redhat.com/2300414 2300414  https://bugzilla.redhat.com/2300429 2300429  https://bugzilla.redhat.com/2300491 2300491  https://bugzilla.redhat.com/2300520 2300520  https://bugzilla.redhat.com/2300713 2300713  https://bugzilla.redhat.com/2301465 2301465  https://bugzilla.redhat.com/2301496 2301496  https://bugzilla.redhat.com/2301637 2301637  https://errata.almalinux.org/9/ALSA-2024-6567.html ALSA-2024:6567 ALSA-2024:6567 �Plibperf-5.14.0-427.35.1.el9_4.x86_64.rpm �Pkernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpm �Pkernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpm �Plibperf-5.14.0-427.35.1.el9_4.x86_64.rpm �Pkernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpm �Pkernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpm ����O�H	�-�|BBBBBsecurity Moderate: libnbd security update 
��7�Qhttps://access.redhat.com/errata/RHSA-2024:6757 RHSA-2024:6757 RHSA-2024:6757 
https://access.redhat.com/security/cve/CVE-2024-7383 CVE-2024-7383 CVE-2024-7383 https://bugzilla.redhat.com/2302865 2302865  https://errata.almalinux.org/9/ALSA-2024-6757.html ALSA-2024:6757 ALSA-2024:6757 ��libnbd-devel-1.18.1-4.el9_4.i686.rpm �\�ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm �[�ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpm ��libnbd-devel-1.18.1-4.el9_4.x86_64.rpm ��libnbd-devel-1.18.1-4.el9_4.i686.rpm �\�ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm �[�ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpm ��libnbd-devel-1.18.1-4.el9_4.x86_64.rpm ����|�I	�.�CBBBBsecurity Important: kernel security update ���+https://access.redhat.com/errata/RHSA-2024:6997 RHSA-2024:6997 RHSA-2024:6997 
https://access.redhat.com/security/cve/CVE-2023-52439 CVE-2023-52439 CVE-2023-52439 https://access.redhat.com/security/cve/CVE-2023-52884 CVE-2023-52884 CVE-2023-52884 https://access.redhat.com/security/cve/CVE-2024-26739 CVE-2024-26739 CVE-2024-26739 https://access.redhat.com/security/cve/CVE-2024-26929 CVE-2024-26929 CVE-2024-26929 https://access.redhat.com/security/cve/CVE-2024-26930 CVE-2024-26930 CVE-2024-26930 https://access.redhat.com/security/cve/CVE-2024-26931 CVE-2024-26931 CVE-2024-26931 https://access.redhat.com/security/cve/CVE-2024-26947 CVE-2024-26947 CVE-2024-26947 https://access.redhat.com/security/cve/CVE-2024-26991 CVE-2024-26991 CVE-2024-26991 https://access.redhat.com/security/cve/CVE-2024-27022 CVE-2024-27022 CVE-2024-27022 https://access.redhat.com/security/cve/CVE-2024-35895 CVE-2024-35895 CVE-2024-35895 https://access.redhat.com/security/cve/CVE-2024-36016 CVE-2024-36016 CVE-2024-36016 https://access.redhat.com/security/cve/CVE-2024-36899 CVE-2024-36899 CVE-2024-36899 https://access.redhat.com/security/cve/CVE-2024-38562 CVE-2024-38562 CVE-2024-38562 https://access.redhat.com/security/cve/CVE-2024-38570 CVE-2024-38570 CVE-2024-38570 https://access.redhat.com/security/cve/CVE-2024-38573 CVE-2024-38573 CVE-2024-38573 https://access.redhat.com/security/cve/CVE-2024-38601 CVE-2024-38601 CVE-2024-38601 https://access.redhat.com/security/cve/CVE-2024-38615 CVE-2024-38615 CVE-2024-38615 https://access.redhat.com/security/cve/CVE-2024-40984 CVE-2024-40984 CVE-2024-40984 https://access.redhat.com/security/cve/CVE-2024-41071 CVE-2024-41071 CVE-2024-41071 https://access.redhat.com/security/cve/CVE-2024-42225 CVE-2024-42225 CVE-2024-42225 https://access.redhat.com/security/cve/CVE-2024-42246 CVE-2024-42246 CVE-2024-42246 https://bugzilla.redhat.com/2265271 2265271  https://bugzilla.redhat.com/2273270 2273270  https://bugzilla.redhat.com/2278167 2278167  https://bugzilla.redhat.com/2278245 2278245  https://bugzilla.redhat.com/2278248 2278248  https://bugzilla.redhat.com/2278250 2278250  https://bugzilla.redhat.com/2278252 2278252  https://bugzilla.redhat.com/2278318 2278318  https://bugzilla.redhat.com/2281677 2281677  https://bugzilla.redhat.com/2283894 2283894  https://bugzilla.redhat.com/2284549 2284549  https://bugzilla.redhat.com/2293348 2293348  https://bugzilla.redhat.com/2293364 2293364  https://bugzilla.redhat.com/2293420 2293420  https://bugzilla.redhat.com/2293423 2293423  https://bugzilla.redhat.com/2293431 2293431  https://bugzilla.redhat.com/2293685 2293685  https://bugzilla.redhat.com/2297568 2297568  https://bugzilla.redhat.com/2300448 2300448  https://bugzilla.redhat.com/2301543 2301543  https://errata.almalinux.org/9/ALSA-2024-6997.html ALSA-2024:6997 ALSA-2024:6997 �Qkernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpm �Qlibperf-5.14.0-427.37.1.el9_4.x86_64.rpm �Qkernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpm �Qkernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpm �Qlibperf-5.14.0-427.37.1.el9_4.x86_64.rpm �Qkernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpm ����}�J	�/�IBsecurity Important: cups-filters security update ���Lhttps://access.redhat.com/errata/RHSA-2024:7346 RHSA-2024:7346 RHSA-2024:7346 
https://access.redhat.com/security/cve/CVE-2024-47076 CVE-2024-47076 CVE-2024-47076 https://access.redhat.com/security/cve/CVE-2024-47175 CVE-2024-47175 CVE-2024-47175 https://access.redhat.com/security/cve/CVE-2024-47176 CVE-2024-47176 CVE-2024-47176 https://bugzilla.redhat.com/2314252 2314252  https://bugzilla.redhat.com/2314253 2314253  https://bugzilla.redhat.com/2314256 2314256  https://errata.almalinux.org/9/ALSA-2024-7346.html ALSA-2024:7346 ALSA-2024:7346 ��kcups-filters-devel-1.28.7-17.el9_4.x86_64.rpm ��kcups-filters-devel-1.28.7-17.el9_4.i686.rpm ��kcups-filters-devel-1.28.7-17.el9_4.x86_64.rpm ��kcups-filters-devel-1.28.7-17.el9_4.i686.rpm ��߷*�K	�0�Lsecurity Important: .NET 6.0 security update ��i�"https://access.redhat.com/errata/RHSA-2024:7867 RHSA-2024:7867 RHSA-2024:7867 
https://access.redhat.com/security/cve/CVE-2024-43483 CVE-2024-43483 CVE-2024-43483 https://access.redhat.com/security/cve/CVE-2024-43484 CVE-2024-43484 CVE-2024-43484 https://access.redhat.com/security/cve/CVE-2024-43485 CVE-2024-43485 CVE-2024-43485 https://bugzilla.redhat.com/2315729 2315729  https://bugzilla.redhat.com/2315730 2315730  https://bugzilla.redhat.com/2315731 2315731  https://errata.almalinux.org/9/ALSA-2024-7867.html ALSA-2024:7867 ALSA-2024:7867 e�dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpm e�dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpm ����2�L	�1�Nsecurity Important: .NET 8.0 security update ���
https://access.redhat.com/errata/RHSA-2024:7869 RHSA-2024:7869 RHSA-2024:7869 
https://access.redhat.com/security/cve/CVE-2024-38229 CVE-2024-38229 CVE-2024-38229 https://access.redhat.com/security/cve/CVE-2024-43483 CVE-2024-43483 CVE-2024-43483 https://access.redhat.com/security/cve/CVE-2024-43484 CVE-2024-43484 CVE-2024-43484 https://access.redhat.com/security/cve/CVE-2024-43485 CVE-2024-43485 CVE-2024-43485 https://bugzilla.redhat.com/2315729 2315729  https://bugzilla.redhat.com/2315730 2315730  https://bugzilla.redhat.com/2315731 2315731  https://bugzilla.redhat.com/2316161 2316161  https://errata.almalinux.org/9/ALSA-2024-7869.html ALSA-2024:7869 ALSA-2024:7869 �6�dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpm �6�dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpm ����M�M	�2�PBsecurity Moderate: OpenIPMI security update 
��!�:https://access.redhat.com/errata/RHSA-2024:8037 RHSA-2024:8037 RHSA-2024:8037 
https://access.redhat.com/security/cve/CVE-2024-42934 CVE-2024-42934 CVE-2024-42934 https://bugzilla.redhat.com/2308375 2308375  https://errata.almalinux.org/9/ALSA-2024-8037.html ALSA-2024:8037 ALSA-2024:8037 ��{OpenIPMI-devel-2.0.32-5.el9_4.i686.rpm ��{OpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpm ��{OpenIPMI-devel-2.0.32-5.el9_4.i686.rpm ��{OpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpm ����]�N	�3�SBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update 
��[�rhttps://access.redhat.com/errata/RHSA-2024:8117 RHSA-2024:8117 RHSA-2024:8117 
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025  https://bugzilla.redhat.com/2318524 2318524  https://bugzilla.redhat.com/2318526 2318526  https://bugzilla.redhat.com/2318530 2318530  https://bugzilla.redhat.com/2318534 2318534  https://errata.almalinux.org/9/ALSA-2024-8117.html ALSA-2024:8117 ALSA-2024:8117 
�-Qjava-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �+Qjava-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �$Qjava-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �'Qjava-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �*Qjava-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �&Qjava-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �,Qjava-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �)Qjava-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �%Qjava-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �(Qjava-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm 
�-Qjava-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �+Qjava-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �$Qjava-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �'Qjava-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �*Qjava-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �&Qjava-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �,Qjava-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �)Qjava-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �%Qjava-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �(Qjava-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm ����k�O	�4�gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security update 
��M�qhttps://access.redhat.com/errata/RHSA-2024:8121 RHSA-2024:8121 RHSA-2024:8121 
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025  https://bugzilla.redhat.com/2318524 2318524  https://bugzilla.redhat.com/2318526 2318526  https://bugzilla.redhat.com/2318530 2318530  https://bugzilla.redhat.com/2318534 2318534  https://errata.almalinux.org/9/ALSA-2024-8121.html ALSA-2024:8121 ALSA-2024:8121 �O)java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �Q)java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �I)java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �F)java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �K)java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �N)java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �L)java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �P)java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �M)java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �R)java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �J)java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �H)java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �S)java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �G)java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �O)java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �Q)java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �I)java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �F)java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �K)java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �N)java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �L)java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �P)java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �M)java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �R)java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �J)java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �H)java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �S)java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �G)java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm ����h�P	�5�CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update 
��>�qhttps://access.redhat.com/errata/RHSA-2024:8124 RHSA-2024:8124 RHSA-2024:8124 
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025  https://bugzilla.redhat.com/2318524 2318524  https://bugzilla.redhat.com/2318526 2318526  https://bugzilla.redhat.com/2318530 2318530  https://bugzilla.redhat.com/2318534 2318534  https://errata.almalinux.org/9/ALSA-2024-8124.html ALSA-2024:8124 ALSA-2024:8124 l-java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm p-java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm s-java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm t-java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm j-java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm u-java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm r-java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm q-java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm o-java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm n-java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm k-java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm w-java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm m-java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm v-java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm l-java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm p-java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm s-java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm t-java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm j-java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm u-java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm r-java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm q-java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm o-java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm n-java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm k-java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm w-java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm m-java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm v-java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm ����n�Q	�6�_BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update 
��/�https://access.redhat.com/errata/RHSA-2024:8127 RHSA-2024:8127 RHSA-2024:8127 
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025  https://bugzilla.redhat.com/2318524 2318524  https://bugzilla.redhat.com/2318526 2318526  https://bugzilla.redhat.com/2318530 2318530  https://bugzilla.redhat.com/2318534 2318534  https://errata.almalinux.org/9/ALSA-2024-8127.html ALSA-2024:8127 ALSA-2024:8127 �_;java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �[;java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �`;java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �b;java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �f;java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �\;java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �a;java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �c;java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �Y;java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �e;java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �^;java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �];java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �Z;java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �d;java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �_;java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �[;java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �`;java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �b;java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �f;java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �\;java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �a;java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �c;java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �Y;java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �e;java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �^;java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �];java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �Z;java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �d;java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm ����_�R	�7�{BBBBsecurity Moderate: kernel security update 
��E�<https://access.redhat.com/errata/RHSA-2024:8162 RHSA-2024:8162 RHSA-2024:8162 
https://access.redhat.com/security/cve/CVE-2021-47385 CVE-2021-47385 CVE-2021-47385 https://access.redhat.com/security/cve/CVE-2023-28746 CVE-2023-28746 CVE-2023-28746 https://access.redhat.com/security/cve/CVE-2023-52658 CVE-2023-52658 CVE-2023-52658 https://access.redhat.com/security/cve/CVE-2024-27403 CVE-2024-27403 CVE-2024-27403 https://access.redhat.com/security/cve/CVE-2024-35989 CVE-2024-35989 CVE-2024-35989 https://access.redhat.com/security/cve/CVE-2024-36889 CVE-2024-36889 CVE-2024-36889 https://access.redhat.com/security/cve/CVE-2024-36978 CVE-2024-36978 CVE-2024-36978 https://access.redhat.com/security/cve/CVE-2024-38556 CVE-2024-38556 CVE-2024-38556 https://access.redhat.com/security/cve/CVE-2024-39483 CVE-2024-39483 CVE-2024-39483 https://access.redhat.com/security/cve/CVE-2024-39502 CVE-2024-39502 CVE-2024-39502 https://access.redhat.com/security/cve/CVE-2024-40959 CVE-2024-40959 CVE-2024-40959 https://access.redhat.com/security/cve/CVE-2024-42079 CVE-2024-42079 CVE-2024-42079 https://access.redhat.com/security/cve/CVE-2024-42272 CVE-2024-42272 CVE-2024-42272 https://access.redhat.com/security/cve/CVE-2024-42284 CVE-2024-42284 CVE-2024-42284 https://bugzilla.redhat.com/2270700 2270700  https://bugzilla.redhat.com/2281127 2281127  https://bugzilla.redhat.com/2281149 2281149  https://bugzilla.redhat.com/2281847 2281847  https://bugzilla.redhat.com/2282355 2282355  https://bugzilla.redhat.com/2284571 2284571  https://bugzilla.redhat.com/2293078 2293078  https://bugzilla.redhat.com/2293443 2293443  https://bugzilla.redhat.com/2295921 2295921  https://bugzilla.redhat.com/2297474 2297474  https://bugzilla.redhat.com/2297543 2297543  https://bugzilla.redhat.com/2300517 2300517  https://errata.almalinux.org/9/ALSA-2024-8162.html ALSA-2024:8162 ALSA-2024:8162 �Rkernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm �Rkernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm �Rlibperf-5.14.0-427.40.1.el9_4.x86_64.rpm �Rkernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm �Rkernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm �Rlibperf-5.14.0-427.40.1.el9_4.x86_64.rpm ���{�S	�:�xB�IBBBBBBBBBsecurity Moderate: python3.11 security update 
���Thttps://access.redhat.com/errata/RHSA-2024:8374 RHSA-2024:8374 RHSA-2024:8374 
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426  https://errata.almalinux.org/9/ALSA-2024-8374.html ALSA-2024:8374 ALSA-2024:8374 g�python3.11-tkinter-3.11.7-1.el9_4.6.i686.rpm f�python3.11-3.11.7-1.el9_4.6.i686.rpm �python3.11-debug-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-debug-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.i686.rpm g�python3.11-tkinter-3.11.7-1.el9_4.6.i686.rpm f�python3.11-3.11.7-1.el9_4.6.i686.rpm �python3.11-debug-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-debug-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.i686.rpm ����w�T	�<�{�c�pBBBBBBBBBsecurity Moderate: python3.9 security update 
��U�\https://access.redhat.com/errata/RHSA-2024:8446 RHSA-2024:8446 RHSA-2024:8446 
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426  https://errata.almalinux.org/9/ALSA-2024-8446.html ALSA-2024:8446 ALSA-2024:8446 �python3-test-3.9.18-3.el9_4.6.x86_64.rpm �python3-idle-3.9.18-3.el9_4.6.x86_64.rpm �python3-idle-3.9.18-3.el9_4.6.i686.rpm �python3-test-3.9.18-3.el9_4.6.i686.rpm �python3-debug-3.9.18-3.el9_4.6.x86_64.rpm Z�python3-tkinter-3.9.18-3.el9_4.6.i686.rpm Y�python3-3.9.18-3.el9_4.6.i686.rpm �python3-debug-3.9.18-3.el9_4.6.i686.rpm �python3-test-3.9.18-3.el9_4.6.x86_64.rpm �python3-idle-3.9.18-3.el9_4.6.x86_64.rpm �python3-idle-3.9.18-3.el9_4.6.i686.rpm �python3-test-3.9.18-3.el9_4.6.i686.rpm �python3-debug-3.9.18-3.el9_4.6.x86_64.rpm Z�python3-tkinter-3.9.18-3.el9_4.6.i686.rpm Y�python3-3.9.18-3.el9_4.6.i686.rpm �python3-debug-3.9.18-3.el9_4.6.i686.rpm ����U	�?�}B�ZBBBBBBBBBsecurity Moderate: python3.12 security update 
��1�
https://access.redhat.com/errata/RHSA-2024:8447 RHSA-2024:8447 RHSA-2024:8447 
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426  https://errata.almalinux.org/9/ALSA-2024-8447.html ALSA-2024:8447 ALSA-2024:8447 W�python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm W�python3.12-test-3.12.1-4.el9_4.4.i686.rpm V�python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm U�python3.12-debug-3.12.1-4.el9_4.4.i686.rpm �h�python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm V�python3.12-idle-3.12.1-4.el9_4.4.i686.rpm �g�python3.12-3.12.1-4.el9_4.4.i686.rpm U�python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm W�python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm W�python3.12-test-3.12.1-4.el9_4.4.i686.rpm V�python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm U�python3.12-debug-3.12.1-4.el9_4.4.i686.rpm �h�python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm V�python3.12-idle-3.12.1-4.el9_4.4.i686.rpm �g�python3.12-3.12.1-4.el9_4.4.i686.rpm U�python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm ���	�V	� �bBBBBsecurity Moderate: kernel security update 
��>�>-https://access.redhat.com/errata/RHSA-2024:8617 RHSA-2024:8617 RHSA-2024:8617 
https://access.redhat.com/security/cve/CVE-2021-47383 CVE-2021-47383 CVE-2021-47383 https://access.redhat.com/security/cve/CVE-2024-2201 CVE-2024-2201 CVE-2024-2201 https://access.redhat.com/security/cve/CVE-2024-26640 CVE-2024-26640 CVE-2024-26640 https://access.redhat.com/security/cve/CVE-2024-26826 CVE-2024-26826 CVE-2024-26826 https://access.redhat.com/security/cve/CVE-2024-26923 CVE-2024-26923 CVE-2024-26923 https://access.redhat.com/security/cve/CVE-2024-26935 CVE-2024-26935 CVE-2024-26935 https://access.redhat.com/security/cve/CVE-2024-26961 CVE-2024-26961 CVE-2024-26961 https://access.redhat.com/security/cve/CVE-2024-36244 CVE-2024-36244 CVE-2024-36244 https://access.redhat.com/security/cve/CVE-2024-39472 CVE-2024-39472 CVE-2024-39472 https://access.redhat.com/security/cve/CVE-2024-39504 CVE-2024-39504 CVE-2024-39504 https://access.redhat.com/security/cve/CVE-2024-40904 CVE-2024-40904 CVE-2024-40904 https://access.redhat.com/security/cve/CVE-2024-40931 CVE-2024-40931 CVE-2024-40931 https://access.redhat.com/security/cve/CVE-2024-40960 CVE-2024-40960 CVE-2024-40960 https://access.redhat.com/security/cve/CVE-2024-40972 CVE-2024-40972 CVE-2024-40972 https://access.redhat.com/security/cve/CVE-2024-40977 CVE-2024-40977 CVE-2024-40977 https://access.redhat.com/security/cve/CVE-2024-40995 CVE-2024-40995 CVE-2024-40995 https://access.redhat.com/security/cve/CVE-2024-40998 CVE-2024-40998 CVE-2024-40998 https://access.redhat.com/security/cve/CVE-2024-41005 CVE-2024-41005 CVE-2024-41005 https://access.redhat.com/security/cve/CVE-2024-41013 CVE-2024-41013 CVE-2024-41013 https://access.redhat.com/security/cve/CVE-2024-41014 CVE-2024-41014 CVE-2024-41014 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://bugzilla.redhat.com/2268118 2268118  https://bugzilla.redhat.com/2270100 2270100  https://bugzilla.redhat.com/2275604 2275604  https://bugzilla.redhat.com/2277171 2277171  https://bugzilla.redhat.com/2278176 2278176  https://bugzilla.redhat.com/2278235 2278235  https://bugzilla.redhat.com/2282357 2282357  https://bugzilla.redhat.com/2293654 2293654  https://bugzilla.redhat.com/2296067 2296067  https://bugzilla.redhat.com/2297476 2297476  https://bugzilla.redhat.com/2297488 2297488  https://bugzilla.redhat.com/2297515 2297515  https://bugzilla.redhat.com/2297544 2297544  https://bugzilla.redhat.com/2297556 2297556  https://bugzilla.redhat.com/2297561 2297561  https://bugzilla.redhat.com/2297579 2297579  https://bugzilla.redhat.com/2297582 2297582  https://bugzilla.redhat.com/2297589 2297589  https://bugzilla.redhat.com/2300296 2300296  https://bugzilla.redhat.com/2300297 2300297  https://bugzilla.redhat.com/2311715 2311715  https://errata.almalinux.org/9/ALSA-2024-8617.html ALSA-2024:8617 ALSA-2024:8617 �Slibperf-5.14.0-427.42.1.el9_4.x86_64.rpm �Skernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm �Skernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm �Slibperf-5.14.0-427.42.1.el9_4.x86_64.rpm �Skernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm �Skernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm ����<�W	��hBsecurity Important: openexr security update ��|�:https://access.redhat.com/errata/RHSA-2024:8800 RHSA-2024:8800 RHSA-2024:8800 
https://access.redhat.com/security/cve/CVE-2023-5841 CVE-2023-5841 CVE-2023-5841 https://bugzilla.redhat.com/2262397 2262397  https://errata.almalinux.org/9/ALSA-2024-8800.html ALSA-2024:8800 ALSA-2024:8800 ��openexr-devel-3.1.1-2.el9_4.1.x86_64.rpm ��openexr-devel-3.1.1-2.el9_4.1.i686.rpm ��openexr-devel-3.1.1-2.el9_4.1.x86_64.rpm ��openexr-devel-3.1.1-2.el9_4.1.i686.rpm �����X	��ksecurity Moderate: libtiff security update 
��6�https://access.redhat.com/errata/RHSA-2024:8914 RHSA-2024:8914 RHSA-2024:8914 
https://access.redhat.com/security/cve/CVE-2024-7006 CVE-2024-7006 CVE-2024-7006 https://bugzilla.redhat.com/2302996 2302996  https://errata.almalinux.org/9/ALSA-2024-8914.html ALSA-2024:8914 ALSA-2024:8914 �{�ulibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm �{�ulibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm �����Y	��CB�jBsecurity Moderate: edk2 security update 
��A�Ehttps://access.redhat.com/errata/RHSA-2024:8935 RHSA-2024:8935 RHSA-2024:8935 
https://access.redhat.com/security/cve/CVE-2024-6119 CVE-2024-6119 CVE-2024-6119 https://bugzilla.redhat.com/2306158 2306158  https://errata.almalinux.org/9/ALSA-2024-8935.html ALSA-2024:8935 ALSA-2024:8935 �@�9edk2-aarch64-20231122-6.el9_4.4.noarch.rpm �w�9edk2-tools-20231122-6.el9_4.4.x86_64.rpm �A�9edk2-tools-doc-20231122-6.el9_4.4.noarch.rpm ��9edk2-ovmf-20231122-6.el9_4.4.noarch.rpm �@�9edk2-aarch64-20231122-6.el9_4.4.noarch.rpm �w�9edk2-tools-20231122-6.el9_4.4.x86_64.rpm �A�9edk2-tools-doc-20231122-6.el9_4.4.noarch.rpm ��9edk2-ovmf-20231122-6.el9_4.4.noarch.rpm ����w�Z	��pBBsecurity Moderate: edk2 security update 
���=
https://access.redhat.com/errata/RHSA-2024:9088 RHSA-2024:9088 RHSA-2024:9088 
https://access.redhat.com/security/cve/CVE-2023-6129 CVE-2023-6129 CVE-2023-6129 https://access.redhat.com/security/cve/CVE-2023-6237 CVE-2023-6237 CVE-2023-6237 https://access.redhat.com/security/cve/CVE-2024-0727 CVE-2024-0727 CVE-2024-0727 https://access.redhat.com/security/cve/CVE-2024-1298 CVE-2024-1298 CVE-2024-1298 https://bugzilla.redhat.com/2257571 2257571  https://bugzilla.redhat.com/2258502 2258502  https://bugzilla.redhat.com/2259944 2259944  https://bugzilla.redhat.com/2284243 2284243  https://errata.almalinux.org/9/ALSA-2024-9088.html ALSA-2024:9088 ALSA-2024:9088 �@�3edk2-aarch64-20240524-6.el9_5.noarch.rpm �w�3edk2-tools-20240524-6.el9_5.x86_64.rpm �A�3edk2-tools-doc-20240524-6.el9_5.noarch.rpm �@�3edk2-aarch64-20240524-6.el9_5.noarch.rpm �w�3edk2-tools-20240524-6.el9_5.x86_64.rpm �A�3edk2-tools-doc-20240524-6.el9_5.noarch.rpm ����6�[	��G�nBBsecurity Moderate: xorg-x11-server-Xwayland security update 
��C�:https://access.redhat.com/errata/RHSA-2024:9093 RHSA-2024:9093 RHSA-2024:9093 
https://access.redhat.com/security/cve/CVE-2024-31080 CVE-2024-31080 CVE-2024-31080 https://access.redhat.com/security/cve/CVE-2024-31081 CVE-2024-31081 CVE-2024-31081 https://access.redhat.com/security/cve/CVE-2024-31083 CVE-2024-31083 CVE-2024-31083 https://bugzilla.redhat.com/2271997 2271997  https://bugzilla.redhat.com/2271998 2271998  https://bugzilla.redhat.com/2272000 2272000  https://errata.almalinux.org/9/ALSA-2024-9093.html ALSA-2024:9093 ALSA-2024:9093 �T�
xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm � �
xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm � �
xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm �T�
xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm � �
xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm � �
xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm ����]�\	�	�xBBsecurity Moderate: xorg-x11-server security update 
��}�)https://access.redhat.com/errata/RHSA-2024:9122 RHSA-2024:9122 RHSA-2024:9122 
https://access.redhat.com/security/cve/CVE-2024-31080 CVE-2024-31080 CVE-2024-31080 https://access.redhat.com/security/cve/CVE-2024-31081 CVE-2024-31081 CVE-2024-31081 https://access.redhat.com/security/cve/CVE-2024-31083 CVE-2024-31083 CVE-2024-31083 https://bugzilla.redhat.com/2271997 2271997  https://bugzilla.redhat.com/2271998 2271998  https://bugzilla.redhat.com/2272000 2272000  https://errata.almalinux.org/9/ALSA-2024-9122.html ALSA-2024:9122 ALSA-2024:9122 �V�-xorg-x11-server-source-1.20.11-26.el9.noarch.rpm i�-xorg-x11-server-devel-1.20.11-26.el9.x86_64.rpm i�-xorg-x11-server-devel-1.20.11-26.el9.i686.rpm �V�-xorg-x11-server-source-1.20.11-26.el9.noarch.rpm i�-xorg-x11-server-devel-1.20.11-26.el9.x86_64.rpm i�-xorg-x11-server-devel-1.20.11-26.el9.i686.rpm ����
�]	�
�|BBBBsecurity Moderate: libvirt security update 
��&�|https://access.redhat.com/errata/RHSA-2024:9128 RHSA-2024:9128 RHSA-2024:9128 
https://access.redhat.com/security/cve/CVE-2024-8235 CVE-2024-8235 CVE-2024-8235 https://bugzilla.redhat.com/2308680 2308680  https://errata.almalinux.org/9/ALSA-2024-9128.html ALSA-2024:9128 ALSA-2024:9128 ��?libvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm �~�?libvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm ��?libvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm ��?libvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm �~�?libvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm ��?libvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm ����`�^	��BBBBBBBBBBBBsecurity Moderate: poppler security update 
��"�+https://access.redhat.com/errata/RHSA-2024:9167 RHSA-2024:9167 RHSA-2024:9167 
https://access.redhat.com/security/cve/CVE-2024-6239 CVE-2024-6239 CVE-2024-6239 https://bugzilla.redhat.com/2293594 2293594  https://errata.almalinux.org/9/ALSA-2024-9167.html ALSA-2024:9167 ALSA-2024:9167 	�hpoppler-glib-devel-21.01.0-21.el9.i686.rpm �hpoppler-glib-devel-21.01.0-21.el9.x86_64.rpm �hpoppler-cpp-devel-21.01.0-21.el9.x86_64.rpm �hpoppler-qt5-devel-21.01.0-21.el9.x86_64.rpm �hpoppler-devel-21.01.0-21.el9.x86_64.rpm �*hpoppler-glib-doc-21.01.0-21.el9.noarch.rpm �hpoppler-qt5-devel-21.01.0-21.el9.i686.rpm �hpoppler-cpp-devel-21.01.0-21.el9.i686.rpm �hpoppler-devel-21.01.0-21.el9.i686.rpm 	�hpoppler-glib-devel-21.01.0-21.el9.i686.rpm �hpoppler-glib-devel-21.01.0-21.el9.x86_64.rpm �hpoppler-cpp-devel-21.01.0-21.el9.x86_64.rpm �hpoppler-qt5-devel-21.01.0-21.el9.x86_64.rpm �hpoppler-devel-21.01.0-21.el9.x86_64.rpm �*hpoppler-glib-doc-21.01.0-21.el9.noarch.rpm �hpoppler-qt5-devel-21.01.0-21.el9.i686.rpm �hpoppler-cpp-devel-21.01.0-21.el9.i686.rpm �hpoppler-devel-21.01.0-21.el9.i686.rpm ����V�_	��OBsecurity Moderate: jose security update 
��M�Rhttps://access.redhat.com/errata/RHSA-2024:9181 RHSA-2024:9181 RHSA-2024:9181 
https://access.redhat.com/security/cve/CVE-2023-50967 CVE-2023-50967 CVE-2023-50967 https://access.redhat.com/security/cve/CVE-2024-28176 CVE-2024-28176 CVE-2024-28176 https://bugzilla.redhat.com/2268820 2268820  https://bugzilla.redhat.com/2270538 2270538  https://errata.almalinux.org/9/ALSA-2024-9181.html ALSA-2024:9181 ALSA-2024:9181 �#�tlibjose-devel-14-1.el9.x86_64.rpm �#�tlibjose-devel-14-1.el9.i686.rpm �#�tlibjose-devel-14-1.el9.x86_64.rpm �#�tlibjose-devel-14-1.el9.i686.rpm ����@�`	�
�Rsecurity Moderate: gtk3 security update 
���+https://access.redhat.com/errata/RHSA-2024:9184 RHSA-2024:9184 RHSA-2024:9184 
https://access.redhat.com/security/cve/CVE-2024-6655 CVE-2024-6655 CVE-2024-6655 https://bugzilla.redhat.com/2297098 2297098  https://errata.almalinux.org/9/ALSA-2024-9184.html ALSA-2024:9184 ALSA-2024:9184 �B�rgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm �B�rgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm ����0�a	��TBsecurity Low: bcc security update �>��J�vhttps://access.redhat.com/errata/RHSA-2024:9187 RHSA-2024:9187 RHSA-2024:9187 
https://access.redhat.com/security/cve/CVE-2024-2314 CVE-2024-2314 CVE-2024-2314 https://bugzilla.redhat.com/2269019 2269019  https://errata.almalinux.org/9/ALSA-2024-9187.html ALSA-2024:9187 ALSA-2024:9187 �+�Ybcc-devel-0.30.0-6.el9.x86_64.rpm ��Ybcc-doc-0.30.0-6.el9.noarch.rpm �+�Ybcc-devel-0.30.0-6.el9.x86_64.rpm ��Ybcc-doc-0.30.0-6.el9.noarch.rpm ����T�b	��OB�HBBBBBBBBBsecurity Moderate: python3.12 security update 
��@�Fhttps://access.redhat.com/errata/RHSA-2024:9190 RHSA-2024:9190 RHSA-2024:9190 
https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2276525 2276525  https://bugzilla.redhat.com/2292921 2292921  https://bugzilla.redhat.com/2307370 2307370  https://errata.almalinux.org/9/ALSA-2024-9190.html ALSA-2024:9190 ALSA-2024:9190 W�	python3.12-test-3.12.5-2.el9.i686.rpm U�	python3.12-debug-3.12.5-2.el9.i686.rpm V�	python3.12-idle-3.12.5-2.el9.x86_64.rpm �h�	python3.12-tkinter-3.12.5-2.el9.i686.rpm �g�	python3.12-3.12.5-2.el9.i686.rpm W�	python3.12-test-3.12.5-2.el9.x86_64.rpm U�	python3.12-debug-3.12.5-2.el9.x86_64.rpm V�	python3.12-idle-3.12.5-2.el9.i686.rpm W�	python3.12-test-3.12.5-2.el9.i686.rpm U�	python3.12-debug-3.12.5-2.el9.i686.rpm V�	python3.12-idle-3.12.5-2.el9.x86_64.rpm �h�	python3.12-tkinter-3.12.5-2.el9.i686.rpm �g�	python3.12-3.12.5-2.el9.i686.rpm W�	python3.12-test-3.12.5-2.el9.x86_64.rpm U�	python3.12-debug-3.12.5-2.el9.x86_64.rpm V�	python3.12-idle-3.12.5-2.el9.i686.rpm ���>�c	��RB�PBBBBBBBBBsecurity Moderate: python3.11 security update 
���Rhttps://access.redhat.com/errata/RHSA-2024:9192 RHSA-2024:9192 RHSA-2024:9192 
https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2276525 2276525  https://bugzilla.redhat.com/2307370 2307370  https://errata.almalinux.org/9/ALSA-2024-9192.html ALSA-2024:9192 ALSA-2024:9192 �python3.11-test-3.11.9-7.el9.i686.rpm f�python3.11-3.11.9-7.el9.i686.rpm �python3.11-idle-3.11.9-7.el9.x86_64.rpm �python3.11-debug-3.11.9-7.el9.i686.rpm g�python3.11-tkinter-3.11.9-7.el9.i686.rpm �python3.11-debug-3.11.9-7.el9.x86_64.rpm �python3.11-test-3.11.9-7.el9.x86_64.rpm �python3.11-idle-3.11.9-7.el9.i686.rpm �python3.11-test-3.11.9-7.el9.i686.rpm f�python3.11-3.11.9-7.el9.i686.rpm �python3.11-idle-3.11.9-7.el9.x86_64.rpm �python3.11-debug-3.11.9-7.el9.i686.rpm g�python3.11-tkinter-3.11.9-7.el9.i686.rpm �python3.11-debug-3.11.9-7.el9.x86_64.rpm �python3.11-test-3.11.9-7.el9.x86_64.rpm �python3.11-idle-3.11.9-7.el9.i686.rpm ���f�d	��mBsecurity Low: NetworkManager security update �>��X�jhttps://access.redhat.com/errata/RHSA-2024:9317 RHSA-2024:9317 RHSA-2024:9317 
https://access.redhat.com/security/cve/CVE-2024-6501 CVE-2024-6501 CVE-2024-6501 https://bugzilla.redhat.com/2295734 2295734  https://errata.almalinux.org/9/ALSA-2024-9317.html ALSA-2024:9317 ALSA-2024:9317 ��vNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm ��vNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpm ��vNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm ��vNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpm ����F�e	��V�I�SBBBBBBBBBsecurity Moderate: python3.9 security update 
��B�khttps://access.redhat.com/errata/RHSA-2024:9371 RHSA-2024:9371 RHSA-2024:9371 
https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2307370 2307370  https://errata.almalinux.org/9/ALSA-2024-9371.html ALSA-2024:9371 ALSA-2024:9371 Z�python3-tkinter-3.9.19-8.el9.i686.rpm �python3-idle-3.9.19-8.el9.x86_64.rpm �python3-idle-3.9.19-8.el9.i686.rpm �python3-debug-3.9.19-8.el9.x86_64.rpm �python3-debug-3.9.19-8.el9.i686.rpm �python3-test-3.9.19-8.el9.x86_64.rpm Y�python3-3.9.19-8.el9.i686.rpm �python3-test-3.9.19-8.el9.i686.rpm Z�python3-tkinter-3.9.19-8.el9.i686.rpm �python3-idle-3.9.19-8.el9.x86_64.rpm �python3-idle-3.9.19-8.el9.i686.rpm �python3-debug-3.9.19-8.el9.x86_64.rpm �python3-debug-3.9.19-8.el9.i686.rpm �python3-test-3.9.19-8.el9.x86_64.rpm Y�python3-3.9.19-8.el9.i686.rpm �python3-test-3.9.19-8.el9.i686.rpm ���7�f	��{Bsecurity Moderate: bluez security update 
��-�+https://access.redhat.com/errata/RHSA-2024:9413 RHSA-2024:9413 RHSA-2024:9413 
https://access.redhat.com/security/cve/CVE-2023-27349 CVE-2023-27349 CVE-2023-27349 https://access.redhat.com/security/cve/CVE-2023-44431 CVE-2023-44431 CVE-2023-44431 https://access.redhat.com/security/cve/CVE-2023-45866 CVE-2023-45866 CVE-2023-45866 https://access.redhat.com/security/cve/CVE-2023-50229 CVE-2023-50229 CVE-2023-50229 https://access.redhat.com/security/cve/CVE-2023-50230 CVE-2023-50230 CVE-2023-50230 https://access.redhat.com/security/cve/CVE-2023-51580 CVE-2023-51580 CVE-2023-51580 https://access.redhat.com/security/cve/CVE-2023-51589 CVE-2023-51589 CVE-2023-51589 https://access.redhat.com/security/cve/CVE-2023-51592 CVE-2023-51592 CVE-2023-51592 https://access.redhat.com/security/cve/CVE-2023-51594 CVE-2023-51594 CVE-2023-51594 https://access.redhat.com/security/cve/CVE-2023-51596 CVE-2023-51596 CVE-2023-51596 https://bugzilla.redhat.com/2253391 2253391  https://bugzilla.redhat.com/2278787 2278787  https://bugzilla.redhat.com/2278945 2278945  https://bugzilla.redhat.com/2278955 2278955  https://bugzilla.redhat.com/2278962 2278962  https://bugzilla.redhat.com/2278965 2278965  https://bugzilla.redhat.com/2278967 2278967  https://bugzilla.redhat.com/2278969 2278969  https://bugzilla.redhat.com/2278972 2278972  https://bugzilla.redhat.com/2278974 2278974  https://errata.almalinux.org/9/ALSA-2024-9413.html ALSA-2024:9413 ALSA-2024:9413 ��bluez-libs-devel-5.72-2.el9.i686.rpm ��bluez-libs-devel-5.72-2.el9.x86_64.rpm ��bluez-libs-devel-5.72-2.el9.i686.rpm ��bluez-libs-devel-5.72-2.el9.x86_64.rpm ����J�g	��~Bsecurity Moderate: fontforge security update 
��X�ehttps://access.redhat.com/errata/RHSA-2024:9439 RHSA-2024:9439 RHSA-2024:9439 
https://access.redhat.com/security/cve/CVE-2024-25081 CVE-2024-25081 CVE-2024-25081 https://access.redhat.com/security/cve/CVE-2024-25082 CVE-2024-25082 CVE-2024-25082 https://bugzilla.redhat.com/2266180 2266180  https://bugzilla.redhat.com/2266181 2266181  https://errata.almalinux.org/9/ALSA-2024-9439.html ALSA-2024:9439 ALSA-2024:9439 ��fontforge-20201107-6.el9.i686.rpm ��fontforge-20201107-6.el9.x86_64.rpm ��fontforge-20201107-6.el9.i686.rpm ��fontforge-20201107-6.el9.x86_64.rpm ����L�h	��BBBsecurity Moderate: mingw-glib2 security update 
��=�(https://access.redhat.com/errata/RHSA-2024:9442 RHSA-2024:9442 RHSA-2024:9442 
https://access.redhat.com/security/cve/CVE-2024-34397 CVE-2024-34397 CVE-2024-34397 https://bugzilla.redhat.com/2279632 2279632  https://errata.almalinux.org/9/ALSA-2024-9442.html ALSA-2024:9442 ALSA-2024:9442 ��Cmingw64-glib2-static-2.78.6-1.el9.noarch.rpm ��Cmingw32-glib2-2.78.6-1.el9.noarch.rpm � �Cmingw32-glib2-static-2.78.6-1.el9.noarch.rpm ��Cmingw64-glib2-2.78.6-1.el9.noarch.rpm ��Cmingw64-glib2-static-2.78.6-1.el9.noarch.rpm ��Cmingw32-glib2-2.78.6-1.el9.noarch.rpm � �Cmingw32-glib2-static-2.78.6-1.el9.noarch.rpm ��Cmingw64-glib2-2.78.6-1.el9.noarch.rpm ����3�i	��YB�nBBBsecurity Important: bubblewrap and flatpak security update ��e�Rhttps://access.redhat.com/errata/RHSA-2024:9449 RHSA-2024:9449 RHSA-2024:9449 
https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://errata.almalinux.org/9/ALSA-2024-9449.html ALSA-2024:9449 ALSA-2024:9449 �7�flatpak-1.12.9-3.el9_5.i686.rpm �q�flatpak-devel-1.12.9-3.el9_5.x86_64.rpm �q�flatpak-devel-1.12.9-3.el9_5.i686.rpm �8�flatpak-session-helper-1.12.9-3.el9_5.i686.rpm �7�flatpak-1.12.9-3.el9_5.i686.rpm �q�flatpak-devel-1.12.9-3.el9_5.x86_64.rpm �q�flatpak-devel-1.12.9-3.el9_5.i686.rpm �8�flatpak-session-helper-1.12.9-3.el9_5.i686.rpm ����4�j	��\B�pBBBBBBBBBsecurity Moderate: python3.11 security update 
��7�\https://access.redhat.com/errata/RHSA-2024:9450 RHSA-2024:9450 RHSA-2024:9450 
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426  https://errata.almalinux.org/9/ALSA-2024-9450.html ALSA-2024:9450 ALSA-2024:9450 �python3.11-test-3.11.9-7.el9_5.1.i686.rpm �python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.1.x86_64.rpm g�python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.i686.rpm f�python3.11-3.11.9-7.el9_5.1.i686.rpm �python3.11-test-3.11.9-7.el9_5.1.i686.rpm �python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.1.x86_64.rpm g�python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.i686.rpm f�python3.11-3.11.9-7.el9_5.1.i686.rpm ����y�k	�!�_B�xBBBBBBBBBsecurity Moderate: python3.12 security update 
���
https://access.redhat.com/errata/RHSA-2024:9451 RHSA-2024:9451 RHSA-2024:9451 
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426  https://errata.almalinux.org/9/ALSA-2024-9451.html ALSA-2024:9451 ALSA-2024:9451 W�
python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm �h�
python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm U�
python3.12-debug-3.12.5-2.el9_5.1.i686.rpm V�
python3.12-idle-3.12.5-2.el9_5.1.i686.rpm U�
python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm W�
python3.12-test-3.12.5-2.el9_5.1.i686.rpm V�
python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm �g�
python3.12-3.12.5-2.el9_5.1.i686.rpm W�
python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm �h�
python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm U�
python3.12-debug-3.12.5-2.el9_5.1.i686.rpm V�
python3.12-idle-3.12.5-2.el9_5.1.i686.rpm U�
python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm W�
python3.12-test-3.12.5-2.el9_5.1.i686.rpm V�
python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm �g�
python3.12-3.12.5-2.el9_5.1.i686.rpm ����|�l	�#�b�~�DBBBBBBBBBsecurity Moderate: python3.9 security update 
�� �\https://access.redhat.com/errata/RHSA-2024:9468 RHSA-2024:9468 RHSA-2024:9468 
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426  https://errata.almalinux.org/9/ALSA-2024-9468.html ALSA-2024:9468 ALSA-2024:9468 �python3-test-3.9.19-8.el9_5.1.x86_64.rpm �python3-idle-3.9.19-8.el9_5.1.x86_64.rpm �python3-debug-3.9.19-8.el9_5.1.x86_64.rpm �python3-test-3.9.19-8.el9_5.1.i686.rpm Z�python3-tkinter-3.9.19-8.el9_5.1.i686.rpm Y�python3-3.9.19-8.el9_5.1.i686.rpm �python3-debug-3.9.19-8.el9_5.1.i686.rpm �python3-idle-3.9.19-8.el9_5.1.i686.rpm �python3-test-3.9.19-8.el9_5.1.x86_64.rpm �python3-idle-3.9.19-8.el9_5.1.x86_64.rpm �python3-debug-3.9.19-8.el9_5.1.x86_64.rpm �python3-test-3.9.19-8.el9_5.1.i686.rpm Z�python3-tkinter-3.9.19-8.el9_5.1.i686.rpm Y�python3-3.9.19-8.el9_5.1.i686.rpm �python3-debug-3.9.19-8.el9_5.1.i686.rpm �python3-idle-3.9.19-8.el9_5.1.i686.rpm ���� �m	�$�msecurity Important: .NET 9.0 security update ��|�fhttps://access.redhat.com/errata/RHSA-2024:9543 RHSA-2024:9543 RHSA-2024:9543 
https://access.redhat.com/security/cve/CVE-2024-43498 CVE-2024-43498 CVE-2024-43498 https://access.redhat.com/security/cve/CVE-2024-43499 CVE-2024-43499 CVE-2024-43499 https://bugzilla.redhat.com/2323239 2323239  https://bugzilla.redhat.com/2323240 2323240  https://errata.almalinux.org/9/ALSA-2024-9543.html ALSA-2024:9543 ALSA-2024:9543 �6�$dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm �6�$dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm ����O�n	�%�oBsecurity Important: openexr security update ��b�:https://access.redhat.com/errata/RHSA-2024:9548 RHSA-2024:9548 RHSA-2024:9548 
https://access.redhat.com/security/cve/CVE-2023-5841 CVE-2023-5841 CVE-2023-5841 https://bugzilla.redhat.com/2262397 2262397  https://errata.almalinux.org/9/ALSA-2024-9548.html ALSA-2024:9548 ALSA-2024:9548 ��openexr-devel-3.1.1-2.el9_5.1.x86_64.rpm ��openexr-devel-3.1.1-2.el9_5.1.i686.rpm ��openexr-devel-3.1.1-2.el9_5.1.x86_64.rpm ��openexr-devel-3.1.1-2.el9_5.1.i686.rpm ����X�o	�&�rBBBBsecurity Moderate: kernel security update 
���'https://access.redhat.com/errata/RHSA-2024:9605 RHSA-2024:9605 RHSA-2024:9605 
https://access.redhat.com/security/cve/CVE-2024-42283 CVE-2024-42283 CVE-2024-42283 https://access.redhat.com/security/cve/CVE-2024-46824 CVE-2024-46824 CVE-2024-46824 https://access.redhat.com/security/cve/CVE-2024-46858 CVE-2024-46858 CVE-2024-46858 https://bugzilla.redhat.com/2315176 2315176  https://bugzilla.redhat.com/2315210 2315210  https://errata.almalinux.org/9/ALSA-2024-9605.html ALSA-2024:9605 ALSA-2024:9605 �Tkernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm �Tkernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm �Tlibperf-5.14.0-503.14.1.el9_5.x86_64.rpm �Tkernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm �Tkernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm �Tlibperf-5.14.0-503.14.1.el9_5.x86_64.rpm ����:�p	�'�xBsecurity Moderate: libvpx security update 
��C�>https://access.redhat.com/errata/RHSA-2024:9827 RHSA-2024:9827 RHSA-2024:9827 
https://access.redhat.com/security/cve/CVE-2024-5197 CVE-2024-5197 CVE-2024-5197 https://bugzilla.redhat.com/2291198 2291198  https://errata.almalinux.org/9/ALSA-2024-9827.html ALSA-2024:9827 ALSA-2024:9827 ��rlibvpx-devel-1.9.0-8.el9_5.i686.rpm ��rlibvpx-devel-1.9.0-8.el9_5.x86_64.rpm ��rlibvpx-devel-1.9.0-8.el9_5.i686.rpm ��rlibvpx-devel-1.9.0-8.el9_5.x86_64.rpm ����Z�q	�(�{BBBBsecurity Important: kernel security update ���
https://access.redhat.com/errata/RHSA-2025:0059 RHSA-2025:0059 RHSA-2025:0059 
https://access.redhat.com/security/cve/CVE-2024-46713 CVE-2024-46713 CVE-2024-46713 https://access.redhat.com/security/cve/CVE-2024-50208 CVE-2024-50208 CVE-2024-50208 https://access.redhat.com/security/cve/CVE-2024-50252 CVE-2024-50252 CVE-2024-50252 https://access.redhat.com/security/cve/CVE-2024-53122 CVE-2024-53122 CVE-2024-53122 https://bugzilla.redhat.com/2312221 2312221  https://bugzilla.redhat.com/2324611 2324611  https://bugzilla.redhat.com/2324898 2324898  https://bugzilla.redhat.com/2329932 2329932  https://errata.almalinux.org/9/ALSA-2025-0059.html ALSA-2025:0059 ALSA-2025:0059 �Xkernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpm �Xkernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpm �Xlibperf-5.14.0-503.21.1.el9_5.x86_64.rpm �Xkernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpm �Xkernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpm �Xlibperf-5.14.0-503.21.1.el9_5.x86_64.rpm ����4�r	�)�ABsecurity Important: raptor2 security update ���@https://access.redhat.com/errata/RHSA-2025:0312 RHSA-2025:0312 RHSA-2025:0312 
https://access.redhat.com/security/cve/CVE-2024-57823 CVE-2024-57823 CVE-2024-57823 https://bugzilla.redhat.com/2336921 2336921  https://errata.almalinux.org/9/ALSA-2025-0312.html ALSA-2025:0312 ALSA-2025:0312 �2�zraptor2-devel-2.0.15-32.el9_5.i686.rpm �2�zraptor2-devel-2.0.15-32.el9_5.x86_64.rpm �2�zraptor2-devel-2.0.15-32.el9_5.i686.rpm �2�zraptor2-devel-2.0.15-32.el9_5.x86_64.rpm ����@�s	�*�security Moderate: ipa security update 
��K�ahttps://access.redhat.com/errata/RHSA-2025:0334 RHSA-2025:0334 RHSA-2025:0334 
https://access.redhat.com/security/cve/CVE-2024-11029 CVE-2024-11029 CVE-2024-11029 https://bugzilla.redhat.com/2325557 2325557  https://errata.almalinux.org/9/ALSA-2025-0334.html ALSA-2025:0334 ALSA-2025:0334 ��python3-ipatests-4.12.2-1.el9_5.3.noarch.rpm ��python3-ipatests-4.12.2-1.el9_5.3.noarch.rpm ����v�t	�+�EBsecurity Moderate: Security and bug fixes for NetworkManager 
��,�Lhttps://access.redhat.com/errata/RHSA-2025:0377 RHSA-2025:0377 RHSA-2025:0377 
https://access.redhat.com/security/cve/CVE-2024-3661 CVE-2024-3661 CVE-2024-3661 https://errata.almalinux.org/9/ALSA-2025-0377.html ALSA-2025:0377 ALSA-2025:0377 ��wNetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm ��wNetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm ��wNetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm ��wNetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm ���� �u	�,�HBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5 
��x�fhttps://access.redhat.com/errata/RHSA-2025:0422 RHSA-2025:0422 RHSA-2025:0422 
https://access.redhat.com/security/cve/CVE-2025-21502 CVE-2025-21502 CVE-2025-21502 https://errata.almalinux.org/9/ALSA-2025-0422.html ALSA-2025:0422 ALSA-2025:0422 u.java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm l.java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm s.java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm k.java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm r.java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm q.java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm n.java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm m.java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm p.java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm j.java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm w.java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm v.java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm t.java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm o.java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm u.java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm l.java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm s.java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm k.java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm r.java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm q.java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm n.java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm m.java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm p.java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm j.java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm w.java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm v.java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm t.java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm o.java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm ����Q�v	�-�dBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5 
��^�https://access.redhat.com/errata/RHSA-2025:0426 RHSA-2025:0426 RHSA-2025:0426 
https://access.redhat.com/security/cve/CVE-2025-21502 CVE-2025-21502 CVE-2025-21502 https://errata.almalinux.org/9/ALSA-2025-0426.html ALSA-2025:0426 ALSA-2025:0426 �d<java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �_<java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �^<java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �f<java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �`<java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �e<java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �Y<java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �[<java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �Z<java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �\<java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �c<java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �]<java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �b<java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �a<java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �d<java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �_<java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �^<java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �f<java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �`<java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �e<java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �Y<java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �[<java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �Z<java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �\<java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �c<java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �]<java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �b<java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �a<java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm ��ɲ%�w	�.�@BBBBsecurity Moderate: kernel security update 
��a�Ehttps://access.redhat.com/errata/RHSA-2025:0578 RHSA-2025:0578 RHSA-2025:0578 
https://access.redhat.com/security/cve/CVE-2024-50154 CVE-2024-50154 CVE-2024-50154 https://access.redhat.com/security/cve/CVE-2024-50275 CVE-2024-50275 CVE-2024-50275 https://access.redhat.com/security/cve/CVE-2024-53088 CVE-2024-53088 CVE-2024-53088 https://bugzilla.redhat.com/2324313 2324313  https://bugzilla.redhat.com/2327198 2327198  https://bugzilla.redhat.com/2327328 2327328  https://errata.almalinux.org/9/ALSA-2025-0578.html ALSA-2025:0578 ALSA-2025:0578 �Ykernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm �Ykernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm �Ylibperf-5.14.0-503.22.1.el9_5.x86_64.rpm �Ykernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm �Ykernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm �Ylibperf-5.14.0-503.22.1.el9_5.x86_64.rpm ��Օ�x	�/�FBBBBsecurity Moderate: galera and mariadb security update 
��&�4https://access.redhat.com/errata/RHSA-2025:0914 RHSA-2025:0914 RHSA-2025:0914 
https://access.redhat.com/security/cve/CVE-2023-22084 CVE-2023-22084 CVE-2023-22084 https://access.redhat.com/security/cve/CVE-2024-21096 CVE-2024-21096 CVE-2024-21096 https://bugzilla.redhat.com/2245023 2245023  https://bugzilla.redhat.com/2275452 2275452  https://errata.almalinux.org/9/ALSA-2025-0914.html ALSA-2025:0914 ALSA-2025:0914 �R�Fmariadb-test-10.5.27-1.el9_5.x86_64.rpm �Q�Fmariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm �P�Fmariadb-devel-10.5.27-1.el9_5.x86_64.rpm �R�Fmariadb-test-10.5.27-1.el9_5.x86_64.rpm �Q�Fmariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm �P�Fmariadb-devel-10.5.27-1.el9_5.x86_64.rpm ����6�y	��LBBsecurity Moderate: mingw-glib2 security update 
��Z�https://access.redhat.com/errata/RHSA-2025:0936 RHSA-2025:0936 RHSA-2025:0936 
https://access.redhat.com/security/cve/CVE-2024-52533 CVE-2024-52533 CVE-2024-52533 https://bugzilla.redhat.com/2325340 2325340  https://errata.almalinux.org/9/ALSA-2025-0936.html ALSA-2025:0936 ALSA-2025:0936 ��Dmingw32-glib2-2.78.6-2.el9.noarch.rpm � �Dmingw32-glib2-static-2.78.6-2.el9.noarch.rpm ��Dmingw64-glib2-static-2.78.6-2.el9.noarch.rpm ��Dmingw64-glib2-2.78.6-2.el9.noarch.rpm ��Dmingw32-glib2-2.78.6-2.el9.noarch.rpm � �Dmingw32-glib2-static-2.78.6-2.el9.noarch.rpm ��Dmingw64-glib2-static-2.78.6-2.el9.noarch.rpm ��Dmingw64-glib2-2.78.6-2.el9.noarch.rpm �����z	�1�p�q�rBBBBBBBBBsecurity Important: python3.9 security update ��o�ghttps://access.redhat.com/errata/RHSA-2025:10136 RHSA-2025:10136 RHSA-2025:10136 
https://access.redhat.com/security/cve/CVE-2024-12718 CVE-2024-12718 CVE-2024-12718 https://access.redhat.com/security/cve/CVE-2025-4138 CVE-2025-4138 CVE-2025-4138 https://access.redhat.com/security/cve/CVE-2025-4330 CVE-2025-4330 CVE-2025-4330 https://access.redhat.com/security/cve/CVE-2025-4435 CVE-2025-4435 CVE-2025-4435 https://access.redhat.com/security/cve/CVE-2025-4517 CVE-2025-4517 CVE-2025-4517 https://bugzilla.redhat.com/2370010 2370010  https://bugzilla.redhat.com/2370013 2370013  https://bugzilla.redhat.com/2370014 2370014  https://bugzilla.redhat.com/2370016 2370016  https://bugzilla.redhat.com/2372426 2372426  https://errata.almalinux.org/9/ALSA-2025-10136.html ALSA-2025:10136 ALSA-2025:10136 �python3-test-3.9.21-2.el9_6.1.i686.rpm �python3-test-3.9.21-2.el9_6.1.x86_64.rpm �python3-idle-3.9.21-2.el9_6.1.i686.rpm Y�python3-3.9.21-2.el9_6.1.i686.rpm �python3-debug-3.9.21-2.el9_6.1.x86_64.rpm �python3-debug-3.9.21-2.el9_6.1.i686.rpm Z�python3-tkinter-3.9.21-2.el9_6.1.i686.rpm �python3-idle-3.9.21-2.el9_6.1.x86_64.rpm �python3-test-3.9.21-2.el9_6.1.i686.rpm �python3-test-3.9.21-2.el9_6.1.x86_64.rpm �python3-idle-3.9.21-2.el9_6.1.i686.rpm Y�python3-3.9.21-2.el9_6.1.i686.rpm �python3-debug-3.9.21-2.el9_6.1.x86_64.rpm �python3-debug-3.9.21-2.el9_6.1.i686.rpm Z�python3-tkinter-3.9.21-2.el9_6.1.i686.rpm �python3-idle-3.9.21-2.el9_6.1.x86_64.rpm ��D�{	�4�rB�jBBBBBBBBBsecurity Important: python3.11 security update ��V�ghttps://access.redhat.com/errata/RHSA-2025:10148 RHSA-2025:10148 RHSA-2025:10148 
https://access.redhat.com/security/cve/CVE-2024-12718 CVE-2024-12718 CVE-2024-12718 https://access.redhat.com/security/cve/CVE-2025-4138 CVE-2025-4138 CVE-2025-4138 https://access.redhat.com/security/cve/CVE-2025-4330 CVE-2025-4330 CVE-2025-4330 https://access.redhat.com/security/cve/CVE-2025-4435 CVE-2025-4435 CVE-2025-4435 https://access.redhat.com/security/cve/CVE-2025-4517 CVE-2025-4517 CVE-2025-4517 https://bugzilla.redhat.com/2370010 2370010  https://bugzilla.redhat.com/2370013 2370013  https://bugzilla.redhat.com/2370014 2370014  https://bugzilla.redhat.com/2370016 2370016  https://bugzilla.redhat.com/2372426 2372426  https://errata.almalinux.org/9/ALSA-2025-10148.html ALSA-2025:10148 ALSA-2025:10148 ypython3.11-debug-3.11.11-2.el9_6.1.i686.rpm gypython3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm ypython3.11-test-3.11.11-2.el9_6.1.i686.rpm ypython3.11-test-3.11.11-2.el9_6.1.x86_64.rpm ypython3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm ypython3.11-idle-3.11.11-2.el9_6.1.i686.rpm fypython3.11-3.11.11-2.el9_6.1.i686.rpm ypython3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm ypython3.11-debug-3.11.11-2.el9_6.1.i686.rpm gypython3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm ypython3.11-test-3.11.11-2.el9_6.1.i686.rpm ypython3.11-test-3.11.11-2.el9_6.1.x86_64.rpm ypython3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm ypython3.11-idle-3.11.11-2.el9_6.1.i686.rpm fypython3.11-3.11.11-2.el9_6.1.i686.rpm ypython3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm ��o�|	�7�uB�rBBBBBBBBBsecurity Important: python3.12 security update ��=�ghttps://access.redhat.com/errata/RHSA-2025:10189 RHSA-2025:10189 RHSA-2025:10189 
https://access.redhat.com/security/cve/CVE-2024-12718 CVE-2024-12718 CVE-2024-12718 https://access.redhat.com/security/cve/CVE-2025-4138 CVE-2025-4138 CVE-2025-4138 https://access.redhat.com/security/cve/CVE-2025-4330 CVE-2025-4330 CVE-2025-4330 https://access.redhat.com/security/cve/CVE-2025-4435 CVE-2025-4435 CVE-2025-4435 https://access.redhat.com/security/cve/CVE-2025-4517 CVE-2025-4517 CVE-2025-4517 https://bugzilla.redhat.com/2370010 2370010  https://bugzilla.redhat.com/2370013 2370013  https://bugzilla.redhat.com/2370014 2370014  https://bugzilla.redhat.com/2370016 2370016  https://bugzilla.redhat.com/2372426 2372426  https://errata.almalinux.org/9/ALSA-2025-10189.html ALSA-2025:10189 ALSA-2025:10189 W�python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm U�python3.12-debug-3.12.9-1.el9_6.1.i686.rpm �h�python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm W�python3.12-test-3.12.9-1.el9_6.1.i686.rpm V�python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm �g�python3.12-3.12.9-1.el9_6.1.i686.rpm V�python3.12-idle-3.12.9-1.el9_6.1.i686.rpm U�python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpm W�python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm U�python3.12-debug-3.12.9-1.el9_6.1.i686.rpm �h�python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm W�python3.12-test-3.12.9-1.el9_6.1.i686.rpm V�python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm �g�python3.12-3.12.9-1.el9_6.1.i686.rpm V�python3.12-idle-3.12.9-1.el9_6.1.i686.rpm U�python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpm ��d�}	�8�rBBBBsecurity Important: kernel security update ��$�]https://access.redhat.com/errata/RHSA-2025:10379 RHSA-2025:10379 RHSA-2025:10379 
https://access.redhat.com/security/cve/CVE-2022-49846 CVE-2022-49846 CVE-2022-49846 https://access.redhat.com/security/cve/CVE-2025-21759 CVE-2025-21759 CVE-2025-21759 https://access.redhat.com/security/cve/CVE-2025-21887 CVE-2025-21887 CVE-2025-21887 https://access.redhat.com/security/cve/CVE-2025-22004 CVE-2025-22004 CVE-2025-22004 https://access.redhat.com/security/cve/CVE-2025-37799 CVE-2025-37799 CVE-2025-37799 https://bugzilla.redhat.com/2348596 2348596  https://bugzilla.redhat.com/2355405 2355405  https://bugzilla.redhat.com/2357142 2357142  https://bugzilla.redhat.com/2363432 2363432  https://bugzilla.redhat.com/2363876 2363876  https://errata.almalinux.org/9/ALSA-2025-10379.html ALSA-2025:10379 ALSA-2025:10379 �fkernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpm �flibperf-5.14.0-570.25.1.el9_6.x86_64.rpm �fkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpm �fkernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpm �flibperf-5.14.0-570.25.1.el9_6.x86_64.rpm �fkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpm �ÿ�}�~	�!�xBsecurity Moderate: jq security update 
���
https://access.redhat.com/errata/RHSA-2025:10585 RHSA-2025:10585 RHSA-2025:10585 
https://access.redhat.com/security/cve/CVE-2024-23337 CVE-2024-23337 CVE-2024-23337 https://access.redhat.com/security/cve/CVE-2025-48060 CVE-2025-48060 CVE-2025-48060 https://bugzilla.redhat.com/2367807 2367807  https://bugzilla.redhat.com/2367842 2367842  https://errata.almalinux.org/9/ALSA-2025-10585.html ALSA-2025:10585 ALSA-2025:10585 �!�pjq-devel-1.6-17.el9_6.2.i686.rpm �!�pjq-devel-1.6-17.el9_6.2.x86_64.rpm �!�pjq-devel-1.6-17.el9_6.2.i686.rpm �!�pjq-devel-1.6-17.el9_6.2.x86_64.rpm �þ�D�	�9�{BBBBsecurity Moderate: kernel security update 
���https://access.redhat.com/errata/RHSA-2025:10837 RHSA-2025:10837 RHSA-2025:10837 
https://access.redhat.com/security/cve/CVE-2025-21991 CVE-2025-21991 CVE-2025-21991 https://bugzilla.redhat.com/2356917 2356917  https://errata.almalinux.org/9/ALSA-2025-10837.html ALSA-2025:10837 ALSA-2025:10837 �gkernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm �gkernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm �glibperf-5.14.0-570.26.1.el9_6.x86_64.rpm �gkernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm �gkernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm �glibperf-5.14.0-570.26.1.el9_6.x86_64.rpm ����Q� 	�:�ABBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security update ���ahttps://access.redhat.com/errata/RHSA-2025:10862 RHSA-2025:10862 RHSA-2025:10862 
https://access.redhat.com/security/cve/CVE-2025-30749 CVE-2025-30749 CVE-2025-30749 https://access.redhat.com/security/cve/CVE-2025-30754 CVE-2025-30754 CVE-2025-30754 https://access.redhat.com/security/cve/CVE-2025-30761 CVE-2025-30761 CVE-2025-30761 https://access.redhat.com/security/cve/CVE-2025-50106 CVE-2025-50106 CVE-2025-50106 https://errata.almalinux.org/9/ALSA-2025-10862.html ALSA-2025:10862 ALSA-2025:10862 
�)Sjava-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �&Sjava-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �%Sjava-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �,Sjava-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �(Sjava-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �*Sjava-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �-Sjava-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �+Sjava-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �$Sjava-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �'Sjava-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm 
�)Sjava-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �&Sjava-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �%Sjava-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �,Sjava-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �(Sjava-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �*Sjava-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �-Sjava-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �+Sjava-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �$Sjava-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �'Sjava-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm ���+�	�;�UBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security update �� �
https://access.redhat.com/errata/RHSA-2025:10867 RHSA-2025:10867 RHSA-2025:10867 
https://access.redhat.com/security/cve/CVE-2025-30749 CVE-2025-30749 CVE-2025-30749 https://access.redhat.com/security/cve/CVE-2025-30754 CVE-2025-30754 CVE-2025-30754 https://access.redhat.com/security/cve/CVE-2025-50059 CVE-2025-50059 CVE-2025-50059 https://access.redhat.com/security/cve/CVE-2025-50106 CVE-2025-50106 CVE-2025-50106 https://errata.almalinux.org/9/ALSA-2025-10867.html ALSA-2025:10867 ALSA-2025:10867 k0java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm r0java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm o0java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm v0java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm j0java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm q0java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm u0java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm p0java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm n0java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm t0java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm l0java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm m0java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm s0java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm w0java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm k0java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm r0java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm o0java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm v0java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm j0java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm q0java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm u0java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm p0java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm n0java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm t0java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm l0java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm m0java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm s0java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm w0java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm ��k�	�<�qBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-21-openjdk security update ��
�qhttps://access.redhat.com/errata/RHSA-2025:10873 RHSA-2025:10873 RHSA-2025:10873 
https://access.redhat.com/security/cve/CVE-2025-30749 CVE-2025-30749 CVE-2025-30749 https://access.redhat.com/security/cve/CVE-2025-30754 CVE-2025-30754 CVE-2025-30754 https://access.redhat.com/security/cve/CVE-2025-50059 CVE-2025-50059 CVE-2025-50059 https://access.redhat.com/security/cve/CVE-2025-50106 CVE-2025-50106 CVE-2025-50106 https://errata.almalinux.org/9/ALSA-2025-10873.html ALSA-2025:10873 ALSA-2025:10873 �^>java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �_>java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �\>java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �]>java-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �d>java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �e>java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �`>java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �Y>java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �c>java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �a>java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �[>java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �Z>java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �f>java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �b>java-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �^>java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �_>java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �\>java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �]>java-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �d>java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �e>java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �`>java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �Y>java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �c>java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �a>java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �[>java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �Z>java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �f>java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �b>java-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �Ĩ�p�	�=�MBsecurity Moderate: glib2 security update 
��~�https://access.redhat.com/errata/RHSA-2025:11140 RHSA-2025:11140 RHSA-2025:11140 
https://access.redhat.com/security/cve/CVE-2024-52533 CVE-2024-52533 CVE-2024-52533 https://access.redhat.com/security/cve/CVE-2025-4373 CVE-2025-4373 CVE-2025-4373 https://bugzilla.redhat.com/2325340 2325340  https://bugzilla.redhat.com/2364265 2364265  https://errata.almalinux.org/9/ALSA-2025-11140.html ALSA-2025:11140 ALSA-2025:11140 �� glib2-static-2.68.4-16.el9_6.2.x86_64.rpm �� glib2-static-2.68.4-16.el9_6.2.i686.rpm �� glib2-static-2.68.4-16.el9_6.2.x86_64.rpm �� glib2-static-2.68.4-16.el9_6.2.i686.rpm ��/�	�>�PBBBBsecurity Important: kernel security update ���Vhttps://access.redhat.com/errata/RHSA-2025:11411 RHSA-2025:11411 RHSA-2025:11411 
https://access.redhat.com/security/cve/CVE-2024-58002 CVE-2024-58002 CVE-2024-58002 https://access.redhat.com/security/cve/CVE-2025-38089 CVE-2025-38089 CVE-2025-38089 https://bugzilla.redhat.com/2348513 2348513  https://bugzilla.redhat.com/2375529 2375529  https://errata.almalinux.org/9/ALSA-2025-11411.html ALSA-2025:11411 ALSA-2025:11411 �hkernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm �hlibperf-5.14.0-570.28.1.el9_6.x86_64.rpm �hkernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm �hkernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm �hlibperf-5.14.0-570.28.1.el9_6.x86_64.rpm �hkernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm ��*�	�?�VBsecurity Important: unbound security update ��X�hhttps://access.redhat.com/errata/RHSA-2025:11849 RHSA-2025:11849 RHSA-2025:11849 
https://access.redhat.com/security/cve/CVE-2025-5994 CVE-2025-5994 CVE-2025-5994 https://bugzilla.redhat.com/2380949 2380949  https://errata.almalinux.org/9/ALSA-2025-11849.html ALSA-2025:11849 ALSA-2025:11849 �4�_unbound-devel-1.16.2-19.el9_6.1.x86_64.rpm �4�_unbound-devel-1.16.2-19.el9_6.1.i686.rpm �4�_unbound-devel-1.16.2-19.el9_6.1.x86_64.rpm �4�_unbound-devel-1.16.2-19.el9_6.1.i686.rpm ��]�	� �YBBBBsecurity Moderate: kernel security update 
��@�https://access.redhat.com/errata/RHSA-2025:11861 RHSA-2025:11861 RHSA-2025:11861 
https://access.redhat.com/security/cve/CVE-2024-57980 CVE-2024-57980 CVE-2024-57980 https://access.redhat.com/security/cve/CVE-2025-21905 CVE-2025-21905 CVE-2025-21905 https://access.redhat.com/security/cve/CVE-2025-22085 CVE-2025-22085 CVE-2025-22085 https://access.redhat.com/security/cve/CVE-2025-22091 CVE-2025-22091 CVE-2025-22091 https://access.redhat.com/security/cve/CVE-2025-22113 CVE-2025-22113 CVE-2025-22113 https://access.redhat.com/security/cve/CVE-2025-22121 CVE-2025-22121 CVE-2025-22121 https://access.redhat.com/security/cve/CVE-2025-37797 CVE-2025-37797 CVE-2025-37797 https://access.redhat.com/security/cve/CVE-2025-37958 CVE-2025-37958 CVE-2025-37958 https://access.redhat.com/security/cve/CVE-2025-38086 CVE-2025-38086 CVE-2025-38086 https://access.redhat.com/security/cve/CVE-2025-38110 CVE-2025-38110 CVE-2025-38110 https://bugzilla.redhat.com/2348599 2348599  https://bugzilla.redhat.com/2356613 2356613  https://bugzilla.redhat.com/2360186 2360186  https://bugzilla.redhat.com/2360199 2360199  https://bugzilla.redhat.com/2360212 2360212  https://bugzilla.redhat.com/2360219 2360219  https://bugzilla.redhat.com/2363672 2363672  https://bugzilla.redhat.com/2367572 2367572  https://bugzilla.redhat.com/2375305 2375305  https://bugzilla.redhat.com/2376035 2376035  https://errata.almalinux.org/9/ALSA-2025-11861.html ALSA-2025:11861 ALSA-2025:11861 �ilibperf-5.14.0-570.30.1.el9_6.x86_64.rpm �ikernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm �ikernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm �ilibperf-5.14.0-570.30.1.el9_6.x86_64.rpm �ikernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm �ikernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm ��	��_BBBBsecurity Important: kernel security update ��N�https://access.redhat.com/errata/RHSA-2025:1262 RHSA-2025:1262 RHSA-2025:1262 
https://access.redhat.com/security/cve/CVE-2024-53104 CVE-2024-53104 CVE-2024-53104 https://bugzilla.redhat.com/2329817 2329817  https://errata.almalinux.org/9/ALSA-2025-1262.html ALSA-2025:1262 ALSA-2025:1262 �Zkernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm �Zkernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm �Zlibperf-5.14.0-503.23.2.el9_5.x86_64.rpm �Zkernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm �Zkernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm �Zlibperf-5.14.0-503.23.2.el9_5.x86_64.rpm ����u�	��eBBBBsecurity Important: kernel security update ��k�ohttps://access.redhat.com/errata/RHSA-2025:12746 RHSA-2025:12746 RHSA-2025:12746 
https://access.redhat.com/security/cve/CVE-2022-49788 CVE-2022-49788 CVE-2022-49788 https://access.redhat.com/security/cve/CVE-2025-21727 CVE-2025-21727 CVE-2025-21727 https://access.redhat.com/security/cve/CVE-2025-21928 CVE-2025-21928 CVE-2025-21928 https://access.redhat.com/security/cve/CVE-2025-21929 CVE-2025-21929 CVE-2025-21929 https://access.redhat.com/security/cve/CVE-2025-21962 CVE-2025-21962 CVE-2025-21962 https://access.redhat.com/security/cve/CVE-2025-22020 CVE-2025-22020 CVE-2025-22020 https://access.redhat.com/security/cve/CVE-2025-37890 CVE-2025-37890 CVE-2025-37890 https://access.redhat.com/security/cve/CVE-2025-38052 CVE-2025-38052 CVE-2025-38052 https://access.redhat.com/security/cve/CVE-2025-38087 CVE-2025-38087 CVE-2025-38087 https://bugzilla.redhat.com/2348516 2348516  https://bugzilla.redhat.com/2356592 2356592  https://bugzilla.redhat.com/2356594 2356594  https://bugzilla.redhat.com/2356624 2356624  https://bugzilla.redhat.com/2360099 2360099  https://bugzilla.redhat.com/2363378 2363378  https://bugzilla.redhat.com/2366848 2366848  https://bugzilla.redhat.com/2373380 2373380  https://bugzilla.redhat.com/2375531 2375531  https://errata.almalinux.org/9/ALSA-2025-12746.html ALSA-2025:12746 ALSA-2025:12746 �jlibperf-5.14.0-570.32.1.el9_6.x86_64.rpm �jkernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm �jkernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm �jlibperf-5.14.0-570.32.1.el9_6.x86_64.rpm �jkernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm �jkernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm ��ҙi�		��+security Moderate: python3.12-setuptools security update 
��Z�Jhttps://access.redhat.com/errata/RHSA-2025:12834 RHSA-2025:12834 RHSA-2025:12834 
https://access.redhat.com/security/cve/CVE-2025-47273 CVE-2025-47273 CVE-2025-47273 https://bugzilla.redhat.com/2366982 2366982  https://errata.almalinux.org/9/ALSA-2025-12834.html ALSA-2025:12834 ALSA-2025:12834 �_�python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpm �_�python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpm ����s�
	�2�lBBBBsecurity Moderate: doxygen security update 
��$�ehttps://access.redhat.com/errata/RHSA-2025:1329 RHSA-2025:1329 RHSA-2025:1329 
https://access.redhat.com/security/cve/CVE-2020-11023 CVE-2020-11023 CVE-2020-11023 https://bugzilla.redhat.com/1850004 1850004  https://errata.almalinux.org/9/ALSA-2025-1329.html ALSA-2025:1329 ALSA-2025:1329 �7�@doxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm �6�@doxygen-1.9.1-12.el9_5.x86_64.rpm �8�@doxygen-latex-1.9.1-12.el9_5.x86_64.rpm �7�@doxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm �6�@doxygen-1.9.1-12.el9_5.x86_64.rpm �8�@doxygen-latex-1.9.1-12.el9_5.x86_64.rpm ����f�	��sBBBBsecurity Moderate: gcc security update 
��	�Khttps://access.redhat.com/errata/RHSA-2025:1346 RHSA-2025:1346 RHSA-2025:1346 
https://access.redhat.com/security/cve/CVE-2020-11023 CVE-2020-11023 CVE-2020-11023 https://bugzilla.redhat.com/1850004 1850004  https://errata.almalinux.org/9/ALSA-2025-1346.html ALSA-2025:1346 ALSA-2025:1346 � �"gcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm � �"gcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm �(�"libstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm �(�"libstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpm � �"gcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm � �"gcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm �(�"libstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm �(�"libstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpm �����	��yBBBBsecurity Moderate: kernel security update 
��T�Hhttps://access.redhat.com/errata/RHSA-2025:13602 RHSA-2025:13602 RHSA-2025:13602 
https://access.redhat.com/security/cve/CVE-2025-38079 CVE-2025-38079 CVE-2025-38079 https://access.redhat.com/security/cve/CVE-2025-38292 CVE-2025-38292 CVE-2025-38292 https://bugzilla.redhat.com/2373383 2373383  https://bugzilla.redhat.com/2379219 2379219  https://errata.almalinux.org/9/ALSA-2025-13602.html ALSA-2025:13602 ALSA-2025:13602 �klibperf-5.14.0-570.33.2.el9_6.x86_64.rpm �kkernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm �kkernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm �klibperf-5.14.0-570.33.2.el9_6.x86_64.rpm �kkernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm �kkernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm ����
	��BBBBsecurity Important: kernel security update ���https://access.redhat.com/errata/RHSA-2025:13962 RHSA-2025:13962 RHSA-2025:13962 
https://access.redhat.com/security/cve/CVE-2024-28956 CVE-2024-28956 CVE-2024-28956 https://access.redhat.com/security/cve/CVE-2025-21867 CVE-2025-21867 CVE-2025-21867 https://access.redhat.com/security/cve/CVE-2025-38084 CVE-2025-38084 CVE-2025-38084 https://access.redhat.com/security/cve/CVE-2025-38085 CVE-2025-38085 CVE-2025-38085 https://access.redhat.com/security/cve/CVE-2025-38124 CVE-2025-38124 CVE-2025-38124 https://access.redhat.com/security/cve/CVE-2025-38159 CVE-2025-38159 CVE-2025-38159 https://access.redhat.com/security/cve/CVE-2025-38250 CVE-2025-38250 CVE-2025-38250 https://access.redhat.com/security/cve/CVE-2025-38380 CVE-2025-38380 CVE-2025-38380 https://access.redhat.com/security/cve/CVE-2025-38471 CVE-2025-38471 CVE-2025-38471 https://bugzilla.redhat.com/2355334 2355334  https://bugzilla.redhat.com/2366125 2366125  https://bugzilla.redhat.com/2375303 2375303  https://bugzilla.redhat.com/2375304 2375304  https://bugzilla.redhat.com/2376041 2376041  https://bugzilla.redhat.com/2376064 2376064  https://bugzilla.redhat.com/2378982 2378982  https://bugzilla.redhat.com/2383381 2383381  https://bugzilla.redhat.com/2383893 2383893  https://errata.almalinux.org/9/ALSA-2025-13962.html ALSA-2025:13962 ALSA-2025:13962 �lkernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm �lkernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm �llibperf-5.14.0-570.35.1.el9_6.x86_64.rpm �lkernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm �lkernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm �llibperf-5.14.0-570.35.1.el9_6.x86_64.rpm ��Z�	��EBBBBsecurity Important: kernel security update ��-�!https://access.redhat.com/errata/RHSA-2025:14420 RHSA-2025:14420 RHSA-2025:14420 
https://access.redhat.com/security/cve/CVE-2025-22058 CVE-2025-22058 CVE-2025-22058 https://access.redhat.com/security/cve/CVE-2025-37914 CVE-2025-37914 CVE-2025-37914 https://access.redhat.com/security/cve/CVE-2025-38417 CVE-2025-38417 CVE-2025-38417 https://bugzilla.redhat.com/2360276 2360276  https://bugzilla.redhat.com/2367500 2367500  https://bugzilla.redhat.com/2383463 2383463  https://errata.almalinux.org/9/ALSA-2025-14420.html ALSA-2025:14420 ALSA-2025:14420 �mkernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm �mkernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm �mlibperf-5.14.0-570.37.1.el9_6.x86_64.rpm �mkernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm �mkernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm �mlibperf-5.14.0-570.37.1.el9_6.x86_64.rpm ��j�	��KBBBBBBBBBBBsecurity Important: postgresql security update ��N�Nhttps://access.redhat.com/errata/RHSA-2025:14878 RHSA-2025:14878 RHSA-2025:14878 
https://access.redhat.com/security/cve/CVE-2025-8714 CVE-2025-8714 CVE-2025-8714 https://access.redhat.com/security/cve/CVE-2025-8715 CVE-2025-8715 CVE-2025-8715 https://bugzilla.redhat.com/2388551 2388551  https://bugzilla.redhat.com/2388553 2388553  https://errata.almalinux.org/9/ALSA-2025-14878.html ALSA-2025:14878 ALSA-2025:14878 ��0postgresql-static-13.22-1.el9_6.x86_64.rpm ��0postgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm �}�0postgresql-private-devel-13.22-1.el9_6.x86_64.rpm �:�0postgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpm �|�0postgresql-docs-13.22-1.el9_6.x86_64.rpm �~�0postgresql-server-devel-13.22-1.el9_6.x86_64.rpm � �0postgresql-test-13.22-1.el9_6.x86_64.rpm ��0postgresql-static-13.22-1.el9_6.x86_64.rpm ��0postgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm �}�0postgresql-private-devel-13.22-1.el9_6.x86_64.rpm �:�0postgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpm �|�0postgresql-docs-13.22-1.el9_6.x86_64.rpm �~�0postgresql-server-devel-13.22-1.el9_6.x86_64.rpm � �0postgresql-test-13.22-1.el9_6.x86_64.rpm ��Śg�	��IB�OBBBBBBBBBsecurity Moderate: python3.12 security update 
���;https://access.redhat.com/errata/RHSA-2025:15007 RHSA-2025:15007 RHSA-2025:15007 
https://access.redhat.com/security/cve/CVE-2025-8194 CVE-2025-8194 CVE-2025-8194 https://bugzilla.redhat.com/2384043 2384043  https://errata.almalinux.org/9/ALSA-2025-15007.html ALSA-2025:15007 ALSA-2025:15007 W�python3.12-test-3.12.9-1.el9_6.2.i686.rpm U�python3.12-debug-3.12.9-1.el9_6.2.i686.rpm �h�python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm W�python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm U�python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm V�python3.12-idle-3.12.9-1.el9_6.2.i686.rpm V�python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm �g�python3.12-3.12.9-1.el9_6.2.i686.rpm W�python3.12-test-3.12.9-1.el9_6.2.i686.rpm U�python3.12-debug-3.12.9-1.el9_6.2.i686.rpm �h�python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm W�python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm U�python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm V�python3.12-idle-3.12.9-1.el9_6.2.i686.rpm V�python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm �g�python3.12-3.12.9-1.el9_6.2.i686.rpm ���%�	��LB�WBBBBBBBBBsecurity Moderate: python3.11 security update 
��W�;https://access.redhat.com/errata/RHSA-2025:15010 RHSA-2025:15010 RHSA-2025:15010 
https://access.redhat.com/security/cve/CVE-2025-8194 CVE-2025-8194 CVE-2025-8194 https://bugzilla.redhat.com/2384043 2384043  https://errata.almalinux.org/9/ALSA-2025-15010.html ALSA-2025:15010 ALSA-2025:15010 zpython3.11-debug-3.11.11-2.el9_6.2.x86_64.rpm fzpython3.11-3.11.11-2.el9_6.2.i686.rpm zpython3.11-test-3.11.11-2.el9_6.2.i686.rpm zpython3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm zpython3.11-test-3.11.11-2.el9_6.2.x86_64.rpm zpython3.11-debug-3.11.11-2.el9_6.2.i686.rpm zpython3.11-idle-3.11.11-2.el9_6.2.i686.rpm gzpython3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm zpython3.11-debug-3.11.11-2.el9_6.2.x86_64.rpm fzpython3.11-3.11.11-2.el9_6.2.i686.rpm zpython3.11-test-3.11.11-2.el9_6.2.i686.rpm zpython3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm zpython3.11-test-3.11.11-2.el9_6.2.x86_64.rpm zpython3.11-debug-3.11.11-2.el9_6.2.i686.rpm zpython3.11-idle-3.11.11-2.el9_6.2.i686.rpm gzpython3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm ���!�	��nBBBBsecurity Important: kernel security update ���https://access.redhat.com/errata/RHSA-2025:15011 RHSA-2025:15011 RHSA-2025:15011 
https://bugzilla.redhat.com/2365024 2365024  https://bugzilla.redhat.com/2376392 2376392  https://bugzilla.redhat.com/2376406 2376406  https://bugzilla.redhat.com/2382054 2382054  https://bugzilla.redhat.com/2383509 2383509  https://bugzilla.redhat.com/2383513 2383513  https://bugzilla.redhat.com/2387866 2387866  https://errata.almalinux.org/9/ALSA-2025-15011.html ALSA-2025:15011 ALSA-2025:15011 https://www.redhat.com/security/data/cve/CVE-2025-37823.html CVE-2025-37823 CVE-2025-37823 https://www.redhat.com/security/data/cve/CVE-2025-38200.html CVE-2025-38200 CVE-2025-38200 https://www.redhat.com/security/data/cve/CVE-2025-38211.html CVE-2025-38211 CVE-2025-38211 https://www.redhat.com/security/data/cve/CVE-2025-38350.html CVE-2025-38350 CVE-2025-38350 https://www.redhat.com/security/data/cve/CVE-2025-38461.html CVE-2025-38461 CVE-2025-38461 https://www.redhat.com/security/data/cve/CVE-2025-38464.html CVE-2025-38464 CVE-2025-38464 https://www.redhat.com/security/data/cve/CVE-2025-38500.html CVE-2025-38500 CVE-2025-38500 https://www.redhat.com/security/data/cve/CVE-2025-38684.html CVE-2025-38684 CVE-2025-38684 �nkernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm �nkernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm �nlibperf-5.14.0-570.39.1.el9_6.x86_64.rpm �nkernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm �nkernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm �nlibperf-5.14.0-570.39.1.el9_6.x86_64.rpm ����	��tBsecurity Important: udisks2 security update ��)�https://access.redhat.com/errata/RHSA-2025:15018 RHSA-2025:15018 RHSA-2025:15018 
https://access.redhat.com/security/cve/CVE-2025-8067 CVE-2025-8067 CVE-2025-8067 https://bugzilla.redhat.com/2388623 2388623  https://errata.almalinux.org/9/ALSA-2025-15018.html ALSA-2025:15018 ALSA-2025:15018 �*�libudisks2-devel-2.9.4-11.el9_6.1.i686.rpm �*�libudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm �*�libudisks2-devel-2.9.4-11.el9_6.1.i686.rpm �*�libudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm ���W�	��Q�R�VBBBBBBBBBsecurity Moderate: python3.9 security update 
��?�;https://access.redhat.com/errata/RHSA-2025:15019 RHSA-2025:15019 RHSA-2025:15019 
https://access.redhat.com/security/cve/CVE-2025-8194 CVE-2025-8194 CVE-2025-8194 https://bugzilla.redhat.com/2384043 2384043  https://errata.almalinux.org/9/ALSA-2025-15019.html ALSA-2025:15019 ALSA-2025:15019 � python3-debug-3.9.21-2.el9_6.2.i686.rpm � python3-idle-3.9.21-2.el9_6.2.x86_64.rpm Z� python3-tkinter-3.9.21-2.el9_6.2.i686.rpm � python3-debug-3.9.21-2.el9_6.2.x86_64.rpm � python3-idle-3.9.21-2.el9_6.2.i686.rpm Y� python3-3.9.21-2.el9_6.2.i686.rpm � python3-test-3.9.21-2.el9_6.2.x86_64.rpm � python3-test-3.9.21-2.el9_6.2.i686.rpm � python3-debug-3.9.21-2.el9_6.2.i686.rpm � python3-idle-3.9.21-2.el9_6.2.x86_64.rpm Z� python3-tkinter-3.9.21-2.el9_6.2.i686.rpm � python3-debug-3.9.21-2.el9_6.2.x86_64.rpm � python3-idle-3.9.21-2.el9_6.2.i686.rpm Y� python3-3.9.21-2.el9_6.2.i686.rpm � python3-test-3.9.21-2.el9_6.2.x86_64.rpm � python3-test-3.9.21-2.el9_6.2.i686.rpm ����	��BBBBBsecurity Important: kernel security update ��z�Whttps://access.redhat.com/errata/RHSA-2025:15429 RHSA-2025:15429 RHSA-2025:15429 
https://access.redhat.com/security/cve/CVE-2025-37803 CVE-2025-37803 CVE-2025-37803 https://access.redhat.com/security/cve/CVE-2025-38392 CVE-2025-38392 CVE-2025-38392 https://bugzilla.redhat.com/2365013 2365013  https://bugzilla.redhat.com/2383407 2383407  https://errata.almalinux.org/9/ALSA-2025-15429.html ALSA-2025:15429 ALSA-2025:15429 �okernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm �okernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm �olibperf-5.14.0-570.41.1.el9_6.x86_64.rpm �okernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm �okernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm �olibperf-5.14.0-570.41.1.el9_6.x86_64.rpm �Ɵ��	��HBBBBsecurity Important: kernel security update ��Q�
https://access.redhat.com/errata/RHSA-2025:15661 RHSA-2025:15661 RHSA-2025:15661 
https://access.redhat.com/security/cve/CVE-2025-22097 CVE-2025-22097 CVE-2025-22097 https://access.redhat.com/security/cve/CVE-2025-38332 CVE-2025-38332 CVE-2025-38332 https://access.redhat.com/security/cve/CVE-2025-38352 CVE-2025-38352 CVE-2025-38352 https://access.redhat.com/security/cve/CVE-2025-38449 CVE-2025-38449 CVE-2025-38449 https://bugzilla.redhat.com/2360223 2360223  https://bugzilla.redhat.com/2379246 2379246  https://bugzilla.redhat.com/2382581 2382581  https://bugzilla.redhat.com/2383519 2383519  https://errata.almalinux.org/9/ALSA-2025-15661.html ALSA-2025:15661 ALSA-2025:15661 �pkernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm �pkernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm �plibperf-5.14.0-570.42.2.el9_6.x86_64.rpm �pkernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm �pkernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm �plibperf-5.14.0-570.42.2.el9_6.x86_64.rpm �Ƥ�G�	��NBBBBsecurity Moderate: kernel security update 
��k� https://access.redhat.com/errata/RHSA-2025:15740 RHSA-2025:15740 RHSA-2025:15740 
https://access.redhat.com/security/cve/CVE-2025-38550 CVE-2025-38550 CVE-2025-38550 https://bugzilla.redhat.com/2388941 2388941  https://errata.almalinux.org/9/ALSA-2025-15740.html ALSA-2025:15740 ALSA-2025:15740 �qlibperf-5.14.0-570.44.1.el9_6.x86_64.rpm �qkernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm �qkernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm �qlibperf-5.14.0-570.44.1.el9_6.x86_64.rpm �qkernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm �qkernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm ��ԃ�	��VB�~BBsecurity Moderate: mysql security update 
��k�hhttps://access.redhat.com/errata/RHSA-2025:16086 RHSA-2025:16086 RHSA-2025:16086 
https://access.redhat.com/security/cve/CVE-2025-21574 CVE-2025-21574 CVE-2025-21574 https://access.redhat.com/security/cve/CVE-2025-21575 CVE-2025-21575 CVE-2025-21575 https://access.redhat.com/security/cve/CVE-2025-21577 CVE-2025-21577 CVE-2025-21577 https://access.redhat.com/security/cve/CVE-2025-21579 CVE-2025-21579 CVE-2025-21579 https://access.redhat.com/security/cve/CVE-2025-21580 CVE-2025-21580 CVE-2025-21580 https://access.redhat.com/security/cve/CVE-2025-21581 CVE-2025-21581 CVE-2025-21581 https://access.redhat.com/security/cve/CVE-2025-21584 CVE-2025-21584 CVE-2025-21584 https://access.redhat.com/security/cve/CVE-2025-21585 CVE-2025-21585 CVE-2025-21585 https://access.redhat.com/security/cve/CVE-2025-30681 CVE-2025-30681 CVE-2025-30681 https://access.redhat.com/security/cve/CVE-2025-30682 CVE-2025-30682 CVE-2025-30682 https://access.redhat.com/security/cve/CVE-2025-30683 CVE-2025-30683 CVE-2025-30683 https://access.redhat.com/security/cve/CVE-2025-30684 CVE-2025-30684 CVE-2025-30684 https://access.redhat.com/security/cve/CVE-2025-30685 CVE-2025-30685 CVE-2025-30685 https://access.redhat.com/security/cve/CVE-2025-30687 CVE-2025-30687 CVE-2025-30687 https://access.redhat.com/security/cve/CVE-2025-30688 CVE-2025-30688 CVE-2025-30688 https://access.redhat.com/security/cve/CVE-2025-30689 CVE-2025-30689 CVE-2025-30689 https://access.redhat.com/security/cve/CVE-2025-30693 CVE-2025-30693 CVE-2025-30693 https://access.redhat.com/security/cve/CVE-2025-30695 CVE-2025-30695 CVE-2025-30695 https://access.redhat.com/security/cve/CVE-2025-30696 CVE-2025-30696 CVE-2025-30696 https://access.redhat.com/security/cve/CVE-2025-30699 CVE-2025-30699 CVE-2025-30699 https://access.redhat.com/security/cve/CVE-2025-30703 CVE-2025-30703 CVE-2025-30703 https://access.redhat.com/security/cve/CVE-2025-30704 CVE-2025-30704 CVE-2025-30704 https://access.redhat.com/security/cve/CVE-2025-30705 CVE-2025-30705 CVE-2025-30705 https://access.redhat.com/security/cve/CVE-2025-30715 CVE-2025-30715 CVE-2025-30715 https://access.redhat.com/security/cve/CVE-2025-30721 CVE-2025-30721 CVE-2025-30721 https://access.redhat.com/security/cve/CVE-2025-30722 CVE-2025-30722 CVE-2025-30722 https://access.redhat.com/security/cve/CVE-2025-50077 CVE-2025-50077 CVE-2025-50077 https://access.redhat.com/security/cve/CVE-2025-50078 CVE-2025-50078 CVE-2025-50078 https://access.redhat.com/security/cve/CVE-2025-50079 CVE-2025-50079 CVE-2025-50079 https://access.redhat.com/security/cve/CVE-2025-50080 CVE-2025-50080 CVE-2025-50080 https://access.redhat.com/security/cve/CVE-2025-50081 CVE-2025-50081 CVE-2025-50081 https://access.redhat.com/security/cve/CVE-2025-50082 CVE-2025-50082 CVE-2025-50082 https://access.redhat.com/security/cve/CVE-2025-50083 CVE-2025-50083 CVE-2025-50083 https://access.redhat.com/security/cve/CVE-2025-50084 CVE-2025-50084 CVE-2025-50084 https://access.redhat.com/security/cve/CVE-2025-50085 CVE-2025-50085 CVE-2025-50085 https://access.redhat.com/security/cve/CVE-2025-50086 CVE-2025-50086 CVE-2025-50086 https://access.redhat.com/security/cve/CVE-2025-50087 CVE-2025-50087 CVE-2025-50087 https://access.redhat.com/security/cve/CVE-2025-50088 CVE-2025-50088 CVE-2025-50088 https://access.redhat.com/security/cve/CVE-2025-50091 CVE-2025-50091 CVE-2025-50091 https://access.redhat.com/security/cve/CVE-2025-50092 CVE-2025-50092 CVE-2025-50092 https://access.redhat.com/security/cve/CVE-2025-50093 CVE-2025-50093 CVE-2025-50093 https://access.redhat.com/security/cve/CVE-2025-50094 CVE-2025-50094 CVE-2025-50094 https://access.redhat.com/security/cve/CVE-2025-50096 CVE-2025-50096 CVE-2025-50096 https://access.redhat.com/security/cve/CVE-2025-50097 CVE-2025-50097 CVE-2025-50097 https://access.redhat.com/security/cve/CVE-2025-50098 CVE-2025-50098 CVE-2025-50098 https://access.redhat.com/security/cve/CVE-2025-50099 CVE-2025-50099 CVE-2025-50099 https://access.redhat.com/security/cve/CVE-2025-50100 CVE-2025-50100 CVE-2025-50100 https://access.redhat.com/security/cve/CVE-2025-50101 CVE-2025-50101 CVE-2025-50101 https://access.redhat.com/security/cve/CVE-2025-50102 CVE-2025-50102 CVE-2025-50102 https://access.redhat.com/security/cve/CVE-2025-50104 CVE-2025-50104 CVE-2025-50104 https://access.redhat.com/security/cve/CVE-2025-53023 CVE-2025-53023 CVE-2025-53023 https://bugzilla.redhat.com/2359885 2359885  https://bugzilla.redhat.com/2359888 2359888  https://bugzilla.redhat.com/2359892 2359892  https://bugzilla.redhat.com/2359894 2359894  https://bugzilla.redhat.com/2359895 2359895  https://bugzilla.redhat.com/2359899 2359899  https://bugzilla.redhat.com/2359900 2359900  https://bugzilla.redhat.com/2359902 2359902  https://bugzilla.redhat.com/2359903 2359903  https://bugzilla.redhat.com/2359918 2359918  https://bugzilla.redhat.com/2359920 2359920  https://bugzilla.redhat.com/2359924 2359924  https://bugzilla.redhat.com/2359928 2359928  https://bugzilla.redhat.com/2359930 2359930  https://bugzilla.redhat.com/2359932 2359932  https://bugzilla.redhat.com/2359934 2359934  https://bugzilla.redhat.com/2359938 2359938  https://bugzilla.redhat.com/2359940 2359940  https://bugzilla.redhat.com/2359943 2359943  https://bugzilla.redhat.com/2359944 2359944  https://bugzilla.redhat.com/2359945 2359945  https://bugzilla.redhat.com/2359947 2359947  https://bugzilla.redhat.com/2359950 2359950  https://bugzilla.redhat.com/2359963 2359963  https://bugzilla.redhat.com/2359964 2359964  https://bugzilla.redhat.com/2359972 2359972  https://bugzilla.redhat.com/2380264 2380264  https://bugzilla.redhat.com/2380273 2380273  https://bugzilla.redhat.com/2380274 2380274  https://bugzilla.redhat.com/2380278 2380278  https://bugzilla.redhat.com/2380280 2380280  https://bugzilla.redhat.com/2380283 2380283  https://bugzilla.redhat.com/2380284 2380284  https://bugzilla.redhat.com/2380290 2380290  https://bugzilla.redhat.com/2380291 2380291  https://bugzilla.redhat.com/2380295 2380295  https://bugzilla.redhat.com/2380298 2380298  https://bugzilla.redhat.com/2380306 2380306  https://bugzilla.redhat.com/2380308 2380308  https://bugzilla.redhat.com/2380309 2380309  https://bugzilla.redhat.com/2380310 2380310  https://bugzilla.redhat.com/2380311 2380311  https://bugzilla.redhat.com/2380312 2380312  https://bugzilla.redhat.com/2380313 2380313  https://bugzilla.redhat.com/2380320 2380320  https://bugzilla.redhat.com/2380321 2380321  https://bugzilla.redhat.com/2380322 2380322  https://bugzilla.redhat.com/2380326 2380326  https://bugzilla.redhat.com/2380327 2380327  https://bugzilla.redhat.com/2380334 2380334  https://bugzilla.redhat.com/2380335 2380335  https://errata.almalinux.org/9/ALSA-2025-16086.html ALSA-2025:16086 ALSA-2025:16086 ��{mysql-devel-8.0.43-1.el9_6.x86_64.rpm ��{mysql-libs-8.0.43-1.el9_6.x86_64.rpm ��{mysql-test-8.0.43-1.el9_6.x86_64.rpm ��{mysql-devel-8.0.43-1.el9_6.x86_64.rpm ��{mysql-libs-8.0.43-1.el9_6.x86_64.rpm ��{mysql-test-8.0.43-1.el9_6.x86_64.rpm ���o�	��XBBBBsecurity Moderate: kernel security update 
��q�
https://access.redhat.com/errata/RHSA-2025:16398 RHSA-2025:16398 RHSA-2025:16398 
https://access.redhat.com/security/cve/CVE-2023-53125 CVE-2023-53125 CVE-2023-53125 https://access.redhat.com/security/cve/CVE-2025-37810 CVE-2025-37810 CVE-2025-37810 https://access.redhat.com/security/cve/CVE-2025-38498 CVE-2025-38498 CVE-2025-38498 https://access.redhat.com/security/cve/CVE-2025-39694 CVE-2025-39694 CVE-2025-39694 https://bugzilla.redhat.com/2363686 2363686  https://bugzilla.redhat.com/2365028 2365028  https://bugzilla.redhat.com/2384422 2384422  https://bugzilla.redhat.com/2393534 2393534  https://errata.almalinux.org/9/ALSA-2025-16398.html ALSA-2025:16398 ALSA-2025:16398 �rlibperf-5.14.0-570.46.1.el9_6.x86_64.rpm �rkernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm �rkernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm �rlibperf-5.14.0-570.46.1.el9_6.x86_64.rpm �rkernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm �rkernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm ���^�	��^BBBBsecurity Moderate: kernel security update 
��x�https://access.redhat.com/errata/RHSA-2025:1659 RHSA-2025:1659 RHSA-2025:1659 
https://access.redhat.com/security/cve/CVE-2023-52490 CVE-2023-52490 CVE-2023-52490 https://bugzilla.redhat.com/2269187 2269187  https://errata.almalinux.org/9/ALSA-2025-1659.html ALSA-2025:1659 ALSA-2025:1659 �[kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm �[libperf-5.14.0-503.26.1.el9_5.x86_64.rpm �[kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm �[kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm �[libperf-5.14.0-503.26.1.el9_5.x86_64.rpm �[kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm ����5�	��[�JBBBsecurity Important: bind9.18 security update ��	�rhttps://access.redhat.com/errata/RHSA-2025:1670 RHSA-2025:1670 RHSA-2025:1670 
https://access.redhat.com/security/cve/CVE-2024-11187 CVE-2024-11187 CVE-2024-11187 https://access.redhat.com/security/cve/CVE-2024-12705 CVE-2024-12705 CVE-2024-12705 https://bugzilla.redhat.com/2342879 2342879  https://bugzilla.redhat.com/2342880 2342880  https://errata.almalinux.org/9/ALSA-2025-1670.html ALSA-2025:1670 ALSA-2025:1670 ��1bind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpm ��1bind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm ��1bind9.18-devel-9.18.29-1.el9_5.1.i686.rpm �,�1bind9.18-libs-9.18.29-1.el9_5.1.i686.rpm ��1bind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpm ��1bind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm ��1bind9.18-devel-9.18.29-1.el9_5.1.i686.rpm �,�1bind9.18-libs-9.18.29-1.el9_5.1.i686.rpm ���3�	��iBBBBsecurity Important: mysql security update ��{�*dhttps://access.redhat.com/errata/RHSA-2025:1671 RHSA-2025:1671 RHSA-2025:1671 
https://access.redhat.com/security/cve/CVE-2024-11053 CVE-2024-11053 CVE-2024-11053 https://access.redhat.com/security/cve/CVE-2024-21193 CVE-2024-21193 CVE-2024-21193 https://access.redhat.com/security/cve/CVE-2024-21194 CVE-2024-21194 CVE-2024-21194 https://access.redhat.com/security/cve/CVE-2024-21196 CVE-2024-21196 CVE-2024-21196 https://access.redhat.com/security/cve/CVE-2024-21197 CVE-2024-21197 CVE-2024-21197 https://access.redhat.com/security/cve/CVE-2024-21198 CVE-2024-21198 CVE-2024-21198 https://access.redhat.com/security/cve/CVE-2024-21199 CVE-2024-21199 CVE-2024-21199 https://access.redhat.com/security/cve/CVE-2024-21201 CVE-2024-21201 CVE-2024-21201 https://access.redhat.com/security/cve/CVE-2024-21203 CVE-2024-21203 CVE-2024-21203 https://access.redhat.com/security/cve/CVE-2024-21212 CVE-2024-21212 CVE-2024-21212 https://access.redhat.com/security/cve/CVE-2024-21213 CVE-2024-21213 CVE-2024-21213 https://access.redhat.com/security/cve/CVE-2024-21218 CVE-2024-21218 CVE-2024-21218 https://access.redhat.com/security/cve/CVE-2024-21219 CVE-2024-21219 CVE-2024-21219 https://access.redhat.com/security/cve/CVE-2024-21230 CVE-2024-21230 CVE-2024-21230 https://access.redhat.com/security/cve/CVE-2024-21231 CVE-2024-21231 CVE-2024-21231 https://access.redhat.com/security/cve/CVE-2024-21236 CVE-2024-21236 CVE-2024-21236 https://access.redhat.com/security/cve/CVE-2024-21237 CVE-2024-21237 CVE-2024-21237 https://access.redhat.com/security/cve/CVE-2024-21238 CVE-2024-21238 CVE-2024-21238 https://access.redhat.com/security/cve/CVE-2024-21239 CVE-2024-21239 CVE-2024-21239 https://access.redhat.com/security/cve/CVE-2024-21241 CVE-2024-21241 CVE-2024-21241 https://access.redhat.com/security/cve/CVE-2024-21247 CVE-2024-21247 CVE-2024-21247 https://access.redhat.com/security/cve/CVE-2024-37371 CVE-2024-37371 CVE-2024-37371 https://access.redhat.com/security/cve/CVE-2024-5535 CVE-2024-5535 CVE-2024-5535 https://access.redhat.com/security/cve/CVE-2024-7264 CVE-2024-7264 CVE-2024-7264 https://access.redhat.com/security/cve/CVE-2025-21490 CVE-2025-21490 CVE-2025-21490 https://access.redhat.com/security/cve/CVE-2025-21491 CVE-2025-21491 CVE-2025-21491 https://access.redhat.com/security/cve/CVE-2025-21494 CVE-2025-21494 CVE-2025-21494 https://access.redhat.com/security/cve/CVE-2025-21497 CVE-2025-21497 CVE-2025-21497 https://access.redhat.com/security/cve/CVE-2025-21500 CVE-2025-21500 CVE-2025-21500 https://access.redhat.com/security/cve/CVE-2025-21501 CVE-2025-21501 CVE-2025-21501 https://access.redhat.com/security/cve/CVE-2025-21503 CVE-2025-21503 CVE-2025-21503 https://access.redhat.com/security/cve/CVE-2025-21504 CVE-2025-21504 CVE-2025-21504 https://access.redhat.com/security/cve/CVE-2025-21505 CVE-2025-21505 CVE-2025-21505 https://access.redhat.com/security/cve/CVE-2025-21518 CVE-2025-21518 CVE-2025-21518 https://access.redhat.com/security/cve/CVE-2025-21519 CVE-2025-21519 CVE-2025-21519 https://access.redhat.com/security/cve/CVE-2025-21520 CVE-2025-21520 CVE-2025-21520 https://access.redhat.com/security/cve/CVE-2025-21521 CVE-2025-21521 CVE-2025-21521 https://access.redhat.com/security/cve/CVE-2025-21522 CVE-2025-21522 CVE-2025-21522 https://access.redhat.com/security/cve/CVE-2025-21523 CVE-2025-21523 CVE-2025-21523 https://access.redhat.com/security/cve/CVE-2025-21525 CVE-2025-21525 CVE-2025-21525 https://access.redhat.com/security/cve/CVE-2025-21529 CVE-2025-21529 CVE-2025-21529 https://access.redhat.com/security/cve/CVE-2025-21531 CVE-2025-21531 CVE-2025-21531 https://access.redhat.com/security/cve/CVE-2025-21534 CVE-2025-21534 CVE-2025-21534 https://access.redhat.com/security/cve/CVE-2025-21536 CVE-2025-21536 CVE-2025-21536 https://access.redhat.com/security/cve/CVE-2025-21540 CVE-2025-21540 CVE-2025-21540 https://access.redhat.com/security/cve/CVE-2025-21543 CVE-2025-21543 CVE-2025-21543 https://access.redhat.com/security/cve/CVE-2025-21546 CVE-2025-21546 CVE-2025-21546 https://access.redhat.com/security/cve/CVE-2025-21555 CVE-2025-21555 CVE-2025-21555 https://access.redhat.com/security/cve/CVE-2025-21559 CVE-2025-21559 CVE-2025-21559 https://bugzilla.redhat.com/2294581 2294581  https://bugzilla.redhat.com/2294676 2294676  https://bugzilla.redhat.com/2301888 2301888  https://bugzilla.redhat.com/2318857 2318857  https://bugzilla.redhat.com/2318858 2318858  https://bugzilla.redhat.com/2318870 2318870  https://bugzilla.redhat.com/2318873 2318873  https://bugzilla.redhat.com/2318874 2318874  https://bugzilla.redhat.com/2318876 2318876  https://bugzilla.redhat.com/2318882 2318882  https://bugzilla.redhat.com/2318883 2318883  https://bugzilla.redhat.com/2318884 2318884  https://bugzilla.redhat.com/2318885 2318885  https://bugzilla.redhat.com/2318886 2318886  https://bugzilla.redhat.com/2318897 2318897  https://bugzilla.redhat.com/2318900 2318900  https://bugzilla.redhat.com/2318905 2318905  https://bugzilla.redhat.com/2318914 2318914  https://bugzilla.redhat.com/2318922 2318922  https://bugzilla.redhat.com/2318923 2318923  https://bugzilla.redhat.com/2318925 2318925  https://bugzilla.redhat.com/2318926 2318926  https://bugzilla.redhat.com/2318927 2318927  https://bugzilla.redhat.com/2331191 2331191  https://bugzilla.redhat.com/2339218 2339218  https://bugzilla.redhat.com/2339220 2339220  https://bugzilla.redhat.com/2339221 2339221  https://bugzilla.redhat.com/2339226 2339226  https://bugzilla.redhat.com/2339231 2339231  https://bugzilla.redhat.com/2339236 2339236  https://bugzilla.redhat.com/2339238 2339238  https://bugzilla.redhat.com/2339243 2339243  https://bugzilla.redhat.com/2339247 2339247  https://bugzilla.redhat.com/2339252 2339252  https://bugzilla.redhat.com/2339259 2339259  https://bugzilla.redhat.com/2339266 2339266  https://bugzilla.redhat.com/2339270 2339270  https://bugzilla.redhat.com/2339271 2339271  https://bugzilla.redhat.com/2339275 2339275  https://bugzilla.redhat.com/2339277 2339277  https://bugzilla.redhat.com/2339281 2339281  https://bugzilla.redhat.com/2339284 2339284  https://bugzilla.redhat.com/2339291 2339291  https://bugzilla.redhat.com/2339293 2339293  https://bugzilla.redhat.com/2339295 2339295  https://bugzilla.redhat.com/2339299 2339299  https://bugzilla.redhat.com/2339300 2339300  https://bugzilla.redhat.com/2339304 2339304  https://bugzilla.redhat.com/2339305 2339305  https://errata.almalinux.org/9/ALSA-2025-1671.html ALSA-2025:1671 ALSA-2025:1671 ��zmysql-devel-8.0.41-2.el9_5.x86_64.rpm ��zmysql-libs-8.0.41-2.el9_5.x86_64.rpm ��zmysql-test-8.0.41-2.el9_5.x86_64.rpm ��zmysql-devel-8.0.41-2.el9_5.x86_64.rpm ��zmysql-libs-8.0.41-2.el9_5.x86_64.rpm ��zmysql-test-8.0.41-2.el9_5.x86_64.rpm ��݄c�	��^�RBBBsecurity Important: bind security update ��%�Xhttps://access.redhat.com/errata/RHSA-2025:1681 RHSA-2025:1681 RHSA-2025:1681 
https://access.redhat.com/security/cve/CVE-2024-11187 CVE-2024-11187 CVE-2024-11187 https://bugzilla.redhat.com/2342879 2342879  https://errata.almalinux.org/9/ALSA-2025-1681.html ALSA-2025:1681 ALSA-2025:1681 �?�/bind-doc-9.16.23-24.el9_5.3.noarch.rpm [�/bind-devel-9.16.23-24.el9_5.3.i686.rpm [�/bind-devel-9.16.23-24.el9_5.3.x86_64.rpm �X�/bind-libs-9.16.23-24.el9_5.3.i686.rpm �?�/bind-doc-9.16.23-24.el9_5.3.noarch.rpm [�/bind-devel-9.16.23-24.el9_5.3.i686.rpm [�/bind-devel-9.16.23-24.el9_5.3.x86_64.rpm �X�/bind-libs-9.16.23-24.el9_5.3.i686.rpm ��ܴ�	� �tBBBBsecurity Moderate: kernel security update 
��}�ihttps://access.redhat.com/errata/RHSA-2025:16880 RHSA-2025:16880 RHSA-2025:16880 
https://access.redhat.com/security/cve/CVE-2025-38472 CVE-2025-38472 CVE-2025-38472 https://access.redhat.com/security/cve/CVE-2025-38527 CVE-2025-38527 CVE-2025-38527 https://access.redhat.com/security/cve/CVE-2025-38718 CVE-2025-38718 CVE-2025-38718 https://access.redhat.com/security/cve/CVE-2025-39682 CVE-2025-39682 CVE-2025-39682 https://access.redhat.com/security/cve/CVE-2025-39698 CVE-2025-39698 CVE-2025-39698 https://bugzilla.redhat.com/2383916 2383916  https://bugzilla.redhat.com/2388928 2388928  https://bugzilla.redhat.com/2393166 2393166  https://bugzilla.redhat.com/2393511 2393511  https://bugzilla.redhat.com/2393519 2393519  https://errata.almalinux.org/9/ALSA-2025-16880.html ALSA-2025:16880 ALSA-2025:16880 �skernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm �slibperf-5.14.0-570.49.1.el9_6.x86_64.rpm �skernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpm �skernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm �slibperf-5.14.0-570.49.1.el9_6.x86_64.rpm �skernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpm ����h�	�!�:security Important: ipa security update ��f�ghttps://access.redhat.com/errata/RHSA-2025:17084 RHSA-2025:17084 RHSA-2025:17084 
https://access.redhat.com/security/cve/CVE-2025-7493 CVE-2025-7493 CVE-2025-7493 https://bugzilla.redhat.com/2389448 2389448  https://errata.almalinux.org/9/ALSA-2025-17084.html ALSA-2025:17084 ALSA-2025:17084 ��python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm ��python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm ���8� 	�=�{security Moderate: perl-JSON-XS security update 
��M�shttps://access.redhat.com/errata/RHSA-2025:17162 RHSA-2025:17162 RHSA-2025:17162 
https://access.redhat.com/security/cve/CVE-2025-40928 CVE-2025-40928 CVE-2025-40928 https://bugzilla.redhat.com/2393878 2393878  https://errata.almalinux.org/9/ALSA-2025-17162.html ALSA-2025:17162 ALSA-2025:17162 �{�hperl-JSON-XS-4.04-1.el9_6.x86_64.rpm �{�hperl-JSON-XS-4.04-1.el9_6.x86_64.rpm �����!	�"�~BBBBsecurity Moderate: kernel security update 
��@�Fhttps://access.redhat.com/errata/RHSA-2025:17377 RHSA-2025:17377 RHSA-2025:17377 
https://access.redhat.com/security/cve/CVE-2024-50301 CVE-2024-50301 CVE-2024-50301 https://access.redhat.com/security/cve/CVE-2025-38351 CVE-2025-38351 CVE-2025-38351 https://access.redhat.com/security/cve/CVE-2025-39761 CVE-2025-39761 CVE-2025-39761 https://bugzilla.redhat.com/2327188 2327188  https://bugzilla.redhat.com/2382059 2382059  https://bugzilla.redhat.com/2394606 2394606  https://errata.almalinux.org/9/ALSA-2025-17377.html ALSA-2025:17377 ALSA-2025:17377 �tkernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm �tkernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm �tlibperf-5.14.0-570.51.1.el9_6.x86_64.rpm �tkernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm �tkernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm �tlibperf-5.14.0-570.51.1.el9_6.x86_64.rpm �ǝ�=�"	�#�DBBBBBBBBBBBsecurity Important: postgresql security update ���'https://access.redhat.com/errata/RHSA-2025:1742 RHSA-2025:1742 RHSA-2025:1742 
https://access.redhat.com/security/cve/CVE-2025-1094 CVE-2025-1094 CVE-2025-1094 https://bugzilla.redhat.com/2345548 2345548  https://errata.almalinux.org/9/ALSA-2025-1742.html ALSA-2025:1742 ALSA-2025:1742 �~�/postgresql-server-devel-13.20-1.el9_5.x86_64.rpm �:�/postgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm �}�/postgresql-private-devel-13.20-1.el9_5.x86_64.rpm � �/postgresql-test-13.20-1.el9_5.x86_64.rpm ��/postgresql-static-13.20-1.el9_5.x86_64.rpm �|�/postgresql-docs-13.20-1.el9_5.x86_64.rpm ��/postgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpm �~�/postgresql-server-devel-13.20-1.el9_5.x86_64.rpm �:�/postgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm �}�/postgresql-private-devel-13.20-1.el9_5.x86_64.rpm � �/postgresql-test-13.20-1.el9_5.x86_64.rpm ��/postgresql-static-13.20-1.el9_5.x86_64.rpm �|�/postgresql-docs-13.20-1.el9_5.x86_64.rpm ��/postgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpm ���s�#	�$�QBBBBsecurity Moderate: kernel security update 
��-�d
https://access.redhat.com/errata/RHSA-2025:17760 RHSA-2025:17760 RHSA-2025:17760 
https://access.redhat.com/security/cve/CVE-2023-53373 CVE-2023-53373 CVE-2023-53373 https://access.redhat.com/security/cve/CVE-2025-38556 CVE-2025-38556 CVE-2025-38556 https://access.redhat.com/security/cve/CVE-2025-38614 CVE-2025-38614 CVE-2025-38614 https://access.redhat.com/security/cve/CVE-2025-39757 CVE-2025-39757 CVE-2025-39757 https://bugzilla.redhat.com/2389456 2389456  https://bugzilla.redhat.com/2389491 2389491  https://bugzilla.redhat.com/2394615 2394615  https://bugzilla.redhat.com/2396379 2396379  https://errata.almalinux.org/9/ALSA-2025-17760.html ALSA-2025:17760 ALSA-2025:17760 �ukernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm �ulibperf-5.14.0-570.52.1.el9_6.x86_64.rpm �ukernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm �ukernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm �ulibperf-5.14.0-570.52.1.el9_6.x86_64.rpm �ukernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm ��¿�$	�%�Wsecurity Important: .NET 8.0 security update ���Mhttps://access.redhat.com/errata/RHSA-2025:18149 RHSA-2025:18149 RHSA-2025:18149 
https://access.redhat.com/security/cve/CVE-2025-55247 CVE-2025-55247 CVE-2025-55247 https://access.redhat.com/security/cve/CVE-2025-55248 CVE-2025-55248 CVE-2025-55248 https://access.redhat.com/security/cve/CVE-2025-55315 CVE-2025-55315 CVE-2025-55315 https://bugzilla.redhat.com/2403083 2403083  https://bugzilla.redhat.com/2403085 2403085  https://bugzilla.redhat.com/2403086 2403086  https://errata.almalinux.org/9/ALSA-2025-18149.html ALSA-2025:18149 ALSA-2025:18149 �6�#dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm �6�#dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm ����\�%	�&�YBBBBsecurity Moderate: kernel security update 
��^�https://access.redhat.com/errata/RHSA-2025:18281 RHSA-2025:18281 RHSA-2025:18281 
https://access.redhat.com/security/cve/CVE-2022-50087 CVE-2022-50087 CVE-2022-50087 https://access.redhat.com/security/cve/CVE-2025-22026 CVE-2025-22026 CVE-2025-22026 https://access.redhat.com/security/cve/CVE-2025-38566 CVE-2025-38566 CVE-2025-38566 https://access.redhat.com/security/cve/CVE-2025-38571 CVE-2025-38571 CVE-2025-38571 https://access.redhat.com/security/cve/CVE-2025-39817 CVE-2025-39817 CVE-2025-39817 https://access.redhat.com/security/cve/CVE-2025-39841 CVE-2025-39841 CVE-2025-39841 https://access.redhat.com/security/cve/CVE-2025-39849 CVE-2025-39849 CVE-2025-39849 https://bugzilla.redhat.com/2360224 2360224  https://bugzilla.redhat.com/2373539 2373539  https://bugzilla.redhat.com/2389480 2389480  https://bugzilla.redhat.com/2389487 2389487  https://bugzilla.redhat.com/2395805 2395805  https://bugzilla.redhat.com/2396928 2396928  https://bugzilla.redhat.com/2396944 2396944  https://errata.almalinux.org/9/ALSA-2025-18281.html ALSA-2025:18281 ALSA-2025:18281 �vkernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm �vkernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm �vlibperf-5.14.0-570.55.1.el9_6.x86_64.rpm �vkernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm �vkernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm �vlibperf-5.14.0-570.55.1.el9_6.x86_64.rpm ����c�&	�'�_BBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update 
��s�\https://access.redhat.com/errata/RHSA-2025:18815 RHSA-2025:18815 RHSA-2025:18815 
https://access.redhat.com/security/cve/CVE-2025-53057 CVE-2025-53057 CVE-2025-53057 https://access.redhat.com/security/cve/CVE-2025-53066 CVE-2025-53066 CVE-2025-53066 https://errata.almalinux.org/9/ALSA-2025-18815.html ALSA-2025:18815 ALSA-2025:18815 
�(Tjava-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �&Tjava-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �+Tjava-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �$Tjava-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �,Tjava-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �%Tjava-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �)Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �*Tjava-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �'Tjava-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �-Tjava-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm 
�(Tjava-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �&Tjava-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �+Tjava-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �$Tjava-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �,Tjava-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �%Tjava-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �)Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �*Tjava-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �'Tjava-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �-Tjava-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �ȍ�I�'	�(�sBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update 
��O�https://access.redhat.com/errata/RHSA-2025:18821 RHSA-2025:18821 RHSA-2025:18821 
https://access.redhat.com/security/cve/CVE-2025-53057 CVE-2025-53057 CVE-2025-53057 https://access.redhat.com/security/cve/CVE-2025-53066 CVE-2025-53066 CVE-2025-53066 https://errata.almalinux.org/9/ALSA-2025-18821.html ALSA-2025:18821 ALSA-2025:18821 n1java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm v1java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm s1java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm j1java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm m1java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm q1java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm o1java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm w1java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm u1java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm t1java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm r1java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm l1java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm p1java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm k1java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm n1java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm v1java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm s1java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm j1java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm m1java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm q1java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm o1java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm w1java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm u1java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm t1java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm r1java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm l1java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm p1java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm k1java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm �Ȍ�l�(	�)�OBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update 
��T�lhttps://access.redhat.com/errata/RHSA-2025:18824 RHSA-2025:18824 RHSA-2025:18824 
https://access.redhat.com/security/cve/CVE-2025-53057 CVE-2025-53057 CVE-2025-53057 https://access.redhat.com/security/cve/CVE-2025-53066 CVE-2025-53066 CVE-2025-53066 https://access.redhat.com/security/cve/CVE-2025-61748 CVE-2025-61748 CVE-2025-61748 https://errata.almalinux.org/9/ALSA-2025-18824.html ALSA-2025:18824 ALSA-2025:18824 �`?java-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �Y?java-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �_?java-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �d?java-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �c?java-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �f?java-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �Z?java-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �[?java-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �^?java-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �\?java-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �e?java-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �]?java-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �a?java-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �b?java-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �`?java-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �Y?java-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �_?java-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �d?java-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �c?java-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �f?java-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �Z?java-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �[?java-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �^?java-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �\?java-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �e?java-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �]?java-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �a?java-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �b?java-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �Ȍ�W�)	�*�ksecurity Important: libtiff security update ��@�<https://access.redhat.com/errata/RHSA-2025:19113 RHSA-2025:19113 RHSA-2025:19113 
https://access.redhat.com/security/cve/CVE-2025-8176 CVE-2025-8176 CVE-2025-8176 https://access.redhat.com/security/cve/CVE-2025-9900 CVE-2025-9900 CVE-2025-9900 https://bugzilla.redhat.com/2383598 2383598  https://bugzilla.redhat.com/2392784 2392784  https://errata.almalinux.org/9/ALSA-2025-19113.html ALSA-2025:19113 ALSA-2025:19113 �{�vlibtiff-tools-4.4.0-13.el9_6.2.x86_64.rpm �{�vlibtiff-tools-4.4.0-13.el9_6.2.x86_64.rpm �ȁ�1�*	�+�mBBBBsecurity Important: kernel security update ��|�9https://access.redhat.com/errata/RHSA-2025:2627 RHSA-2025:2627 RHSA-2025:2627 
https://access.redhat.com/security/cve/CVE-2023-52605 CVE-2023-52605 CVE-2023-52605 https://access.redhat.com/security/cve/CVE-2023-52922 CVE-2023-52922 CVE-2023-52922 https://access.redhat.com/security/cve/CVE-2024-50264 CVE-2024-50264 CVE-2024-50264 https://access.redhat.com/security/cve/CVE-2024-50302 CVE-2024-50302 CVE-2024-50302 https://access.redhat.com/security/cve/CVE-2024-53113 CVE-2024-53113 CVE-2024-53113 https://access.redhat.com/security/cve/CVE-2024-53197 CVE-2024-53197 CVE-2024-53197 https://bugzilla.redhat.com/2268295 2268295  https://bugzilla.redhat.com/2327168 2327168  https://bugzilla.redhat.com/2327169 2327169  https://bugzilla.redhat.com/2329370 2329370  https://bugzilla.redhat.com/2329924 2329924  https://bugzilla.redhat.com/2334412 2334412  https://errata.almalinux.org/9/ALSA-2025-2627.html ALSA-2025:2627 ALSA-2025:2627 �\libperf-5.14.0-503.31.1.el9_5.x86_64.rpm �\kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm �\kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm �\libperf-5.14.0-503.31.1.el9_5.x86_64.rpm �\kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm �\kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm �����+	�,�ssecurity Important: .NET 9.0 security, bug fix, and enhancement update ��5�|https://access.redhat.com/errata/RHSA-2025:2668 RHSA-2025:2668 RHSA-2025:2668 
https://access.redhat.com/security/cve/CVE-2025-24070 CVE-2025-24070 CVE-2025-24070 https://bugzilla.redhat.com/2349733 2349733  https://errata.almalinux.org/9/ALSA-2025-2668.html ALSA-2025:2668 ALSA-2025:2668 �6�%dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpm �6�%dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpm ����Y�,	�-�usecurity Important: .NET 8.0 security, bug fix, and enhancement update ��1�}https://access.redhat.com/errata/RHSA-2025:2669 RHSA-2025:2669 RHSA-2025:2669 
https://access.redhat.com/security/cve/CVE-2025-24070 CVE-2025-24070 CVE-2025-24070 https://bugzilla.redhat.com/2349733 2349733  https://errata.almalinux.org/9/ALSA-2025-2669.html ALSA-2025:2669 ALSA-2025:2669 �6� dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpm �6� dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpm ����P�-	�0�nB�IBBBBBBBBBsecurity Low: python3.12 security update �>��.�Xhttps://access.redhat.com/errata/RHSA-2025:3631 RHSA-2025:3631 RHSA-2025:3631 
https://access.redhat.com/security/cve/CVE-2024-7592 CVE-2024-7592 CVE-2024-7592 https://errata.almalinux.org/9/ALSA-2025-3631.html ALSA-2025:3631 ALSA-2025:3631 �g�python3.12-3.12.5-2.el9_5.3.i686.rpm V�python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm U�python3.12-debug-3.12.5-2.el9_5.3.i686.rpm �h�python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm W�python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm V�python3.12-idle-3.12.5-2.el9_5.3.i686.rpm U�python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm W�python3.12-test-3.12.5-2.el9_5.3.i686.rpm �g�python3.12-3.12.5-2.el9_5.3.i686.rpm V�python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm U�python3.12-debug-3.12.5-2.el9_5.3.i686.rpm �h�python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm W�python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm V�python3.12-idle-3.12.5-2.el9_5.3.i686.rpm U�python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm W�python3.12-test-3.12.5-2.el9_5.3.i686.rpm ����;�.	�3�qB�QBBBBBBBBBsecurity Low: python3.11 security update �>���Xhttps://access.redhat.com/errata/RHSA-2025:3634 RHSA-2025:3634 RHSA-2025:3634 
https://access.redhat.com/security/cve/CVE-2024-7592 CVE-2024-7592 CVE-2024-7592 https://errata.almalinux.org/9/ALSA-2025-3634.html ALSA-2025:3634 ALSA-2025:3634 �python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.i686.rpm �python3.11-idle-3.11.9-7.el9_5.3.i686.rpm f�python3.11-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpm g�python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpm �python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.i686.rpm �python3.11-idle-3.11.9-7.el9_5.3.i686.rpm f�python3.11-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpm g�python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpm ����C�/	�4�MBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update 
��^�https://access.redhat.com/errata/RHSA-2025:3845 RHSA-2025:3845 RHSA-2025:3845 
https://access.redhat.com/security/cve/CVE-2025-21587 CVE-2025-21587 CVE-2025-21587 https://access.redhat.com/security/cve/CVE-2025-30691 CVE-2025-30691 CVE-2025-30691 https://access.redhat.com/security/cve/CVE-2025-30698 CVE-2025-30698 CVE-2025-30698 https://errata.almalinux.org/9/ALSA-2025-3845.html ALSA-2025:3845 ALSA-2025:3845 
�&Rjava-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �$Rjava-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �)Rjava-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �-Rjava-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �%Rjava-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �(Rjava-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �*Rjava-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �'Rjava-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �,Rjava-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �+Rjava-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm 
�&Rjava-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �$Rjava-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �)Rjava-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �-Rjava-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �%Rjava-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �(Rjava-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �*Rjava-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �'Rjava-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �,Rjava-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �+Rjava-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm ����T�0	�5�aBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update 
��c�https://access.redhat.com/errata/RHSA-2025:3852 RHSA-2025:3852 RHSA-2025:3852 
https://access.redhat.com/security/cve/CVE-2025-21587 CVE-2025-21587 CVE-2025-21587 https://access.redhat.com/security/cve/CVE-2025-30691 CVE-2025-30691 CVE-2025-30691 https://access.redhat.com/security/cve/CVE-2025-30698 CVE-2025-30698 CVE-2025-30698 https://errata.almalinux.org/9/ALSA-2025-3852.html ALSA-2025:3852 ALSA-2025:3852 m/java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm j/java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm r/java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm u/java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm v/java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm o/java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm w/java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm n/java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm p/java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm q/java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm k/java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm t/java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm l/java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm s/java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm m/java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm j/java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm r/java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm u/java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm v/java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm o/java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm w/java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm n/java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm p/java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm q/java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm k/java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm t/java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm l/java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm s/java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm ���"�1	�6�}BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update 
��g�https://access.redhat.com/errata/RHSA-2025:3855 RHSA-2025:3855 RHSA-2025:3855 
https://access.redhat.com/security/cve/CVE-2025-21587 CVE-2025-21587 CVE-2025-21587 https://access.redhat.com/security/cve/CVE-2025-30691 CVE-2025-30691 CVE-2025-30691 https://access.redhat.com/security/cve/CVE-2025-30698 CVE-2025-30698 CVE-2025-30698 https://errata.almalinux.org/9/ALSA-2025-3855.html ALSA-2025:3855 ALSA-2025:3855 �c=java-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �d=java-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �[=java-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �^=java-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �a=java-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �`=java-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �Y=java-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �e=java-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �\=java-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �]=java-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �b=java-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �_=java-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �f=java-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �Z=java-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �c=java-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �d=java-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �[=java-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �^=java-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �a=java-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �`=java-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �Y=java-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �e=java-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �\=java-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �]=java-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �b=java-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �_=java-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �f=java-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �Z=java-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm ����2	�7�YBBBBsecurity Moderate: kernel security update 
��f�https://access.redhat.com/errata/RHSA-2025:3937 RHSA-2025:3937 RHSA-2025:3937 
https://access.redhat.com/security/cve/CVE-2024-53150 CVE-2024-53150 CVE-2024-53150 https://bugzilla.redhat.com/2333971 2333971  https://errata.almalinux.org/9/ALSA-2025-3937.html ALSA-2025:3937 ALSA-2025:3937 �]kernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpm �]kernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpm �]libperf-5.14.0-503.38.1.el9_5.x86_64.rpm �]kernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpm �]kernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpm �]libperf-5.14.0-503.38.1.el9_5.x86_64.rpm ����X�3	�8�_BBBBBBBBBBBBsecurity Moderate: glibc security update 
��u�;https://access.redhat.com/errata/RHSA-2025:4244 RHSA-2025:4244 RHSA-2025:4244 
https://access.redhat.com/security/cve/CVE-2025-0395 CVE-2025-0395 CVE-2025-0395 https://bugzilla.redhat.com/2339460 2339460  https://errata.almalinux.org/9/ALSA-2025-4244.html ALSA-2025:4244 ALSA-2025:4244 	�B_glibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpm �}_glibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpm �D_nss_db-2.34-125.el9_5.8.alma.1.i686.rpm �C_glibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpm �C_glibc-static-2.34-125.el9_5.8.alma.1.i686.rpm �E_nss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpm �B_glibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm �D_nss_db-2.34-125.el9_5.8.alma.1.x86_64.rpm �E_nss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm 	�B_glibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpm �}_glibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpm �D_nss_db-2.34-125.el9_5.8.alma.1.i686.rpm �C_glibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpm �C_glibc-static-2.34-125.el9_5.8.alma.1.i686.rpm �E_nss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpm �B_glibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm �D_nss_db-2.34-125.el9_5.8.alma.1.x86_64.rpm �E_nss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm ����?�4	�9�msecurity Moderate: 389-ds-base security update 
��0�zhttps://access.redhat.com/errata/RHSA-2025:4491 RHSA-2025:4491 RHSA-2025:4491 
https://access.redhat.com/security/cve/CVE-2025-2487 CVE-2025-2487 CVE-2025-2487 https://bugzilla.redhat.com/2353071 2353071  https://errata.almalinux.org/9/ALSA-2025-4491.html ALSA-2025:4491 ALSA-2025:4491 �4�m389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpm �4�m389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpm ���i�5	�;�z�j�MBBBBBBBBBsecurity Moderate: python3.9 security update 
��*�[https://access.redhat.com/errata/RHSA-2025:6977 RHSA-2025:6977 RHSA-2025:6977 
https://access.redhat.com/security/cve/CVE-2025-0938 CVE-2025-0938 CVE-2025-0938 https://bugzilla.redhat.com/2343237 2343237  https://errata.almalinux.org/9/ALSA-2025-6977.html ALSA-2025:6977 ALSA-2025:6977 �python3-idle-3.9.21-2.el9.i686.rpm �python3-debug-3.9.21-2.el9.x86_64.rpm �python3-idle-3.9.21-2.el9.x86_64.rpm �python3-test-3.9.21-2.el9.x86_64.rpm Z�python3-tkinter-3.9.21-2.el9.i686.rpm �python3-test-3.9.21-2.el9.i686.rpm Y�python3-3.9.21-2.el9.i686.rpm �python3-debug-3.9.21-2.el9.i686.rpm �python3-idle-3.9.21-2.el9.i686.rpm �python3-debug-3.9.21-2.el9.x86_64.rpm �python3-idle-3.9.21-2.el9.x86_64.rpm �python3-test-3.9.21-2.el9.x86_64.rpm Z�python3-tkinter-3.9.21-2.el9.i686.rpm �python3-test-3.9.21-2.el9.i686.rpm Y�python3-3.9.21-2.el9.i686.rpm �python3-debug-3.9.21-2.el9.i686.rpm �Ô�t�6	�>�|B�~BBBBBBBBBsecurity Moderate: python3.12 security update 
���[https://access.redhat.com/errata/RHSA-2025:7107 RHSA-2025:7107 RHSA-2025:7107 
https://access.redhat.com/security/cve/CVE-2025-0938 CVE-2025-0938 CVE-2025-0938 https://bugzilla.redhat.com/2343237 2343237  https://errata.almalinux.org/9/ALSA-2025-7107.html ALSA-2025:7107 ALSA-2025:7107 U�
python3.12-debug-3.12.9-1.el9.i686.rpm �h�
python3.12-tkinter-3.12.9-1.el9.i686.rpm V�
python3.12-idle-3.12.9-1.el9.i686.rpm W�
python3.12-test-3.12.9-1.el9.x86_64.rpm �g�
python3.12-3.12.9-1.el9.i686.rpm U�
python3.12-debug-3.12.9-1.el9.x86_64.rpm V�
python3.12-idle-3.12.9-1.el9.x86_64.rpm W�
python3.12-test-3.12.9-1.el9.i686.rpm U�
python3.12-debug-3.12.9-1.el9.i686.rpm �h�
python3.12-tkinter-3.12.9-1.el9.i686.rpm V�
python3.12-idle-3.12.9-1.el9.i686.rpm W�
python3.12-test-3.12.9-1.el9.x86_64.rpm �g�
python3.12-3.12.9-1.el9.i686.rpm U�
python3.12-debug-3.12.9-1.el9.x86_64.rpm V�
python3.12-idle-3.12.9-1.el9.x86_64.rpm W�
python3.12-test-3.12.9-1.el9.i686.rpm ��!�7	��B�FBBBBBBBBBsecurity Moderate: python3.11 security update 
��`�[https://access.redhat.com/errata/RHSA-2025:7109 RHSA-2025:7109 RHSA-2025:7109 
https://access.redhat.com/security/cve/CVE-2025-0938 CVE-2025-0938 CVE-2025-0938 https://bugzilla.redhat.com/2343237 2343237  https://errata.almalinux.org/9/ALSA-2025-7109.html ALSA-2025:7109 ALSA-2025:7109 xpython3.11-idle-3.11.11-2.el9.i686.rpm xpython3.11-test-3.11.11-2.el9.i686.rpm gxpython3.11-tkinter-3.11.11-2.el9.i686.rpm xpython3.11-idle-3.11.11-2.el9.x86_64.rpm xpython3.11-debug-3.11.11-2.el9.i686.rpm xpython3.11-test-3.11.11-2.el9.x86_64.rpm fxpython3.11-3.11.11-2.el9.i686.rpm xpython3.11-debug-3.11.11-2.el9.x86_64.rpm xpython3.11-idle-3.11.11-2.el9.i686.rpm xpython3.11-test-3.11.11-2.el9.i686.rpm gxpython3.11-tkinter-3.11.11-2.el9.i686.rpm xpython3.11-idle-3.11.11-2.el9.x86_64.rpm xpython3.11-debug-3.11.11-2.el9.i686.rpm xpython3.11-test-3.11.11-2.el9.x86_64.rpm fxpython3.11-3.11.11-2.el9.i686.rpm xpython3.11-debug-3.11.11-2.el9.x86_64.rpm ��P�8	��PBBBBBBBsecurity Moderate: protobuf security update 
��;�:https://access.redhat.com/errata/RHSA-2025:7138 RHSA-2025:7138 RHSA-2025:7138 
https://access.redhat.com/security/cve/CVE-2022-1941 CVE-2022-1941 CVE-2022-1941 https://bugzilla.redhat.com/2291470 2291470  https://errata.almalinux.org/9/ALSA-2025-7138.html ALSA-2025:7138 ALSA-2025:7138 �$�Uprotobuf-lite-devel-3.14.0-16.el9.x86_64.rpm �"�Uprotobuf-compiler-3.14.0-16.el9.i686.rpm �#�Uprotobuf-devel-3.14.0-16.el9.i686.rpm �#�Uprotobuf-devel-3.14.0-16.el9.x86_64.rpm �"�Uprotobuf-compiler-3.14.0-16.el9.x86_64.rpm �$�Uprotobuf-lite-devel-3.14.0-16.el9.i686.rpm �$�Uprotobuf-lite-devel-3.14.0-16.el9.x86_64.rpm �"�Uprotobuf-compiler-3.14.0-16.el9.i686.rpm �#�Uprotobuf-devel-3.14.0-16.el9.i686.rpm �#�Uprotobuf-devel-3.14.0-16.el9.x86_64.rpm �"�Uprotobuf-compiler-3.14.0-16.el9.x86_64.rpm �$�Uprotobuf-lite-devel-3.14.0-16.el9.i686.rpm ��C�9	��YBBsecurity Moderate: xorg-x11-server security update 
��u�shttps://access.redhat.com/errata/RHSA-2025:7163 RHSA-2025:7163 RHSA-2025:7163 
https://access.redhat.com/security/cve/CVE-2024-9632 CVE-2024-9632 CVE-2024-9632 https://access.redhat.com/security/cve/CVE-2025-26594 CVE-2025-26594 CVE-2025-26594 https://access.redhat.com/security/cve/CVE-2025-26595 CVE-2025-26595 CVE-2025-26595 https://access.redhat.com/security/cve/CVE-2025-26596 CVE-2025-26596 CVE-2025-26596 https://access.redhat.com/security/cve/CVE-2025-26597 CVE-2025-26597 CVE-2025-26597 https://access.redhat.com/security/cve/CVE-2025-26598 CVE-2025-26598 CVE-2025-26598 https://access.redhat.com/security/cve/CVE-2025-26599 CVE-2025-26599 CVE-2025-26599 https://access.redhat.com/security/cve/CVE-2025-26600 CVE-2025-26600 CVE-2025-26600 https://access.redhat.com/security/cve/CVE-2025-26601 CVE-2025-26601 CVE-2025-26601 https://bugzilla.redhat.com/2317233 2317233  https://bugzilla.redhat.com/2345248 2345248  https://bugzilla.redhat.com/2345251 2345251  https://bugzilla.redhat.com/2345252 2345252  https://bugzilla.redhat.com/2345253 2345253  https://bugzilla.redhat.com/2345254 2345254  https://bugzilla.redhat.com/2345255 2345255  https://bugzilla.redhat.com/2345256 2345256  https://bugzilla.redhat.com/2345257 2345257  https://errata.almalinux.org/9/ALSA-2025-7163.html ALSA-2025:7163 ALSA-2025:7163 �V�.xorg-x11-server-source-1.20.11-28.el9_6.noarch.rpm i�.xorg-x11-server-devel-1.20.11-28.el9_6.i686.rpm i�.xorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpm �V�.xorg-x11-server-source-1.20.11-28.el9_6.noarch.rpm i�.xorg-x11-server-devel-1.20.11-28.el9_6.i686.rpm i�.xorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpm ��-�:	��D�ZBBsecurity Moderate: xorg-x11-server-Xwayland security update 
��h�https://access.redhat.com/errata/RHSA-2025:7165 RHSA-2025:7165 RHSA-2025:7165 
https://access.redhat.com/security/cve/CVE-2024-9632 CVE-2024-9632 CVE-2024-9632 https://access.redhat.com/security/cve/CVE-2025-26594 CVE-2025-26594 CVE-2025-26594 https://access.redhat.com/security/cve/CVE-2025-26595 CVE-2025-26595 CVE-2025-26595 https://access.redhat.com/security/cve/CVE-2025-26596 CVE-2025-26596 CVE-2025-26596 https://access.redhat.com/security/cve/CVE-2025-26597 CVE-2025-26597 CVE-2025-26597 https://access.redhat.com/security/cve/CVE-2025-26598 CVE-2025-26598 CVE-2025-26598 https://access.redhat.com/security/cve/CVE-2025-26599 CVE-2025-26599 CVE-2025-26599 https://access.redhat.com/security/cve/CVE-2025-26600 CVE-2025-26600 CVE-2025-26600 https://access.redhat.com/security/cve/CVE-2025-26601 CVE-2025-26601 CVE-2025-26601 https://bugzilla.redhat.com/2317233 2317233  https://bugzilla.redhat.com/2345248 2345248  https://bugzilla.redhat.com/2345251 2345251  https://bugzilla.redhat.com/2345252 2345252  https://bugzilla.redhat.com/2345253 2345253  https://bugzilla.redhat.com/2345254 2345254  https://bugzilla.redhat.com/2345255 2345255  https://bugzilla.redhat.com/2345256 2345256  https://bugzilla.redhat.com/2345257 2345257  https://errata.almalinux.org/9/ALSA-2025-7165.html ALSA-2025:7165 ALSA-2025:7165 � �xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpm �T�xorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm � �xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm � �xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpm �T�xorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm � �xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm ���;	��aBsecurity Moderate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update 
��l�shttps://access.redhat.com/errata/RHSA-2025:7178 RHSA-2025:7178 RHSA-2025:7178 
https://access.redhat.com/security/cve/CVE-2024-0444 CVE-2024-0444 CVE-2024-0444 https://access.redhat.com/security/cve/CVE-2024-4453 CVE-2024-4453 CVE-2024-4453 https://bugzilla.redhat.com/2282999 2282999  https://bugzilla.redhat.com/2292335 2292335  https://errata.almalinux.org/9/ALSA-2025-7178.html ALSA-2025:7178 ALSA-2025:7178 �r�hgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm �r�hgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpm �r�hgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm �r�hgstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpm ��/�<	��dsecurity Moderate: corosync security update 
��_�$https://access.redhat.com/errata/RHSA-2025:7201 RHSA-2025:7201 RHSA-2025:7201 
https://access.redhat.com/security/cve/CVE-2025-30472 CVE-2025-30472 CVE-2025-30472 https://bugzilla.redhat.com/2354229 2354229  https://errata.almalinux.org/9/ALSA-2025-7201.html ALSA-2025:7201 ALSA-2025:7201 �.�qcorosync-vqsim-3.1.9-2.el9_6.x86_64.rpm �.�qcorosync-vqsim-3.1.9-2.el9_6.x86_64.rpm ��:�=	��fBBBBsecurity Moderate: openjpeg2 security update 
���Xhttps://access.redhat.com/errata/RHSA-2025:7309 RHSA-2025:7309 RHSA-2025:7309 
https://access.redhat.com/security/cve/CVE-2024-56826 CVE-2024-56826 CVE-2024-56826 https://access.redhat.com/security/cve/CVE-2024-56827 CVE-2024-56827 CVE-2024-56827 https://bugzilla.redhat.com/2335172 2335172  https://bugzilla.redhat.com/2335174 2335174  https://errata.almalinux.org/9/ALSA-2025-7309.html ALSA-2025:7309 ALSA-2025:7309 �!�&openjpeg2-tools-2.4.0-8.el9.i686.rpm � �&openjpeg2-devel-2.4.0-8.el9.x86_64.rpm � �&openjpeg2-devel-2.4.0-8.el9.i686.rpm �!�&openjpeg2-tools-2.4.0-8.el9.x86_64.rpm �!�&openjpeg2-tools-2.4.0-8.el9.i686.rpm � �&openjpeg2-devel-2.4.0-8.el9.x86_64.rpm � �&openjpeg2-devel-2.4.0-8.el9.i686.rpm �!�&openjpeg2-tools-2.4.0-8.el9.x86_64.rpm �Ô�<�>	�-�,security Moderate: perl-Module-ScanDeps security update 
��[�https://access.redhat.com/errata/RHSA-2025:7350 RHSA-2025:7350 RHSA-2025:7350 
https://access.redhat.com/security/cve/CVE-2024-10224 CVE-2024-10224 CVE-2024-10224 https://bugzilla.redhat.com/2327329 2327329  https://errata.almalinux.org/9/ALSA-2025-7350.html ALSA-2025:7350 ALSA-2025:7350 �)�perl-Module-ScanDeps-1.30-6.el9.noarch.rpm �)�perl-Module-ScanDeps-1.30-6.el9.noarch.rpm �Ô�K�?	�	�nsecurity Moderate: 389-ds-base security update 
��_�zhttps://access.redhat.com/errata/RHSA-2025:7395 RHSA-2025:7395 RHSA-2025:7395 
https://access.redhat.com/security/cve/CVE-2025-2487 CVE-2025-2487 CVE-2025-2487 https://bugzilla.redhat.com/2353071 2353071  https://errata.almalinux.org/9/ALSA-2025-7395.html ALSA-2025:7395 ALSA-2025:7395 �4�n389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm �4�n389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm �����@	�
�psecurity Moderate: nginx security update 
��Y�Ghttps://access.redhat.com/errata/RHSA-2025:7402 RHSA-2025:7402 RHSA-2025:7402 
https://access.redhat.com/security/cve/CVE-2022-41741 CVE-2022-41741 CVE-2022-41741 https://access.redhat.com/security/cve/CVE-2022-41742 CVE-2022-41742 CVE-2022-41742 https://access.redhat.com/security/cve/CVE-2024-7347 CVE-2024-7347 CVE-2024-7347 https://bugzilla.redhat.com/2141495 2141495  https://bugzilla.redhat.com/2141496 2141496  https://errata.almalinux.org/9/ALSA-2025-7402.html ALSA-2025:7402 ALSA-2025:7402 �Z�pnginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm �Z�pnginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm ����^�A	��KBB�fBBBBsecurity Moderate: ghostscript security update 
�� �hhttps://access.redhat.com/errata/RHSA-2025:7422 RHSA-2025:7422 RHSA-2025:7422 
https://access.redhat.com/security/cve/CVE-2023-46751 CVE-2023-46751 CVE-2023-46751 https://access.redhat.com/security/cve/CVE-2024-46951 CVE-2024-46951 CVE-2024-46951 https://access.redhat.com/security/cve/CVE-2024-46952 CVE-2024-46952 CVE-2024-46952 https://access.redhat.com/security/cve/CVE-2024-46953 CVE-2024-46953 CVE-2024-46953 https://access.redhat.com/security/cve/CVE-2024-46954 CVE-2024-46954 CVE-2024-46954 https://access.redhat.com/security/cve/CVE-2024-46956 CVE-2024-46956 CVE-2024-46956 https://bugzilla.redhat.com/2253365 2253365  https://bugzilla.redhat.com/2325041 2325041  https://bugzilla.redhat.com/2325043 2325043  https://bugzilla.redhat.com/2325044 2325044  https://bugzilla.redhat.com/2325045 2325045  https://bugzilla.redhat.com/2325047 2325047  https://errata.almalinux.org/9/ALSA-2025-7422.html ALSA-2025:7422 ALSA-2025:7422 �y�oghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpm \�olibgs-devel-9.54.0-18.el9_6.i686.rpm \�olibgs-devel-9.54.0-18.el9_6.x86_64.rpm �z�oghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm �x�oghostscript-9.54.0-18.el9_6.i686.rpm �y�oghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpm \�olibgs-devel-9.54.0-18.el9_6.i686.rpm \�olibgs-devel-9.54.0-18.el9_6.x86_64.rpm �z�oghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm �x�oghostscript-9.54.0-18.el9_6.i686.rpm ����^�B	��xBBBBsecurity Important: kernel security update ���@https://access.redhat.com/errata/RHSA-2025:7423 RHSA-2025:7423 RHSA-2025:7423 
https://access.redhat.com/security/cve/CVE-2024-58005 CVE-2024-58005 CVE-2024-58005 https://access.redhat.com/security/cve/CVE-2024-58007 CVE-2024-58007 CVE-2024-58007 https://access.redhat.com/security/cve/CVE-2024-58069 CVE-2024-58069 CVE-2024-58069 https://access.redhat.com/security/cve/CVE-2025-21633 CVE-2025-21633 CVE-2025-21633 https://access.redhat.com/security/cve/CVE-2025-21927 CVE-2025-21927 CVE-2025-21927 https://access.redhat.com/security/cve/CVE-2025-21993 CVE-2025-21993 CVE-2025-21993 https://bugzilla.redhat.com/2338813 2338813  https://bugzilla.redhat.com/2348565 2348565  https://bugzilla.redhat.com/2348590 2348590  https://bugzilla.redhat.com/2350364 2350364  https://bugzilla.redhat.com/2356593 2356593  https://bugzilla.redhat.com/2356908 2356908  https://errata.almalinux.org/9/ALSA-2025-7423.html ALSA-2025:7423 ALSA-2025:7423 �^libperf-5.14.0-570.16.1.el9_6.x86_64.rpm �^kernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpm �^kernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpm �^libperf-5.14.0-570.16.1.el9_6.x86_64.rpm �^kernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpm �^kernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpm ��ɐ#�C	��~Bsecurity Important: yelp security update ��H�dhttps://access.redhat.com/errata/RHSA-2025:7430 RHSA-2025:7430 RHSA-2025:7430 
https://access.redhat.com/security/cve/CVE-2025-3155 CVE-2025-3155 CVE-2025-3155 https://bugzilla.redhat.com/2357091 2357091  https://errata.almalinux.org/9/ALSA-2025-7430.html ALSA-2025:7430 ALSA-2025:7430 �9�yelp-devel-40.3-2.el9_6.1.x86_64.rpm �9�yelp-devel-40.3-2.el9_6.1.i686.rpm �9�yelp-devel-40.3-2.el9_6.1.x86_64.rpm �9�yelp-devel-40.3-2.el9_6.1.i686.rpm ����5�D	��ABBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: avahi security update 
��,�*https://access.redhat.com/errata/RHSA-2025:7437 RHSA-2025:7437 RHSA-2025:7437 
https://access.redhat.com/security/cve/CVE-2024-52616 CVE-2024-52616 CVE-2024-52616 https://bugzilla.redhat.com/2326429 2326429  https://errata.almalinux.org/9/ALSA-2025-7437.html ALSA-2025:7437 ALSA-2025:7437 � avahi-devel-0.8-22.el9_6.x86_64.rpm � avahi-compat-howl-0.8-22.el9_6.i686.rpm � avahi-glib-devel-0.8-22.el9_6.i686.rpm � avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm � avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpm � avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm � avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpm � avahi-gobject-devel-0.8-22.el9_6.i686.rpm � avahi-compat-howl-0.8-22.el9_6.x86_64.rpm � avahi-gobject-0.8-22.el9_6.i686.rpm � avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm � avahi-glib-devel-0.8-22.el9_6.x86_64.rpm � avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpm � avahi-gobject-0.8-22.el9_6.x86_64.rpm � avahi-devel-0.8-22.el9_6.i686.rpm � avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm � avahi-devel-0.8-22.el9_6.x86_64.rpm � avahi-compat-howl-0.8-22.el9_6.i686.rpm � avahi-glib-devel-0.8-22.el9_6.i686.rpm � avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm � avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpm � avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm � avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpm � avahi-gobject-devel-0.8-22.el9_6.i686.rpm � avahi-compat-howl-0.8-22.el9_6.x86_64.rpm � avahi-gobject-0.8-22.el9_6.i686.rpm � avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm � avahi-glib-devel-0.8-22.el9_6.x86_64.rpm � avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpm � avahi-gobject-0.8-22.el9_6.x86_64.rpm � avahi-devel-0.8-22.el9_6.i686.rpm � avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm ����~�E	��RBB�FBBBBsecurity Moderate: ghostscript security update 
��V�fhttps://access.redhat.com/errata/RHSA-2025:7586 RHSA-2025:7586 RHSA-2025:7586 
https://access.redhat.com/security/cve/CVE-2025-27832 CVE-2025-27832 CVE-2025-27832 https://bugzilla.redhat.com/2354949 2354949  https://errata.almalinux.org/9/ALSA-2025-7586.html ALSA-2025:7586 ALSA-2025:7586 �z�pghostscript-tools-printing-9.54.0-19.el9_6.i686.rpm \�plibgs-devel-9.54.0-19.el9_6.x86_64.rpm �y�pghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm �x�pghostscript-9.54.0-19.el9_6.i686.rpm \�plibgs-devel-9.54.0-19.el9_6.i686.rpm �z�pghostscript-tools-printing-9.54.0-19.el9_6.i686.rpm \�plibgs-devel-9.54.0-19.el9_6.x86_64.rpm �y�pghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm �x�pghostscript-9.54.0-19.el9_6.i686.rpm \�plibgs-devel-9.54.0-19.el9_6.i686.rpm ��v�F	��_security Important: .NET 8.0 security update ��<�Ghttps://access.redhat.com/errata/RHSA-2025:7598 RHSA-2025:7598 RHSA-2025:7598 
https://access.redhat.com/security/cve/CVE-2025-26646 CVE-2025-26646 CVE-2025-26646 https://bugzilla.redhat.com/2365317 2365317  https://errata.almalinux.org/9/ALSA-2025-7598.html ALSA-2025:7598 ALSA-2025:7598 �6�!dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpm �6�!dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpm ����H�G	��asecurity Important: .NET 9.0 security update ���Fhttps://access.redhat.com/errata/RHSA-2025:7600 RHSA-2025:7600 RHSA-2025:7600 
https://access.redhat.com/security/cve/CVE-2025-26646 CVE-2025-26646 CVE-2025-26646 https://bugzilla.redhat.com/2365317 2365317  https://errata.almalinux.org/9/ALSA-2025-7600.html ALSA-2025:7600 ALSA-2025:7600 �6�&dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpm �6�&dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpm ��;�H	��cBBBBsecurity Important: kernel security update ��I�9https://access.redhat.com/errata/RHSA-2025:7903 RHSA-2025:7903 RHSA-2025:7903 
https://access.redhat.com/security/cve/CVE-2025-21756 CVE-2025-21756 CVE-2025-21756 https://access.redhat.com/security/cve/CVE-2025-21966 CVE-2025-21966 CVE-2025-21966 https://access.redhat.com/security/cve/CVE-2025-37749 CVE-2025-37749 CVE-2025-37749 https://bugzilla.redhat.com/2348609 2348609  https://bugzilla.redhat.com/2356605 2356605  https://bugzilla.redhat.com/2363332 2363332  https://errata.almalinux.org/9/ALSA-2025-7903.html ALSA-2025:7903 ALSA-2025:7903 �_kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm �_kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm �_libperf-5.14.0-570.17.1.el9_6.x86_64.rpm �_kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm �_kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm �_libperf-5.14.0-570.17.1.el9_6.x86_64.rpm ����V�I	��iBBBBsecurity Moderate: kernel security update 
���
https://access.redhat.com/errata/RHSA-2025:8142 RHSA-2025:8142 RHSA-2025:8142 
https://access.redhat.com/security/cve/CVE-2025-21964 CVE-2025-21964 CVE-2025-21964 https://bugzilla.redhat.com/2356665 2356665  https://errata.almalinux.org/9/ALSA-2025-8142.html ALSA-2025:8142 ALSA-2025:8142 �`libperf-5.14.0-570.18.1.el9_6.x86_64.rpm �`kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm �`kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpm �`libperf-5.14.0-570.18.1.el9_6.x86_64.rpm �`kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm �`kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpm ��ܣf�J	��oBsecurity Important: gstreamer1-plugins-bad-free security update ���https://access.redhat.com/errata/RHSA-2025:8183 RHSA-2025:8183 RHSA-2025:8183 
https://access.redhat.com/security/cve/CVE-2025-3887 CVE-2025-3887 CVE-2025-3887 https://bugzilla.redhat.com/2367919 2367919  https://errata.almalinux.org/9/ALSA-2025-8183.html ALSA-2025:8183 ALSA-2025:8183 �r�igstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm �r�igstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm �r�igstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm �r�igstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm �����K	��rBBBBsecurity Moderate: kernel security update 
���Whttps://access.redhat.com/errata/RHSA-2025:8333 RHSA-2025:8333 RHSA-2025:8333 
https://access.redhat.com/security/cve/CVE-2022-3424 CVE-2022-3424 CVE-2022-3424 https://access.redhat.com/security/cve/CVE-2025-21764 CVE-2025-21764 CVE-2025-21764 https://bugzilla.redhat.com/2132640 2132640  https://bugzilla.redhat.com/2348575 2348575  https://errata.almalinux.org/9/ALSA-2025-8333.html ALSA-2025:8333 ALSA-2025:8333 �akernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm �alibperf-5.14.0-570.19.1.el9_6.x86_64.rpm �akernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpm �akernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm �alibperf-5.14.0-570.19.1.el9_6.x86_64.rpm �akernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpm ��H�L	��xBsecurity Important: varnish security update ��t�Zhttps://access.redhat.com/errata/RHSA-2025:8337 RHSA-2025:8337 RHSA-2025:8337 
https://access.redhat.com/security/cve/CVE-2025-47905 CVE-2025-47905 CVE-2025-47905 https://bugzilla.redhat.com/2364235 2364235  https://errata.almalinux.org/9/ALSA-2025-8337.html ALSA-2025:8337 ALSA-2025:8337 �v�varnish-devel-6.6.2-6.el9_6.1.i686.rpm �v�varnish-devel-6.6.2-6.el9_6.1.x86_64.rpm �v�varnish-devel-6.6.2-6.el9_6.1.i686.rpm �v�varnish-devel-6.6.2-6.el9_6.1.x86_64.rpm ����[�M	��{BBBBsecurity Important: kernel security update ��N�https://access.redhat.com/errata/RHSA-2025:8643 RHSA-2025:8643 RHSA-2025:8643 
https://access.redhat.com/security/cve/CVE-2025-21920 CVE-2025-21920 CVE-2025-21920 https://access.redhat.com/security/cve/CVE-2025-21926 CVE-2025-21926 CVE-2025-21926 https://access.redhat.com/security/cve/CVE-2025-21997 CVE-2025-21997 CVE-2025-21997 https://access.redhat.com/security/cve/CVE-2025-22055 CVE-2025-22055 CVE-2025-22055 https://access.redhat.com/security/cve/CVE-2025-37785 CVE-2025-37785 CVE-2025-37785 https://access.redhat.com/security/cve/CVE-2025-37943 CVE-2025-37943 CVE-2025-37943 https://bugzilla.redhat.com/2356587 2356587  https://bugzilla.redhat.com/2356639 2356639  https://bugzilla.redhat.com/2357143 2357143  https://bugzilla.redhat.com/2360300 2360300  https://bugzilla.redhat.com/2360921 2360921  https://bugzilla.redhat.com/2367748 2367748  https://errata.almalinux.org/9/ALSA-2025-8643.html ALSA-2025:8643 ALSA-2025:8643 �bkernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm �bkernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm �blibperf-5.14.0-570.21.1.el9_6.x86_64.rpm �bkernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm �bkernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm �blibperf-5.14.0-570.21.1.el9_6.x86_64.rpm �«�]�N	��ABBBBBBBBBBBBsecurity Moderate: glibc security update 
��V�Nhttps://access.redhat.com/errata/RHSA-2025:8655 RHSA-2025:8655 RHSA-2025:8655 
https://access.redhat.com/security/cve/CVE-2025-4802 CVE-2025-4802 CVE-2025-4802 https://bugzilla.redhat.com/2367468 2367468  https://errata.almalinux.org/9/ALSA-2025-8655.html ALSA-2025:8655 ALSA-2025:8655 	�D`nss_db-2.34-168.el9_6.19.i686.rpm �E`nss_hesiod-2.34-168.el9_6.19.i686.rpm �}`glibc-benchtests-2.34-168.el9_6.19.x86_64.rpm �C`glibc-static-2.34-168.el9_6.19.x86_64.rpm �B`glibc-nss-devel-2.34-168.el9_6.19.i686.rpm �C`glibc-static-2.34-168.el9_6.19.i686.rpm �E`nss_hesiod-2.34-168.el9_6.19.x86_64.rpm �D`nss_db-2.34-168.el9_6.19.x86_64.rpm �B`glibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm 	�D`nss_db-2.34-168.el9_6.19.i686.rpm �E`nss_hesiod-2.34-168.el9_6.19.i686.rpm �}`glibc-benchtests-2.34-168.el9_6.19.x86_64.rpm �C`glibc-static-2.34-168.el9_6.19.x86_64.rpm �B`glibc-nss-devel-2.34-168.el9_6.19.i686.rpm �C`glibc-static-2.34-168.el9_6.19.i686.rpm �E`nss_hesiod-2.34-168.el9_6.19.x86_64.rpm �D`nss_db-2.34-168.el9_6.19.x86_64.rpm �B`glibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm �� �O	��Osecurity Important: .NET 8.0 security update ��$�8https://access.redhat.com/errata/RHSA-2025:8813 RHSA-2025:8813 RHSA-2025:8813 
https://access.redhat.com/security/cve/CVE-2025-30399 CVE-2025-30399 CVE-2025-30399 https://bugzilla.redhat.com/2369701 2369701  https://errata.almalinux.org/9/ALSA-2025-8813.html ALSA-2025:8813 ALSA-2025:8813 �6�"dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm �6�"dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm �°�q�P	� �Qsecurity Important: .NET 9.0 security update ��\�7https://access.redhat.com/errata/RHSA-2025:8817 RHSA-2025:8817 RHSA-2025:8817 
https://access.redhat.com/security/cve/CVE-2025-30399 CVE-2025-30399 CVE-2025-30399 https://bugzilla.redhat.com/2369701 2369701  https://errata.almalinux.org/9/ALSA-2025-8817.html ALSA-2025:8817 ALSA-2025:8817 �6�'dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpm �6�'dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpm �ª�B�Q	�!�SBBBBsecurity Important: kernel security update ���ihttps://access.redhat.com/errata/RHSA-2025:9080 RHSA-2025:9080 RHSA-2025:9080 
https://access.redhat.com/security/cve/CVE-2025-21961 CVE-2025-21961 CVE-2025-21961 https://access.redhat.com/security/cve/CVE-2025-21963 CVE-2025-21963 CVE-2025-21963 https://access.redhat.com/security/cve/CVE-2025-21969 CVE-2025-21969 CVE-2025-21969 https://access.redhat.com/security/cve/CVE-2025-21979 CVE-2025-21979 CVE-2025-21979 https://access.redhat.com/security/cve/CVE-2025-21999 CVE-2025-21999 CVE-2025-21999 https://access.redhat.com/security/cve/CVE-2025-22126 CVE-2025-22126 CVE-2025-22126 https://access.redhat.com/security/cve/CVE-2025-37750 CVE-2025-37750 CVE-2025-37750 https://bugzilla.redhat.com/2356584 2356584  https://bugzilla.redhat.com/2356633 2356633  https://bugzilla.redhat.com/2356642 2356642  https://bugzilla.redhat.com/2356652 2356652  https://bugzilla.redhat.com/2357134 2357134  https://bugzilla.redhat.com/2360236 2360236  https://bugzilla.redhat.com/2363341 2363341  https://errata.almalinux.org/9/ALSA-2025-9080.html ALSA-2025:9080 ALSA-2025:9080 �ckernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpm �ckernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpm �clibperf-5.14.0-570.22.1.el9_6.x86_64.rpm �ckernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpm �ckernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpm �clibperf-5.14.0-570.22.1.el9_6.x86_64.rpm ���R	��security Important: apache-commons-beanutils security update ��|�ihttps://access.redhat.com/errata/RHSA-2025:9114 RHSA-2025:9114 RHSA-2025:9114 
https://access.redhat.com/security/cve/CVE-2025-48734 CVE-2025-48734 CVE-2025-48734 https://bugzilla.redhat.com/2368956 2368956  https://errata.almalinux.org/9/ALSA-2025-9114.html ALSA-2025:9114 ALSA-2025:9114 ��apache-commons-beanutils-1.9.4-10.el9_6.noarch.rpm ��apache-commons-beanutils-1.9.4-10.el9_6.noarch.rpm ��3�S	�"�[Bsecurity Important: libvpx security update ��e�8https://access.redhat.com/errata/RHSA-2025:9118 RHSA-2025:9118 RHSA-2025:9118 
https://access.redhat.com/security/cve/CVE-2025-5283 CVE-2025-5283 CVE-2025-5283 https://bugzilla.redhat.com/2368749 2368749  https://errata.almalinux.org/9/ALSA-2025-9118.html ALSA-2025:9118 ALSA-2025:9118 ��slibvpx-devel-1.9.0-9.el9_6.x86_64.rpm ��slibvpx-devel-1.9.0-9.el9_6.i686.rpm ��slibvpx-devel-1.9.0-9.el9_6.x86_64.rpm ��slibvpx-devel-1.9.0-9.el9_6.i686.rpm ��@�T	�#�security Important: ipa security update ���ghttps://access.redhat.com/errata/RHSA-2025:9184 RHSA-2025:9184 RHSA-2025:9184 
https://access.redhat.com/security/cve/CVE-2025-4404 CVE-2025-4404 CVE-2025-4404 https://bugzilla.redhat.com/2364606 2364606  https://errata.almalinux.org/9/ALSA-2025-9184.html ALSA-2025:9184 ALSA-2025:9184 ��python3-ipatests-4.12.2-14.el9_6.1.noarch.rpm ��python3-ipatests-4.12.2-14.el9_6.1.noarch.rpm ��E�U	�$�_BBBBsecurity Moderate: kernel security update 
���https://access.redhat.com/errata/RHSA-2025:9302 RHSA-2025:9302 RHSA-2025:9302 
https://access.redhat.com/security/cve/CVE-2025-21883 CVE-2025-21883 CVE-2025-21883 https://access.redhat.com/security/cve/CVE-2025-21919 CVE-2025-21919 CVE-2025-21919 https://access.redhat.com/security/cve/CVE-2025-22104 CVE-2025-22104 CVE-2025-22104 https://access.redhat.com/security/cve/CVE-2025-23150 CVE-2025-23150 CVE-2025-23150 https://access.redhat.com/security/cve/CVE-2025-37738 CVE-2025-37738 CVE-2025-37738 https://bugzilla.redhat.com/2355415 2355415  https://bugzilla.redhat.com/2356618 2356618  https://bugzilla.redhat.com/2360265 2360265  https://bugzilla.redhat.com/2363268 2363268  https://bugzilla.redhat.com/2363305 2363305  https://errata.almalinux.org/9/ALSA-2025-9302.html ALSA-2025:9302 ALSA-2025:9302 �dlibperf-5.14.0-570.23.1.el9_6.x86_64.rpm �dkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpm �dkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpm �dlibperf-5.14.0-570.23.1.el9_6.x86_64.rpm �dkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpm �dkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpm ��;�V	�&�e�ABBBBBBsecurity Important: xorg-x11-server and xorg-x11-server-Xwayland security update ���zhttps://access.redhat.com/errata/RHSA-2025:9303 RHSA-2025:9303 RHSA-2025:9303 
https://access.redhat.com/security/cve/CVE-2025-49175 CVE-2025-49175 CVE-2025-49175 https://access.redhat.com/security/cve/CVE-2025-49176 CVE-2025-49176 CVE-2025-49176 https://access.redhat.com/security/cve/CVE-2025-49178 CVE-2025-49178 CVE-2025-49178 https://access.redhat.com/security/cve/CVE-2025-49179 CVE-2025-49179 CVE-2025-49179 https://access.redhat.com/security/cve/CVE-2025-49180 CVE-2025-49180 CVE-2025-49180 https://bugzilla.redhat.com/2369947 2369947  https://bugzilla.redhat.com/2369954 2369954  https://bugzilla.redhat.com/2369977 2369977  https://bugzilla.redhat.com/2369978 2369978  https://bugzilla.redhat.com/2369981 2369981  https://errata.almalinux.org/9/ALSA-2025-9303.html ALSA-2025:9303 ALSA-2025:9303 � �xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm � �xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpm i�/xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpm �V�/xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpm �T�xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpm i�/xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm � �xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm � �xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpm i�/xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpm �V�/xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpm �T�xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpm i�/xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm ���W	�/�msecurity Important: perl-YAML-LibYAML security update ���nhttps://access.redhat.com/errata/RHSA-2025:9330 RHSA-2025:9330 RHSA-2025:9330 
https://access.redhat.com/security/cve/CVE-2025-40908 CVE-2025-40908 CVE-2025-40908 https://bugzilla.redhat.com/2369630 2369630  https://errata.almalinux.org/9/ALSA-2025-9330.html ALSA-2025:9330 ALSA-2025:9330 �|�fperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpm �|�fperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpm ��y�X	�'�pBsecurity Moderate: qt5-qtbase security update 
���.https://access.redhat.com/errata/RHSA-2025:9462 RHSA-2025:9462 RHSA-2025:9462 
https://access.redhat.com/security/cve/CVE-2025-5455 CVE-2025-5455 CVE-2025-5455 https://bugzilla.redhat.com/2369722 2369722  https://errata.almalinux.org/9/ALSA-2025-9462.html ALSA-2025:9462 ALSA-2025:9462 �u�qt5-qtbase-static-5.15.9-11.el9_6.i686.rpm �u�qt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm �u�qt5-qtbase-static-5.15.9-11.el9_6.i686.rpm �u�qt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm ���Y	�4�3security Important: perl-File-Find-Rule security update ��4�4https://access.redhat.com/errata/RHSA-2025:9517 RHSA-2025:9517 RHSA-2025:9517 
https://access.redhat.com/security/cve/CVE-2011-10007 CVE-2011-10007 CVE-2011-10007 https://bugzilla.redhat.com/2370424 2370424  https://errata.almalinux.org/9/ALSA-2025-9517.html ALSA-2025:9517 ALSA-2025:9517 �(�perl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpm �(�perl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpm ���Z	�(�uBBBBBBBBBBBBsecurity Moderate: glibc security update 
��h�2https://access.redhat.com/errata/RHSA-2025:9877 RHSA-2025:9877 RHSA-2025:9877 
https://access.redhat.com/security/cve/CVE-2025-5702 CVE-2025-5702 CVE-2025-5702 https://bugzilla.redhat.com/2370472 2370472  https://errata.almalinux.org/9/ALSA-2025-9877.html ALSA-2025:9877 ALSA-2025:9877 	�}aglibc-benchtests-2.34-168.el9_6.20.x86_64.rpm �Caglibc-static-2.34-168.el9_6.20.x86_64.rpm �Danss_db-2.34-168.el9_6.20.x86_64.rpm �Caglibc-static-2.34-168.el9_6.20.i686.rpm �Danss_db-2.34-168.el9_6.20.i686.rpm �Eanss_hesiod-2.34-168.el9_6.20.i686.rpm �Baglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm �Baglibc-nss-devel-2.34-168.el9_6.20.i686.rpm �Eanss_hesiod-2.34-168.el9_6.20.x86_64.rpm 	�}aglibc-benchtests-2.34-168.el9_6.20.x86_64.rpm �Caglibc-static-2.34-168.el9_6.20.x86_64.rpm �Danss_db-2.34-168.el9_6.20.x86_64.rpm �Caglibc-static-2.34-168.el9_6.20.i686.rpm �Danss_db-2.34-168.el9_6.20.i686.rpm �Eanss_hesiod-2.34-168.el9_6.20.i686.rpm �Baglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm �Baglibc-nss-devel-2.34-168.el9_6.20.i686.rpm �Eanss_hesiod-2.34-168.el9_6.20.x86_64.rpm ��t�[	�)�CBBBBsecurity Moderate: kernel security update 
���	https://access.redhat.com/errata/RHSA-2025:9880 RHSA-2025:9880 RHSA-2025:9880 
https://access.redhat.com/security/cve/CVE-2023-52933 CVE-2023-52933 CVE-2023-52933 https://bugzilla.redhat.com/2355476 2355476  https://errata.almalinux.org/9/ALSA-2025-9880.html ALSA-2025:9880 ALSA-2025:9880 �elibperf-5.14.0-570.24.1.el9_6.x86_64.rpm �ekernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpm �ekernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpm �elibperf-5.14.0-570.24.1.el9_6.x86_64.rpm �ekernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpm �ekernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpm ��b  �   N�For detailed information �changes� this release, see�e AlmaLinux R� Not�0link�Nfrom�'Referenc�sec�^. T�grub2 packa�gprovide vers��2 of�?Grand Unifi�VBoot Loader (GRUB), a highly configurable �5customiz�b�:l�:with modular archit��ure. ����support�bvariety��kernel �.s, fi�]system�
compute�Vs,��hardware�uvi�.
�mshim�r�é�ns�rfirst-st�UEFI�that h�Tl����ining to�7tru����ull�3un���ur�environment��S�i��Fix(es):
*��: Integ�Bflow��_net_recv_ip4_��ets (CVE-2022-28733)�HCraf��PNG�aysca�=im�nmay �Kd��out-of-bo�rs wr�J�sheap�^1-3695�]�S�R�Qd��7huffma��)�V��g6�gJPE�hc�>�hb�N�,������7�ZOȤwhen��split HTTP�Id�/�n4�M�[_lock�X�B��l��s non-��i�D��e�*d�Q�buse-��r-fre�ӳcmd_���k()�B�=��: B�ov��ޢ6��c�Y���H�+�mo�F��+b�ګ[s��issue(s�inclu�[� im��t�4CVSS sc�G�
cknow�g�
��o�/r�a���,����1�R����g�m�s�,�
��w�f��3�S�!,����wany�oper����v���C: Sma��ڡ8�b siz��TCP sourc���gen�^�algor�+m���*�k�1012)�{rac��di�-�qp��_ev�f_�ƤT�|priv���Je��^�Y729�Ya��c����sub�$���l�r��t966�tb��mIP�� ESP�wans�co���76�K�
Bug�`make SHA512_���.s�CRYPTO_USER�4��-��(BZ#207264�SR-IOV���n�*> 50%��d��34830�3fix �a�rup�ia�
d by dm�gt�=�F�98218�_SC�1cli�$-s�jpeeloff�ns [al�(�_-9]�<404�N�#��n�	 f��in��asymmetric�<u��itu¼8548��F�6�h�fMultipl�jT VMs ea�B��vCPUs�E��6spec:����para��too�X�hd�-9�u��c������	���eeh_pse��s ob�v���vm�oi�!t�=p�d,�kdump���ggere�n225�%Mark�C	�X NIC d�j�vs�mai���7638)�lib�2	ve�
� mm�L�rary��cre��r��sev�l dif��t
st��7�K�	�KGNU�r�	pio�/ISO ��0 CD-ROM�z.
L��is �f��Jy�'bsdta��til�t,��rip�l�Au�bin�ws
su�$��
yth�~��pop�
desktop�`
�ag�����J: an�<	�+via�Mmpon�+ zipx_lzma_al�_�B
t
�62���7�
�<�
�l�inp��i�P�J�;���-�M�b	�6
�rs��ap�{	c��s�Ene�Ndir�sly�H�����X���%:�� st�
vul�b�R��
�
$215�	java-11-� jdk�%�<O�JDK 11 J�/ Runtime E�����+Soft�
D�rlop�,Kit�
fo�"��xhave��up���a ��r��w�:�(11.0.16�8).�]77����: ���Krun�y���BXa�b-J (JAXP, 82�h07�y3416�5	�Oclass�il�N(Hotspot�F1859�1�X�F�&r�
 ����I�
Me��dH�[.invokeBasic��a�	�a1�	rh1991003�Bt�br�*�Rn.��.pkcs�wr�Yer.PKCS�getIn��^�7�,��P�[�9�e�z�GretKey�e/im���/�don'�d�CKA_SIGN at��bu�@FIPS�e�{107�ǡ{R�t�	s��	�v���1t�q���e�etoge���v�5�h.8.0�-8�,�*�T+��(�.342.b���06�$08�/���V/�z��95�V.�u�-7�X7�X�+�T,��(17�(4�W9�&�a�N�ex�
ia����L�i��J3875�J9�qPr�ous���Cs�r��a�I��he�Wgu���vss����i��rd��fac��������i������Ha�~�#m���\�mo�i�*����5at��
whi�nde��d���� r�=�\��!e���3����
�<���s�/W�0p�v,�Lc�z��q��wou��������la���� ���e�U�`����w�ced�a�
�IN�����c�P�a53��ޢ/r��>���V wa�����������requi�~u�Tbo�h-D��}�HeS�LP�BF�4=���<-D�.��.fips=f�	e�=�,�ڢa�n�{����c�b��tr���{�F�1l�,����ha�}�
r������I�� ��7�fe��,�Ṇ��-�1��@�r��=a �M�� �a���e�
�s�m�F���(�!���ed¶3) M�aDB��a�F-u��,�th��SQL�Fb�������r�4�pomp��5��My�4. �5�g�ra (26�11),���db��0.5.�	�ysql-sel�~(�C5)�K�=: ���ough �M9���ack���/����on�r_co�_to_i��`��BIGINT�typ�l��,1-4����������v�	���bleng�f�
��-�l���f�o�-copy�m�=
�$xed-�;s��-��d����8˒���7ex�G���Lbj�j��p��.�(�X�,�v50�	a��bef�sus��a���4����u1�uCONNECT Stora�pEng� H��1�Ov��P�kE�kV��p2�p�r�3���r �!I�_�s::walk�
�D��6�D�pois�q����lex���/"�vol���gblob�X7�X���nsh�0�Z_tmp_�)::f�;�&�F8�F�]��_�B� or::�e_r� _���X9�X��my_d����::�uor=�A80�AField::s�!defa���=�y�z�s�	��	�c�T���R���f�x�!�[s/upd�m�+_map_��_�
�o�S��r��$ca���8bit�`
�Ic����*.c�V3�V�#ɺ�<��ct::�_�5r_c��)r�G�W4��e�nquery_a�a����$��SEL���?%view�`���d�(_��_s�8����V�]HAVI�>#��NOT EXIST�
d�0����[a�744�����_�]�f445�� IS NULLޡ�_�;B��T�j��_�M�J�H���v����lit�)#oup���G�R�4�/i�L�z.cc�A�;��wi��w�in ��ess�
ORD�BY�O5�
��u˔5���LWHERE��	�h�	�8
�e����q���d�(˩VD�/:��/���_�ȴ���h
�
�K"dup�ue" erro�;	f���@g��ique�P�$�)o5�'�*��%�T�un�
d����/�=b�up/ds��
�31622�Xk �C��ex��
�	�VIEW�ggreg�\�9�S�|
5���n� �fi��_�:��d����g�^an���
��mon�d%�b(CTE�D�1˚�13���_�,::�Vɹ����B&�>� ��|3�|�+�&s��'�_postjo����=a��#��
�ă4��  ���0s��ȏbe�#�j��k����Ĉ5�-�y��~D�2IN�	�8��(�m(��csi_io�q!�h*049�[�k��c�,w_�(��#(/s��	d/cls_api�%
���J!��ower9 - LPAR��&t�&�Sha�,��c��������C&��s��[H��T22��H��.����+�\&�e��-�ss-ng�`���s�O5��R�i�V�����|nam����>3�gfs�,F�y��0(�Ll�
�5*�en����� t�P0t�K730�i/o���i�~
��u���:�Kwork�;�j�g��
����372.9.1.el8.x86_� �[82�k	�c�(�tes�v��3�SSATA�M7�6Guest���re�����3 mig�B���21�� ���-�J�<(�{Oops ���~l�t�[ �?�IRIP�q�+_�K_�_label�r	�g�+�!�s�l1�\�l�	
BUG:�U�H���%��tas ���(n����'fs4�ton�
�;��lookup�r��lpa��ɢ�: K���o�kad��a�=ig:�C$[#� ����+tu�bon��t�D��(P10/ ibmvnic/����L)��3�)��S�����^vm��O�U��m��q�\e�'���)
Enh�f�^�'�B�u/vt-d���+DMAR_UNITS_SUPPORTED��� ���U5326) .NET�V��d-s��fr���D.�5����a�}-e�E�C�- API�^	s�(n����i��P�u CLR�Z��.
N�/�����_��dd��a��T'����vail�D�3�
d�U�'�VS���%108������%��dot�: Ext�OE�2�"Inj�K�2XML�`nat�G�1���.47��:�I�ZJ�-�9�Q9���L9���M�NDen�OfS�\ice��ASP�]C�MVC���H��0�<M�lS�
D�i�r�u��.�v801��wRub��a�ens������p�:��.�-or�&0���-��h�e���2�5	 t�Y�O5���-�����,sks���4Pr��(3�
"�	"�Y428)�J��Hou�!�(R��xp���!��5�9�:��5��	�=S��-to-F�Pt��E��L�
���f�>�f�b�i�a�M�.daem�0�d)��m�5
�2�k�1�al�"�7H�w (�(0�J�8���J�2�i6��:����	r��2un�d�>��%(��2 Apr ��r#412, �4�35�6�7�8�40�52�9�6�78��x�D��� ��3�NRe��$V 5�VInno��/��j1�51�2��DDL�/� 2���iFTS�$=27�NG���Plugi�%�5ʲPAM Au��ZJul�Z5�/Z ε�Log�"
�#R 60�R�!`�
50��5�;526�7�8��O30�1�53��o69��R
�"