Mini Shell

Direktori : /var/cache/dnf/
Upload File :
Current File : //var/cache/dnf/baseos-updateinfo.solvx

SOLV	�k�0dnf1.01.2� L���,�6w�r�/\��8��\K^������C�!x86_64noarch2.34-100.el9_4.260.el9_2.7cvebugzillai6861finalpackager@almalinux.orgrhsaself3Moderate2.9.4-6.el9_44.17.5-102.el9	3.el9_2.alma8.6-100.el9	1.el9_3.alma.1Copyright 2024 AlmaLinux OS5.14.0-70.17.1.el9_0
22.1.el9_0Copyright 2023 AlmaLinux OSkernel-abi-stablelists5.14.0-503.14.1.el9_55.1.el9_54.16.4-101.el9	3.el9_15.14.0-284.11.1.el9_28.1.el9_225.1.el9_230.1.el9_2427.13.1.el9_46.1.el9_48.1.el9_420.1.el9_44.1.el9_46.1.el9_48.1.el9_431.1.el9_43.1.el9_45.1.el9_47.1.el9_440.1.el9_42.1.el9_4bpftoolkernel-coredebug-core
modules-extramodules-extratools-libspython3-perflibsImportant5.14.0-162.12.1.el9_18.1.el9_122.2.el9_13.1.el9_16.1.el9_170.26.1.el9_0
30.1.el9_0libcurl-minimal1:2.06-27.el9_0.7.alma46.el9_1.3.alma70.el9_3.2.alma.1252-32.el9_4.alma.11:1.48.10-2.el9_5.alma.14.16.1.3-27.el9_31:2.06-77.el9.alma.1250-12.el9_1.1
3kernel-debug-modules-core
uki-virtmodules-coreuki-virt1.19.1-24.el9_120.1-8.el91.1-1.el92.el9_43.el94.el9_5openssl-libsCopyright 2022 AlmaLinux OSpython3krb5-libspkinitserver-ldaplibkadm5smbclientwbclientpython3-sambasamba-client-libsommon-libslibswinbind-modules7.76.1-14.el9_0.5curl-minimal1.46.5-3.el9expatLowgnutls7.76.1-19.el9
_1.1223.el9
_2.1246.el9
_3.239.el9_4.11.29.33.1-2.el9_2.alma.13.90.0-6.el9_3openssl1:3.0.1-41.el9_02:8.2.2637-16.el9_0.233.21.0-9.el9_3.alma.1cups-libslibnetapixml2samba-dc-libs18.168.6.1-135.el9_2.alma.140.el9_3
3.1.el9_43.el9_4:1.12.20-7.el9_12.12.5.2-1.el9311.2-1.el9_423.1-1.el9_5samba-common8.7p1-29.el9_230.el9_24.el9_3.38.el9_4.140.8.7-20.el97.el9_0.112:4.4.2-17.b1.el9
8.b1.el93.5.3-2.el9_0c-areslibnghttp2ua-libsopenscsystemd-containerlibs0.8-15.el920.el96.2-10.20210508.el9krb5-workstationsamba-common-toolswinbind20230310-135.el9_2.alma.1814-140.el9_340603-143.1.el9_4905-143.3.el9_4grub2-commonefi-aa64-modules
x64-modulespc-modulesiwl100-firmware0-firmware5-firmware35-firmware2000-firmware30-firmware3160-firmware5000-firmware150-firmware6000g2a-firmware	b-firmware50-firmware7260-firmwarelibertas-sd8787-firmwarenux-firmware-whencenetronome-firmwareopenssh-clientskeycatservervim-filesystem1:3.0.1-43.el9_0	7.el9_17-16.el9_225.el9_3	7.el9	8.el9_46.el9_22.2-6.el9_52.2.10-12.el9_0.235.2-42.el99.13-3.el9_1
2.15.el9_36.el9_4:4.9-8.el93.9.14-1.el9_1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9_5.15.2.5-8.el9_039-16.el972-2.el9avahi-libsdbus-libsevice-mapper-multipath-libsglib2c-gconv-extraharfbuzzlibarchiveksbanslsshpamrepokey:type:idsqlite-libs0.10.4-11.el93.el93.3.17-13.el9grub2-efi-x64
-cdbootpctools-efi
xtraminimalpython3-libxml2samba-dcsamba-dcerpcldb-ldap-modulestoolsusersharesvim-minimalgrub2-ppc64le-modulessystemd-rpm-macros15.6-1.el9.alma3.9.10-3.el9_0device-mapper-multipathlesssystemd-oomdpamresolvedudev0.23.0-2.el93.el9_34.el9_34.1-3.el9_21.10.0-11.el97.1-5.el9_2.19.1-1.el92.el9_43.3-0.el913.el943.0-5.el9_2.1
3.1
4.35.1-19.el922.el9_55.el9_06.el9_18-6.el9_4.alma.1:2.3.3op2-16.el9_2.121.el97.el9_431.el9_56.2.0-13.el92.10.4-9.el94.9-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.168.4-11.el94.el9_4.17.4-10.el98.el9:8.2.2637-20.el9_11.el93.2.2-2.el934.1-6.el9_17.el9_35.3-4.el97.6-12.el9_08.el9_123.el9_3.348.3-4.el9_44.16.0-8.el9_15.4.2-4.el9_0.34-2.el9_13.el9NetworkManager-libnmbinutilsluez-libse2fsprogs-libsfile-libsreetypegmplibcapom_erreconfgcryptipa_hbacldbndpsss_certmapidmapnss_idmapsimpleifptasn1irpcncurses-libsopencryptoki-libsprocps-ngtobuf-cython3-ldbrepokey:type:strpm-build-libslibssign-libsshadow-utils-subidssd-clienttpm2-tssxz-libs1:25.30.13.0-135.el9_2.alma.140.el9_33.1.el9_43.el9_42.24.0-2.el9_5.alma.153.0.0-10.el9_1.12.el9_4.1bubblewrapcockpit-bridgedocsystemwsdbus-commontoolshcp-clientommonrelayserverglibc-all-langpackscommonlangpack-aafgrkmnprstyczbemrghboinorxsyncaehrkbmnrhsbvydaeoisbvzelnostufafilorurygadezluvhakeifnersbtuyiadgkstujakabklmnoksuwylbgijnotvzhmagifeghriqjwklniwrstynanbdsehniulnrsoocmrspaplstquzrajouwsahtcdegshnsidklmoqrstvwzltacyegheigklnopirstugknmrzveiwaeloxhyiouewzhuminimal-langpackkernel-cross-headersdebug-devel-matched	vel-matchedocheaderstools-libs-develuki-virt-addonspartxlibssh-confignscdperfython3-setuptools-wheelurllib3shim-x64udovim-X11commonenhanced0.4.1-7.el9_4.alma.18.el9_58.7-12.el9_1.11.2.11-32.el9_02-2.el98.10-2.el9.alma9.5p2-10.el9_37.el9_1.15.8-4.el9_3.alma.1:2.10-5.el93.3-7.el9_2.12.2.10-12.el9_0.33.3-2.el9_08-5.1.el9_0:1.34-6.el9_13.18.0-7.el92.3-18.el96.0.1-4.el9:2.1.0-18.el94.35.0-6.el9_34-10.git1.el95.1.8-6.el9_12-4.el96.1-6.el990-2.el9_23.el9_34.el9_47.0.0-284.11.1.el9_28.1.el9_2
25.1.el9_2
30.1.el9_23.0-427.13.1.el9_46.1.el9_48.1.el9_4
20.1.el9_44.1.el9_46.1.el9_48.1.el9_4
31.1.el9_43.1.el9_45.1.el9_47.1.el9_4
40.1.el9_42.1.el9_44.0-503.14.1.el9_55.1.el9_5NetworkManager-adslbluetoothteamuiwifiwanbashinutils-goldluezsdtardbus-brokermidecodee2fsprogsxfatprogspat-develfilewupdgnupg2ldb-toolsibarchive-develcurl-develdnf-plugin-subscription-managersss_autofssudoogrotatenanocursessprs-softokn-freeblysinitutilopencryptoki-icsftok
swtokssl-develperlpython3-cloud-what	ryptographylibipa_hbacsss_nss_idmaprpmsss-murmur	ubscription-manager-rhsmrepokey:type:flexarraypm-plugin-auditselinuxsignsyncshadow-utilsim-unsigned-x64quashfs-toolsssd-adcommon-pacdbusipakcmrb5	-commonldapnfs-idmappasskeyolkit-rulesroxytoolswinbind-idmapubscription-manager-plugin-ostreetarpm2-toolsraceroutewpa_supplicantxzzlib1.26.5-3.el9_3.15.el9_4.1:39.31.5.1-135.el9_2.alma.1
40.el9_33.1.el9_43.el9_42.10-7.el9_4.125.1-7.el9_26.1-3.el91.2.3-7.el939.31.5.1-135.el9_2.alma.140.el9_33.1.el9_43.el9_441.28.5.1-135.el9_2.alma.140.el9_33.1.el9_43.el9_4:20240910-1.el9_58.24.2.2-135.el9_2.alma.1
40.el9_33.1.el9_4
3.el9_483.5.1_1-135.el9_2.alma.140.el9_3
3.1.el9_43.el9_4NetworkManager-config-serverinitscripts-updownmicrocode_ctlncurses-baseprocps-ng-i18nython3-dnsidnapip-wheelrequestssssdconfigrhel-net-naming-sysattrstuned-profiles-cpu-partitioningpatch:ALSA-2022:49405099242495294260031572246028108385470901852883148239826791931784053618459340053936373:02823334567894036267529465123478911414707013212745897887502192332708264550355995722354325479504774125697088385061897145362763838658793566152131254359617798594897057445677478794:03104634568533790811966102447438412930239530692879903239464103378475663835041277016797583306395011361984236407831249457583636774699285363529349286162363564645677548399774848162446617931725313714014513234304968704541605repokey:type:relidarray
numsitory:solvablessolvable:arch	buildtime	conflicts	description	evr	name	patchcategory
rovides	summary	vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatus�O�O�P�P�Q�Q����ll55�C�C9922�>�>�=�=�D�D�@�@�A�A//�?�?440066�I�I8877::1133�l�l�
�
���DDEE�jjii�%YY�&�&�%||���� � �!�!������_�_�N�N�_�6�6�|�|�v�v�w�w�z�z�y�y�{�{�x�x�M�Ml�lEDY����nnn�m�m�m�g�g�F�F�g���O�O;;[[����4�4�&�&�%�%aaggffddbbbfeedacc�$�$gce�W�W�J�J���J�W�C�C�C;�A�A�L�L�A�F�F�F�L�
�
�k�k�k�s�s�p�p�r�r���R�R�R]]__\\^^_``\�#�#^`]�N�N�m�m�f�f�o�o�f������
�
������
�
�������}�}�r�r�r���Q�Q�Q�J�JRRQQOOPP�������������~�~�����B�B�@�@�A�A�C�C����	�	�G�G�G�H�H���'�'�I�I�.�.������E�E�E�O�O�"�"�w�w�	�	�
�
�B�B�	�	�<�<�)�)�'�'�/�/�n�n���>�>�f�f�����l�l�!�!�x�x�e�e�����u�u�F�F�H�H�#�#���Q�Q�N�N���j�j�4�4���j�j�0�0�-�-�{�{�}�}�����k�k���2�2���/�/�]�]���&�&���T�T���H�H�$�$�@�@�v�v�$�$�������"�"�2�2�J�J���#�#�6�6�i�i���E�E�������t�t�g�g�~�~�D�D�I�I�����=�=�,�,�Z�Z���)�)�0�0�z�z�9�9�b�b���w�w�A�A�[�[���:�:���
�
�������x�x�h�h�V�V�����R�R�3�3�y�y�M�M�y�y�+�+� � �{�{���P�P���m�m�;�;�^�^���u�u�1�1�X�X�i�i�?�?�t�t�S�S�d�d�L�L�z�z�~�~�%�%�����o�o�.�.�a�a�,�,���*�*���7�7�|�|���n�j�;�;���������9�9�8�8�C�C�(�(�5�5�����*�*�&�&�-�-�'�'�3�3�`�`���q�q�.�.�c�c�(�(�i�s�s�
�
��� � ���7�7�<�<�|�|�n�n���_�_�W�W�U�U���5�5�
�
���}�}�G�G�4�4�\�\�:�:�������1�1�!�!�v�v�K�K�8�8�r�r�����+�+���Y�Y�p�p�%�%�6�6�������?�?�?���(�(�V�V�V�h�h�h�5�5�\�\�\�o�o�o�D�D�D�^�^�^���S�S�S�U�U�U�e�e�d�d�d�e�3�3�[�[�1�1�+�+�2�2�Z�Z�Y�Y�[�0�0�Z�Y�p�p�p�E�E�T�T�T�$�$�#�#�"�"�7�7���L�L�B�B���B�M�M�I�I�]�]�*�*�:�:�8�8�-�-�P�P�9�9�E�E�@�@�P�C�C�F�F�O�O�<�<�I�M�M�;�;�)�)�A�A�>�>�N�N���G�G�D�D���=�=�?�?�M�B�B�]�N�,�,�O�l�l�h�h�i�i�K�K�K�g�g�������>�>���>�������H�H�H�@�@�	�	�@�K�K���x	�g~�h~�i~�j~�k~�l~�m~�n~�D~�z	�o�M�p�M�q�M�r�M�{	�s�t�u�v�w�x�y�z�{�|�}�~�B�����������	�
���
��������������|	����������� ��}	�i�j�k�l�m�n�D�g�h�~	���s�t�B�u�v�
��������y�z���}�~���������	�
���w�x���{�|���	�!h�"h�#h�$h�%h�&h�'h�(h�)h�*h�	�+}�,}�-}�.}�/}�0}�1}�2}�	�	�	�	�	�		�
	�	�	�
	�	�	�	�	�	�	�	�	�	�	�	�	�	� 	�!	�"	�#	�$	�&	�)	�*	�,	�-	�.	�/	�1	�2	�3	�4	�5	�6	�8	�9	�;	�<	�=	�>	�?	�@	�A	�B	�C	�D	�E	�G	�I	�J	�K	�L	�M	�N	�P	�S	�T	�U	�V	�W	�Z	�\	�_	�a	�b	�c	�d	�e	�f	�h	�i	�j	�l	�m	�n	�p�r�s�u�v�x�8{�9{�:{�;{�<�e�3�e�5{�6{�7{�={�4{�>{�y�z�|�}�~�������	���������������� �!�"�#�&�'�(�)�*�,�.�/�0�1�2�3�4�5�7�8�9�:�;�<�=�>�@�A�B�F�G�H�I�J�K�?�a�@�a�A�a�B�a�C�a�D��E��FF�GF�HF�IF�JF�KF�LF�MF�NF�OF�-F�,F�F�PF�QF�RF�SF�.F�T��U��+F�y	�V�M�W��Xh�Yh�Z}�[�^�\�^�]�_�^�_�	�B�B�B�B�sB�tB�wB�xBB�B�B�	B�
B�
B�B�B�B�B�B�B�B�B�B�yB�zB�q�]�r�]�_�5�`�5�a�5�b��c��d��	�e��f��g��h��i��j��k��	�1�E�2�E�,�E�-�E�Z�E�l�U�m�U�C�C�C�C�C�C�C�C�	C�
C�wC�xC�sC�tC�C�C�yC�zC�C�C�C�CC�
C�C�n��o��p��q��r�;�s�;�t�;�	A�
A�A�A�A�A�A�A�
A�AA�yA�zA�A�A�A�A�sA�tA�A�A�A�A�wA�xA�u�b�v�b�$o�%o�"o�#o�Yo�Xo�)o�*o�'o�(o�w�x�y�z�{�|��}�~�����������	�
���
���������������������	��%��%��%�p�T�q�T��T�o�T�n�T�k�k� k�!k�"k�#k�$k�%k�&k�'k�(k�)�.�*�.�+�.�q��,��-��.��/��0��1��	�2�a�3�a�	�4��5��6��	�j�T�k�T�	��U�o�U�p�U�q�U�n�U�7S�8S�9S�:S�;S�<S�=S�>S�?S�@S�AS�BS�CS�DS�ES�FS�GS�H�Y�I�Y�)p�*p�$p�%p�"p�#p�Yp�Xp�'p�(p�s=�t=�=�=�=�=�	=�
=�=�=�=�=�=�=�y=�z==�=�=�=�=�
=�=�w=�x=�J�	�K�	�L�	�M�	�n�	�N�	�O�	�P�	�QM�RM�SM�TM�UM�M�VM�WM�XM�YM�ZM�[M�\M�]M�^M�_M�`M�aM�V�&�r�&�q�&�b�O�c�O�d�O�e�O�f�O�g�2�h�2�i�2�j�g�k�g�%	�l�:�m�:�n�:�b��c��d��'	�LG�MG�NG�OG�+G�PG�QG�FG�GG�,G�G�RG�SG�.G�-G�JG�KG�HG�IG�(	�Z�F�-�F�1�F�2�F�,�F>�w>�x>�>�>�>�>�s>�t>�>�>�
>�>�>�>�>�>�>�>�y>�z>�>�>�	>�
>�K�e�J�e�+	�p�V�q�V��V�o�V�n�V�UN�TN�XN�YN�]N�^N�[N�\N�VN�WN�QN�RN�aN�SN�ZN�N�_N�`N�t�<�s�<�r�<�m�/�n�/�D�/�o�`�p�`�0	�a�6�`�6�_�6�?�?�?�?�?�?�?�?�
?�?�?�??�y?�z?�?�?�	?�
?�?�?�w?�x?�s?�t?�"q�#q�Yq�Xq�%q�)q�*q�$q�'q�(q�@�@�@�@�@�@�s@�t@�@�@�	@�
@�@�@�
@�@�y@�z@�@�@@�@�@�w@�x@��~�	����y�z�}���{�|������
�������
�w�x�s�t�w�x�����q�r�	�
�
��s�t����m��m���y�z���u�v�w�x���g��h��j��k��e��f��i��7	�Yr�#r�)r�*r�Xr�%r�"r�$r�'r�(r�y�W�z�W�q��.��/��0��1��,��-��:	�{�|�}�~������
�|�y�z�	������}�~�������{�����	�����w�x�
�
����,�K�-�K�Z�K�1�K�2�K�W�4��4��4�?T�:T�;T�<T�BT�=T�>T�CT�DT�FT�AT�GT�8T�ET�@T�7T�9T�t�=�s�=�r�=�����
������������)s�*s�"s�#s�'s�(s�$s�%s�Ys�Xs�������n�W�o�W��W�p�W�q�W�Z�G�-�G�,�G�1�G�2�G�������	�
�y�z�
����s�t�u�v���w�x��n��n�s�t���w�x�q�r��j��j�F	���y�z�	��{�|�}�~�����	��
�|�����
����}�~�������{���w�x����
��������H	�b�P�c�P�e�P�f�P�d�P�s�W�)t�*t�Xt�%t�$t�Yt�#t�'t�(t�"t� � �s �t �
 � �	 �
 �y �z � � � � � � �u �v � � �w �x �s �t ��o��o�w �x � � �q �r  �����
������������N�
�O�
�L�
�M�
�n�
�J�
�K�
�P�
�z�z�z�z�z� z�!z�"z�#z�$z�O	�%� �&� �'� �(�\�)�\�Q	�5�`�9��6�g�7�c�3��?�'�8��1��2��/�Z�4��>�'�;�`�0�R�<�'�=�'�:�^�R	�!�!�s!�t!�!�!�y!�z!�	!�
!�q!�r!�
!�!�!�!�u!�v!��p��p�w!�x!�!�!�s!�t!�w!�x!!�!�!�!�!�*�'�+�'�,�'�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�����������	�
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�n�X�o�X��X�p�X�q�X�'u�(u�Xu�%u�$u�"u�#u�)u�*u�Yu�J��K��L��X	�M��N��O��Y	�P�N�Q�N�R�N�S�N�T�N�2��=�(�?�(�0�S�>�(�4��6�h�1��/�[�5�a�8��9��3��<�(�:�_�;�a�7�d�[	�'�!�&�!�%�!�U�c�V�c�]	�W��X��Y��^	�Z�+�[�+�\�+�]�S�^�S�_�S�`�S�a�S�`	�������b�s�c�s�G�s�d�s��Y�o�Y�p�Y�q�Y�n�Y�e�$�f�$�g�$�
��y�z��~�	���w�x���
�|���{�����������������}��
�|�}�~�{��	��"v�#v�Xv�%v�'v�(v�Yv�)v�*v�$v�h�1�i�1�j�1�g	�r�Y�k�"�l�"�m�"�n�"�o�"�n�"�BU�<U�FU�AU�7U�8U�9U�:U�@U�=U�>U�EU�;U�CU�DU�?U�GU�p�u�q�u�o�u�r�u�k	�s� �t� �u� �v� �w� �x� ���	����
�|�
�|�	����}�~������������{�}�~���w�x�{��y�z��
�����'w�(w�"w�#w�)w�*w�Xw�%w�Yw�$w�J��K��L��o	�e�Q�f�Q�b�Q�c�Q�d�Q�O��N��M��q�1�H�2�H�Z�H�-�H�,�H�yK�zK�{K�|K�}K�~K�K�K�K�K�K�K�K�K�K�K�	K�
K�K�L�P�t�g�3�h�3�i�3�n�Z�o�Z�p�Z�q�Z��Z�,H�-H�JH�KH�RH�SH�+H�H�.H�HH�IH�FH�GH�PH�QH�LH�MH�NH�OH�w�_�7�`�7�a�7�H�X�I�X�M��N��O��{���
����
��u�v�w�x���q�r�����������	�
�s�t�s�t�y�z�w�x�������w�d�v�d�Xx�%x�$x�'x�(x�"x�#x�Yx�)x�*x�����
�������������������������������q�(�r�(�V�(��k��k��_�8�`�8�a�8�T�Z�U�Z��"�"�s"�t""�	"�
"�w"�x"�u"�v"�w"�x"�"�"�"�"�"�"�"�"�s"�t"�y"�z"�
"�"�q"�r"�"�"��q��q��f��f��)�-�*�-�+�-�x�!�t�!�w�!�v�!�s�!�u�!��V��V�
���
����Z�I�-�I�,�I�1�I�2�I�.L�NL�OL�RL�SL�PL�QL�HL�IL�JL�KL�LL�ML�-L�,L�+L�FL�GL�
�uI�ZI�RI�]I�^I�VI�WI�aI�\I�SI�TI�UI�[I�_I�`I�QI�XI�YI�I��d��d��d�t�c�t�G�t�b�t� �b�!�b�"�b�#�b�$�b�%�[�&�[��a�9�`�9�_�9�t�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�R�f�R�d�R�c�R�b�R�	#�
#�s#�t##�#�#�#�#��r��r�y#�z#�#�#�
#�#�s#�t#�#�#�w#�x#�#�#�q#�r#�u#�v#�#�#�w#�x#�
$�$�$�$�u$�v$�q$�r$�s$�t$$�$�$�$�$�y$�z$�w$�x$�$�$�	$�
$�s$�t$�w$�x$�$�$�$�$��s��s�G�H�y�z��� �!�>�?�?�@�1�2�!�"�i�j�#�$�_�`�S�T�Q�R�����<�=�!�"�O�P�-�.�E�F�B�C�{�|�� �]�^���a�b�o�p���]�^�m�n�M�N�3�4�s�t�2�3�a�b�k�l�q�r�K�L�Y�Z�_�`�A�B���
��W�X���"�#�+�,�W�X�e�f�
��;�<�K�L�H�I�'�(�I�J���5�6�}�~�)�*�����i�j�A�B�:�;�Q�R�q�r�1�2���3�4�[�\�#�$�/�0�E�F�C�D������
�6�7�	�
�w�x�9�:�[�\�5�6�
����D�E�����g�h���=�>�*�+���4�5�w�x���/�0�7�8�%�&���k�l�9�:�u�v���m�n�S�T���9�:���y�z�%�&���U�V�;�<���U�V�@�A�k�l���F�G�(�)���Y�Z�M�N�?�@����	�I�J�,�-���=�>���_�`�s�t�g�h�1�2���+�,�g�h�a�b�i�j���c�d�8�9�;�<�[�\�]�^�~��{�3�4�S�T�K�L�r�A�B�O�P�w�x�Y�Z���.�/�u�v�$�%�� �	�
���0�1�/�0�U�V�=�>���e�f�5�6�G�H�q���{�|�7�8�&�'�C�D�o�p�m�n�o�p�I�J�O�P�C�D���?�@�Q�R�E�F���e�f�G�H�|�}�'�(�����7�8�M�N�y�z�-�.�c�d�c�d�)�*�}�~�-�.�s�t���u�v�W�X�L��K��J����l��l��w%�x%�%�%�%�%�%�%�y%�z%�u%�v%�%�%��t��t�w%�x%�q%�r%�s%�t%�	%�
%�
%�%�%�%%�%�%�s%�t%�������k��e��f��g��h��j��i��j��q�V��n�[�o�[�p�[�q�[��[�����
������������w&�x&�s&�t&�w&�x&�s&�t&�y&�z&�&�&�q&�r&��u��u�&�&�u&�v&�&�&�
&�&�&�&&�&�&�&�&�	&�
&�������������
����s'�t'�'�'�w'�x''�'�'�	'�
'�'�'�'�'�w'�x'�'�'��v��v�y'�z'�'�'�
'�'�s'�t'�u'�v'�q'�r'�k��l��m��$�4��:�`�5�b�9��7�e�?�)�/�\�2��1��<�)�0�T�=�)�8��6�i�;�b�>�)�3��%�%�"�&�"�'�"�p�\�q�\�n�\�o�\��\�(�(�(�(�
(�(�s(�t(�(�(�u(�v(�w(�x(�q(�r(�s(�t(�(�(�	(�
(�w(�x(�(�(�y(�z(��w��w(�(�(�u)�v)��x��x�)�)�)�)�)�)�w)�x)�	)�
)�w)�x)�s)�t)�
)�)�s)�t)�)�))�y)�z)�)�)�q)�r)�)�)�Xy�%y�Yy�#y�$y�'y�(y�)y�*y�"y�J�f�K�f�+�*�*�*�*�y*�z**�u*�v*�*�*�	*�
*�*�*�w*�x*�*�*�q*�r*�
*�*�w*�x*�s*�t*�s*�t*��y��y�*�*�L�Q�-��]�o�]�p�]�q�]�n�]�BV�<V�CV�DV�=V�>V�FV�AV�EV�;V�?V�:V�7V�8V�@V�GV�9V�n�R�o�R�Z�,�[�,�\�,�+�+�w+�x+�
+�+�y+�z+�+�+�u+�v+�+�+�+�+��z��z�s+�t+�+�+�s+�t+�+�+�q+�r++�w+�x+�	+�
+�V�)�r�)�q�)�Z�J�-�J�1�J�2�J�,�J�,�,�u,�v,�,�,�	,�
,�,�,�,�,�s,�t,�y,�z,�q,�r,�s,�t,�w,�x,�,�,�,�,��{��{�w,�x,�
,�,,�8��3��1��;�c�0�U�5�c�6�j�>�*�7�f�4��:�a�<�*�9��?�*�=�*�/�]�2��6�q-�r-�y-�z-�-�-�-�-�-�-�s-�t-��|��|�
-�-�w-�x-�-�-�-�-�u-�v-�	-�
-�s-�t--�-�-�w-�x-�p�^�q�^��^�o�^�n�^�y.�z.�.�.�.�..�s.�t.�	.�
.�w.�x.�q.�r.�.�.�u.�v.�.�.�
.�.�w.�x.�.�.��}��}�.�.�s.�t.�lJ�pJ�qJ�rJ�sJ�kJ�tJ�uJ�vJ�wJ�xJ�yJ�zJ�{J�|J�}J�~J�J�J�i�
�j�
�e�
�f�
�g�
�h�
�k�
�j�
�BW�<W�@W�AW�EW�>W�?W�:W�;W�7W�8W�=W�9W�GW�FW�CW�DW�1�L�2�L�,�L�-�L�Z�L��_�o�_�n�_�p�_�q�_�m�b�?�������D�0�m�0�n�0��c��c��c��c��c�p�X�C�	�h�
�h�D��i��i�E�n�S�o�S��`�o�`�p�`�q�`�n�`�%�#�&�#�'�#�9X�:X�GX�8X�?X�EX�>X�;X�<X�=X�BX�7X�FX�AX�CX�DX�@X�q�*�r�*�V�*�w�x�����w�x�s�t���
����y�z��~��~���	�
�u�v���q�r�s�t���T�q�O�q�S�q�X�q�V�L�(�Q�L�E�N�/�U�X�f�q�W�X�d�q�e�q�R�X��	�`�X�a�X�b�X�c�q�_�/�]�q�[�q�Z�q�\�X�Y�/�^�/�P�M NOPSTUABCDEFHIJKLMRWX��w��F�T�x	��zBBBsecurity
Important: xz security updateZ<�https://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:4940
�_�axz-libs-5.2.5-8.el9_0.i686.rpm�N�axz-5.2.5-8.el9_0.x86_64.rpm�_�axz-libs-5.2.5-8.el9_0.x86_64.rpm�_�axz-libs-5.2.5-8.el9_0.i686.rpm�N�axz-5.2.5-8.el9_0.x86_64.rpm�_�axz-libs-5.2.5-8.el9_0.x86_64.rpm���� �y	��BBBBBBBBBBBBBBBBBBBBBsecurity
Important: grub2, mokutil, shim, and shim-unsigned-x64 security updateZ<��|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099
�6�shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm�|Fgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm�vFgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm�wFgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm�zFgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm�yFgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm�-Fgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm�,Fgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm�Fgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm�{Fgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm�xFgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm�.Fgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm�M�shim-x64-15.6-1.el9.alma.x86_64.rpm�+Fgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm�6�shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm�|Fgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm�vFgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm�wFgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm�zFgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm�yFgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm�-Fgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm�,Fgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm�Fgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm�{Fgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm�xFgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm�.Fgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm�M�shim-x64-15.6-1.el9.alma.x86_64.rpm�+Fgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm����f�z	��OBBBBBBBsecurity
Moderate: vim security updateZ��Thttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242
�O~vim-X11-8.2.2637-16.el9_0.2.x86_64.rpm�P~vim-common-8.2.2637-16.el9_0.2.x86_64.rpm�Q~vim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm�~vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm�D~vim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm�O~vim-X11-8.2.2637-16.el9_0.2.x86_64.rpm�P~vim-common-8.2.2637-16.el9_0.2.x86_64.rpm�Q~vim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm�~vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm�D~vim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm���_�{	��YBBB�<security
Moderate: expat security updateZ�e�xhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244
��Mexpat-devel-2.2.10-12.el9_0.2.x86_64.rpml�Mexpat-2.2.10-12.el9_0.2.i686.rpml�Mexpat-2.2.10-12.el9_0.2.x86_64.rpm��Mexpat-devel-2.2.10-12.el9_0.2.x86_64.rpml�Mexpat-2.2.10-12.el9_0.2.i686.rpml�Mexpat-2.2.10-12.el9_0.2.x86_64.rpm���%�|	��^BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security and bug fix updateZ<�]�
https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249
5kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�Ckernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm9kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm2kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm�>kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�=kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�Bkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm�Dkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�@kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�Akernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm/bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm�?kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm4kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm0kernel-5.14.0-70.17.1.el9_0.x86_64.rpm6kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�Iperf-5.14.0-70.17.1.el9_0.x86_64.rpm8kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm7kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm:python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm1kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm3kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm5kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm�Ckernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm9kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm2kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm�>kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�=kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm�Bkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm�Dkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�@kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm�Akernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm/bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm�?kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm4kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm0kernel-5.14.0-70.17.1.el9_0.x86_64.rpm6kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm�Iperf-5.14.0-70.17.1.el9_0.x86_64.rpm8kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm7kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm:python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm1kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm3kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm�����}	��IBBBBB�security
Moderate: libarchive security updateZ�r�Xhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252
�l�libarchive-3.5.3-2.el9_0.x86_64.rpm�
�bsdtar-3.5.3-2.el9_0.x86_64.rpm�l�libarchive-3.5.3-2.el9_0.i686.rpm��libarchive-devel-3.5.3-2.el9_0.x86_64.rpm�l�libarchive-3.5.3-2.el9_0.x86_64.rpm�
�bsdtar-3.5.3-2.el9_0.x86_64.rpm�l�libarchive-3.5.3-2.el9_0.i686.rpm��libarchive-devel-3.5.3-2.el9_0.x86_64.rpm���t�~	��PBBBBBBBsecurity
Moderate: vim security updateZ�J�Rhttps://access.redhat.com/errata/RHSA-2022:5942RHSA-2022:5942RHSA-2022:5942https://access.redhat.com/security/cve/CVE-2022-1785CVE-2022-1785CVE-2022-1785https://access.redhat.com/security/cve/CVE-2022-1897CVE-2022-1897CVE-2022-1897https://access.redhat.com/security/cve/CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/20886892088689https://bugzilla.redhat.com/20916822091682https://bugzilla.redhat.com/20916872091687https://errata.almalinux.org/9/ALSA-2022-5942.htmlALSA-2022:5942ALSA-2022:5942
�Pvim-common-8.2.2637-16.el9_0.3.x86_64.rpm�Qvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm�vim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm�Dvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm�Ovim-X11-8.2.2637-16.el9_0.3.x86_64.rpm�Pvim-common-8.2.2637-16.el9_0.3.x86_64.rpm�Qvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm�vim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm�Dvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm�Ovim-X11-8.2.2637-16.el9_0.3.x86_64.rpm����U�	��ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security, bug fix, and enhancement updateZ��qhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003
8kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm5kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�Bkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm�Ckernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm6kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm1kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm�Iperf-5.14.0-70.22.1.el9_0.x86_64.rpm0kernel-5.14.0-70.22.1.el9_0.x86_64.rpm2kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm�?kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�=kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�Dkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm7kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm�Akernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm4kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�@kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm9kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm:python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm�>kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm3kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm8kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm5kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm�Bkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm�Ckernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm6kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm1kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm�Iperf-5.14.0-70.22.1.el9_0.x86_64.rpm0kernel-5.14.0-70.22.1.el9_0.x86_64.rpm2kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm�?kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm�=kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm�Dkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm7kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm�Akernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm4kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm�@kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm9kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm:python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm�>kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm3kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm��о}�	��EBBBBBBBBB�Lsecurity
Moderate: curl security updateZ�
�https://access.redhat.com/errata/RHSA-2022:6157RHSA-2022:6157RHSA-2022:6157https://access.redhat.com/security/cve/CVE-2022-32206CVE-2022-32206CVE-2022-32206https://access.redhat.com/security/cve/CVE-2022-32207CVE-2022-32207CVE-2022-32207https://access.redhat.com/security/cve/CVE-2022-32208CVE-2022-32208CVE-2022-32208https://bugzilla.redhat.com/20993002099300https://bugzilla.redhat.com/20993052099305https://bugzilla.redhat.com/20993062099306https://errata.almalinux.org/9/ALSA-2022-6157.htmlALSA-2022:6157ALSA-2022:6157
Ehlibcurl-minimal-7.76.1-14.el9_0.5.i686.rpmDhlibcurl-7.76.1-14.el9_0.5.i686.rpmDhlibcurl-7.76.1-14.el9_0.5.x86_64.rpmEhlibcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm�hlibcurl-devel-7.76.1-14.el9_0.5.x86_64.rpmjhcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpmihcurl-7.76.1-14.el9_0.5.x86_64.rpmEhlibcurl-minimal-7.76.1-14.el9_0.5.i686.rpmDhlibcurl-7.76.1-14.el9_0.5.i686.rpmDhlibcurl-7.76.1-14.el9_0.5.x86_64.rpmEhlibcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm�hlibcurl-devel-7.76.1-14.el9_0.5.x86_64.rpmjhcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpmihcurl-7.76.1-14.el9_0.5.x86_64.rpm�����	��PBBBBBBB�security
Moderate: openssl security and bug fix updateZ�&�/https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224
Y}openssl-libs-3.0.1-41.el9_0.x86_64.rpm�&}openssl-perl-3.0.1-41.el9_0.x86_64.rpmY}openssl-libs-3.0.1-41.el9_0.i686.rpm�%}openssl-devel-3.0.1-41.el9_0.x86_64.rpm|}openssl-3.0.1-41.el9_0.x86_64.rpmY}openssl-libs-3.0.1-41.el9_0.x86_64.rpm�&}openssl-perl-3.0.1-41.el9_0.x86_64.rpmY}openssl-libs-3.0.1-41.el9_0.i686.rpm�%}openssl-devel-3.0.1-41.el9_0.x86_64.rpm|}openssl-3.0.1-41.el9_0.x86_64.rpm�����	��\security
Moderate: gnupg2 security updateZ�U�(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602
��^gnupg2-2.3.3-2.el9_0.x86_64.rpm��^gnupg2-2.3.3-2.el9_0.x86_64.rpm����'�	� �^security
Moderate: dbus-broker security updateZ�}�chttps://access.redhat.com/errata/RHSA-2022:6608RHSA-2022:6608RHSA-2022:6608https://access.redhat.com/security/cve/CVE-2022-31212CVE-2022-31212CVE-2022-31212https://access.redhat.com/security/cve/CVE-2022-31213CVE-2022-31213CVE-2022-31213https://bugzilla.redhat.com/20947182094718https://bugzilla.redhat.com/20947222094722https://errata.almalinux.org/9/ALSA-2022-6608.htmlALSA-2022:6608ALSA-2022:6608
��_dbus-broker-28-5.1.el9_0.x86_64.rpm��_dbus-broker-28-5.1.el9_0.x86_64.rpm�����	��aBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security, bug fix, and enhancement updateZ<�`�=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610

1Bkernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm:Bpython3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm5Bkernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm9Bkernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpmBkernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm7Bkernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm4Bkernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm6Bkernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm8Bkernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm0Bkernel-5.14.0-70.26.1.el9_0.x86_64.rpm3Bkernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm/Bbpftool-5.14.0-70.26.1.el9_0.x86_64.rpm2Bkernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm
1Bkernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm:Bpython3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm5Bkernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm9Bkernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpmBkernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm7Bkernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm4Bkernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm6Bkernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm8Bkernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm0Bkernel-5.14.0-70.26.1.el9_0.x86_64.rpm3Bkernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm/Bbpftool-5.14.0-70.26.1.el9_0.x86_64.rpm2Bkernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm����+�	��zsecurity
Important: expat security updateZ<��Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838
l�]expat-2.2.10-12.el9_0.3.x86_64.rpml�]expat-2.2.10-12.el9_0.3.x86_64.rpm�����	��|Bsecurity
Moderate: gnutls and nettle security, bug fix, and enhancement updateZ�r�2https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854
n�5gnutls-3.7.6-12.el9_0.i686.rpmn�5gnutls-3.7.6-12.el9_0.x86_64.rpmn�5gnutls-3.7.6-12.el9_0.i686.rpmn�5gnutls-3.7.6-12.el9_0.x86_64.rpm����~�	��Bsecurity
Important: libksba security updateZ<�$�Yhttps://access.redhat.com/errata/RHSA-2022:7090RHSA-2022:7090RHSA-2022:7090https://access.redhat.com/security/cve/CVE-2022-3515CVE-2022-3515CVE-2022-3515https://bugzilla.redhat.com/21356102135610https://errata.almalinux.org/9/ALSA-2022-7090.htmlALSA-2022:7090ALSA-2022:7090
�m�libksba-1.5.1-5.el9_0.x86_64.rpm�m�libksba-1.5.1-5.el9_0.i686.rpm�m�libksba-1.5.1-5.el9_0.x86_64.rpm�m�libksba-1.5.1-5.el9_0.i686.rpm����^�	�
�CBBBBBsecurity
Important: device-mapper-multipath security updateZ<�}�chttps://access.redhat.com/errata/RHSA-2022:7185RHSA-2022:7185RHSA-2022:7185https://access.redhat.com/security/cve/CVE-2022-41974CVE-2022-41974CVE-2022-41974https://bugzilla.redhat.com/21339882133988https://errata.almalinux.org/9/ALSA-2022-7185.htmlALSA-2022:7185ALSA-2022:7185
�g�device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm�F�kpartx-0.8.7-7.el9_0.1.x86_64.rpm�g�device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm��device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm�g�device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm�F�kpartx-0.8.7-7.el9_0.1.x86_64.rpm�g�device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm��device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm����d�		��KBBBsecurity
Important: openssl security updateZ<�`�https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288
|�Eopenssl-3.0.1-43.el9_0.x86_64.rpmY�Eopenssl-libs-3.0.1-43.el9_0.x86_64.rpmY�Eopenssl-libs-3.0.1-43.el9_0.i686.rpm|�Eopenssl-3.0.1-43.el9_0.x86_64.rpmY�Eopenssl-libs-3.0.1-43.el9_0.x86_64.rpmY�Eopenssl-libs-3.0.1-43.el9_0.i686.rpm����h�
	��Psecurity
Moderate: zlib security updateZ�s�Ohttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314
�O�Uzlib-1.2.11-32.el9_0.x86_64.rpm�O�Uzlib-1.2.11-32.el9_0.x86_64.rpm����S�	��RBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security, bug fix, and enhancement updateZ<�B�https://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318

7Ckernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm8Ckernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm1Ckernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm:Cpython3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm4Ckernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm9Ckernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm5Ckernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm3Ckernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm2Ckernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm/Cbpftool-5.14.0-70.30.1.el9_0.x86_64.rpm0Ckernel-5.14.0-70.30.1.el9_0.x86_64.rpmCkernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm6Ckernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm
7Ckernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm8Ckernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm1Ckernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm:Cpython3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm4Ckernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm9Ckernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm5Ckernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm3Ckernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm2Ckernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm/Cbpftool-5.14.0-70.30.1.el9_0.x86_64.rpm0Ckernel-5.14.0-70.30.1.el9_0.x86_64.rpmCkernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm6Ckernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm����j�	� �kBBsecurity
Moderate: python3.9 security updateZ�E�nhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323
;�python3-libs-3.9.10-3.el9_0.x86_64.rpm[�python3-3.9.10-3.el9_0.x86_64.rpm;�python3-libs-3.9.10-3.el9_0.x86_64.rpm[�python3-3.9.10-3.el9_0.x86_64.rpm�����
	�!�oBsecurity
Moderate: lua security updateZ��3�https://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329
��;lua-libs-5.4.2-4.el9_0.3.i686.rpm��;lua-libs-5.4.2-4.el9_0.3.x86_64.rpm��;lua-libs-5.4.2-4.el9_0.3.i686.rpm��;lua-libs-5.4.2-4.el9_0.3.x86_64.rpm����t�	�"�rBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security, bug fix, and enhancement updateZ��E�?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267

4Akernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm0Akernel-5.14.0-162.6.1.el9_1.x86_64.rpm/Abpftool-5.14.0-162.6.1.el9_1.x86_64.rpm:Apython3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm6Akernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpmAkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm2Akernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm3Akernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm7Akernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm5Akernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm1Akernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm8Akernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm9Akernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm
4Akernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm0Akernel-5.14.0-162.6.1.el9_1.x86_64.rpm/Abpftool-5.14.0-162.6.1.el9_1.x86_64.rpm:Apython3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm6Akernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpmAkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm2Akernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm3Akernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm7Akernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm5Akernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm1Akernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm8Akernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm9Akernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm��۰Q�	�#�Ksecurity
Moderate: rsync security and bug fix updateZ��H�zhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291
�4�brsync-3.2.3-18.el9.x86_64.rpm�4�brsync-3.2.3-18.el9.x86_64.rpm��ۨ3�	�$�MBBBBBBBBsecurity
Low: curl security updateZm��B�8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299
Eolibcurl-minimal-7.76.1-19.el9.x86_64.rpmDolibcurl-7.76.1-19.el9.x86_64.rpmDolibcurl-7.76.1-19.el9.i686.rpmEolibcurl-minimal-7.76.1-19.el9.i686.rpmiocurl-7.76.1-19.el9.x86_64.rpmjocurl-minimal-7.76.1-19.el9.x86_64.rpmEolibcurl-minimal-7.76.1-19.el9.x86_64.rpmDolibcurl-7.76.1-19.el9.x86_64.rpmDolibcurl-7.76.1-19.el9.i686.rpmEolibcurl-minimal-7.76.1-19.el9.i686.rpmiocurl-7.76.1-19.el9.x86_64.rpmjocurl-minimal-7.76.1-19.el9.x86_64.rpm��ދ�	�%�WBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: samba security, bug fix, and enhancement updateZ��z�mhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317
�&samba-winbind-4.16.4-101.el9.x86_64.rpm�%samba-common-tools-4.16.4-101.el9.x86_64.rpmalibsmbclient-4.16.4-101.el9.x86_64.rpm�samba-common-4.16.4-101.el9.noarch.rpmgsamba-winbind-modules-4.16.4-101.el9.x86_64.rpmfsamba-libs-4.16.4-101.el9.x86_64.rpmdsamba-client-libs-4.16.4-101.el9.i686.rpmblibwbclient-4.16.4-101.el9.x86_64.rpmblibwbclient-4.16.4-101.el9.i686.rpmfsamba-libs-4.16.4-101.el9.i686.rpmesamba-common-libs-4.16.4-101.el9.i686.rpmdsamba-client-libs-4.16.4-101.el9.x86_64.rpmalibsmbclient-4.16.4-101.el9.i686.rpmcpython3-samba-4.16.4-101.el9.i686.rpm�$samba-4.16.4-101.el9.x86_64.rpmgsamba-winbind-modules-4.16.4-101.el9.i686.rpmcpython3-samba-4.16.4-101.el9.x86_64.rpmesamba-common-libs-4.16.4-101.el9.x86_64.rpm�&samba-winbind-4.16.4-101.el9.x86_64.rpm�%samba-common-tools-4.16.4-101.el9.x86_64.rpmalibsmbclient-4.16.4-101.el9.x86_64.rpm�samba-common-4.16.4-101.el9.noarch.rpmgsamba-winbind-modules-4.16.4-101.el9.x86_64.rpmfsamba-libs-4.16.4-101.el9.x86_64.rpmdsamba-client-libs-4.16.4-101.el9.i686.rpmblibwbclient-4.16.4-101.el9.x86_64.rpmblibwbclient-4.16.4-101.el9.i686.rpmfsamba-libs-4.16.4-101.el9.i686.rpmesamba-common-libs-4.16.4-101.el9.i686.rpmdsamba-client-libs-4.16.4-101.el9.x86_64.rpmalibsmbclient-4.16.4-101.el9.i686.rpmcpython3-samba-4.16.4-101.el9.i686.rpm�$samba-4.16.4-101.el9.x86_64.rpmgsamba-winbind-modules-4.16.4-101.el9.i686.rpmcpython3-samba-4.16.4-101.el9.x86_64.rpmesamba-common-libs-4.16.4-101.el9.x86_64.rpm��ދN�	�;�sBBBBBBsecurity
Moderate: libldb security, bug fix, and enhancement updateZ��g�Lhttps://access.redhat.com/errata/RHSA-2022:8318RHSA-2022:8318RHSA-2022:8318https://access.redhat.com/security/cve/CVE-2022-32746CVE-2022-32746CVE-2022-32746https://bugzilla.redhat.com/21082152108215https://errata.almalinux.org/9/ALSA-2022-8318.htmlALSA-2022:8318ALSA-2022:8318
�W�python3-ldb-2.5.2-1.el9.i686.rpm�J�libldb-2.5.2-1.el9.i686.rpm��ldb-tools-2.5.2-1.el9.x86_64.rpm�J�libldb-2.5.2-1.el9.x86_64.rpm�W�python3-ldb-2.5.2-1.el9.x86_64.rpm�W�python3-ldb-2.5.2-1.el9.i686.rpm�J�libldb-2.5.2-1.el9.i686.rpm��ldb-tools-2.5.2-1.el9.x86_64.rpm�J�libldb-2.5.2-1.el9.x86_64.rpm�W�python3-ldb-2.5.2-1.el9.x86_64.rpm��ތ�	�&�|Bsecurity
Moderate: freetype security updateZ��3�Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340
�C�%freetype-2.10.4-9.el9.i686.rpm�C�%freetype-2.10.4-9.el9.x86_64.rpm�C�%freetype-2.10.4-9.el9.i686.rpm�C�%freetype-2.10.4-9.el9.x86_64.rpm��ތ*�	�'�BBBsecurity
Moderate: python3.9 security, bug fix, and enhancement updateZ���5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353
[�Tpython3-3.9.14-1.el9.x86_64.rpm;�Tpython3-libs-3.9.14-1.el9.i686.rpm;�Tpython3-libs-3.9.14-1.el9.x86_64.rpm[�Tpython3-3.9.14-1.el9.x86_64.rpm;�Tpython3-libs-3.9.14-1.el9.i686.rpm;�Tpython3-libs-3.9.14-1.el9.x86_64.rpm��ތ_�	�(�DBBBBBBBBBsecurity
Moderate: e2fsprogs security updateZ��7�<https://access.redhat.com/errata/RHSA-2022:8361RHSA-2022:8361RHSA-2022:8361https://access.redhat.com/security/cve/CVE-2022-1304CVE-2022-1304CVE-2022-1304https://bugzilla.redhat.com/20697262069726https://errata.almalinux.org/9/ALSA-2022-8361.htmlALSA-2022:8361ALSA-2022:8361
�Ake2fsprogs-libs-1.46.5-3.el9.x86_64.rpm�Lklibss-1.46.5-3.el9.x86_64.rpm�Ake2fsprogs-libs-1.46.5-3.el9.i686.rpm�Fklibcom_err-1.46.5-3.el9.i686.rpm�Fklibcom_err-1.46.5-3.el9.x86_64.rpm�Lklibss-1.46.5-3.el9.i686.rpm�
ke2fsprogs-1.46.5-3.el9.x86_64.rpm�Ake2fsprogs-libs-1.46.5-3.el9.x86_64.rpm�Lklibss-1.46.5-3.el9.x86_64.rpm�Ake2fsprogs-libs-1.46.5-3.el9.i686.rpm�Fklibcom_err-1.46.5-3.el9.i686.rpm�Fklibcom_err-1.46.5-3.el9.x86_64.rpm�Lklibss-1.46.5-3.el9.i686.rpm�
ke2fsprogs-1.46.5-3.el9.x86_64.rpm����p�	�)�OBsecurity
Moderate: harfbuzz security updateZ��s�uhttps://access.redhat.com/errata/RHSA-2022:8384RHSA-2022:8384RHSA-2022:8384https://access.redhat.com/security/cve/CVE-2022-33068CVE-2022-33068CVE-2022-33068https://bugzilla.redhat.com/21026082102608https://errata.almalinux.org/9/ALSA-2022-8384.htmlALSA-2022:8384ALSA-2022:8384
�k�.harfbuzz-2.7.4-8.el9.x86_64.rpm�k�.harfbuzz-2.7.4-8.el9.i686.rpm�k�.harfbuzz-2.7.4-8.el9.x86_64.rpm�k�.harfbuzz-2.7.4-8.el9.i686.rpm��ލ
�	��RBBBBBsecurity
Moderate: dhcp security and enhancement updateZ��h�}https://access.redhat.com/errata/RHSA-2022:8385RHSA-2022:8385RHSA-2022:8385https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://bugzilla.redhat.com/20645122064512https://errata.almalinux.org/9/ALSA-2022-8385.htmlALSA-2022:8385ALSA-2022:8385
�q�dhcp-common-4.4.2-17.b1.el9.noarch.rpm�s�dhcp-server-4.4.2-17.b1.el9.x86_64.rpm�p�dhcp-client-4.4.2-17.b1.el9.x86_64.rpm�r�dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm�q�dhcp-common-4.4.2-17.b1.el9.noarch.rpm�s�dhcp-server-4.4.2-17.b1.el9.x86_64.rpm�p�dhcp-client-4.4.2-17.b1.el9.x86_64.rpm�r�dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm�����	��Zsecurity
Moderate: logrotate security updateZ��e�Jhttps://access.redhat.com/errata/RHSA-2022:8393RHSA-2022:8393RHSA-2022:8393https://access.redhat.com/security/cve/CVE-2022-1348CVE-2022-1348CVE-2022-1348https://bugzilla.redhat.com/20750742075074https://errata.almalinux.org/9/ALSA-2022-8393.htmlALSA-2022:8393ALSA-2022:8393
��alogrotate-3.18.0-7.el9.x86_64.rpm��alogrotate-3.18.0-7.el9.x86_64.rpm����K�	� �]Bsecurity
Moderate: libtirpc security updateZ��/�{https://access.redhat.com/errata/RHSA-2022:8400RHSA-2022:8400RHSA-2022:8400https://access.redhat.com/security/cve/CVE-2021-46828CVE-2021-46828CVE-2021-46828https://bugzilla.redhat.com/21093522109352https://errata.almalinux.org/9/ALSA-2022-8400.htmlALSA-2022:8400ALSA-2022:8400
�R�libtirpc-1.3.3-0.el9.i686.rpm�R�libtirpc-1.3.3-0.el9.x86_64.rpm�R�libtirpc-1.3.3-0.el9.i686.rpm�R�libtirpc-1.3.3-0.el9.x86_64.rpm��ލR�	�#�asecurity
Important: device-mapper-multipath security updateZ<��*�.https://access.redhat.com/errata/RHSA-2022:8453RHSA-2022:8453RHSA-2022:8453https://access.redhat.com/security/cve/CVE-2022-3787CVE-2022-3787CVE-2022-3787https://bugzilla.redhat.com/21389592138959https://errata.almalinux.org/9/ALSA-2022-8453.htmlALSA-2022:8453ALSA-2022:8453
��Tdevice-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm��Tdevice-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm����`�	�*�dBBBsecurity
Important: python3.9 security updateZ<��X�Qhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493
;�Upython3-libs-3.9.14-1.el9_1.1.i686.rpm[�Upython3-3.9.14-1.el9_1.1.x86_64.rpm;�Upython3-libs-3.9.14-1.el9_1.1.x86_64.rpm;�Upython3-libs-3.9.14-1.el9_1.1.i686.rpm[�Upython3-3.9.14-1.el9_1.1.x86_64.rpm;�Upython3-libs-3.9.14-1.el9_1.1.x86_64.rpm����|�	�+�iBBBBBBBBBBBBBBBsecurity
Important: krb5 security updateZ<��)�ghttps://access.redhat.com/errata/RHSA-2022:8637RHSA-2022:8637RHSA-2022:8637https://access.redhat.com/security/cve/CVE-2022-42898CVE-2022-42898CVE-2022-42898https://bugzilla.redhat.com/21409602140960https://errata.almalinux.org/9/ALSA-2022-8637.htmlALSA-2022:8637ALSA-2022:8637
]Skrb5-pkinit-1.19.1-24.el9_1.i686.rpm_Skrb5-server-ldap-1.19.1-24.el9_1.i686.rpm\Skrb5-libs-1.19.1-24.el9_1.x86_64.rpm^Skrb5-server-1.19.1-24.el9_1.x86_64.rpm_Skrb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm`Slibkadm5-1.19.1-24.el9_1.x86_64.rpm\Skrb5-libs-1.19.1-24.el9_1.i686.rpm�#Skrb5-workstation-1.19.1-24.el9_1.x86_64.rpm^Skrb5-server-1.19.1-24.el9_1.i686.rpm`Slibkadm5-1.19.1-24.el9_1.i686.rpm]Skrb5-pkinit-1.19.1-24.el9_1.x86_64.rpm]Skrb5-pkinit-1.19.1-24.el9_1.i686.rpm_Skrb5-server-ldap-1.19.1-24.el9_1.i686.rpm\Skrb5-libs-1.19.1-24.el9_1.x86_64.rpm^Skrb5-server-1.19.1-24.el9_1.x86_64.rpm_Skrb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm`Slibkadm5-1.19.1-24.el9_1.x86_64.rpm\Skrb5-libs-1.19.1-24.el9_1.i686.rpm�#Skrb5-workstation-1.19.1-24.el9_1.x86_64.rpm^Skrb5-server-1.19.1-24.el9_1.i686.rpm`Slibkadm5-1.19.1-24.el9_1.i686.rpm]Skrb5-pkinit-1.19.1-24.el9_1.x86_64.rpm�����	�,�zsecurity
Important: sudo security update<���https://access.redhat.com/errata/RHSA-2023:0282RHSA-2023:0282RHSA-2023:0282https://access.redhat.com/security/cve/CVE-2023-22809CVE-2023-22809CVE-2023-22809https://bugzilla.redhat.com/21611422161142https://errata.almalinux.org/9/ALSA-2023-0282.htmlALSA-2023:0282ALSA-2023:0282
�N�Ysudo-1.9.5p2-7.el9_1.1.x86_64.rpm�N�Ysudo-1.9.5p2-7.el9_1.1.x86_64.rpm����O�	�-�|BBBBBBBBsecurity
Moderate: curl security update���&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333
ipcurl-7.76.1-19.el9_1.1.x86_64.rpmEplibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmDplibcurl-7.76.1-19.el9_1.1.x86_64.rpmDplibcurl-7.76.1-19.el9_1.1.i686.rpmEplibcurl-minimal-7.76.1-19.el9_1.1.i686.rpmjpcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmipcurl-7.76.1-19.el9_1.1.x86_64.rpmEplibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmDplibcurl-7.76.1-19.el9_1.1.x86_64.rpmDplibcurl-7.76.1-19.el9_1.1.i686.rpmEplibcurl-minimal-7.76.1-19.el9_1.1.i686.rpmjpcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm�����	�.�FBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security and bug fix update<��D�;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334

5=kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm7=kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm0=kernel-5.14.0-162.12.1.el9_1.x86_64.rpm4=kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm8=kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm:=python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm/=bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm2=kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm=kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm1=kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm3=kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm6=kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm9=kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm
5=kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm7=kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm0=kernel-5.14.0-162.12.1.el9_1.x86_64.rpm4=kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm8=kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm:=python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm/=bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm2=kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm=kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm1=kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm3=kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm6=kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm9=kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm����f� 	�/�_BBBBBBsecurity
Moderate: dbus security update���^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335
�m�	dbus-1.12.20-7.el9_1.x86_64.rpm�f�	dbus-libs-1.12.20-7.el9_1.x86_64.rpm�n�	dbus-common-1.12.20-7.el9_1.noarch.rpm�o�	dbus-tools-1.12.20-7.el9_1.x86_64.rpm�f�	dbus-libs-1.12.20-7.el9_1.i686.rpm�m�	dbus-1.12.20-7.el9_1.x86_64.rpm�f�	dbus-libs-1.12.20-7.el9_1.x86_64.rpm�n�	dbus-common-1.12.20-7.el9_1.noarch.rpm�o�	dbus-tools-1.12.20-7.el9_1.x86_64.rpm�f�	dbus-libs-1.12.20-7.el9_1.i686.rpm����}�!	�0�gBBBBBBBBBBBBBBBBsecurity
Moderate: systemd security update��]�Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336
�Msystemd-container-250-12.el9_1.1.x86_64.rpm�Msystemd-libs-250-12.el9_1.1.i686.rpm�Msystemd-libs-250-12.el9_1.1.x86_64.rpm�Msystemd-rpm-macros-250-12.el9_1.1.noarch.rpm�
Msystemd-oomd-250-12.el9_1.1.x86_64.rpm�Msystemd-resolved-250-12.el9_1.1.x86_64.rpm�Msystemd-container-250-12.el9_1.1.i686.rpm�Msystemd-250-12.el9_1.1.i686.rpm�
Msystemd-udev-250-12.el9_1.1.x86_64.rpm�Msystemd-pam-250-12.el9_1.1.x86_64.rpm�Msystemd-250-12.el9_1.1.x86_64.rpm�Msystemd-container-250-12.el9_1.1.x86_64.rpm�Msystemd-libs-250-12.el9_1.1.i686.rpm�Msystemd-libs-250-12.el9_1.1.x86_64.rpm�Msystemd-rpm-macros-250-12.el9_1.1.noarch.rpm�
Msystemd-oomd-250-12.el9_1.1.x86_64.rpm�Msystemd-resolved-250-12.el9_1.1.x86_64.rpm�Msystemd-container-250-12.el9_1.1.i686.rpm�Msystemd-250-12.el9_1.1.i686.rpm�
Msystemd-udev-250-12.el9_1.1.x86_64.rpm�Msystemd-pam-250-12.el9_1.1.x86_64.rpm�Msystemd-250-12.el9_1.1.x86_64.rpm�����"	�1�yBsecurity
Moderate: expat security update��.�}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337
l�&expat-2.4.9-1.el9_1.1.i686.rpml�&expat-2.4.9-1.el9_1.1.x86_64.rpml�&expat-2.4.9-1.el9_1.1.i686.rpml�&expat-2.4.9-1.el9_1.1.x86_64.rpm�����#	�2�|BBBsecurity
Moderate: libxml2 security update��+�Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338
��Olibxml2-2.9.13-3.el9_1.i686.rpm��Olibxml2-2.9.13-3.el9_1.x86_64.rpm�}�Opython3-libxml2-2.9.13-3.el9_1.x86_64.rpm��Olibxml2-2.9.13-3.el9_1.i686.rpm��Olibxml2-2.9.13-3.el9_1.x86_64.rpm�}�Opython3-libxml2-2.9.13-3.el9_1.x86_64.rpm�����$	�3�ABsecurity
Moderate: sqlite security update��q�<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339
�r�2sqlite-libs-3.34.1-6.el9_1.i686.rpm�r�2sqlite-libs-3.34.1-6.el9_1.x86_64.rpm�r�2sqlite-libs-3.34.1-6.el9_1.i686.rpm�r�2sqlite-libs-3.34.1-6.el9_1.x86_64.rpm����~�%	��Dsecurity
Moderate: bash security update��-�}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340
��gbash-5.1.8-6.el9_1.x86_64.rpm��gbash-5.1.8-6.el9_1.x86_64.rpm�����&	�4�GBsecurity
Moderate: libtasn1 security update��*�uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343
�Q�:libtasn1-4.16.0-8.el9_1.x86_64.rpm�Q�:libtasn1-4.16.0-8.el9_1.i686.rpm�Q�:libtasn1-4.16.0-8.el9_1.x86_64.rpm�Q�:libtasn1-4.16.0-8.el9_1.i686.rpm����O�'	�
�JBsecurity
Important: libksba security update<���Jhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626
�m�libksba-1.5.1-6.el9_1.x86_64.rpm�m�libksba-1.5.1-6.el9_1.i686.rpm�m�libksba-1.5.1-6.el9_1.x86_64.rpm�m�libksba-1.5.1-6.el9_1.i686.rpm����s�(	�!�NBBBBBBBBBBBBBBBBBsecurity
Moderate: grub2 security update��i�Chttps://access.redhat.com/errata/RHSA-2023:0752RHSA-2023:0752RHSA-2023:0752https://access.redhat.com/security/cve/CVE-2022-2601CVE-2022-2601CVE-2022-2601https://access.redhat.com/security/cve/CVE-2022-3775CVE-2022-3775CVE-2022-3775https://bugzilla.redhat.com/21129752112975https://bugzilla.redhat.com/21388802138880https://errata.almalinux.org/9/ALSA-2023-0752.htmlALSA-2023:0752ALSA-2023:0752
�zGgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm�yGgrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm�+Ggrub2-common-2.06-46.el9_1.3.alma.noarch.rpm�{Ggrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm�|Ggrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm�,Ggrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm�Ggrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm�xGgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm�.Ggrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm�-Ggrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm�wGgrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm�vGgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm�zGgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm�yGgrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm�+Ggrub2-common-2.06-46.el9_1.3.alma.noarch.rpm�{Ggrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm�|Ggrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm�,Ggrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm�Ggrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm�xGgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm�.Ggrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm�-Ggrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm�wGgrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm�vGgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm����#�)	�5�bBBBsecurity
Moderate: openssl security and bug fix update��,�"https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946
Y�Fopenssl-libs-3.0.1-47.el9_1.i686.rpm|�Fopenssl-3.0.1-47.el9_1.x86_64.rpmY�Fopenssl-libs-3.0.1-47.el9_1.x86_64.rpmY�Fopenssl-libs-3.0.1-47.el9_1.i686.rpm|�Fopenssl-3.0.1-47.el9_1.x86_64.rpmY�Fopenssl-libs-3.0.1-47.el9_1.x86_64.rpm����r�*	�6�gBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security and bug fix update<��N�~https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951

>kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm9>kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm0>kernel-5.14.0-162.18.1.el9_1.x86_64.rpm8>kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm5>kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm3>kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm6>kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm/>bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm:>python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm1>kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm2>kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm7>kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm4>kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm
>kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm9>kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm0>kernel-5.14.0-162.18.1.el9_1.x86_64.rpm8>kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm5>kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm3>kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm6>kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm/>bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm:>python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm1>kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm2>kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm7>kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm4>kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm�����+	��@security
Moderate: python-setuptools security update��L�^https://access.redhat.com/errata/RHSA-2023:0952RHSA-2023:0952RHSA-2023:0952https://access.redhat.com/security/cve/CVE-2022-40897CVE-2022-40897CVE-2022-40897https://bugzilla.redhat.com/21585592158559https://errata.almalinux.org/9/ALSA-2023-0952.htmlALSA-2023:0952ALSA-2023:0952
�K�epython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm�J�epython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm�K�epython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm�J�epython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm����l�,	�7�CBBBsecurity
Moderate: python3.9 security update��*�9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953
[�Vpython3-3.9.14-1.el9_1.2.x86_64.rpm;�Vpython3-libs-3.9.14-1.el9_1.2.i686.rpm;�Vpython3-libs-3.9.14-1.el9_1.2.x86_64.rpm[�Vpython3-3.9.14-1.el9_1.2.x86_64.rpm;�Vpython3-libs-3.9.14-1.el9_1.2.i686.rpm;�Vpython3-libs-3.9.14-1.el9_1.2.x86_64.rpm����I�-	�8�HBBBBBBBBBBBBBBBBsecurity
Moderate: systemd security update��c�]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954
�Nsystemd-libs-250-12.el9_1.3.x86_64.rpm�Nsystemd-resolved-250-12.el9_1.3.x86_64.rpm�
Nsystemd-udev-250-12.el9_1.3.x86_64.rpm�Nsystemd-250-12.el9_1.3.i686.rpm�
Nsystemd-oomd-250-12.el9_1.3.x86_64.rpm�Nsystemd-container-250-12.el9_1.3.x86_64.rpm�Nsystemd-250-12.el9_1.3.x86_64.rpm�Nsystemd-libs-250-12.el9_1.3.i686.rpm�Nsystemd-container-250-12.el9_1.3.i686.rpm�Nsystemd-rpm-macros-250-12.el9_1.3.noarch.rpm�Nsystemd-pam-250-12.el9_1.3.x86_64.rpm�Nsystemd-libs-250-12.el9_1.3.x86_64.rpm�Nsystemd-resolved-250-12.el9_1.3.x86_64.rpm�
Nsystemd-udev-250-12.el9_1.3.x86_64.rpm�Nsystemd-250-12.el9_1.3.i686.rpm�
Nsystemd-oomd-250-12.el9_1.3.x86_64.rpm�Nsystemd-container-250-12.el9_1.3.x86_64.rpm�Nsystemd-250-12.el9_1.3.x86_64.rpm�Nsystemd-libs-250-12.el9_1.3.i686.rpm�Nsystemd-container-250-12.el9_1.3.i686.rpm�Nsystemd-rpm-macros-250-12.el9_1.3.noarch.rpm�Nsystemd-pam-250-12.el9_1.3.x86_64.rpm����|�.	�9�ZBsecurity
Moderate: lua security update��@�8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957
��<lua-libs-5.4.4-2.el9_1.x86_64.rpm��<lua-libs-5.4.4-2.el9_1.i686.rpm��<lua-libs-5.4.4-2.el9_1.x86_64.rpm��<lua-libs-5.4.4-2.el9_1.i686.rpm����b�/	�:�]Bsecurity
Moderate: vim security update��x�ehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958
��/vim-minimal-8.2.2637-20.el9_1.x86_64.rpm�D�/vim-filesystem-8.2.2637-20.el9_1.noarch.rpm��/vim-minimal-8.2.2637-20.el9_1.x86_64.rpm�D�/vim-filesystem-8.2.2637-20.el9_1.noarch.rpm����A�0	�"�`security
Moderate: tar security update��]�https://access.redhat.com/errata/RHSA-2023:0959RHSA-2023:0959RHSA-2023:0959https://access.redhat.com/security/cve/CVE-2022-48303CVE-2022-48303CVE-2022-48303https://bugzilla.redhat.com/21497222149722https://errata.almalinux.org/9/ALSA-2023-0959.htmlALSA-2023:0959ALSA-2023:0959
�J�`tar-1.34-6.el9_1.x86_64.rpm�J�`tar-1.34-6.el9_1.x86_64.rpm����r�1	�;�cBsecurity
Moderate: gnutls security and bug fix update��s�https://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141
n�6gnutls-3.7.6-18.el9_1.x86_64.rpmn�6gnutls-3.7.6-18.el9_1.i686.rpmn�6gnutls-3.7.6-18.el9_1.x86_64.rpmn�6gnutls-3.7.6-18.el9_1.i686.rpm�����2	�<�fBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security, bug fix, and enhancement update<���Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470

0?kernel-5.14.0-162.22.2.el9_1.x86_64.rpm/?bpftool-5.14.0-162.22.2.el9_1.x86_64.rpm1?kernel-core-5.14.0-162.22.2.el9_1.x86_64.rpm7?kernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm6?kernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm:?python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpm?kernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpm2?kernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpm8?kernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpm4?kernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpm3?kernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpm9?kernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpm5?kernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm
0?kernel-5.14.0-162.22.2.el9_1.x86_64.rpm/?bpftool-5.14.0-162.22.2.el9_1.x86_64.rpm1?kernel-core-5.14.0-162.22.2.el9_1.x86_64.rpm7?kernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm6?kernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm:?python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpm?kernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpm2?kernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpm8?kernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpm4?kernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpm3?kernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpm9?kernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpm5?kernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm����C�3	�=�BBBBBBBBsecurity
Moderate: curl security update��k�9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701
Dqlibcurl-7.76.1-19.el9_1.2.x86_64.rpmDqlibcurl-7.76.1-19.el9_1.2.i686.rpmEqlibcurl-minimal-7.76.1-19.el9_1.2.i686.rpmiqcurl-7.76.1-19.el9_1.2.x86_64.rpmEqlibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpmjqcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpmDqlibcurl-7.76.1-19.el9_1.2.x86_64.rpmDqlibcurl-7.76.1-19.el9_1.2.i686.rpmEqlibcurl-minimal-7.76.1-19.el9_1.2.i686.rpmiqcurl-7.76.1-19.el9_1.2.x86_64.rpmEqlibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpmjqcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm�����4	�>�IBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security and bug fix update<��$�4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703

/@bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm3@kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm7@kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm5@kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm1@kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm4@kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm:@python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm6@kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2@kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm8@kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm@kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm0@kernel-5.14.0-162.23.1.el9_1.x86_64.rpm9@kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm
/@bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm3@kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm7@kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm5@kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm1@kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm4@kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm:@python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm6@kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2@kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm8@kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm@kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm0@kernel-5.14.0-162.23.1.el9_1.x86_64.rpm9@kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm�����5	�?�bBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: samba security update<��X�https://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127
gsamba-winbind-modules-4.16.4-103.el9_1.i686.rpmdsamba-client-libs-4.16.4-103.el9_1.x86_64.rpmblibwbclient-4.16.4-103.el9_1.x86_64.rpm�%samba-common-tools-4.16.4-103.el9_1.x86_64.rpmgsamba-winbind-modules-4.16.4-103.el9_1.x86_64.rpmfsamba-libs-4.16.4-103.el9_1.i686.rpmalibsmbclient-4.16.4-103.el9_1.x86_64.rpmdsamba-client-libs-4.16.4-103.el9_1.i686.rpmcpython3-samba-4.16.4-103.el9_1.i686.rpmesamba-common-libs-4.16.4-103.el9_1.i686.rpm�$samba-4.16.4-103.el9_1.x86_64.rpmcpython3-samba-4.16.4-103.el9_1.x86_64.rpmfsamba-libs-4.16.4-103.el9_1.x86_64.rpmesamba-common-libs-4.16.4-103.el9_1.x86_64.rpmblibwbclient-4.16.4-103.el9_1.i686.rpm�samba-common-4.16.4-103.el9_1.noarch.rpmalibsmbclient-4.16.4-103.el9_1.i686.rpm�&samba-winbind-4.16.4-103.el9_1.x86_64.rpmgsamba-winbind-modules-4.16.4-103.el9_1.i686.rpmdsamba-client-libs-4.16.4-103.el9_1.x86_64.rpmblibwbclient-4.16.4-103.el9_1.x86_64.rpm�%samba-common-tools-4.16.4-103.el9_1.x86_64.rpmgsamba-winbind-modules-4.16.4-103.el9_1.x86_64.rpmfsamba-libs-4.16.4-103.el9_1.i686.rpmalibsmbclient-4.16.4-103.el9_1.x86_64.rpmdsamba-client-libs-4.16.4-103.el9_1.i686.rpmcpython3-samba-4.16.4-103.el9_1.i686.rpmesamba-common-libs-4.16.4-103.el9_1.i686.rpm�$samba-4.16.4-103.el9_1.x86_64.rpmcpython3-samba-4.16.4-103.el9_1.x86_64.rpmfsamba-libs-4.16.4-103.el9_1.x86_64.rpmesamba-common-libs-4.16.4-103.el9_1.x86_64.rpmblibwbclient-4.16.4-103.el9_1.i686.rpm�samba-common-4.16.4-103.el9_1.noarch.rpmalibsmbclient-4.16.4-103.el9_1.i686.rpm�&samba-winbind-4.16.4-103.el9_1.x86_64.rpm��ӿ/�6	��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security, bug fix, and enhancement update<��l�SRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458
5kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm9kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm8kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm1kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpmRkernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm4kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpmkernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm6kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpmQkernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm7kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm/�mbpftool-7.0.0-284.11.1.el9_2.x86_64.rpm:python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm2kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm3kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpmOkernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpmPkernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm0kernel-5.14.0-284.11.1.el9_2.x86_64.rpm5kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm9kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm8kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm1kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpmRkernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm4kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpmkernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm6kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpmQkernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm7kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm/�mbpftool-7.0.0-284.11.1.el9_2.x86_64.rpm:python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm2kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm3kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpmOkernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpmPkernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm0kernel-5.14.0-284.11.1.el9_2.x86_64.rpm����[�7	�&�_BBBBBsecurity
Moderate: device-mapper-multipath security and bug fix update��?�]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459
�F�kpartx-0.8.7-20.el9.x86_64.rpm��device-mapper-multipath-0.8.7-20.el9.x86_64.rpm�g�device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm�g�device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm�F�kpartx-0.8.7-20.el9.x86_64.rpm��device-mapper-multipath-0.8.7-20.el9.x86_64.rpm�g�device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm�g�device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm�����8	��gBBBBBBBBsecurity
Low: curl security updatem���"https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478
Drlibcurl-7.76.1-23.el9.i686.rpmircurl-7.76.1-23.el9.x86_64.rpmErlibcurl-minimal-7.76.1-23.el9.i686.rpmDrlibcurl-7.76.1-23.el9.x86_64.rpmErlibcurl-minimal-7.76.1-23.el9.x86_64.rpmjrcurl-minimal-7.76.1-23.el9.x86_64.rpmDrlibcurl-7.76.1-23.el9.i686.rpmircurl-7.76.1-23.el9.x86_64.rpmErlibcurl-minimal-7.76.1-23.el9.i686.rpmDrlibcurl-7.76.1-23.el9.x86_64.rpmErlibcurl-minimal-7.76.1-23.el9.x86_64.rpmjrcurl-minimal-7.76.1-23.el9.x86_64.rpm����c�9	��qsecurity
Moderate: fwupd security and bug fix update��>�M
https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487
��Wfwupd-1.8.10-2.el9.alma.x86_64.rpm��Wfwupd-1.8.10-2.el9.alma.x86_64.rpm����}�:	�:�sBBBBBsecurity
Moderate: dhcp security and enhancement update���Ahttps://access.redhat.com/errata/RHSA-2023:2502RHSA-2023:2502RHSA-2023:2502https://access.redhat.com/security/cve/CVE-2022-2928CVE-2022-2928CVE-2022-2928https://access.redhat.com/security/cve/CVE-2022-2929CVE-2022-2929CVE-2022-2929https://bugzilla.redhat.com/21320012132001https://bugzilla.redhat.com/21320022132002https://errata.almalinux.org/9/ALSA-2023-2502.htmlALSA-2023:2502ALSA-2023:2502
�q�dhcp-common-4.4.2-18.b1.el9.noarch.rpm�p�dhcp-client-4.4.2-18.b1.el9.x86_64.rpm�r�dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm�s�dhcp-server-4.4.2-18.b1.el9.x86_64.rpm�q�dhcp-common-4.4.2-18.b1.el9.noarch.rpm�p�dhcp-client-4.4.2-18.b1.el9.x86_64.rpm�r�dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm�s�dhcp-server-4.4.2-18.b1.el9.x86_64.rpm�����;	��{BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Low: samba security, bug fix, and enhancement updatem��L�https://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519
�samba-dc-libs-4.17.5-102.el9.i686.rpm�samba-tools-4.17.5-102.el9.x86_64.rpm�samba-common-4.17.5-102.el9.noarch.rpm�samba-usershares-4.17.5-102.el9.x86_64.rpmblibwbclient-4.17.5-102.el9.x86_64.rpmalibsmbclient-4.17.5-102.el9.i686.rpm�%samba-common-tools-4.17.5-102.el9.x86_64.rpmdsamba-client-libs-4.17.5-102.el9.x86_64.rpmfsamba-libs-4.17.5-102.el9.i686.rpm�samba-dcerpc-4.17.5-102.el9.x86_64.rpmgsamba-winbind-modules-4.17.5-102.el9.x86_64.rpm�libnetapi-4.17.5-102.el9.x86_64.rpm�~python3-samba-dc-4.17.5-102.el9.x86_64.rpm�samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpmalibsmbclient-4.17.5-102.el9.x86_64.rpmesamba-common-libs-4.17.5-102.el9.x86_64.rpmblibwbclient-4.17.5-102.el9.i686.rpmdsamba-client-libs-4.17.5-102.el9.i686.rpm�libnetapi-4.17.5-102.el9.i686.rpmgsamba-winbind-modules-4.17.5-102.el9.i686.rpmfsamba-libs-4.17.5-102.el9.x86_64.rpmcpython3-samba-4.17.5-102.el9.i686.rpm�&samba-winbind-4.17.5-102.el9.x86_64.rpm�samba-dc-libs-4.17.5-102.el9.x86_64.rpm�$samba-4.17.5-102.el9.x86_64.rpmcpython3-samba-4.17.5-102.el9.x86_64.rpmesamba-common-libs-4.17.5-102.el9.i686.rpm�samba-dc-libs-4.17.5-102.el9.i686.rpm�samba-tools-4.17.5-102.el9.x86_64.rpm�samba-common-4.17.5-102.el9.noarch.rpm�samba-usershares-4.17.5-102.el9.x86_64.rpmblibwbclient-4.17.5-102.el9.x86_64.rpmalibsmbclient-4.17.5-102.el9.i686.rpm�%samba-common-tools-4.17.5-102.el9.x86_64.rpmdsamba-client-libs-4.17.5-102.el9.x86_64.rpmfsamba-libs-4.17.5-102.el9.i686.rpm�samba-dcerpc-4.17.5-102.el9.x86_64.rpmgsamba-winbind-modules-4.17.5-102.el9.x86_64.rpm�libnetapi-4.17.5-102.el9.x86_64.rpm�~python3-samba-dc-4.17.5-102.el9.x86_64.rpm�samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpmalibsmbclient-4.17.5-102.el9.x86_64.rpmesamba-common-libs-4.17.5-102.el9.x86_64.rpmblibwbclient-4.17.5-102.el9.i686.rpmdsamba-client-libs-4.17.5-102.el9.i686.rpm�libnetapi-4.17.5-102.el9.i686.rpmgsamba-winbind-modules-4.17.5-102.el9.i686.rpmfsamba-libs-4.17.5-102.el9.x86_64.rpmcpython3-samba-4.17.5-102.el9.i686.rpm�&samba-winbind-4.17.5-102.el9.x86_64.rpm�samba-dc-libs-4.17.5-102.el9.x86_64.rpm�$samba-4.17.5-102.el9.x86_64.rpmcpython3-samba-4.17.5-102.el9.x86_64.rpmesamba-common-libs-4.17.5-102.el9.i686.rpm����l�<	��gBBBsecurity
Low: openssl security and bug fix updatem��P�phttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523
Y�Kopenssl-libs-3.0.7-6.el9_2.x86_64.rpmY�Kopenssl-libs-3.0.7-6.el9_2.i686.rpm|�Kopenssl-3.0.7-6.el9_2.x86_64.rpmY�Kopenssl-libs-3.0.7-6.el9_2.x86_64.rpmY�Kopenssl-libs-3.0.7-6.el9_2.i686.rpm|�Kopenssl-3.0.7-6.el9_2.x86_64.rpm����B�=	��lBsecurity
Low: libarchive security updatem��@�Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532
�l�4libarchive-3.5.3-4.el9.i686.rpm�l�4libarchive-3.5.3-4.el9.x86_64.rpm�l�4libarchive-3.5.3-4.el9.i686.rpm�l�4libarchive-3.5.3-4.el9.x86_64.rpm�����>	��oBBBBBBBBBBBBBBBsecurity
Moderate: krb5 security, bug fix, and enhancement update���Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570
_Tkrb5-server-ldap-1.20.1-8.el9.x86_64.rpm\Tkrb5-libs-1.20.1-8.el9.x86_64.rpm\Tkrb5-libs-1.20.1-8.el9.i686.rpm^Tkrb5-server-1.20.1-8.el9.x86_64.rpm�#Tkrb5-workstation-1.20.1-8.el9.x86_64.rpm`Tlibkadm5-1.20.1-8.el9.i686.rpm]Tkrb5-pkinit-1.20.1-8.el9.x86_64.rpm^Tkrb5-server-1.20.1-8.el9.i686.rpm`Tlibkadm5-1.20.1-8.el9.x86_64.rpm]Tkrb5-pkinit-1.20.1-8.el9.i686.rpm_Tkrb5-server-ldap-1.20.1-8.el9.i686.rpm_Tkrb5-server-ldap-1.20.1-8.el9.x86_64.rpm\Tkrb5-libs-1.20.1-8.el9.x86_64.rpm\Tkrb5-libs-1.20.1-8.el9.i686.rpm^Tkrb5-server-1.20.1-8.el9.x86_64.rpm�#Tkrb5-workstation-1.20.1-8.el9.x86_64.rpm`Tlibkadm5-1.20.1-8.el9.i686.rpm]Tkrb5-pkinit-1.20.1-8.el9.x86_64.rpm^Tkrb5-server-1.20.1-8.el9.i686.rpm`Tlibkadm5-1.20.1-8.el9.x86_64.rpm]Tkrb5-pkinit-1.20.1-8.el9.i686.rpm_Tkrb5-server-ldap-1.20.1-8.el9.i686.rpm����-�?	��@Bsecurity
Low: lua security updatem��p�Rhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582
��=lua-libs-5.4.4-3.el9.x86_64.rpm��=lua-libs-5.4.4-3.el9.i686.rpm��=lua-libs-5.4.4-3.el9.x86_64.rpm��=lua-libs-5.4.4-3.el9.i686.rpm����n�@	��CBBBBBBsecurity
Moderate: openssh security update��B�https://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645
�B�openssh-keycat-8.7p1-29.el9_2.x86_64.rpm�@�openssh-8.7p1-29.el9_2.x86_64.rpm�A�openssh-clients-8.7p1-29.el9_2.x86_64.rpm�C�openssh-server-8.7p1-29.el9_2.x86_64.rpm�B�openssh-keycat-8.7p1-29.el9_2.x86_64.rpm�@�openssh-8.7p1-29.el9_2.x86_64.rpm�A�openssh-clients-8.7p1-29.el9_2.x86_64.rpm�C�openssh-server-8.7p1-29.el9_2.x86_64.rpm����I�A	�	�KBBBBBBBBsecurity
Moderate: curl security update��J�(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650
iscurl-7.76.1-23.el9_2.1.x86_64.rpmDslibcurl-7.76.1-23.el9_2.1.x86_64.rpmjscurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmEslibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmDslibcurl-7.76.1-23.el9_2.1.i686.rpmEslibcurl-minimal-7.76.1-23.el9_2.1.i686.rpmiscurl-7.76.1-23.el9_2.1.x86_64.rpmDslibcurl-7.76.1-23.el9_2.1.x86_64.rpmjscurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmEslibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmDslibcurl-7.76.1-23.el9_2.1.i686.rpmEslibcurl-minimal-7.76.1-23.el9_2.1.i686.rpm����C�B	�
�UBsecurity
Important: c-ares security update<��r�https://access.redhat.com/errata/RHSA-2023:3559RHSA-2023:3559RHSA-2023:3559https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3559.htmlALSA-2023:3559ALSA-2023:3559
��c-ares-1.17.1-5.el9_2.1.x86_64.rpm��c-ares-1.17.1-5.el9_2.1.i686.rpm��c-ares-1.17.1-5.el9_2.1.x86_64.rpm��c-ares-1.17.1-5.el9_2.1.i686.rpm����|�C	��XBBBsecurity
Important: python3.9 security update<��q�+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595
;�Wpython3-libs-3.9.16-1.el9_2.1.x86_64.rpm;�Wpython3-libs-3.9.16-1.el9_2.1.i686.rpm[�Wpython3-3.9.16-1.el9_2.1.x86_64.rpm;�Wpython3-libs-3.9.16-1.el9_2.1.x86_64.rpm;�Wpython3-libs-3.9.16-1.el9_2.1.i686.rpm[�Wpython3-3.9.16-1.el9_2.1.x86_64.rpm����u�D	��]BBBsecurity
Moderate: openssl security and bug fix update���Vhttps://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722
Y�Gopenssl-libs-3.0.7-16.el9_2.i686.rpmY�Gopenssl-libs-3.0.7-16.el9_2.x86_64.rpm|�Gopenssl-3.0.7-16.el9_2.x86_64.rpmY�Gopenssl-libs-3.0.7-16.el9_2.i686.rpmY�Gopenssl-libs-3.0.7-16.el9_2.x86_64.rpm|�Gopenssl-3.0.7-16.el9_2.x86_64.rpm����z�E	�
�bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security and bug fix update<��r�https://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723
7kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm0kernel-5.14.0-284.18.1.el9_2.x86_64.rpm1kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm4kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm2kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm6kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm8kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpmQkernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpmOkernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm:python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpmPkernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm/�nbpftool-7.0.0-284.18.1.el9_2.x86_64.rpm5kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm3kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpmkernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm9kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpmRkernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm7kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm0kernel-5.14.0-284.18.1.el9_2.x86_64.rpm1kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm4kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm2kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm6kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm8kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpmQkernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpmOkernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm:python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpmPkernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm/�nbpftool-7.0.0-284.18.1.el9_2.x86_64.rpm5kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm3kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpmkernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm9kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpmRkernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm����_�F	��Csecurity
Moderate: less security update���Chttps://access.redhat.com/errata/RHSA-2023:3725RHSA-2023:3725RHSA-2023:3725https://access.redhat.com/security/cve/CVE-2022-46663CVE-2022-46663CVE-2022-46663https://bugzilla.redhat.com/21696212169621https://errata.almalinux.org/9/ALSA-2023-3725.htmlALSA-2023:3725ALSA-2023:3725
�	�jless-590-2.el9_2.x86_64.rpm�	�jless-590-2.el9_2.x86_64.rpm����/�G	��FBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: samba security and bug fix update��C�https://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325
�~python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm�%samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm�libnetapi-4.17.5-103.el9_2.alma.i686.rpm�samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpmgsamba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm�samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm�samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpmdsamba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpmalibsmbclient-4.17.5-103.el9_2.alma.i686.rpmblibwbclient-4.17.5-103.el9_2.alma.x86_64.rpm�libnetapi-4.17.5-103.el9_2.alma.x86_64.rpmdsamba-client-libs-4.17.5-103.el9_2.alma.i686.rpm�$samba-4.17.5-103.el9_2.alma.x86_64.rpmcpython3-samba-4.17.5-103.el9_2.alma.x86_64.rpm�samba-tools-4.17.5-103.el9_2.alma.x86_64.rpmesamba-common-libs-4.17.5-103.el9_2.alma.i686.rpm�samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpmfsamba-libs-4.17.5-103.el9_2.alma.i686.rpmalibsmbclient-4.17.5-103.el9_2.alma.x86_64.rpmfsamba-libs-4.17.5-103.el9_2.alma.x86_64.rpmblibwbclient-4.17.5-103.el9_2.alma.i686.rpm�&samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm�samba-common-4.17.5-103.el9_2.alma.noarch.rpmgsamba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpmcpython3-samba-4.17.5-103.el9_2.alma.i686.rpm�samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpmesamba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm�~python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm�%samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm�libnetapi-4.17.5-103.el9_2.alma.i686.rpm�samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpmgsamba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm�samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm�samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpmdsamba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpmalibsmbclient-4.17.5-103.el9_2.alma.i686.rpmblibwbclient-4.17.5-103.el9_2.alma.x86_64.rpm�libnetapi-4.17.5-103.el9_2.alma.x86_64.rpmdsamba-client-libs-4.17.5-103.el9_2.alma.i686.rpm�$samba-4.17.5-103.el9_2.alma.x86_64.rpmcpython3-samba-4.17.5-103.el9_2.alma.x86_64.rpm�samba-tools-4.17.5-103.el9_2.alma.x86_64.rpmesamba-common-libs-4.17.5-103.el9_2.alma.i686.rpm�samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpmfsamba-libs-4.17.5-103.el9_2.alma.i686.rpmalibsmbclient-4.17.5-103.el9_2.alma.x86_64.rpmfsamba-libs-4.17.5-103.el9_2.alma.x86_64.rpmblibwbclient-4.17.5-103.el9_2.alma.i686.rpm�&samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm�samba-common-4.17.5-103.el9_2.alma.noarch.rpmgsamba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpmcpython3-samba-4.17.5-103.el9_2.alma.i686.rpm�samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpmesamba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm����@�H	�5�rBsecurity
Moderate: libeconf security update��K�https://access.redhat.com/errata/RHSA-2023:4347RHSA-2023:4347RHSA-2023:4347https://access.redhat.com/security/cve/CVE-2023-22652CVE-2023-22652CVE-2023-22652https://bugzilla.redhat.com/22124632212463https://errata.almalinux.org/9/ALSA-2023-4347.htmlALSA-2023:4347ALSA-2023:4347
�G�libeconf-0.4.1-3.el9_2.x86_64.rpm�G�libeconf-0.4.1-3.el9_2.i686.rpm�G�libeconf-0.4.1-3.el9_2.x86_64.rpm�G�libeconf-0.4.1-3.el9_2.i686.rpm����T�I	��vBBBsecurity
Moderate: libxml2 security update��Y�Nhttps://access.redhat.com/errata/RHSA-2023:4349RHSA-2023:4349RHSA-2023:4349https://access.redhat.com/security/cve/CVE-2023-28484CVE-2023-28484CVE-2023-28484https://access.redhat.com/security/cve/CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/21859842185984https://bugzilla.redhat.com/21859942185994https://errata.almalinux.org/9/ALSA-2023-4349.htmlALSA-2023:4349ALSA-2023:4349
��Plibxml2-2.9.13-3.el9_2.1.i686.rpm�}�Ppython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm��Plibxml2-2.9.13-3.el9_2.1.x86_64.rpm��Plibxml2-2.9.13-3.el9_2.1.i686.rpm�}�Ppython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm��Plibxml2-2.9.13-3.el9_2.1.x86_64.rpm�����J	��;security
Moderate: python-requests security update��'�https://access.redhat.com/errata/RHSA-2023:4350RHSA-2023:4350RHSA-2023:4350https://access.redhat.com/security/cve/CVE-2023-32681CVE-2023-32681CVE-2023-32681https://bugzilla.redhat.com/22094692209469https://errata.almalinux.org/9/ALSA-2023-4350.htmlALSA-2023:4350ALSA-2023:4350
�s�Wpython3-requests-2.25.1-7.el9_2.noarch.rpm�s�Wpython3-requests-2.25.1-7.el9_2.noarch.rpm����J�K	��|BBBBBBBBsecurity
Moderate: curl security update��.�~https://access.redhat.com/errata/RHSA-2023:4354RHSA-2023:4354RHSA-2023:4354https://access.redhat.com/security/cve/CVE-2023-28321CVE-2023-28321CVE-2023-28321https://access.redhat.com/security/cve/CVE-2023-28322CVE-2023-28322CVE-2023-28322https://bugzilla.redhat.com/21967862196786https://bugzilla.redhat.com/21967932196793https://errata.almalinux.org/9/ALSA-2023-4354.htmlALSA-2023:4354ALSA-2023:4354
itcurl-7.76.1-23.el9_2.2.x86_64.rpmEtlibcurl-minimal-7.76.1-23.el9_2.2.i686.rpmEtlibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpmDtlibcurl-7.76.1-23.el9_2.2.i686.rpmjtcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpmDtlibcurl-7.76.1-23.el9_2.2.x86_64.rpmitcurl-7.76.1-23.el9_2.2.x86_64.rpmEtlibcurl-minimal-7.76.1-23.el9_2.2.i686.rpmEtlibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpmDtlibcurl-7.76.1-23.el9_2.2.i686.rpmjtcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpmDtlibcurl-7.76.1-23.el9_2.2.x86_64.rpm����j�L	��FBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security, bug fix, and enhancement update<��,�0https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377
: python3-perf-5.14.0-284.25.1.el9_2.x86_64.rpm5 kernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm6 kernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpm4 kernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpm2 kernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpm8 kernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpm7 kernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm0 kernel-5.14.0-284.25.1.el9_2.x86_64.rpmO kernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm3 kernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpmP kernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpmQ kernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm/�obpftool-7.0.0-284.25.1.el9_2.x86_64.rpm9 kernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpm1 kernel-core-5.14.0-284.25.1.el9_2.x86_64.rpmR kernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm: python3-perf-5.14.0-284.25.1.el9_2.x86_64.rpm5 kernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm6 kernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpm4 kernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpm2 kernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpm8 kernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpm7 kernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm0 kernel-5.14.0-284.25.1.el9_2.x86_64.rpmO kernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm3 kernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpmP kernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpmQ kernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm/�obpftool-7.0.0-284.25.1.el9_2.x86_64.rpm9 kernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpm1 kernel-core-5.14.0-284.25.1.el9_2.x86_64.rpmR kernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm���:�M	��gBBBBBBsecurity
Important: openssh security update<��\�]https://access.redhat.com/errata/RHSA-2023:4412RHSA-2023:4412RHSA-2023:4412https://access.redhat.com/security/cve/CVE-2023-38408CVE-2023-38408CVE-2023-38408https://bugzilla.redhat.com/22241732224173https://errata.almalinux.org/9/ALSA-2023-4412.htmlALSA-2023:4412ALSA-2023:4412
�B�openssh-keycat-8.7p1-30.el9_2.x86_64.rpm�@�openssh-8.7p1-30.el9_2.x86_64.rpm�A�openssh-clients-8.7p1-30.el9_2.x86_64.rpm�C�openssh-server-8.7p1-30.el9_2.x86_64.rpm�B�openssh-keycat-8.7p1-30.el9_2.x86_64.rpm�@�openssh-8.7p1-30.el9_2.x86_64.rpm�A�openssh-clients-8.7p1-30.el9_2.x86_64.rpm�C�openssh-server-8.7p1-30.el9_2.x86_64.rpm����
�N	��oBBBBBBsecurity
Moderate: dbus security update��9�https://access.redhat.com/errata/RHSA-2023:4569RHSA-2023:4569RHSA-2023:4569https://access.redhat.com/security/cve/CVE-2023-34969CVE-2023-34969CVE-2023-34969https://bugzilla.redhat.com/22131662213166https://errata.almalinux.org/9/ALSA-2023-4569.htmlALSA-2023:4569ALSA-2023:4569
�o�
dbus-tools-1.12.20-7.el9_2.1.x86_64.rpm�f�
dbus-libs-1.12.20-7.el9_2.1.x86_64.rpm�n�
dbus-common-1.12.20-7.el9_2.1.noarch.rpm�m�
dbus-1.12.20-7.el9_2.1.x86_64.rpm�f�
dbus-libs-1.12.20-7.el9_2.1.i686.rpm�o�
dbus-tools-1.12.20-7.el9_2.1.x86_64.rpm�f�
dbus-libs-1.12.20-7.el9_2.1.x86_64.rpm�n�
dbus-common-1.12.20-7.el9_2.1.noarch.rpm�m�
dbus-1.12.20-7.el9_2.1.x86_64.rpm�f�
dbus-libs-1.12.20-7.el9_2.1.i686.rpm�����O	��wBBBBBBBBsecurity
Important: subscription-manager security update<��8�https://access.redhat.com/errata/RHSA-2023:4708RHSA-2023:4708RHSA-2023:4708https://access.redhat.com/security/cve/CVE-2023-3899CVE-2023-3899CVE-2023-3899https://bugzilla.redhat.com/22254072225407https://errata.almalinux.org/9/ALSA-2023-4708.htmlALSA-2023:4708ALSA-2023:4708
�Hzsubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�zlibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�'zpython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�Izsubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�.zpython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�Hzsubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�zlibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�'zpython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�Izsubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm�.zpython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm����e�P	��BBsecurity
Important: cups security update<��C�https://access.redhat.com/errata/RHSA-2023:4838RHSA-2023:4838RHSA-2023:4838https://access.redhat.com/security/cve/CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/22304952230495https://errata.almalinux.org/9/ALSA-2023-4838.htmlALSA-2023:4838ALSA-2023:4838
�� cups-libs-2.3.3op2-16.el9_2.1.i686.rpm�� cups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm�� cups-libs-2.3.3op2-16.el9_2.1.i686.rpm�� cups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm����E�Q	��Esecurity
Moderate: dmidecode security update��]�https://access.redhat.com/errata/RHSA-2023:5061RHSA-2023:5061RHSA-2023:5061https://access.redhat.com/security/cve/CVE-2023-30630CVE-2023-30630CVE-2023-30630https://bugzilla.redhat.com/21866692186669https://errata.almalinux.org/9/ALSA-2023-5061.htmlALSA-2023:5061ALSA-2023:5061
��\dmidecode-3.3-7.el9_2.1.x86_64.rpm��\dmidecode-3.3-7.el9_2.1.x86_64.rpm����O�R	��HBBBBBBBBBBBBBBBsecurity
Moderate: linux-firmware security update��e�|https://access.redhat.com/errata/RHSA-2023:5068RHSA-2023:5068RHSA-2023:5068https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://bugzilla.redhat.com/22178452217845https://errata.almalinux.org/9/ALSA-2023-5068.htmlALSA-2023:5068ALSA-2023:5068
�5�`iwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�6�giwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm�7�ciwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm�3�iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�?�'netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm�8�iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�1�iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�2�iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�/�Ziwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�4�iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�>�'linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm�;�`iwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�0�Riwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�<�'libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm�=�'linux-firmware-20230310-135.el9_2.alma.1.noarch.rpm�:�^iwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm�5�`iwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�6�giwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm�7�ciwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm�3�iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�?�'netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm�8�iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�1�iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�2�iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�/�Ziwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�4�iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm�>�'linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm�;�`iwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm�0�Riwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm�<�'libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm�=�'linux-firmware-20230310-135.el9_2.alma.1.noarch.rpm�:�^iwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm����S�S	��ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security, bug fix, and enhancement update<��a�_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069
:!python3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm5!kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm0!kernel-5.14.0-284.30.1.el9_2.x86_64.rpm2!kernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm4!kernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpmR!kernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm6!kernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpm8!kernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpmO!kernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm/�pbpftool-7.0.0-284.30.1.el9_2.x86_64.rpmP!kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm3!kernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpmQ!kernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm9!kernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm!kernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpm7!kernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm1!kernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm:!python3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm5!kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm0!kernel-5.14.0-284.30.1.el9_2.x86_64.rpm2!kernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm4!kernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpmR!kernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm6!kernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpm8!kernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpmO!kernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm/�pbpftool-7.0.0-284.30.1.el9_2.x86_64.rpmP!kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm3!kernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpmQ!kernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm9!kernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm!kernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpm7!kernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm1!kernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm����
�T	��{Bsecurity
Moderate: libcap security update��@�0https://access.redhat.com/errata/RHSA-2023:5071RHSA-2023:5071RHSA-2023:5071https://access.redhat.com/security/cve/CVE-2023-2602CVE-2023-2602CVE-2023-2602https://access.redhat.com/security/cve/CVE-2023-2603CVE-2023-2603CVE-2023-2603https://bugzilla.redhat.com/22091132209113https://bugzilla.redhat.com/22091142209114https://errata.almalinux.org/9/ALSA-2023-5071.htmlALSA-2023:5071ALSA-2023:5071
�E�'libcap-2.48-9.el9_2.i686.rpm�E�'libcap-2.48-9.el9_2.x86_64.rpm�E�'libcap-2.48-9.el9_2.i686.rpm�E�'libcap-2.48-9.el9_2.x86_64.rpm�����U	��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: glibc security update<��p�
https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453
�P�Oglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm�wglibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm�	glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm�Bglibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm�	glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm�<glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm�nlibnsl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm�>glibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm�fglibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm�lglibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm�xglibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm�eglibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm�uglibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm�Fglibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm�Hnscd-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm�Qglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm�Nglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm�jglibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm�jglibc-gconv-extra-2.34-60.el9_2.7.i686.rpm�0glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm�{glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm�}glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm�kglibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm�]glibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm�Tglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm�Hglibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm�@glibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm�vglibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm�Jglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm�iglibc-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm�Eglibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm�tglibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm�gglibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm�~glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm�Dglibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm�Iglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm�=glibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm�Zglibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm�0glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm�zglibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm�bglibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm�wglibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm�Aglibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm�[glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm�xglibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm�hglibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm�Vglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm�Rglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm�yglibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm�Mglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm�yglibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm�{glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm�Pglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm�mglibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm�^glibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm�uglibc-common-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm�Xglibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm�iglibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm�?glibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm�tglibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm�Sglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm�dglibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm�Lglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm�zglibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm�~glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm�oglibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm�aglibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm�|glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm�nlibnsl-2.34-60.el9_2.7.i686.rpm�jglibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm�Cglibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm�`glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm�qglibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm�cglibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm�iglibc-2.34-60.el9_2.7.i686.rpm�sglibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm�<glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm�|glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm�nglibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm�_glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm�Wglibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm�Uglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm�}glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm�Gglibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm�\glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm�vglibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm�Kglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm�rglibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm�Yglibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm�pglibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm�P�Oglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm�wglibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm�	glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm�Bglibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm�	glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm�<glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm�nlibnsl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm�>glibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm�fglibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm�lglibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm�xglibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm�eglibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm�uglibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm�Fglibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm�Hnscd-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm�Qglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm�Nglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm�jglibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm�jglibc-gconv-extra-2.34-60.el9_2.7.i686.rpm�0glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm�{glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm�}glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm�kglibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm�/glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm�]glibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm�Tglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm�Hglibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm�@glibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm�vglibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm�$glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm�"glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm�2glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm�Jglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm�#glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm�iglibc-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm�Eglibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm�tglibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm�gglibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm�~glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm�Dglibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm�Iglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm�=glibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm�Zglibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm�)glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm�0glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm�zglibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm�bglibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm�wglibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm�Aglibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm�[glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm�xglibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm�hglibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm�Vglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm�Rglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm�yglibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm�Mglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm�yglibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm�{glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm�Pglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm�mglibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm�^glibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm�uglibc-common-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm�Xglibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm�iglibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm�?glibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm�tglibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm�Sglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm�dglibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm�Lglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm�zglibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm�~glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm�oglibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm�aglibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm�,glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm�|glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm�nlibnsl-2.34-60.el9_2.7.i686.rpm�jglibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm�;glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm�9glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm�Cglibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm�*glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm�&glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm�-glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm�'glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm�3glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm�`glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm�qglibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm�.glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm�cglibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm�(glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm�iglibc-2.34-60.el9_2.7.i686.rpm�sglibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm� glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm�7glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm�<glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm�|glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm�nglibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm�_glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm�Wglibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm�Uglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm�5glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm�
glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm�}glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm�Gglibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm�4glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm�\glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm�:glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm�1glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm�!glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm�vglibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm�Kglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm�8glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm�rglibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm�+glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm�glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm�Yglibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm�pglibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm�%glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm�6glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm����&�V	��[BBBsecurity
Important: python3.9 security update<��|�https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462
;�Xpython3-libs-3.9.16-1.el9_2.2.x86_64.rpm;�Xpython3-libs-3.9.16-1.el9_2.2.i686.rpm[�Xpython3-3.9.16-1.el9_2.2.x86_64.rpm;�Xpython3-libs-3.9.16-1.el9_2.2.x86_64.rpm;�Xpython3-libs-3.9.16-1.el9_2.2.i686.rpm[�Xpython3-3.9.16-1.el9_2.2.x86_64.rpm����E�W	��`BBBBBBBBsecurity
Important: curl security update<���}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763
jucurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmEulibcurl-minimal-7.76.1-23.el9_2.4.i686.rpmEulibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmDulibcurl-7.76.1-23.el9_2.4.x86_64.rpmiucurl-7.76.1-23.el9_2.4.x86_64.rpmDulibcurl-7.76.1-23.el9_2.4.i686.rpmjucurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmEulibcurl-minimal-7.76.1-23.el9_2.4.i686.rpmEulibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmDulibcurl-7.76.1-23.el9_2.4.x86_64.rpmiucurl-7.76.1-23.el9_2.4.x86_64.rpmDulibcurl-7.76.1-23.el9_2.4.i686.rpm����g�X	�-�jBsecurity
Important: nghttp2 security update<���-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838
��libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm��libnghttp2-1.43.0-5.el9_2.1.i686.rpm��libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm��libnghttp2-1.43.0-5.el9_2.1.i686.rpm��Ù0�Y	�1�nBsecurity
Low: opensc security updatem��A�(https://access.redhat.com/errata/RHSA-2023:6587RHSA-2023:6587RHSA-2023:6587https://access.redhat.com/security/cve/CVE-2023-2977CVE-2023-2977CVE-2023-2977https://bugzilla.redhat.com/22110882211088https://errata.almalinux.org/9/ALSA-2023-6587.htmlALSA-2023:6587ALSA-2023:6587
��opensc-0.23.0-2.el9.i686.rpm��opensc-0.23.0-2.el9.x86_64.rpm��opensc-0.23.0-2.el9.i686.rpm��opensc-0.23.0-2.el9.x86_64.rpm�����Z	��rBBBsecurity
Moderate: binutils security update��i�Jhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593
�?�Nbinutils-2.35.2-42.el9.x86_64.rpm�?�Nbinutils-2.35.2-42.el9.i686.rpm��Nbinutils-gold-2.35.2-42.el9.x86_64.rpm�?�Nbinutils-2.35.2-42.el9.x86_64.rpm�?�Nbinutils-2.35.2-42.el9.i686.rpm��Nbinutils-gold-2.35.2-42.el9.x86_64.rpm����<�[	��wBBBBBBBBBBBBBBBsecurity
Important: linux-firmware security, bug fix, and enhancement update<��3�https://access.redhat.com/errata/RHSA-2023:6595RHSA-2023:6595RHSA-2023:6595https://access.redhat.com/security/cve/CVE-2022-27635CVE-2022-27635CVE-2022-27635https://access.redhat.com/security/cve/CVE-2022-36351CVE-2022-36351CVE-2022-36351https://access.redhat.com/security/cve/CVE-2022-38076CVE-2022-38076CVE-2022-38076https://access.redhat.com/security/cve/CVE-2022-40964CVE-2022-40964CVE-2022-40964https://access.redhat.com/security/cve/CVE-2022-46329CVE-2022-46329CVE-2022-46329https://access.redhat.com/security/cve/CVE-2023-20569CVE-2023-20569CVE-2023-20569https://bugzilla.redhat.com/22076252207625https://bugzilla.redhat.com/22389602238960https://bugzilla.redhat.com/22389612238961https://bugzilla.redhat.com/22389622238962https://bugzilla.redhat.com/22389632238963https://bugzilla.redhat.com/22389642238964https://errata.almalinux.org/9/ALSA-2023-6595.htmlALSA-2023:6595ALSA-2023:6595
�2�iwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm�=�(linux-firmware-20230814-140.el9_3.noarch.rpm�?�(netronome-firmware-20230814-140.el9_3.noarch.rpm�0�Siwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm�>�(linux-firmware-whence-20230814-140.el9_3.noarch.rpm�4�iwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm�6�hiwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm�1�iwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm�/�[iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm�5�aiwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm�8�iwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm�3�iwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm�<�(libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm�:�_iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm�;�aiwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm�7�diwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm�2�iwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm�=�(linux-firmware-20230814-140.el9_3.noarch.rpm�?�(netronome-firmware-20230814-140.el9_3.noarch.rpm�0�Siwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm�>�(linux-firmware-whence-20230814-140.el9_3.noarch.rpm�4�iwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm�6�hiwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm�1�iwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm�/�[iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm�5�aiwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm�8�iwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm�3�iwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm�<�(libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm�:�_iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm�;�aiwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm�7�diwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm����c�\	��IBsecurity
Moderate: cups security and bug fix update��?�nhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596
��!cups-libs-2.3.3op2-21.el9.x86_64.rpm��!cups-libs-2.3.3op2-21.el9.i686.rpm��!cups-libs-2.3.3op2-21.el9.x86_64.rpm��!cups-libs-2.3.3op2-21.el9.i686.rpm�����]	��Lsecurity
Moderate: python-cryptography security update��-�fhttps://access.redhat.com/errata/RHSA-2023:6615RHSA-2023:6615RHSA-2023:6615https://access.redhat.com/security/cve/CVE-2023-23931CVE-2023-23931CVE-2023-23931https://bugzilla.redhat.com/21718172171817https://errata.almalinux.org/9/ALSA-2023-6615.htmlALSA-2023:6615ALSA-2023:6615
�(�cpython3-cryptography-36.0.1-4.el9.x86_64.rpm�(�cpython3-cryptography-36.0.1-4.el9.x86_64.rpm�����^	��OBsecurity
Moderate: protobuf-c security update���}https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621
�V�protobuf-c-1.3.3-13.el9.x86_64.rpm�V�protobuf-c-1.3.3-13.el9.i686.rpm�V�protobuf-c-1.3.3-13.el9.x86_64.rpm�V�protobuf-c-1.3.3-13.el9.i686.rpm�����_	��SBsecurity
Low: glib2 security and bug fix updatem���ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631
�h�+glib2-2.68.4-11.el9.x86_64.rpm�h�+glib2-2.68.4-11.el9.i686.rpm�h�+glib2-2.68.4-11.el9.x86_64.rpm�h�+glib2-2.68.4-11.el9.i686.rpm�����`	��VBBBsecurity
Low: shadow-utils security and bug fix updatem���Yhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632
�5�Sshadow-utils-4.9-8.el9.x86_64.rpm�\�Sshadow-utils-subid-4.9-8.el9.i686.rpm�\�Sshadow-utils-subid-4.9-8.el9.x86_64.rpm�5�Sshadow-utils-4.9-8.el9.x86_64.rpm�\�Sshadow-utils-subid-4.9-8.el9.i686.rpm�\�Sshadow-utils-subid-4.9-8.el9.x86_64.rpm����@�a	��\Bsecurity
Moderate: c-ares security, bug fix, and enhancement update��X�

https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635
��c-ares-1.19.1-1.el9.i686.rpm��c-ares-1.19.1-1.el9.x86_64.rpm��c-ares-1.19.1-1.el9.i686.rpm��c-ares-1.19.1-1.el9.x86_64.rpm�����b	��_BBsecurity
Moderate: libssh security update��b�{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:6643
�o�slibssh-0.10.4-11.el9.i686.rpm�G�slibssh-config-0.10.4-11.el9.noarch.rpm�o�slibssh-0.10.4-11.el9.x86_64.rpm�o�slibssh-0.10.4-11.el9.i686.rpm�G�slibssh-config-0.10.4-11.el9.noarch.rpm�o�slibssh-0.10.4-11.el9.x86_64.rpm����X�c	� �cBBBsecurity
Moderate: python3.9 security update��]� https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659
;�Ypython3-libs-3.9.18-1.el9_3.i686.rpm[�Ypython3-3.9.18-1.el9_3.x86_64.rpm;�Ypython3-libs-3.9.18-1.el9_3.x86_64.rpm;�Ypython3-libs-3.9.18-1.el9_3.i686.rpm[�Ypython3-3.9.18-1.el9_3.x86_64.rpm;�Ypython3-libs-3.9.18-1.el9_3.x86_64.rpm����B�d	�!�hBsecurity
Low: gmp security and enhancement updatem��}�Uhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661
�D�$gmp-6.2.0-13.el9.x86_64.rpm�D�$gmp-6.2.0-13.el9.i686.rpm�D�$gmp-6.2.0-13.el9.x86_64.rpm�D�$gmp-6.2.0-13.el9.i686.rpm����B�e	�"�kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: samba security, bug fix, and enhancement update��R�K
https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667
�$samba-4.18.6-100.el9.x86_64.rpm�%samba-common-tools-4.18.6-100.el9.x86_64.rpmgsamba-winbind-modules-4.18.6-100.el9.i686.rpmdsamba-client-libs-4.18.6-100.el9.x86_64.rpmdsamba-client-libs-4.18.6-100.el9.i686.rpm�&samba-winbind-4.18.6-100.el9.x86_64.rpmesamba-common-libs-4.18.6-100.el9.i686.rpmalibsmbclient-4.18.6-100.el9.i686.rpm�libnetapi-4.18.6-100.el9.x86_64.rpmalibsmbclient-4.18.6-100.el9.x86_64.rpm�~python3-samba-dc-4.18.6-100.el9.x86_64.rpmfsamba-libs-4.18.6-100.el9.x86_64.rpm�samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpmcpython3-samba-4.18.6-100.el9.x86_64.rpmblibwbclient-4.18.6-100.el9.i686.rpm�samba-dcerpc-4.18.6-100.el9.x86_64.rpmblibwbclient-4.18.6-100.el9.x86_64.rpmfsamba-libs-4.18.6-100.el9.i686.rpm�samba-usershares-4.18.6-100.el9.x86_64.rpmgsamba-winbind-modules-4.18.6-100.el9.x86_64.rpmcpython3-samba-4.18.6-100.el9.i686.rpm�samba-dc-libs-4.18.6-100.el9.x86_64.rpm�samba-tools-4.18.6-100.el9.x86_64.rpm�samba-dc-libs-4.18.6-100.el9.i686.rpmesamba-common-libs-4.18.6-100.el9.x86_64.rpm�libnetapi-4.18.6-100.el9.i686.rpm�samba-common-4.18.6-100.el9.noarch.rpm�$samba-4.18.6-100.el9.x86_64.rpm�%samba-common-tools-4.18.6-100.el9.x86_64.rpmgsamba-winbind-modules-4.18.6-100.el9.i686.rpmdsamba-client-libs-4.18.6-100.el9.x86_64.rpmdsamba-client-libs-4.18.6-100.el9.i686.rpm�&samba-winbind-4.18.6-100.el9.x86_64.rpmesamba-common-libs-4.18.6-100.el9.i686.rpmalibsmbclient-4.18.6-100.el9.i686.rpm�libnetapi-4.18.6-100.el9.x86_64.rpmalibsmbclient-4.18.6-100.el9.x86_64.rpm�~python3-samba-dc-4.18.6-100.el9.x86_64.rpmfsamba-libs-4.18.6-100.el9.x86_64.rpm�samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpmcpython3-samba-4.18.6-100.el9.x86_64.rpmblibwbclient-4.18.6-100.el9.i686.rpm�samba-dcerpc-4.18.6-100.el9.x86_64.rpmblibwbclient-4.18.6-100.el9.x86_64.rpmfsamba-libs-4.18.6-100.el9.i686.rpm�samba-usershares-4.18.6-100.el9.x86_64.rpmgsamba-winbind-modules-4.18.6-100.el9.x86_64.rpmcpython3-samba-4.18.6-100.el9.i686.rpm�samba-dc-libs-4.18.6-100.el9.x86_64.rpm�samba-tools-4.18.6-100.el9.x86_64.rpm�samba-dc-libs-4.18.6-100.el9.i686.rpmesamba-common-libs-4.18.6-100.el9.x86_64.rpm�libnetapi-4.18.6-100.el9.i686.rpm�samba-common-4.18.6-100.el9.noarch.rpm����8�f	�#�WBBBBBBBBsecurity
Moderate: curl security update���q
https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679
Dvlibcurl-7.76.1-26.el9.x86_64.rpmEvlibcurl-minimal-7.76.1-26.el9.i686.rpmjvcurl-minimal-7.76.1-26.el9.x86_64.rpmDvlibcurl-7.76.1-26.el9.i686.rpmivcurl-7.76.1-26.el9.x86_64.rpmEvlibcurl-minimal-7.76.1-26.el9.x86_64.rpmDvlibcurl-7.76.1-26.el9.x86_64.rpmEvlibcurl-minimal-7.76.1-26.el9.i686.rpmjvcurl-minimal-7.76.1-26.el9.x86_64.rpmDvlibcurl-7.76.1-26.el9.i686.rpmivcurl-7.76.1-26.el9.x86_64.rpmEvlibcurl-minimal-7.76.1-26.el9.x86_64.rpm����Y�g	�$�aBsecurity
Low: tpm2-tss security and enhancement updatem���Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685
�^�1tpm2-tss-3.2.2-2.el9.i686.rpm�^�1tpm2-tss-3.2.2-2.el9.x86_64.rpm�^�1tpm2-tss-3.2.2-2.el9.i686.rpm�^�1tpm2-tss-3.2.2-2.el9.x86_64.rpm���� �h	�$�%security
Moderate: python-pip security update��`�(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694
�r�Ypython3-pip-wheel-21.2.3-7.el9.noarch.rpm�r�Ypython3-pip-wheel-21.2.3-7.el9.noarch.rpm����C�i	�%�fBBBBsecurity
Moderate: ncurses security and bug fix update���xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698
��"ncurses-6.2-10.20210508.el9.x86_64.rpm�S�"ncurses-libs-6.2-10.20210508.el9.i686.rpm�S�"ncurses-libs-6.2-10.20210508.el9.x86_64.rpm�n�"ncurses-base-6.2-10.20210508.el9.noarch.rpm��"ncurses-6.2-10.20210508.el9.x86_64.rpm�S�"ncurses-libs-6.2-10.20210508.el9.i686.rpm�S�"ncurses-libs-6.2-10.20210508.el9.x86_64.rpm�n�"ncurses-base-6.2-10.20210508.el9.noarch.rpm����b�j	�&�lBBBBBBBBBBBBBBBsecurity
Moderate: krb5 security and bug fix update���9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699
\Ukrb5-libs-1.21.1-1.el9.i686.rpm`Ulibkadm5-1.21.1-1.el9.i686.rpm]Ukrb5-pkinit-1.21.1-1.el9.i686.rpm_Ukrb5-server-ldap-1.21.1-1.el9.i686.rpm`Ulibkadm5-1.21.1-1.el9.x86_64.rpm^Ukrb5-server-1.21.1-1.el9.x86_64.rpm^Ukrb5-server-1.21.1-1.el9.i686.rpm\Ukrb5-libs-1.21.1-1.el9.x86_64.rpm�#Ukrb5-workstation-1.21.1-1.el9.x86_64.rpm_Ukrb5-server-ldap-1.21.1-1.el9.x86_64.rpm]Ukrb5-pkinit-1.21.1-1.el9.x86_64.rpm\Ukrb5-libs-1.21.1-1.el9.i686.rpm`Ulibkadm5-1.21.1-1.el9.i686.rpm]Ukrb5-pkinit-1.21.1-1.el9.i686.rpm_Ukrb5-server-ldap-1.21.1-1.el9.i686.rpm`Ulibkadm5-1.21.1-1.el9.x86_64.rpm^Ukrb5-server-1.21.1-1.el9.x86_64.rpm^Ukrb5-server-1.21.1-1.el9.i686.rpm\Ukrb5-libs-1.21.1-1.el9.x86_64.rpm�#Ukrb5-workstation-1.21.1-1.el9.x86_64.rpm_Ukrb5-server-ldap-1.21.1-1.el9.x86_64.rpm]Ukrb5-pkinit-1.21.1-1.el9.x86_64.rpm����u�k	��}BBsecurity
Low: procps-ng security and bug fix updatem��9�Hhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705
�U�uprocps-ng-3.3.17-13.el9.x86_64.rpm�o�uprocps-ng-i18n-3.3.17-13.el9.noarch.rpm�U�uprocps-ng-3.3.17-13.el9.i686.rpm�U�uprocps-ng-3.3.17-13.el9.x86_64.rpm�o�uprocps-ng-i18n-3.3.17-13.el9.noarch.rpm�U�uprocps-ng-3.3.17-13.el9.i686.rpm����Z�l	�'�BBBBBsecurity
Moderate: avahi security update���https://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707
�e� avahi-libs-0.8-15.el9.i686.rpm�d� avahi-0.8-15.el9.i686.rpm�d� avahi-0.8-15.el9.x86_64.rpm�e� avahi-libs-0.8-15.el9.x86_64.rpm�e� avahi-libs-0.8-15.el9.i686.rpm�d� avahi-0.8-15.el9.i686.rpm�d� avahi-0.8-15.el9.x86_64.rpm�e� avahi-libs-0.8-15.el9.x86_64.rpm����h�m	�(�HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: samba security update���Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744
�samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpmdsamba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmblibwbclient-4.18.6-101.el9_3.alma.1.i686.rpm�samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmalibsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm�libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm�samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpmgsamba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpmblibwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpmdsamba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpmfsamba-libs-4.18.6-101.el9_3.alma.1.i686.rpmesamba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpmfsamba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmcpython3-samba-4.18.6-101.el9_3.alma.1.i686.rpmalibsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�~python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm�&samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm�libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm�%samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm�$samba-4.18.6-101.el9_3.alma.1.x86_64.rpmgsamba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpmcpython3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpmesamba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm�samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpmdsamba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmblibwbclient-4.18.6-101.el9_3.alma.1.i686.rpm�samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmalibsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm�libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm�samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpmgsamba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpmblibwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpmdsamba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpmfsamba-libs-4.18.6-101.el9_3.alma.1.i686.rpmesamba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpmfsamba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmcpython3-samba-4.18.6-101.el9_3.alma.1.i686.rpmalibsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�~python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm�&samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm�libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm�%samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm�samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm�$samba-4.18.6-101.el9_3.alma.1.x86_64.rpmgsamba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpmcpython3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpmesamba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm����0�n	�)�tBBBBBBBBsecurity
Important: curl security update<��k�}https://access.redhat.com/errata/RHSA-2023:6745RHSA-2023:6745RHSA-2023:6745https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-6745.htmlALSA-2023:6745ALSA-2023:6745
jwcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpmDwlibcurl-7.76.1-26.el9_3.2.x86_64.rpmiwcurl-7.76.1-26.el9_3.2.x86_64.rpmEwlibcurl-minimal-7.76.1-26.el9_3.2.i686.rpmDwlibcurl-7.76.1-26.el9_3.2.i686.rpmEwlibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpmjwcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpmDwlibcurl-7.76.1-26.el9_3.2.x86_64.rpmiwcurl-7.76.1-26.el9_3.2.x86_64.rpmEwlibcurl-minimal-7.76.1-26.el9_3.2.i686.rpmDwlibcurl-7.76.1-26.el9_3.2.i686.rpmEwlibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm����!�o	��~Bsecurity
Important: nghttp2 security update<��h�-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746
��libnghttp2-1.43.0-5.el9_3.1.x86_64.rpm��libnghttp2-1.43.0-5.el9_3.1.i686.rpm��libnghttp2-1.43.0-5.el9_3.1.x86_64.rpm��libnghttp2-1.43.0-5.el9_3.1.i686.rpm����J�p�*�BBBBsecurity
Moderate: libxml2 security update���https://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747
�}�Qpython3-libxml2-2.9.13-5.el9_3.x86_64.rpm��Qlibxml2-2.9.13-5.el9_3.i686.rpm��Qlibxml2-2.9.13-5.el9_3.x86_64.rpm�}�Qpython3-libxml2-2.9.13-5.el9_3.x86_64.rpm��Qlibxml2-2.9.13-5.el9_3.i686.rpm��Qlibxml2-2.9.13-5.el9_3.x86_64.rpm���N�q�
�GBsecurity
Moderate: opensc security update���Khttps://access.redhat.com/errata/RHSA-2023:7879RHSA-2023:7879RHSA-2023:7879https://access.redhat.com/security/cve/CVE-2023-40660CVE-2023-40660CVE-2023-40660https://access.redhat.com/security/cve/CVE-2023-40661CVE-2023-40661CVE-2023-40661https://access.redhat.com/security/cve/CVE-2023-4535CVE-2023-4535CVE-2023-4535https://bugzilla.redhat.com/22409122240912https://bugzilla.redhat.com/22409132240913https://bugzilla.redhat.com/22409142240914https://errata.almalinux.org/9/ALSA-2023-7879.htmlALSA-2023:7879ALSA-2023:7879
��opensc-0.23.0-3.el9_3.x86_64.rpm��opensc-0.23.0-3.el9_3.i686.rpm��opensc-0.23.0-3.el9_3.x86_64.rpm��opensc-0.23.0-3.el9_3.i686.rpm�����r�+�KBBBsecurity
Moderate: openssl security update��_�Nhttps://access.redhat.com/errata/RHSA-2024:0310RHSA-2024:0310RHSA-2024:0310https://access.redhat.com/security/cve/CVE-2023-5363CVE-2023-5363CVE-2023-5363https://bugzilla.redhat.com/22438392243839https://errata.almalinux.org/9/ALSA-2024-0310.htmlALSA-2024:0310ALSA-2024:0310
|�Hopenssl-3.0.7-25.el9_3.x86_64.rpmY�Hopenssl-libs-3.0.7-25.el9_3.i686.rpmY�Hopenssl-libs-3.0.7-25.el9_3.x86_64.rpm|�Hopenssl-3.0.7-25.el9_3.x86_64.rpmY�Hopenssl-libs-3.0.7-25.el9_3.i686.rpmY�Hopenssl-libs-3.0.7-25.el9_3.x86_64.rpm����[�s�,�PBBBBBBBBBBBBBBBBBsecurity
Moderate: rpm security update��-�whttps://access.redhat.com/errata/RHSA-2024:0463RHSA-2024:0463RHSA-2024:0463https://access.redhat.com/security/cve/CVE-2021-35937CVE-2021-35937CVE-2021-35937https://access.redhat.com/security/cve/CVE-2021-35938CVE-2021-35938CVE-2021-35938https://access.redhat.com/security/cve/CVE-2021-35939CVE-2021-35939CVE-2021-35939https://bugzilla.redhat.com/19641141964114https://bugzilla.redhat.com/19641251964125https://bugzilla.redhat.com/19641291964129https://errata.almalinux.org/9/ALSA-2024-0463.htmlALSA-2024:0463ALSA-2024:0463
�3Krpm-sign-4.16.1.3-27.el9_3.x86_64.rpm�[Krpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm�1Krpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm�+Kpython3-rpm-4.16.1.3-27.el9_3.x86_64.rpm�2Krpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm�ZKrpm-libs-4.16.1.3-27.el9_3.i686.rpm�YKrpm-build-libs-4.16.1.3-27.el9_3.i686.rpm�[Krpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm�0Krpm-4.16.1.3-27.el9_3.x86_64.rpm�ZKrpm-libs-4.16.1.3-27.el9_3.x86_64.rpm�YKrpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm�3Krpm-sign-4.16.1.3-27.el9_3.x86_64.rpm�[Krpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm�1Krpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm�+Kpython3-rpm-4.16.1.3-27.el9_3.x86_64.rpm�2Krpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm�ZKrpm-libs-4.16.1.3-27.el9_3.i686.rpm�YKrpm-build-libs-4.16.1.3-27.el9_3.i686.rpm�[Krpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm�0Krpm-4.16.1.3-27.el9_3.x86_64.rpm�ZKrpm-libs-4.16.1.3-27.el9_3.x86_64.rpm�YKrpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm��˰2�t�$�#security
Moderate: python-urllib3 security update��$�https://access.redhat.com/errata/RHSA-2024:0464RHSA-2024:0464RHSA-2024:0464https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22424932242493https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-0464.htmlALSA-2024:0464ALSA-2024:0464
�L�Ppython3-urllib3-1.26.5-3.el9_3.1.noarch.rpm�L�Ppython3-urllib3-1.26.5-3.el9_3.1.noarch.rpm��˭�u�-�eBsecurity
Moderate: sqlite security update��;�https://access.redhat.com/errata/RHSA-2024:0465RHSA-2024:0465RHSA-2024:0465https://access.redhat.com/security/cve/CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/22561942256194https://errata.almalinux.org/9/ALSA-2024-0465.htmlALSA-2024:0465ALSA-2024:0465
�r�3sqlite-libs-3.34.1-7.el9_3.i686.rpm�r�3sqlite-libs-3.34.1-7.el9_3.x86_64.rpm�r�3sqlite-libs-3.34.1-7.el9_3.i686.rpm�r�3sqlite-libs-3.34.1-7.el9_3.x86_64.rpm��˩6�v�.�hBBBsecurity
Moderate: python3.9 security update��C�chttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466
;�Zpython3-libs-3.9.18-1.el9_3.1.x86_64.rpm[�Zpython3-3.9.18-1.el9_3.1.x86_64.rpm;�Zpython3-libs-3.9.18-1.el9_3.1.i686.rpm;�Zpython3-libs-3.9.18-1.el9_3.1.x86_64.rpm[�Zpython3-3.9.18-1.el9_3.1.x86_64.rpm;�Zpython3-libs-3.9.18-1.el9_3.1.i686.rpm��ˤ�w��mBBBBBBBBBBBBBBBBBsecurity
Moderate: grub2 security update��&�!https://access.redhat.com/errata/RHSA-2024:0468RHSA-2024:0468RHSA-2024:0468https://access.redhat.com/security/cve/CVE-2023-4001CVE-2023-4001CVE-2023-4001https://bugzilla.redhat.com/22249512224951https://errata.almalinux.org/9/ALSA-2024-0468.htmlALSA-2024:0468ALSA-2024:0468
�,Hgrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�-Hgrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�wHgrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm�xHgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm�+Hgrub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm�Hgrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�.Hgrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�vHgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm�|Hgrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm�{Hgrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm�zHgrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm�yHgrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm�,Hgrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�-Hgrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�wHgrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm�xHgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm�+Hgrub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm�Hgrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�.Hgrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm�vHgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm�|Hgrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm�{Hgrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm�zHgrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm�yHgrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm��Όr�x�/�ABsecurity
Moderate: gnutls security update��G�Ghttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533
n�7gnutls-3.7.6-23.el9_3.3.i686.rpmn�7gnutls-3.7.6-23.el9_3.3.x86_64.rpmn�7gnutls-3.7.6-23.el9_3.3.i686.rpmn�7gnutls-3.7.6-23.el9_3.3.x86_64.rpm��߲
�y�<�pBBBBBBBBBBsecurity
Moderate: nss security update���:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790
�!{nss-util-3.90.0-6.el9_3.x86_64.rpm�{nss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm��enspr-4.35.0-6.el9_3.x86_64.rpm� {nss-sysinit-3.90.0-6.el9_3.x86_64.rpm�{nss-3.90.0-6.el9_3.x86_64.rpm�{nss-softokn-3.90.0-6.el9_3.x86_64.rpm�!{nss-util-3.90.0-6.el9_3.x86_64.rpm�{nss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm��enspr-4.35.0-6.el9_3.x86_64.rpm� {nss-sysinit-3.90.0-6.el9_3.x86_64.rpm�{nss-3.90.0-6.el9_3.x86_64.rpm�{nss-softokn-3.90.0-6.el9_3.x86_64.rpm����4�z�=�Dsecurity
Moderate: sudo security update��H�|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811
�N�Xsudo-1.9.5p2-10.el9_3.x86_64.rpm�N�Xsudo-1.9.5p2-10.el9_3.x86_64.rpm����[�{�	�FBsecurity
Moderate: opensc security update��D�https://access.redhat.com/errata/RHSA-2024:0966RHSA-2024:0966RHSA-2024:0966https://access.redhat.com/security/cve/CVE-2023-5992CVE-2023-5992CVE-2023-5992https://bugzilla.redhat.com/22486852248685https://errata.almalinux.org/9/ALSA-2024-0966.htmlALSA-2024:0966ALSA-2024:0966
��opensc-0.23.0-4.el9_3.i686.rpm��opensc-0.23.0-4.el9_3.x86_64.rpm��opensc-0.23.0-4.el9_3.i686.rpm��opensc-0.23.0-4.el9_3.x86_64.rpm����E�|�>�JBsecurity
Important: pam:1.5.1 security update<��V�[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:10244
�p�pam-1.5.1-22.el9_5.x86_64.rpm�p�pam-1.5.1-22.el9_5.i686.rpm�p�pam-1.5.1-22.el9_5.x86_64.rpm�p�pam-1.5.1-22.el9_5.i686.rpm����g�}�?�MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security update��1�https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274
6kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpmkernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpmOkernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpmPkernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm�Ekernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpmRkernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm/�bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpmQkernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm2kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm1kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm0kernel-5.14.0-503.15.1.el9_5.x86_64.rpm:python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpmkernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpmOkernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpmPkernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm�Ekernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpmRkernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm/�bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpmQkernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm2kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm1kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm0kernel-5.14.0-503.15.1.el9_5.x86_64.rpm:python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm�����~��psecurity
Important: tuned security update<��P�https://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:10384
�w�dtuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm�v�dtuned-2.24.0-2.el9_5.alma.1.noarch.rpm�w�dtuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm�v�dtuned-2.24.0-2.el9_5.alma.1.noarch.rpm����^���rBBBBBBBBsecurity
Moderate: curl security update��n�@https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129
Exlibcurl-minimal-7.76.1-26.el9_3.3.i686.rpmExlibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpmjxcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpmDxlibcurl-7.76.1-26.el9_3.3.x86_64.rpmDxlibcurl-7.76.1-26.el9_3.3.i686.rpmixcurl-7.76.1-26.el9_3.3.x86_64.rpmExlibcurl-minimal-7.76.1-26.el9_3.3.i686.rpmExlibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpmjxcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpmDxlibcurl-7.76.1-26.el9_3.3.x86_64.rpmDxlibcurl-7.76.1-26.el9_3.3.i686.rpmixcurl-7.76.1-26.el9_3.3.x86_64.rpm����7���|BBBBBBsecurity
Moderate: openssh security update��.�0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130
�B�openssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm�@�openssh-8.7p1-34.el9_3.3.x86_64.rpm�A�openssh-clients-8.7p1-34.el9_3.3.x86_64.rpm�C�openssh-server-8.7p1-34.el9_3.3.x86_64.rpm�B�openssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm�@�openssh-8.7p1-34.el9_3.3.x86_64.rpm�A�openssh-clients-8.7p1-34.el9_3.3.x86_64.rpm�C�openssh-server-8.7p1-34.el9_3.3.x86_64.rpm����R��
�DBBBBBBBsecurity
Moderate: opencryptoki security update��^�Whttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239
�T�opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm�T�opencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm�$�opencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm�#�opencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm�"�opencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm�T�opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm�T�opencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm�$�opencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm�#�opencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm�"�opencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm����E���NBsecurity
Moderate: expat security update��5�Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530
l�(expat-2.5.0-1.el9_3.1.x86_64.rpml�(expat-2.5.0-1.el9_3.1.i686.rpml�(expat-2.5.0-1.el9_3.1.x86_64.rpml�(expat-2.5.0-1.el9_3.1.i686.rpm�������Qsecurity
Moderate: less security update��w�#https://access.redhat.com/errata/RHSA-2024:1692RHSA-2024:1692RHSA-2024:1692https://access.redhat.com/security/cve/CVE-2022-48624CVE-2022-48624CVE-2022-48624https://bugzilla.redhat.com/22650812265081https://errata.almalinux.org/9/ALSA-2024-1692.htmlALSA-2024:1692ALSA-2024:1692
�	�kless-590-3.el9_3.x86_64.rpm�	�kless-590-3.el9_3.x86_64.rpm����|���TBsecurity
Moderate: gnutls security update���https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879
n�8gnutls-3.7.6-23.el9_3.4.i686.rpmn�8gnutls-3.7.6-23.el9_3.4.x86_64.rpmn�8gnutls-3.7.6-23.el9_3.4.i686.rpmn�8gnutls-3.7.6-23.el9_3.4.x86_64.rpm�������Wsecurity
Important: shim bug fix update<��,�Mhttps://access.redhat.com/errata/RHSA-2024:1903RHSA-2024:1903RHSA-2024:1903https://access.redhat.com/security/cve/CVE-2023-40546CVE-2023-40546CVE-2023-40546https://access.redhat.com/security/cve/CVE-2023-40547CVE-2023-40547CVE-2023-40547https://access.redhat.com/security/cve/CVE-2023-40548CVE-2023-40548CVE-2023-40548https://access.redhat.com/security/cve/CVE-2023-40549CVE-2023-40549CVE-2023-40549https://access.redhat.com/security/cve/CVE-2023-40550CVE-2023-40550CVE-2023-40550https://access.redhat.com/security/cve/CVE-2023-40551CVE-2023-40551CVE-2023-40551https://bugzilla.redhat.com/22345892234589https://bugzilla.redhat.com/22417822241782https://bugzilla.redhat.com/22417962241796https://bugzilla.redhat.com/22417972241797https://bugzilla.redhat.com/22599152259915https://bugzilla.redhat.com/22599182259918https://errata.almalinux.org/9/ALSA-2024-1903.htmlALSA-2024:1903ALSA-2024:1903
�M�Zshim-x64-15.8-4.el9_3.alma.1.x86_64.rpm�M�Zshim-x64-15.8-4.el9_3.alma.1.x86_64.rpm����x���ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security, bug fix, and enhancement update<��y�%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394
https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-266710"kernel-5.14.0-427.13.1.el9_4.x86_64.rpmQ"kernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm"kernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpm4"kernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpm9"kernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpmO"kernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmP"kernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm3"kernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpm8"kernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm:"python3-perf-5.14.0-427.13.1.el9_4.x86_64.rpm7"kernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm5"kernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm2"kernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpm6"kernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpmR"kernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm1"kernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm/�qbpftool-7.3.0-427.13.1.el9_4.x86_64.rpm0"kernel-5.14.0-427.13.1.el9_4.x86_64.rpmQ"kernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm"kernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpm4"kernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpm9"kernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpmO"kernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmP"kernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm3"kernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpm8"kernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm:"python3-perf-5.14.0-427.13.1.el9_4.x86_64.rpm7"kernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm5"kernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm2"kernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpm6"kernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpmR"kernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm1"kernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm/�qbpftool-7.3.0-427.13.1.el9_4.x86_64.rpm����'��=�{security
Moderate: squashfs-tools security update���https://access.redhat.com/errata/RHSA-2024:2396RHSA-2024:2396RHSA-2024:2396https://access.redhat.com/security/cve/CVE-2021-40153CVE-2021-40153CVE-2021-40153https://access.redhat.com/security/cve/CVE-2021-41072CVE-2021-41072CVE-2021-41072https://bugzilla.redhat.com/19986211998621https://bugzilla.redhat.com/20049572004957https://errata.almalinux.org/9/ALSA-2024-2396.htmlALSA-2024:2396ALSA-2024:2396
�7�fsquashfs-tools-4.4-10.git1.el9.x86_64.rpm�7�fsquashfs-tools-4.4-10.git1.el9.x86_64.rpm������~Bsecurity
Moderate: harfbuzz security update��=�{https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410
�k�-harfbuzz-2.7.4-10.el9.x86_64.rpm�k�-harfbuzz-2.7.4-10.el9.i686.rpm�k�-harfbuzz-2.7.4-10.el9.x86_64.rpm�k�-harfbuzz-2.7.4-10.el9.i686.rpm����	��ABBBBsecurity
Moderate: avahi security update��8�Ohttps://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433
�e�!avahi-libs-0.8-20.el9.x86_64.rpm�d�!avahi-0.8-20.el9.x86_64.rpm�e�!avahi-libs-0.8-20.el9.i686.rpm�d�!avahi-0.8-20.el9.i686.rpm�e�!avahi-libs-0.8-20.el9.x86_64.rpm�d�!avahi-0.8-20.el9.x86_64.rpm�e�!avahi-libs-0.8-20.el9.i686.rpm�d�!avahi-0.8-20.el9.i686.rpm����
�	�Gsecurity
Moderate: exfatprogs security update���https://access.redhat.com/errata/RHSA-2024:2437RHSA-2024:2437RHSA-2024:2437https://access.redhat.com/security/cve/CVE-2023-45897CVE-2023-45897CVE-2023-45897https://bugzilla.redhat.com/22469762246976https://errata.almalinux.org/9/ALSA-2024-2437.htmlALSA-2024:2437ALSA-2024:2437
��Vexfatprogs-1.2.2-2.el9.x86_64.rpm��Vexfatprogs-1.2.2-2.el9.x86_64.rpm������JBsecurity
Moderate: pam security update���Ohttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:2438
�p�pam-1.5.1-19.el9.x86_64.rpm�p�pam-1.5.1-19.el9.i686.rpm�p�pam-1.5.1-19.el9.x86_64.rpm�p�pam-1.5.1-19.el9.i686.rpm���
��	�MBBBsecurity
Low: openssl and openssl-fips-provider security updatem��^�/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447
Y�Iopenssl-libs-3.0.7-27.el9.i686.rpmY�Iopenssl-libs-3.0.7-27.el9.x86_64.rpm|�Iopenssl-3.0.7-27.el9.x86_64.rpmY�Iopenssl-libs-3.0.7-27.el9.i686.rpmY�Iopenssl-libs-3.0.7-27.el9.x86_64.rpm|�Iopenssl-3.0.7-27.el9.x86_64.rpm����
�$�RBBBBBBBBBBBBBBBBsecurity
Moderate: grub2 security update��
�Thttps://access.redhat.com/errata/RHSA-2024:2456RHSA-2024:2456RHSA-2024:2456https://access.redhat.com/security/cve/CVE-2023-4692CVE-2023-4692CVE-2023-4692https://access.redhat.com/security/cve/CVE-2023-4693CVE-2023-4693CVE-2023-4693https://access.redhat.com/security/cve/CVE-2024-1048CVE-2024-1048CVE-2024-1048https://bugzilla.redhat.com/22366132236613https://bugzilla.redhat.com/22383432238343https://bugzilla.redhat.com/22568272256827https://errata.almalinux.org/9/ALSA-2024-2456.htmlALSA-2024:2456ALSA-2024:2456
�.Lgrub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm�yLgrub2-tools-2.06-77.el9.alma.1.x86_64.rpm�xLgrub2-pc-2.06-77.el9.alma.1.x86_64.rpm�{Lgrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm�vLgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm�wLgrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm�zLgrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm�-Lgrub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm�,Lgrub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm�+Lgrub2-common-2.06-77.el9.alma.1.noarch.rpm�|Lgrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm�.Lgrub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm�yLgrub2-tools-2.06-77.el9.alma.1.x86_64.rpm�xLgrub2-pc-2.06-77.el9.alma.1.x86_64.rpm�{Lgrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm�vLgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm�wLgrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm�zLgrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm�-Lgrub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm�,Lgrub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm�+Lgrub2-common-2.06-77.el9.alma.1.noarch.rpm�|Lgrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm���F��
�eBBBBBBBBBBBBBBBBBsecurity
Moderate: systemd security update��a�https://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463
�uIrhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm�Isystemd-container-252-32.el9_4.alma.1.i686.rpm�
Isystemd-udev-252-32.el9_4.alma.1.x86_64.rpm�
Isystemd-oomd-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-libs-252-32.el9_4.alma.1.i686.rpm�Isystemd-libs-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-252-32.el9_4.alma.1.i686.rpm�Isystemd-pam-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-container-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-resolved-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm�uIrhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm�Isystemd-container-252-32.el9_4.alma.1.i686.rpm�
Isystemd-udev-252-32.el9_4.alma.1.x86_64.rpm�
Isystemd-oomd-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-libs-252-32.el9_4.alma.1.i686.rpm�Isystemd-libs-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-252-32.el9_4.alma.1.i686.rpm�Isystemd-pam-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-container-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-resolved-252-32.el9_4.alma.1.x86_64.rpm�Isystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm�����:�xsecurity
Moderate: traceroute security update��b�https://access.redhat.com/errata/RHSA-2024:2483RHSA-2024:2483RHSA-2024:2483https://access.redhat.com/security/cve/CVE-2023-46316CVE-2023-46316CVE-2023-46316https://bugzilla.redhat.com/22463032246303https://errata.almalinux.org/9/ALSA-2024-2483.htmlALSA-2024:2483ALSA-2024:2483
�L�dtraceroute-2.1.0-18.el9.x86_64.rpm�L�dtraceroute-2.1.0-18.el9.x86_64.rpm������{BBsecurity
Low: libssh security updatem��u�https://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:2504
�o�tlibssh-0.10.4-13.el9.x86_64.rpm�G�tlibssh-config-0.10.4-13.el9.noarch.rpm�o�tlibssh-0.10.4-13.el9.i686.rpm�o�tlibssh-0.10.4-13.el9.x86_64.rpm�G�tlibssh-config-0.10.4-13.el9.noarch.rpm�o�tlibssh-0.10.4-13.el9.i686.rpm���'���BBBsecurity
Low: file security updatem��}�Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512
�B�bfile-libs-5.39-16.el9.x86_64.rpm��bfile-5.39-16.el9.x86_64.rpm�B�bfile-libs-5.39-16.el9.i686.rpm�B�bfile-libs-5.39-16.el9.x86_64.rpm��bfile-5.39-16.el9.x86_64.rpm�B�bfile-libs-5.39-16.el9.i686.rpm������Dsecurity
Moderate: wpa_supplicant security update��?�bhttps://access.redhat.com/errata/RHSA-2024:2517RHSA-2024:2517RHSA-2024:2517https://access.redhat.com/security/cve/CVE-2023-52160CVE-2023-52160CVE-2023-52160https://bugzilla.redhat.com/22645932264593https://errata.almalinux.org/9/ALSA-2024-2517.htmlALSA-2024:2517ALSA-2024:2517
�M�[wpa_supplicant-2.10-5.el9.x86_64.rpm�M�[wpa_supplicant-2.10-5.el9.x86_64.rpm�����
�GBsecurity
Moderate: gnutls security update��!�https://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570
n�9gnutls-3.8.3-4.el9_4.x86_64.rpmn�9gnutls-3.8.3-4.el9_4.i686.rpmn�9gnutls-3.8.3-4.el9_4.x86_64.rpmn�9gnutls-3.8.3-4.el9_4.i686.rpm���A���JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: sssd security and bug fix update��2�Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571
#�tpython3-sssdconfig-2.9.4-6.el9_4.noarch.rpm�Ilibipa_hbac-2.9.4-6.el9_4.x86_64.rpm�]sssd-client-2.9.4-6.el9_4.i686.rpm�*python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�:sssd-common-2.9.4-6.el9_4.x86_64.rpm�8sssd-2.9.4-6.el9_4.x86_64.rpm�-python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm�Plibsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm�9sssd-ad-2.9.4-6.el9_4.x86_64.rpm�Esssd-proxy-2.9.4-6.el9_4.x86_64.rpm�@sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm�Plibsss_simpleifp-2.9.4-6.el9_4.i686.rpm�Csssd-passkey-2.9.4-6.el9_4.x86_64.rpm�Fsssd-tools-2.9.4-6.el9_4.x86_64.rpm�Olibsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�<sssd-dbus-2.9.4-6.el9_4.x86_64.rpm�Ilibipa_hbac-2.9.4-6.el9_4.i686.rpm�Mlibsss_certmap-2.9.4-6.el9_4.i686.rpm�;sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm�)python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm�Asssd-ldap-2.9.4-6.el9_4.x86_64.rpm�>sssd-kcm-2.9.4-6.el9_4.x86_64.rpm�Nlibsss_idmap-2.9.4-6.el9_4.i686.rpm�libsss_sudo-2.9.4-6.el9_4.x86_64.rpm�Gsssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm�Dsssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm�libsss_autofs-2.9.4-6.el9_4.x86_64.rpm�=sssd-ipa-2.9.4-6.el9_4.x86_64.rpm�?sssd-krb5-2.9.4-6.el9_4.x86_64.rpm�Mlibsss_certmap-2.9.4-6.el9_4.x86_64.rpm�Bsssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm�]sssd-client-2.9.4-6.el9_4.x86_64.rpm�Nlibsss_idmap-2.9.4-6.el9_4.x86_64.rpm�,python3-sss-2.9.4-6.el9_4.x86_64.rpm�Olibsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#�tpython3-sssdconfig-2.9.4-6.el9_4.noarch.rpm�Ilibipa_hbac-2.9.4-6.el9_4.x86_64.rpm�]sssd-client-2.9.4-6.el9_4.i686.rpm�*python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�:sssd-common-2.9.4-6.el9_4.x86_64.rpm�8sssd-2.9.4-6.el9_4.x86_64.rpm�-python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm�Plibsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm�9sssd-ad-2.9.4-6.el9_4.x86_64.rpm�Esssd-proxy-2.9.4-6.el9_4.x86_64.rpm�@sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm�Plibsss_simpleifp-2.9.4-6.el9_4.i686.rpm�Csssd-passkey-2.9.4-6.el9_4.x86_64.rpm�Fsssd-tools-2.9.4-6.el9_4.x86_64.rpm�Olibsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm�<sssd-dbus-2.9.4-6.el9_4.x86_64.rpm�Ilibipa_hbac-2.9.4-6.el9_4.i686.rpm�Mlibsss_certmap-2.9.4-6.el9_4.i686.rpm�;sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm�)python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm�Asssd-ldap-2.9.4-6.el9_4.x86_64.rpm�>sssd-kcm-2.9.4-6.el9_4.x86_64.rpm�Nlibsss_idmap-2.9.4-6.el9_4.i686.rpm�libsss_sudo-2.9.4-6.el9_4.x86_64.rpm�Gsssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm�Dsssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm�libsss_autofs-2.9.4-6.el9_4.x86_64.rpm�=sssd-ipa-2.9.4-6.el9_4.x86_64.rpm�?sssd-krb5-2.9.4-6.el9_4.x86_64.rpm�Mlibsss_certmap-2.9.4-6.el9_4.x86_64.rpm�Bsssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm�]sssd-client-2.9.4-6.el9_4.x86_64.rpm�Nlibsss_idmap-2.9.4-6.el9_4.x86_64.rpm�,python3-sss-2.9.4-6.el9_4.x86_64.rpm�Olibsss_nss_idmap-2.9.4-6.el9_4.i686.rpm���#���IBBBsecurity
Moderate: libxml2 security update��z�nhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679
�}�Rpython3-libxml2-2.9.13-6.el9_4.x86_64.rpm��Rlibxml2-2.9.13-6.el9_4.x86_64.rpm��Rlibxml2-2.9.13-6.el9_4.i686.rpm�}�Rpython3-libxml2-2.9.13-6.el9_4.x86_64.rpm��Rlibxml2-2.9.13-6.el9_4.x86_64.rpm��Rlibxml2-2.9.13-6.el9_4.i686.rpm����k���NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security and bug fix update��h�&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758
https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-257434#kernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm5#kernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm#kernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpm0#kernel-5.14.0-427.16.1.el9_4.x86_64.rpm:#python3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm/�rbpftool-7.3.0-427.16.1.el9_4.x86_64.rpm2#kernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpm1#kernel-core-5.14.0-427.16.1.el9_4.x86_64.rpm6#kernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpmQ#kernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm8#kernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpm9#kernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpm7#kernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmR#kernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmO#kernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm3#kernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpmP#kernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm4#kernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm5#kernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm#kernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpm0#kernel-5.14.0-427.16.1.el9_4.x86_64.rpm:#python3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm/�rbpftool-7.3.0-427.16.1.el9_4.x86_64.rpm2#kernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpm1#kernel-core-5.14.0-427.16.1.el9_4.x86_64.rpm6#kernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpmQ#kernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm8#kernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpm9#kernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpm7#kernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmR#kernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmO#kernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm3#kernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpmP#kernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm����t���oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security and bug fix update���xhttps://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306
https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-358906$kernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpm8$kernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpmO$kernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmR$kernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm5$kernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm$kernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpm3$kernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpm1$kernel-core-5.14.0-427.18.1.el9_4.x86_64.rpm2$kernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpmP$kernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm7$kernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm4$kernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpmQ$kernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm9$kernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpm0$kernel-5.14.0-427.18.1.el9_4.x86_64.rpm:$python3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm/�sbpftool-7.3.0-427.18.1.el9_4.x86_64.rpm6$kernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpm8$kernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpmO$kernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmR$kernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm5$kernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm$kernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpm3$kernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpm1$kernel-core-5.14.0-427.18.1.el9_4.x86_64.rpm2$kernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpmP$kernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm7$kernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm4$kernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpmQ$kernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm9$kernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpm0$kernel-5.14.0-427.18.1.el9_4.x86_64.rpm:$python3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm/�sbpftool-7.3.0-427.18.1.el9_4.x86_64.rpm����"���PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: glibc security update<���https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339
�P�|glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm�}glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm�Gglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm�gglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm�Hnscd-2.34-100.el9_4.2.x86_64.rpm�xglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm�iglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm�zglibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm�Iglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm�Yglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm�Xglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm�Aglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm�Fglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm�qglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm�vglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm�#glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm�jglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm�=glibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm�uglibc-common-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm�vglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm�Lglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm�zglibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm�Qglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm�|glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm�Sglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm�fglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm�Tglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm�dglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm�iglibc-2.34-100.el9_4.2.x86_64.rpm�^glibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm�bglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm�?glibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm�nlibnsl-2.34-100.el9_4.2.x86_64.rpm�kglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm�}glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm�nglibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm�Vglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm�	glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm�uglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm�pglibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm�Wglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm�tglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm�Kglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm�cglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm�Bglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm�Pglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm�Hglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm�tglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm�Mglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm�aglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm�@glibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm�<glibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm�_glibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm�wglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm�wglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm�mglibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm�Nglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm�rglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm�<glibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm�Cglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm�iglibc-2.34-100.el9_4.2.i686.rpm�	glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm�nlibnsl-2.34-100.el9_4.2.i686.rpm�jglibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm�~glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm�lglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm�{glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm�\glibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm�]glibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm�~glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm�eglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm�yglibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm�Eglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm�jglibc-gconv-extra-2.34-100.el9_4.2.i686.rpm�Uglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm�`glibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm�Zglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm�Dglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm�{glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm�yglibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm�>glibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm�sglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm�oglibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm�#glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm�[glibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm�Jglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm�Rglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm�Oglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm�xglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm�hglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm�P�|glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm�}glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm�Gglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm�gglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm�Hnscd-2.34-100.el9_4.2.x86_64.rpm�xglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm�iglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm�zglibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm�Iglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm�Yglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm�Xglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm�Aglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm�Fglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm�qglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm�vglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm�#glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm�jglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm�=glibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm�uglibc-common-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm�vglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm�Lglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm�zglibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm�Qglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm�|glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm�Sglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm�fglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm�Tglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm�dglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm�+glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm�iglibc-2.34-100.el9_4.2.x86_64.rpm�^glibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm�bglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm�?glibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm�6glibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm�nlibnsl-2.34-100.el9_4.2.x86_64.rpm�kglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm�}glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm�nglibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm�Vglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm�	glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm�uglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm�pglibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm�Wglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm�tglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm�Kglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm�cglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm�Bglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm�"glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm�Pglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm� glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm�Hglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm�tglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm�Mglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm�aglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm�@glibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm�%glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm�8glibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm�;glibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm�<glibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm�7glibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm�_glibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm�wglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm�0glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm�&glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm�wglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm�mglibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm�Nglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm�-glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm�rglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm�<glibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm�Cglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm�
glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm�iglibc-2.34-100.el9_4.2.i686.rpm�	glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm�)glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm�nlibnsl-2.34-100.el9_4.2.i686.rpm�jglibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm�~glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm�lglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm�{glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm�9glibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm�$glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm�1glibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm�.glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm�\glibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm�]glibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm�/glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm�~glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm�eglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm�,glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm�yglibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm�*glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm�Eglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm�jglibc-gconv-extra-2.34-100.el9_4.2.i686.rpm�Uglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm�:glibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm�4glibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm�`glibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm�Zglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm�Dglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm�{glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm�'glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm�!glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm�yglibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm�>glibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm�sglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm�2glibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm�3glibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm�5glibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm�oglibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm�(glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm�#glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm�[glibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm�Jglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm�Rglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm�Oglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm�xglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm�hglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm�glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm����"��0�mBsecurity
Moderate: nghttp2 security update���mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501
��libnghttp2-1.43.0-5.el9_4.3.i686.rpm��libnghttp2-1.43.0-5.el9_4.3.x86_64.rpm��libnghttp2-1.43.0-5.el9_4.3.i686.rpm��libnghttp2-1.43.0-5.el9_4.3.x86_64.rpm���<��3�qsecurity
Important: less security update<���zhttps://access.redhat.com/errata/RHSA-2024:3513RHSA-2024:3513RHSA-2024:3513https://access.redhat.com/security/cve/CVE-2024-32487CVE-2024-32487CVE-2024-32487https://bugzilla.redhat.com/22749802274980https://errata.almalinux.org/9/ALSA-2024-3513.htmlALSA-2024:3513ALSA-2024:3513
�	�lless-590-4.el9_4.x86_64.rpm�	�lless-590-4.el9_4.x86_64.rpm���U���tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security and bug fix update��}�bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619
9%kernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpm0%kernel-5.14.0-427.20.1.el9_4.x86_64.rpm8%kernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm:%python3-perf-5.14.0-427.20.1.el9_4.x86_64.rpm2%kernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpmO%kernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm3%kernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm/�tbpftool-7.3.0-427.20.1.el9_4.x86_64.rpmP%kernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpmR%kernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpmQ%kernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm4%kernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm6%kernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpm7%kernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm%kernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpm1%kernel-core-5.14.0-427.20.1.el9_4.x86_64.rpm5%kernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm9%kernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpm0%kernel-5.14.0-427.20.1.el9_4.x86_64.rpm8%kernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm:%python3-perf-5.14.0-427.20.1.el9_4.x86_64.rpm2%kernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpmO%kernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm3%kernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm/�tbpftool-7.3.0-427.20.1.el9_4.x86_64.rpmP%kernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpmR%kernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpmQ%kernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm4%kernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm6%kernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpm7%kernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm%kernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpm1%kernel-core-5.14.0-427.20.1.el9_4.x86_64.rpm5%kernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm����O���UBsecurity
Low: c-ares security updatem��_�https://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842
��c-ares-1.19.1-2.el9_4.i686.rpm��c-ares-1.19.1-2.el9_4.x86_64.rpm��c-ares-1.19.1-2.el9_4.i686.rpm��c-ares-1.19.1-2.el9_4.x86_64.rpm����W���XBBBBBBsecurity
Moderate: cockpit security update��a�Ehttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843
�k�cockpit-system-311.2-1.el9_4.noarch.rpm�l�cockpit-ws-311.2-1.el9_4.x86_64.rpm�h�cockpit-311.2-1.el9_4.x86_64.rpm�j�cockpit-doc-311.2-1.el9_4.noarch.rpm�i�cockpit-bridge-311.2-1.el9_4.x86_64.rpm�k�cockpit-system-311.2-1.el9_4.noarch.rpm�l�cockpit-ws-311.2-1.el9_4.x86_64.rpm�h�cockpit-311.2-1.el9_4.x86_64.rpm�j�cockpit-doc-311.2-1.el9_4.noarch.rpm�i�cockpit-bridge-311.2-1.el9_4.x86_64.rpm����c��!� security
Moderate: python-idna security update��&�https://access.redhat.com/errata/RHSA-2024:3846RHSA-2024:3846RHSA-2024:3846https://access.redhat.com/security/cve/CVE-2024-3651CVE-2024-3651CVE-2024-3651https://bugzilla.redhat.com/22747792274779https://errata.almalinux.org/9/ALSA-2024-3846.htmlALSA-2024:3846ALSA-2024:3846
�q�Vpython3-idna-2.10-7.el9_4.1.noarch.rpm�q�Vpython3-idna-2.10-7.el9_4.1.noarch.rpm����O���bBBBsecurity
Important: python3.9 security update<��*�https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078
;�[python3-libs-3.9.18-3.el9_4.1.x86_64.rpm[�[python3-3.9.18-3.el9_4.1.x86_64.rpm;�[python3-libs-3.9.18-3.el9_4.1.i686.rpm;�[python3-libs-3.9.18-3.el9_4.1.x86_64.rpm[�[python3-3.9.18-3.el9_4.1.x86_64.rpm;�[python3-libs-3.9.18-3.el9_4.1.i686.rpm���� ��gBBBBBBsecurity
Important: openssh security update<��?�shttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312
�C�openssh-server-8.7p1-38.el9_4.1.x86_64.rpm�@�openssh-8.7p1-38.el9_4.1.x86_64.rpm�A�openssh-clients-8.7p1-38.el9_4.1.x86_64.rpm�B�openssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm�C�openssh-server-8.7p1-38.el9_4.1.x86_64.rpm�@�openssh-8.7p1-38.el9_4.1.x86_64.rpm�A�openssh-clients-8.7p1-38.el9_4.1.x86_64.rpm�B�openssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm�����!��oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security and bug fix update��2�https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349
P&kernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm5&kernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm9&kernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpmQ&kernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm2&kernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpm0&kernel-5.14.0-427.24.1.el9_4.x86_64.rpmR&kernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm/�ubpftool-7.3.0-427.24.1.el9_4.x86_64.rpm1&kernel-core-5.14.0-427.24.1.el9_4.x86_64.rpmO&kernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm3&kernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm6&kernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpm8&kernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpm&kernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm:&python3-perf-5.14.0-427.24.1.el9_4.x86_64.rpm7&kernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm4&kernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpmP&kernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm5&kernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm9&kernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpmQ&kernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm2&kernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpm0&kernel-5.14.0-427.24.1.el9_4.x86_64.rpmR&kernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm/�ubpftool-7.3.0-427.24.1.el9_4.x86_64.rpm1&kernel-core-5.14.0-427.24.1.el9_4.x86_64.rpmO&kernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm3&kernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm6&kernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpm8&kernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpm&kernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm:&python3-perf-5.14.0-427.24.1.el9_4.x86_64.rpm7&kernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm4&kernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm����{�"��PBBBBBBsecurity
Moderate: openssh security update��@�https://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457
�B�openssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm�A�openssh-clients-8.7p1-38.el9_4.4.x86_64.rpm�C�openssh-server-8.7p1-38.el9_4.4.x86_64.rpm�@�openssh-8.7p1-38.el9_4.4.x86_64.rpm�B�openssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm�A�openssh-clients-8.7p1-38.el9_4.4.x86_64.rpm�C�openssh-server-8.7p1-38.el9_4.4.x86_64.rpm�@�openssh-8.7p1-38.el9_4.4.x86_64.rpm��ߴ�#��XBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security update<��F�$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583
5'kernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm8'kernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpmP'kernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm'kernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpm3'kernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm4'kernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm1'kernel-core-5.14.0-427.26.1.el9_4.x86_64.rpm7'kernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm9'kernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpm0'kernel-5.14.0-427.26.1.el9_4.x86_64.rpm/�vbpftool-7.3.0-427.26.1.el9_4.x86_64.rpm2'kernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm:'python3-perf-5.14.0-427.26.1.el9_4.x86_64.rpm6'kernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpmQ'kernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmO'kernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmR'kernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm5'kernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm8'kernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpmP'kernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm'kernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpm3'kernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm4'kernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm1'kernel-core-5.14.0-427.26.1.el9_4.x86_64.rpm7'kernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm9'kernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpm0'kernel-5.14.0-427.26.1.el9_4.x86_64.rpm/�vbpftool-7.3.0-427.26.1.el9_4.x86_64.rpm2'kernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm:'python3-perf-5.14.0-427.26.1.el9_4.x86_64.rpm6'kernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpmQ'kernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmO'kernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmR'kernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm����&�$�<�yBsecurity
Important: libndp security update<��`�[https://access.redhat.com/errata/RHSA-2024:4636RHSA-2024:4636RHSA-2024:4636https://access.redhat.com/security/cve/CVE-2024-5564CVE-2024-5564CVE-2024-5564https://bugzilla.redhat.com/22841222284122https://errata.almalinux.org/9/ALSA-2024-4636.htmlALSA-2024:4636ALSA-2024:4636
�K�libndp-1.8-6.el9_4.alma.1.i686.rpm�K�libndp-1.8-6.el9_4.alma.1.x86_64.rpm�K�libndp-1.8-6.el9_4.alma.1.i686.rpm�K�libndp-1.8-6.el9_4.alma.1.x86_64.rpm����%��}BBBBBBBBBBBBBBBsecurity
Moderate: linux-firmware security update��;�#https://access.redhat.com/errata/RHSA-2024:4774RHSA-2024:4774RHSA-2024:4774https://access.redhat.com/security/cve/CVE-2023-31346CVE-2023-31346CVE-2023-31346https://bugzilla.redhat.com/22504582250458https://errata.almalinux.org/9/ALSA-2024-4774.htmlALSA-2024:4774ALSA-2024:4774
�4�iwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�:�`iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm�5�biwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�7�eiwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm�?�)netronome-firmware-20240603-143.1.el9_4.noarch.rpm�/�\iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�2�iwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�1�iwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�<�)libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm�0�Tiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�=�)linux-firmware-20240603-143.1.el9_4.noarch.rpm�8�iwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�6�iiwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm�;�biwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�>�)linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm�3�iwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�4�iwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�:�`iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm�5�biwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�7�eiwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm�?�)netronome-firmware-20240603-143.1.el9_4.noarch.rpm�/�\iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�2�iwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�1�iwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�<�)libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm�0�Tiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm�=�)linux-firmware-20240603-143.1.el9_4.noarch.rpm�8�iwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm�6�iiwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm�;�biwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm�>�)linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm�3�iwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm����a�&��OBsecurity
Moderate: cups security update��^�
https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776
��"cups-libs-2.3.3op2-27.el9_4.i686.rpm��"cups-libs-2.3.3op2-27.el9_4.x86_64.rpm��"cups-libs-2.3.3op2-27.el9_4.i686.rpm��"cups-libs-2.3.3op2-27.el9_4.x86_64.rpm����Z�'��RBBBsecurity
Low: python3 security updatem��h�,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779
[�\python3-3.9.18-3.el9_4.3.x86_64.rpm;�\python3-libs-3.9.18-3.el9_4.3.x86_64.rpm;�\python3-libs-3.9.18-3.el9_4.3.i686.rpm[�\python3-3.9.18-3.el9_4.3.x86_64.rpm;�\python3-libs-3.9.18-3.el9_4.3.x86_64.rpm;�\python3-libs-3.9.18-3.el9_4.3.i686.rpm����^�(��WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security update���1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928
7(kernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm3(kernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm6(kernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpm5(kernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm:(python3-perf-5.14.0-427.28.1.el9_4.x86_64.rpmO(kernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm9(kernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpmR(kernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmQ(kernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm0(kernel-5.14.0-427.28.1.el9_4.x86_64.rpm4(kernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpmP(kernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm1(kernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm2(kernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm/�wbpftool-7.3.0-427.28.1.el9_4.x86_64.rpm(kernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm8(kernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm7(kernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm3(kernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm6(kernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpm5(kernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm:(python3-perf-5.14.0-427.28.1.el9_4.x86_64.rpmO(kernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm9(kernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpmR(kernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmQ(kernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm0(kernel-5.14.0-427.28.1.el9_4.x86_64.rpm4(kernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpmP(kernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm1(kernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm2(kernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm/�wbpftool-7.3.0-427.28.1.el9_4.x86_64.rpm(kernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm8(kernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm����Q�)��xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security update<��E�4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363
O)kernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm/�xbpftool-7.3.0-427.31.1.el9_4.x86_64.rpm:)python3-perf-5.14.0-427.31.1.el9_4.x86_64.rpm1)kernel-core-5.14.0-427.31.1.el9_4.x86_64.rpm0)kernel-5.14.0-427.31.1.el9_4.x86_64.rpmP)kernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm4)kernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm9)kernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpmQ)kernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm6)kernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm5)kernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm3)kernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm)kernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm2)kernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm8)kernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpmR)kernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm7)kernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmO)kernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm/�xbpftool-7.3.0-427.31.1.el9_4.x86_64.rpm:)python3-perf-5.14.0-427.31.1.el9_4.x86_64.rpm1)kernel-core-5.14.0-427.31.1.el9_4.x86_64.rpm0)kernel-5.14.0-427.31.1.el9_4.x86_64.rpmP)kernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm4)kernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm9)kernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpmQ)kernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm6)kernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm5)kernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm3)kernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm)kernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm2)kernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm8)kernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpmR)kernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm7)kernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm����|�*��YBBBBBBBBsecurity
Moderate: curl security update��y�(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529
Eylibcurl-minimal-7.76.1-29.el9_4.1.i686.rpmDylibcurl-7.76.1-29.el9_4.1.i686.rpmEylibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpmjycurl-minimal-7.76.1-29.el9_4.1.x86_64.rpmiycurl-7.76.1-29.el9_4.1.x86_64.rpmDylibcurl-7.76.1-29.el9_4.1.x86_64.rpmEylibcurl-minimal-7.76.1-29.el9_4.1.i686.rpmDylibcurl-7.76.1-29.el9_4.1.i686.rpmEylibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpmjycurl-minimal-7.76.1-29.el9_4.1.x86_64.rpmiycurl-7.76.1-29.el9_4.1.x86_64.rpmDylibcurl-7.76.1-29.el9_4.1.x86_64.rpm����/�+�%�csecurity
Important: python-setuptools security update<��!�xhttps://access.redhat.com/errata/RHSA-2024:5534RHSA-2024:5534RHSA-2024:5534https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5534.htmlALSA-2024:5534ALSA-2024:5534
�J�fpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm�K�fpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm�J�fpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm�K�fpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm����l�,� �fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security update<���Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928
3*kernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpm7*kernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm2*kernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpm*kernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpmO*kernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm:*python3-perf-5.14.0-427.33.1.el9_4.x86_64.rpm4*kernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpm0*kernel-5.14.0-427.33.1.el9_4.x86_64.rpmP*kernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm1*kernel-core-5.14.0-427.33.1.el9_4.x86_64.rpmR*kernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm6*kernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpm9*kernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpm5*kernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmQ*kernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm/�ybpftool-7.3.0-427.33.1.el9_4.x86_64.rpm8*kernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm3*kernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpm7*kernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm2*kernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpm*kernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpmO*kernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm:*python3-perf-5.14.0-427.33.1.el9_4.x86_64.rpm4*kernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpm0*kernel-5.14.0-427.33.1.el9_4.x86_64.rpmP*kernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm1*kernel-core-5.14.0-427.33.1.el9_4.x86_64.rpmR*kernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm6*kernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpm9*kernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpm5*kernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmQ*kernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm/�ybpftool-7.3.0-427.33.1.el9_4.x86_64.rpm8*kernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm����*�-��security
Moderate: python-urllib3 security update��1�+https://access.redhat.com/errata/RHSA-2024:6162RHSA-2024:6162RHSA-2024:6162https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-6162.htmlALSA-2024:6162ALSA-2024:6162
�L�Qpython3-urllib3-1.26.5-5.el9_4.1.noarch.rpm�L�Qpython3-urllib3-1.26.5-5.el9_4.1.noarch.rpm��ܝ7�.�!�IBBBsecurity
Moderate: python3.9 security update��\�hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163
;�]python3-libs-3.9.18-3.el9_4.5.i686.rpm[�]python3-3.9.18-3.el9_4.5.x86_64.rpm;�]python3-libs-3.9.18-3.el9_4.5.x86_64.rpm;�]python3-libs-3.9.18-3.el9_4.5.i686.rpm[�]python3-3.9.18-3.el9_4.5.x86_64.rpm;�]python3-libs-3.9.18-3.el9_4.5.x86_64.rpm����/�"�NBBBBBBBBBBBBBBBsecurity
Moderate: krb5 security update��D�https://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166
\Vkrb5-libs-1.21.1-2.el9_4.i686.rpm�#Vkrb5-workstation-1.21.1-2.el9_4.x86_64.rpm^Vkrb5-server-1.21.1-2.el9_4.x86_64.rpm`Vlibkadm5-1.21.1-2.el9_4.i686.rpm^Vkrb5-server-1.21.1-2.el9_4.i686.rpm\Vkrb5-libs-1.21.1-2.el9_4.x86_64.rpm_Vkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm]Vkrb5-pkinit-1.21.1-2.el9_4.i686.rpm`Vlibkadm5-1.21.1-2.el9_4.x86_64.rpm]Vkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm_Vkrb5-server-ldap-1.21.1-2.el9_4.i686.rpm\Vkrb5-libs-1.21.1-2.el9_4.i686.rpm�#Vkrb5-workstation-1.21.1-2.el9_4.x86_64.rpm^Vkrb5-server-1.21.1-2.el9_4.x86_64.rpm`Vlibkadm5-1.21.1-2.el9_4.i686.rpm^Vkrb5-server-1.21.1-2.el9_4.i686.rpm\Vkrb5-libs-1.21.1-2.el9_4.x86_64.rpm_Vkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm]Vkrb5-pkinit-1.21.1-2.el9_4.i686.rpm`Vlibkadm5-1.21.1-2.el9_4.x86_64.rpm]Vkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm_Vkrb5-server-ldap-1.21.1-2.el9_4.i686.rpm��� �0�#�_security
Important: bubblewrap and flatpak security update<��J�Jhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356
�g�Rbubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm�g�Rbubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm���`�1�$�aBsecurity
Moderate: glib2 security update���
https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464
�h�,glib2-2.68.4-14.el9_4.1.x86_64.rpm�h�,glib2-2.68.4-14.el9_4.1.i686.rpm�h�,glib2-2.68.4-14.el9_4.1.x86_64.rpm�h�,glib2-2.68.4-14.el9_4.1.i686.rpm����0�2�%�dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security update��!�l8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567
8+kernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpmP+kernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm6+kernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpm2+kernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpm1+kernel-core-5.14.0-427.35.1.el9_4.x86_64.rpmO+kernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm7+kernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm:+python3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm/�zbpftool-7.3.0-427.35.1.el9_4.x86_64.rpm5+kernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm0+kernel-5.14.0-427.35.1.el9_4.x86_64.rpmQ+kernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm3+kernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpmR+kernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm+kernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpm9+kernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpm4+kernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm8+kernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpmP+kernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm6+kernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpm2+kernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpm1+kernel-core-5.14.0-427.35.1.el9_4.x86_64.rpmO+kernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm7+kernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm:+python3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm/�zbpftool-7.3.0-427.35.1.el9_4.x86_64.rpm5+kernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm0+kernel-5.14.0-427.35.1.el9_4.x86_64.rpmQ+kernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm3+kernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpmR+kernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm+kernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpm9+kernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpm4+kernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm����Y�3�&�EBsecurity
Moderate: expat security update��
�;https://access.redhat.com/errata/RHSA-2024:6754RHSA-2024:6754RHSA-2024:6754https://access.redhat.com/security/cve/CVE-2024-45490CVE-2024-45490CVE-2024-45490https://access.redhat.com/security/cve/CVE-2024-45491CVE-2024-45491CVE-2024-45491https://access.redhat.com/security/cve/CVE-2024-45492CVE-2024-45492CVE-2024-45492https://bugzilla.redhat.com/23086152308615https://bugzilla.redhat.com/23086162308616https://bugzilla.redhat.com/23086172308617https://errata.almalinux.org/9/ALSA-2024-6754.htmlALSA-2024:6754ALSA-2024:6754
l�)expat-2.5.0-2.el9_4.1.i686.rpml�)expat-2.5.0-2.el9_4.1.x86_64.rpml�)expat-2.5.0-2.el9_4.1.i686.rpml�)expat-2.5.0-2.el9_4.1.x86_64.rpm����1�4�'�HBBBsecurity
Moderate: openssl security update��H�Phttps://access.redhat.com/errata/RHSA-2024:6783RHSA-2024:6783RHSA-2024:6783https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-6783.htmlALSA-2024:6783ALSA-2024:6783
Y�Jopenssl-libs-3.0.7-28.el9_4.i686.rpm|�Jopenssl-3.0.7-28.el9_4.x86_64.rpmY�Jopenssl-libs-3.0.7-28.el9_4.x86_64.rpmY�Jopenssl-libs-3.0.7-28.el9_4.i686.rpm|�Jopenssl-3.0.7-28.el9_4.x86_64.rpmY�Jopenssl-libs-3.0.7-28.el9_4.x86_64.rpm����Q�5�(�MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Important: kernel security update<���+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997
1,kernel-core-5.14.0-427.37.1.el9_4.x86_64.rpmO,kernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm3,kernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpm4,kernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpm8,kernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpm0,kernel-5.14.0-427.37.1.el9_4.x86_64.rpm5,kernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm2,kernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpmR,kernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmQ,kernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm9,kernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm:,python3-perf-5.14.0-427.37.1.el9_4.x86_64.rpm7,kernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm/�{bpftool-7.3.0-427.37.1.el9_4.x86_64.rpmP,kernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm6,kernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpm,kernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm1,kernel-core-5.14.0-427.37.1.el9_4.x86_64.rpmO,kernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm3,kernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpm4,kernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpm8,kernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpm0,kernel-5.14.0-427.37.1.el9_4.x86_64.rpm5,kernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm2,kernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpmR,kernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmQ,kernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm9,kernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm:,python3-perf-5.14.0-427.37.1.el9_4.x86_64.rpm7,kernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm/�{bpftool-7.3.0-427.37.1.el9_4.x86_64.rpmP,kernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm6,kernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpm,kernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm����	�6�?�nBBBBBBBBBBBBBBBsecurity
Moderate: linux-firmware security update��-�*https://access.redhat.com/errata/RHSA-2024:7484RHSA-2024:7484RHSA-2024:7484https://access.redhat.com/security/cve/CVE-2023-20584CVE-2023-20584CVE-2023-20584https://access.redhat.com/security/cve/CVE-2023-31356CVE-2023-31356CVE-2023-31356https://bugzilla.redhat.com/23045832304583https://bugzilla.redhat.com/23045932304593https://errata.almalinux.org/9/ALSA-2024-7484.htmlALSA-2024:7484ALSA-2024:7484
�8�iwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�3�iwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�1�iwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�;�ciwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�0�Uiwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�5�ciwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�6�jiwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm�>�*linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm�7�fiwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm�4�iwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�:�aiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm�<�*libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�?�*netronome-firmware-20240905-143.3.el9_4.noarch.rpm�=�*linux-firmware-20240905-143.3.el9_4.noarch.rpm�/�]iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�2�iwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�8�iwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�3�iwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�1�iwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�;�ciwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�0�Uiwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�5�ciwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm�6�jiwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm�>�*linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm�7�fiwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm�4�iwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�:�aiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm�<�*libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm�9�iwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm�?�*netronome-firmware-20240905-143.3.el9_4.noarch.rpm�=�*linux-firmware-20240905-143.3.el9_4.noarch.rpm�/�]iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm�2�iwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm����y�7�)�@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security update��W�<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162
R-kernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm2-kernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm:-python3-perf-5.14.0-427.40.1.el9_4.x86_64.rpm1-kernel-core-5.14.0-427.40.1.el9_4.x86_64.rpm0-kernel-5.14.0-427.40.1.el9_4.x86_64.rpmQ-kernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm/�|bpftool-7.3.0-427.40.1.el9_4.x86_64.rpm6-kernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpmP-kernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm7-kernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm8-kernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpmO-kernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm4-kernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm5-kernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm-kernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpm3-kernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm9-kernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpmR-kernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm2-kernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm:-python3-perf-5.14.0-427.40.1.el9_4.x86_64.rpm1-kernel-core-5.14.0-427.40.1.el9_4.x86_64.rpm0-kernel-5.14.0-427.40.1.el9_4.x86_64.rpmQ-kernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm/�|bpftool-7.3.0-427.40.1.el9_4.x86_64.rpm6-kernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpmP-kernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm7-kernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm8-kernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpmO-kernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm4-kernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm5-kernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm-kernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpm3-kernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm9-kernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm���	�8�*�aBBBsecurity
Moderate: python3.9 security update���\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446
[�^python3-3.9.18-3.el9_4.6.x86_64.rpm;�^python3-libs-3.9.18-3.el9_4.6.i686.rpm;�^python3-libs-3.9.18-3.el9_4.6.x86_64.rpm[�^python3-3.9.18-3.el9_4.6.x86_64.rpm;�^python3-libs-3.9.18-3.el9_4.6.i686.rpm;�^python3-libs-3.9.18-3.el9_4.6.x86_64.rpm����9�+�fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security update��o�>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617
2.kernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm:.python3-perf-5.14.0-427.42.1.el9_4.x86_64.rpm0.kernel-5.14.0-427.42.1.el9_4.x86_64.rpm.kernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpmQ.kernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm4.kernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm9.kernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpmR.kernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm3.kernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmO.kernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm8.kernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm6.kernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpmP.kernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm1.kernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm/�}bpftool-7.3.0-427.42.1.el9_4.x86_64.rpm7.kernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm5.kernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm2.kernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm:.python3-perf-5.14.0-427.42.1.el9_4.x86_64.rpm0.kernel-5.14.0-427.42.1.el9_4.x86_64.rpm.kernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpmQ.kernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm4.kernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm9.kernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpmR.kernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm3.kernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmO.kernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm8.kernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm6.kernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpmP.kernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm1.kernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm/�}bpftool-7.3.0-427.42.1.el9_4.x86_64.rpm7.kernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm5.kernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm����E�:�,�GBBBBBBBBBBBBBBBBBsecurity
Low: NetworkManager security updatem��-�jhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317
�lJNetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm�JNetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm�kJNetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm�JNetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm�>JNetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm�>JNetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm�JNetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm�lJNetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm�JNetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm�kJNetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm�JNetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm�>JNetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm�>JNetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm�JNetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm�JNetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm����%�;�-�ZBBBBBBsecurity
Low: cockpit security updatem���2https://access.redhat.com/errata/RHSA-2024:9325RHSA-2024:9325RHSA-2024:9325https://access.redhat.com/security/cve/CVE-2024-6126CVE-2024-6126CVE-2024-6126https://bugzilla.redhat.com/22928972292897https://errata.almalinux.org/9/ALSA-2024-9325.htmlALSA-2024:9325ALSA-2024:9325
�i�
cockpit-bridge-323.1-1.el9_5.x86_64.rpm�l�
cockpit-ws-323.1-1.el9_5.x86_64.rpm�h�
cockpit-323.1-1.el9_5.x86_64.rpm�k�
cockpit-system-323.1-1.el9_5.noarch.rpm�j�
cockpit-doc-323.1-1.el9_5.noarch.rpm�i�
cockpit-bridge-323.1-1.el9_5.x86_64.rpm�l�
cockpit-ws-323.1-1.el9_5.x86_64.rpm�h�
cockpit-323.1-1.el9_5.x86_64.rpm�k�
cockpit-system-323.1-1.el9_5.noarch.rpm�j�
cockpit-doc-323.1-1.el9_5.noarch.rpm����K�<�.�bBBBBBBBBBBBBBBBsecurity
Moderate: krb5 security update��I�https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331
\Wkrb5-libs-1.21.1-3.el9.i686.rpm`Wlibkadm5-1.21.1-3.el9.x86_64.rpm^Wkrb5-server-1.21.1-3.el9.i686.rpm_Wkrb5-server-ldap-1.21.1-3.el9.x86_64.rpm\Wkrb5-libs-1.21.1-3.el9.x86_64.rpm]Wkrb5-pkinit-1.21.1-3.el9.i686.rpm^Wkrb5-server-1.21.1-3.el9.x86_64.rpm_Wkrb5-server-ldap-1.21.1-3.el9.i686.rpm]Wkrb5-pkinit-1.21.1-3.el9.x86_64.rpm`Wlibkadm5-1.21.1-3.el9.i686.rpm�#Wkrb5-workstation-1.21.1-3.el9.x86_64.rpm\Wkrb5-libs-1.21.1-3.el9.i686.rpm`Wlibkadm5-1.21.1-3.el9.x86_64.rpm^Wkrb5-server-1.21.1-3.el9.i686.rpm_Wkrb5-server-ldap-1.21.1-3.el9.x86_64.rpm\Wkrb5-libs-1.21.1-3.el9.x86_64.rpm]Wkrb5-pkinit-1.21.1-3.el9.i686.rpm^Wkrb5-server-1.21.1-3.el9.x86_64.rpm_Wkrb5-server-ldap-1.21.1-3.el9.i686.rpm]Wkrb5-pkinit-1.21.1-3.el9.x86_64.rpm`Wlibkadm5-1.21.1-3.el9.i686.rpm�#Wkrb5-workstation-1.21.1-3.el9.x86_64.rpm���h�=�/�sBBBsecurity
Low: openssl security updatem��T�L
https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:9333
|�Lopenssl-3.2.2-6.el9_5.x86_64.rpmY�Lopenssl-libs-3.2.2-6.el9_5.x86_64.rpmY�Lopenssl-libs-3.2.2-6.el9_5.i686.rpm|�Lopenssl-3.2.2-6.el9_5.x86_64.rpmY�Lopenssl-libs-3.2.2-6.el9_5.x86_64.rpmY�Lopenssl-libs-3.2.2-6.el9_5.i686.rpm����e�>�0�xBBBsecurity
Moderate: python3.9 security update�� �khttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371
;�_python3-libs-3.9.19-8.el9.i686.rpm;�_python3-libs-3.9.19-8.el9.x86_64.rpm[�_python3-3.9.19-8.el9.x86_64.rpm;�_python3-libs-3.9.19-8.el9.i686.rpm;�_python3-libs-3.9.19-8.el9.x86_64.rpm[�_python3-3.9.19-8.el9.x86_64.rpm���4�?�>�=security
Moderate: microcode_ctl security update���dhttps://access.redhat.com/errata/RHSA-2024:9401RHSA-2024:9401RHSA-2024:9401https://access.redhat.com/security/cve/CVE-2023-22655CVE-2023-22655CVE-2023-22655https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-38575CVE-2023-38575CVE-2023-38575https://access.redhat.com/security/cve/CVE-2023-39368CVE-2023-39368CVE-2023-39368https://access.redhat.com/security/cve/CVE-2023-43490CVE-2023-43490CVE-2023-43490https://access.redhat.com/security/cve/CVE-2023-45733CVE-2023-45733CVE-2023-45733https://access.redhat.com/security/cve/CVE-2023-46103CVE-2023-46103CVE-2023-46103https://bugzilla.redhat.com/22706982270698https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22707012270701https://bugzilla.redhat.com/22707032270703https://bugzilla.redhat.com/22707042270704https://bugzilla.redhat.com/22922962292296https://bugzilla.redhat.com/22923002292300https://errata.almalinux.org/9/ALSA-2024-9401.htmlALSA-2024:9401ALSA-2024:9401
�m�bmicrocode_ctl-20240910-1.el9_5.noarch.rpm�m�bmicrocode_ctl-20240910-1.el9_5.noarch.rpm����3�@�1�Bsecurity
Moderate: libgcrypt security update��o�
https://access.redhat.com/errata/RHSA-2024:9404RHSA-2024:9404RHSA-2024:9404https://access.redhat.com/security/cve/CVE-2024-2236CVE-2024-2236CVE-2024-2236https://bugzilla.redhat.com/22452182245218https://errata.almalinux.org/9/ALSA-2024-9404.htmlALSA-2024:9404ALSA-2024:9404
�H�libgcrypt-1.10.0-11.el9.x86_64.rpm�H�libgcrypt-1.10.0-11.el9.i686.rpm�H�libgcrypt-1.10.0-11.el9.x86_64.rpm�H�libgcrypt-1.10.0-11.el9.i686.rpm����H�A�2�BBsecurity
Low: vim security updatem��y�thttps://access.redhat.com/errata/RHSA-2024:9405RHSA-2024:9405RHSA-2024:9405https://access.redhat.com/security/cve/CVE-2021-3903CVE-2021-3903CVE-2021-3903https://bugzilla.redhat.com/20185582018558https://errata.almalinux.org/9/ALSA-2024-9405.htmlALSA-2024:9405ALSA-2024:9405
�D�0vim-filesystem-8.2.2637-21.el9.noarch.rpm��0vim-minimal-8.2.2637-21.el9.x86_64.rpm�D�0vim-filesystem-8.2.2637-21.el9.noarch.rpm��0vim-minimal-8.2.2637-21.el9.x86_64.rpm����a�B�3�EBBBsecurity
Moderate: bluez security update��m�+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413
�@�cbluez-libs-5.72-2.el9.x86_64.rpm�	�cbluez-5.72-2.el9.x86_64.rpm�@�cbluez-libs-5.72-2.el9.i686.rpm�@�cbluez-libs-5.72-2.el9.x86_64.rpm�	�cbluez-5.72-2.el9.x86_64.rpm�@�cbluez-libs-5.72-2.el9.i686.rpm����t�C��
security
Moderate: python-dns security update���qhttps://access.redhat.com/errata/RHSA-2024:9423RHSA-2024:9423RHSA-2024:9423https://access.redhat.com/security/cve/CVE-2023-29483CVE-2023-29483CVE-2023-29483https://bugzilla.redhat.com/22745202274520https://errata.almalinux.org/9/ALSA-2024-9423.htmlALSA-2024:9423ALSA-2024:9423
�p�Xpython3-dns-2.6.1-3.el9.noarch.rpm�p�Xpython3-dns-2.6.1-3.el9.noarch.rpm����0�D��Lsecurity
Low: tpm2-tools security updatem��	�'https://access.redhat.com/errata/RHSA-2024:9424RHSA-2024:9424RHSA-2024:9424https://access.redhat.com/security/cve/CVE-2024-29038CVE-2024-29038CVE-2024-29038https://access.redhat.com/security/cve/CVE-2024-29039CVE-2024-29039CVE-2024-29039https://bugzilla.redhat.com/22780712278071https://bugzilla.redhat.com/22780752278075https://errata.almalinux.org/9/ALSA-2024-9424.htmlALSA-2024:9424ALSA-2024:9424
�K�htpm2-tools-5.2-4.el9.x86_64.rpm�K�htpm2-tools-5.2-4.el9.x86_64.rpm����5�E��Osecurity
Low: nano security updatem��0�Ahttps://access.redhat.com/errata/RHSA-2024:9430RHSA-2024:9430RHSA-2024:9430https://access.redhat.com/security/cve/CVE-2024-5742CVE-2024-5742CVE-2024-5742https://bugzilla.redhat.com/22785742278574https://errata.almalinux.org/9/ALSA-2024-9430.htmlALSA-2024:9430ALSA-2024:9430
��inano-5.6.1-6.el9.x86_64.rpm��inano-5.6.1-6.el9.x86_64.rpm����5�F�4�Rsecurity
Important: bubblewrap and flatpak security update<��q�Rhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449
�g�Sbubblewrap-0.4.1-8.el9_5.x86_64.rpm�g�Sbubblewrap-0.4.1-8.el9_5.x86_64.rpm����6�G�5�TBBBsecurity
Moderate: python3.9 security update��C�\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468
;�`python3-libs-3.9.19-8.el9_5.1.i686.rpm[�`python3-3.9.19-8.el9_5.1.x86_64.rpm;�`python3-libs-3.9.19-8.el9_5.1.x86_64.rpm;�`python3-libs-3.9.19-8.el9_5.1.i686.rpm[�`python3-3.9.19-8.el9_5.1.x86_64.rpm;�`python3-libs-3.9.19-8.el9_5.1.x86_64.rpm�����H�6�YBsecurity
Low: cups security updatem���)https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470
��#cups-libs-2.3.3op2-31.el9_5.i686.rpm��#cups-libs-2.3.3op2-31.el9_5.x86_64.rpm��#cups-libs-2.3.3op2-31.el9_5.i686.rpm��#cups-libs-2.3.3op2-31.el9_5.x86_64.rpm����S�I�7�\BBBBBBBBBBBBBBBsecurity
Important: krb5 security update<��H�Shttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474
_Xkrb5-server-ldap-1.21.1-4.el9_5.i686.rpm]Xkrb5-pkinit-1.21.1-4.el9_5.x86_64.rpm_Xkrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm^Xkrb5-server-1.21.1-4.el9_5.i686.rpm\Xkrb5-libs-1.21.1-4.el9_5.x86_64.rpm^Xkrb5-server-1.21.1-4.el9_5.x86_64.rpm\Xkrb5-libs-1.21.1-4.el9_5.i686.rpm]Xkrb5-pkinit-1.21.1-4.el9_5.i686.rpm`Xlibkadm5-1.21.1-4.el9_5.i686.rpm�#Xkrb5-workstation-1.21.1-4.el9_5.x86_64.rpm`Xlibkadm5-1.21.1-4.el9_5.x86_64.rpm_Xkrb5-server-ldap-1.21.1-4.el9_5.i686.rpm]Xkrb5-pkinit-1.21.1-4.el9_5.x86_64.rpm_Xkrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm^Xkrb5-server-1.21.1-4.el9_5.i686.rpm\Xkrb5-libs-1.21.1-4.el9_5.x86_64.rpm^Xkrb5-server-1.21.1-4.el9_5.x86_64.rpm\Xkrb5-libs-1.21.1-4.el9_5.i686.rpm]Xkrb5-pkinit-1.21.1-4.el9_5.i686.rpm`Xlibkadm5-1.21.1-4.el9_5.i686.rpm�#Xkrb5-workstation-1.21.1-4.el9_5.x86_64.rpm`Xlibkadm5-1.21.1-4.el9_5.x86_64.rpm����Q�J�8�mBsecurity
Moderate: expat security update���Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541
l�*expat-2.5.0-3.el9_5.1.x86_64.rpml�*expat-2.5.0-3.el9_5.1.i686.rpml�*expat-2.5.0-3.el9_5.1.x86_64.rpml�*expat-2.5.0-3.el9_5.1.i686.rpm����U�K�9�pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity
Moderate: kernel security update��b�'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605
9kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm�Ekernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm:python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpmPkernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm0kernel-5.14.0-503.14.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm2kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm/�~bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpmOkernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpmRkernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpmQkernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpmkernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm1kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm�Ekernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm:python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpmPkernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm0kernel-5.14.0-503.14.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm2kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm/�~bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpmOkernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpmRkernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpmQkernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpmkernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm1kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm����F�VmXZ Utils is an integrated collection of user-space file�mpress�u�@ities bas�9�the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossl�[ data�i. T�W�?provide�� high��io�Y��keeping��de�%time short.
Secu�Wy Fix(es):
* gzip: arbitrary-��-w�%e vulnerab��y (CVE-2022-1271)
For mor�ota�_about��s�gissue(s�includ��im�gt,��CVSS sc�G�
cknowledgments,���j�/r rel��in�@��n,�f�to�R�� pag�m lis�,�R�&enc�Es��.�egrub2 p�u�6s�j ver�82��?Gr��Unifi�TBoot Load�z(GRUB)�ƪ�ly��nfigu�3le��customiz�b�:l�:w�ީ>dular�}ch�pcture���supp���bvarie�S��kernel �
�'��sy��m�
��ute�V�Mhardwa��vi�.
�mshim�r��t�IJrfirst-st�UEFI�that�Ondl������o�7tru��full�3un���environ������: I���Bflow�ޢ_net_recv_ip4_��ets�28733)�HCraf��PNG �yscal���nmay lead�DZ�-of-��nds ��sheap�^1-3695�]�S�R�Qd��7huffma���)�V��g6�gJPE�hc�>�hb�N�,������7�ZOȤwhen��sp� HTTP�Id�/�n4�M�[_lock�X�Br����s non-��i�D��e�*d�Q�b�-��r-fre�ӳcmd_���k()�B�=��: B�ov��ޢ6��c�Y���H7�Vi�Vi IM��ed)�upd�g�yim��
�vi editor��v�]Use�.�F�<��Po�wr Offset��v���W055�4�@H��-�h��O��oc�ts�?943�?�y��420�2��4��+621�+�&-r�o�'9�'us�f�{��utf_ptr2char�51���SExpat�G C�.b�J��B�?��XML docu��e�C�0ta�,exha�D�z�v�9type�M�531���=��	���=copySt�f��:�w��C�2��3Linux�!,�����any�ope�J
���B���C: Sma����8�[b siz�[TCP sourc��gen�^o���
�k�012)�{r���di��Q_ev�f_�ƤT�Hpriv�T�e���^�Y7���Ya�U�/�a���sub�$���l�r���t966�t�o�mIP�� ESP t�s�co�
�76�K�
Bug�`make SHA512_�
�.s�CRYPTO_USER�4��-�
(BZ#20726�SR-IOV�c
an�*> 50%���	d��3483�fix�
rrup�iau�yby dm-�-��98218�+	SC�cli�$-s�6peeloff�ns [al�(�_-9]�<404���#��n�|f��in��asymme�c�<u��itu¼8548��F�6�4	�fMultipl�jT VMs ea�B�e�vCPUs�E�N
�6spec:�����^a��tools�hd�-9�u��c����s���eeh_pser�!ob��:��vm�oi��	t�=p�d,�q	kdump���ggere�n225��	�U�
��
X NIC d�jer�'��
mai���7638)���ve��
�mm�L���c�t�
��sev�l dif��t
st��7�K�r
�KGNU�r�w
pio�/ISO ��0 CD-ROM�F
.
L��is �f��Jy�'bsdtar�oy,��rip�l��u��bin�ws
su�$�yth�J�񤄦�pop�d�Ektop�,�ag��	���J:�
�
�+via�Mmpon�+ �Fx_lzma_al�_�t
�62���7�
�<�
�o8O�gW��8��*��v�k
regs�
b�()�r�xp.c�K8��
��
i�
�Embyte�D92�

�W>	���ascsi_i��
l�
049�%��tc��w_����/sched/cls_api�0�H�&Power9 - LPAR�:��Sha�G��c���m�9	����se�[Hash]�w48�zH�& �up�+���nrun��� ss-� �`��ha����dFIPS���Pd�1�c��Inam���4�>338�Jfs2��=�����g�
s�Ume����ght�K730�|
i/o��iator��u�o
�:�Kwork�;dis�g�Z4.18.0-372.9.1.el8.x86_64)�[825�A����(�
esn't��3�SSATA�5974��G�/	t���re���@post��
 mig�L����� �����^10��{Oop�r�l�t�x	�	�IRIP�8de_attr_�_lab����g��!�s�l18��l�BUG:��%
���&��t�#���xn��l�E
�fs4�ton�
�;��loo���r��lp���s��	��: K��acc��ebad��a,�P
g: 11 [#1]�kc���+tu���Nn��t�L��(P10/ ibmvnic/�����)��30�OS�����^vm��O�U��map��\e�'���)
Enh���^�'�Bommu/vt-d:�
�,DMAR_UNITS_SUPPORTED��� ����U5326�
������~���%
������	��dow�f�_�from �#r��	��ou�atoc�R�Z�=, F��:DAP�8�{:�l���Dial���ti����322��;Un�5��	�mi�Fs�57�5��-KRB�7m�t��v���98�	O�=SSL��	�
ki����m�;
��<���o�gLaye���:)��T������(TLS)�a�ell�a�)-��ng���-pur�e��ypt��phy���-��Z: c�
h��A�sc�C��j��+29��
�CSigne�[�����re��
n�a���hp�V���OCSP_NOCHECKS�o3��oOPEN�H_LH_flus�
br�h��L�����D47�D�����18�GAES��B�a�0����me �s�>�P�g	��qa�*�Cy�,�n��n�}��o�mgnutls��FFDHE��8032���q�"��Z3DES�+549����pts�I �1�c���ara�/�t�|�N�	��5508�]m�U���>ECDSA�
�5
licit�k�F��	e�Z�#��s_� -g��p�ip256k1�>�[be�r X��19/X448�S6�Conv���X�8p�-on�Sl�_�?	�FKAT�88�j�R��keys������on��9193�+�q�&������Y��O�Z�h���K7�[�w��su��]s�qi�5��[IBM�R
HW�$T] POWER10��e�0s���5�\�y��[���o	��view]�R-�R�*�78�*DH t�	g�*5856�*EC�*7�*�S�+8�+AND�,9�,zero� ��,61�,HKDF�5mit�"�1838�b�P�acy���1
(GnuPG�lGPG��K���&���r�
��ig�hl�
na� ��lian���PGP�7S/MIME�*nd�x���
��gpg���S ��of�n�t
st�s l�?�34�@��dbus-brok�@�$�������	bu���Tby�WD-Bus�'�. It�*�i�m�D�
��١�i�D$�%l�$��P�a$��or��ű�z�uexcl�jve��te�~��#���Y�n�A���r�/e�k�����J"ent���e��g�f�K���W�ka�S�Ex���~s�$l�_$�12��]n�S#p���$��Dy�X�g���Q�z�
��a���C�����. �nft_s�$e������J1��?�Y'��
�Rd�S_�йy_�e��0��y
�z
�&R��/mlx5�numb�f��c�{XLT ���q�-227�O�8,�x
t�+��ed�Qun�w-�Ye-nex�7p-ob�.�-�G5�n$�)�4��un�l�
d MSR�_�: WR��0x199��amazo�t4.32x�
�t��n941�X86/p�X�S/UV��S�>�	����UV5 �)��773�+�	l�{:���2�sync s�\��soft����blk_mq_�G_��ch_����9.0�z]�13��&��NVMe/��der���o+v������%�vonic��,�nic�^77�Ad����nvme��a�j-�
�7�~	�(/tcp�9t�n�#uses����(_to_rq(�)_�)��l(��ue)��69��Im����hb���Y�&929�x� 9/ppc64�hIn��\�-�
& "C�_�
pe��"�=�a�lscpu�.�d2171��	�
*�/��d��+w ���y�~AMX fla�amx_�~8, �	bf16) �H82�6��: D�mU���!4�!avf�"194��i40e�"9)�7$���#��!�sdoCont��f����xml�N�/406�|�������������.��X
����#s���� ��u
, �R��D�	��N�����O��|�
���fit e��0��o�
���x�In�N�x�����-or�!�K�M����C++, P�K,��Pike,�f�	�
�.k�RSH��NUPG�+�$�*���E0�䪈fo�|���have��+p�"��a �r �*�v �:��(3.7.6),��;�8)���3�{ou���j,�_pkcs7_��y.�Q509��Q�A] [���"@�u-��r�l�P�258�xA�����K����K5��-CBC�mg��{�>�3/��:�(*���2���<2�r��1�0)KSB�p�/�P c�[Kasbah����o�%X.�"�����MS���!	i�0y���Q. �R1th�_s��$��������9�G����k���
*�/r�K��
ex�G�7�51��
��1-�q��
&ath��%�w�,t�; �;������P$�!�`2�1̔�wuth��bypas�!� d�<��n��n���'��R's�;an��s�t�3��l	��19���p��� �����:�_Em������0�60�B�>V��ML���N78�C�z�m��a�[��8�	�+��$)�Z�^)������3��1��l����
���*	�J�8�4 �	r�6eld��43���U���)�P�8:r�Q
�?��N#�
h/25�"� �(d�T�D�K�gPTRACE_SEIZE�W�3�O��!S�D�CCOMP���059���
����#�%�%��T14/G2��D�p��+(mt7921e��%56�&��v������~�-lle�{#�U0�Matrox�x	a�Mscr��vVGA�z*put�
�D�i�120���nee�1o��a wa�L
�"e�a#C�
DRBG�fa�5;��y�����;���i��x�|w�dog�%����'��.#30��&�734s! [sw�/30:0]�O7���
��5.16�"�Bad���Q�p�}( qemu-kvm  pfn:68a74600�?�,6f��=��E�%s���2M �6s�>879���Vh�-t 2)�9�n��N�lo��% hpilo�����* HPE RL3�
Gen�&��ARM��y.�[(��4�������pret�I0�a�G�.����/�����es�3s,�F
�k
��[e�g��y��l���0ynam��.�6��d���l. �����3!�K'���B�H4ll�C�pi�=�O
o�I&wind�K�u���}��-�:7��PyLong_F���7�6�����d��gv�y �`���9��o�a��#0-��=�plua�>	����Lua���!��V�m+-we�t+�x ���>�Len���
L�w��lso��nt�d�p�	,�-�u1�k�ua��:in�G_��ms��de��.c�;��
un�xro�3r�a�*
�)�$�>�30��#��	�-�B�a,acker�)	� �vor �Mmin�o�G�	's�y9��3651���	�����]_�*�}nd�	�N�+@�-smb2�0_��ry_�i NULL��	�01�h'�*i�d��9��nd_�_�kicbdu�����.b��[6�{swiotlb��t1�H"�\_F�5_DEVICE�?��-�-�?3�rs����i�do�q@�N6��%�$���'-g�:UM�i10����:s��pcm_hw_���i��M�0� ��0)����%�w4�����6��o�8��/�[B�k1�0�ur��y�wb�F0�0
drm�ma�=�,�+���K/��,<s�b�*6��Y�33���pf��_���:3��
��P9k_h�B3�be_��Ocould��an�����ß67�	�	��!1emu�_�	n�9
�2�5�[9fa���u�fd�:t�������G�9�nf_�D�o�2�=o��>.�@�!�
�T2�g�oD�F�
��6�._sfa_�>>�� 63�`s�&-�@�p���E��!3�din�D&e���n-up���M-��/4�
�ka SBDR�N�\3�Ni�]�lGa��Dl�TS�T5�T���a�$��C�)�_DRPW�_�*po�~�0�����to�N�����c!�cho�\021�+�~:�+tBl��A�@J Sp���)�pC�[��$�[�i3�5.�s�&H��^3816, �9900�nBran�T��
C��$u���Z �b��)�L�c�<H�v#Po�!��:r�F��S���P�iȓ63�d.d�L�Jms_usb_st�
_x�?i���s/�7�/�!/�)�j283�6 �x��
�XSUNRPC�l@�589���	i�~:�u����c��i�38u32Ę958�Y�5�?��ӣ`���fqnl_m�
le���rA/nf��S
k�hu��H4��!���"��'=�al�ey �C�M�D�,0�Ds_��LB�R��0��	��f ENOTDIR��44���~#�
�|C�H%s:�Ҥ��j�7c�%�Ti�!@�6), se�w�R� No�>��ed�j�	�r��$�5�_��u�R���&8��*hr�n$z��Os��ly�>a� a��8. S�.�γǤoi�st�/�o�U$�1�R���in�q�]
��Y9�5�:��
hol���M���u�mi��	��ol�v�	t�9�n�
��p�c�8�~�}:�<8�H
IPv6�3��D��5�17�'�<7Samb�Ln�4-�I���	�AS�4M�0B�H*(SMB��[�8C�(�A�(rn��>S�IF�7�v�PC-�/l�w�;ne����,�~�Z�����C.�6d%s�,��>6.4)���V+4��G���2:�@�w?�s�?�E1�$2742�@$l�Md����-"�m���#!�%��-��'API�/�n�*$��/�'����TDB�
�k��4���(2.5.2��
�
�AD�	��
u��� +�����
 add�����.���0!�}�F������#��,�-qua�F5�.�on�DWg�F4�����-�%�$�a
�[�
s�W�[re���di�7u�glyph��0ff�4����W�]U�"sf�O�B
_�NB�4�L.�>Se��iviol�	a FNT_S��_R��H5�Ht�HT�B�O�G�=����4%��3.9�.�],��I24�|�
%�)'�O�/4���@!���X2a�z�se� ��1�A15��GD�^��X�
3���z�;/http/�.��G����c�&��(��1��"�>O	e2fs���G2a�7�afo�5/��=, �(7�	�=�
�@�]�g�z�	2,�3���:�� ���O��/������[��Q13��:;�>MfBuzz���o�+��n,�i����h�Rb�R��Y�O�Rh�4�Uhape-f��%.c�7�M�A�D�HH�5��c�~P�C(DHCP�Y2�X�
��~
�D0�n �M�Gto ge��i�	w�Nc�t�j��Ka�.���i��k��a br�c��'�dh�V:�
���{g��@ISC �� �K�9
��Dt�'�hdm�s���.��������5NS�ow�B�-�ch��iso�D��e1�220�A}ogro�*�us���b�"��r��Ylo�by��ii�u�a��H�^�9�/�Fmo�d=�n��	i��
�&��:� ���u�-��W��*��;�B��tirpc�h�k&Sun�DZ's�S�3-i��p������d�5���3I-�a�)�Z=�F�\
�7����
��e�6-���
���������:�}��lot��7��5��4682�Az�,8R�_��(�)���7 �)B�'��	7���<�%/��&���`�AZf�	�"��# �Pho�42�C"�P�oF��os��Pauth�&c�#�e�0�[��^�乍y�l�Eby e�a0nat��n�-����"�!�;�8d�B!�e�LN�����L�=�<�=��to����c�G�m�ahel��'�n�cr��r�s�"�#��Pd��	ib�$�4Le�*KDC��Akrb5����+
i�-
AC�v��h4�t38�f�esud��4�H/��?�1s��Do����@�F�
���2��X���&�t��
�iGs�r�N$�Z�u����<�.i�ut��]�4+g��as�g����rs�T�ho���t,�+RunA�;��,3-2�&-�X1c��"POST�PUT�|�*�j2221��U�2�E:��9 ��)�&1�{k�~��*�,�U�!��Fa�"
X88179_�beA��wUSB e�K��
.�V64�Vi91����KGP�bILB ��Zï�]9���_ ��13ï�\
�'�0�M�,�S�"�3�=g�X��	�X3�I9ò2�{
un�1��l�A���U��?smt_���n/30��K�Y��=�f-�H��v�hN�\M�iN�2<�|3�%2<5�8H�N-�O�Z���g�lt�7t�"ly�t5EMC��8st�~NDU�0�d3�3��i�@N�/�@=9�)��"�w-WARNIN�=�=�b6 PI��/3440�P�Y1/x�Qmm/��:.c:��a��_ha�Ycr_f���+0x3f/0x50�f458�2�v4:���l9��	of�4����X_��>�Y4_�3i�kg�)�&or�$��i61���|/�p���z�'+th�{R�dysf�g�`.�*�"-EINVAL�J9�S69��DE�l4�:�_'i��@�?�1�m�5R�Herc12.�J9��U*��4Jl�+P���?mon�j�!6�}4�^�E��R�-���Ybio�/e�e401�5P��a�q-�\<"Dummy��i��P��ar�/t�%4����
�M2�.8�SQ��8��e��o�z�7R����e's�]�c�alef��0z��?�*]�Z397�;0fa��K��S�{in �4e�g�s2t�-t �gof�n��g���%��5AMdCLIENT:�?�z`l�#�H^ "no�:�"�̪�mp��1�8�\52��8Az�0
:�=)I��-v�:��ECI_�5MA�@MEMORY�me�%VM�e�~�S5�]0�S z�}bam:�H��imes�?��eploy�n�Up��qg�\e�
l�ed�
�+��	�	��s16�#���TT��- O���
@760�^���B�s�id��g����E�i�l�>7)DV!-Bus is a system for sending messages between applications. It�9used both�:the�I-wide�B b�fservice, and a�sper-us�login-s�,�Z�4��facility.

Secur�
 Fix(es):

* d�W:�-daem�;crash��wh��receiv�� wi��incor�tly ne��d parent�8es���k�brackets (CVE-2022-42010)�zan�)���y�@�varray leng��nsi�|nt�elem�type�p1�p`_�_marshal_byteswap` doesn't proc�v fds�dł"��eign" ��ann�)��u2)

F��m�3 detail�bout�殐issue(s),��lu�:� impact,��CVSS sc�G�
cknowledg��s�
o�/r��la��in��m�f,�fe�Wo�R����g�m l�<�,�R�&ences���:.T����ck��v��n��������� man�-r��Linux,�8��tibl�E�uSysV�7LSB��it��ript���v��4ggr��ve�halle��m�0pab��ie�u�{so�p�RD��a��v�
��tart�`���7of��s on-dem�æ#of ���ekeeps t�Ԣ�)e�â.�� cgroup����ddi����upport��napshot�c�Wr�Cor�q���t��m�n�rs�Iun��auto�
poi��1��� �
bor�B��ns�	onal��p����y-ba�}����rol �Mc����also work�sdrop-i�plac�r�Yysv���j�/:���p overrun���_ti�lpan() fun���Q3821�PEx��.C�.�ry�<p���XML�cu���Ie�E:��-aft�dree���Iy�Ye�}d�Xru�I�Z��h��TD���m_Ex�A�Ent�gP��erC�>t�C3680���sxml2�{��develop�<oolbox�z���W�H�Jvario�^����ndard���u: ��e����flow�U��PARSE_HUGE�w0303)�Adict�pup���e��� �� cycles�M4��SQLite�Cth�W��(�ta�� �3ine. A large�bs�&�ȡ&92�N�ed�%�lete�A�!tor���H�le��sk fil�Z�^API�(�v�#�*���Tveni���e�M�x���i�
��link����t�����enjo��e��w�<�Jflexi�y����[��adm�strat�Ehass��5����f�_��er��ql��:�z�	-b�ds�� if ��l��of �n	 a�{���Jtr�|rg���ڪK�5737�b��
�L	�� B�(Bourn���� �ll��which�U�Udefault��^Alma�x���p:��heap-�{-�n��lid_��me�
_�+���}715�|A�,�[
Ab��USy��x No��On�ASN.1,�specifi�l�dX.� ITU-T �ommend�:)�����ures����D���&ui��E���/Ru�DER�yp��l90) e�"�=de��-	�	�tasn1: Out-of���}���4ETYPE_OK��1-46848��KSBA (��n��c�+Kasbah)�?�o��k��509 ce�
f����ja�CMS�i��
�<���s	����B���6���buil�"bl��S/MIME�TLS��k���G���e�
�7�ia�7629�;grub2�<ve�l��2�>
Gr��Un��Boot Load�z(GRUB)��high���figura�Ǣ5cus�Y
iz�b�:l�:�	modu�A��ch�������O�b�#
e�ke����
�'�2�
s�u���V�Mh�X
wa�����: B�\
���_f��
_�1�_glyph�g
�Ylead��o�wr�x��po��#�bypas�[
260�d��H�l�yed�Vs�W�\�V�_�p��uni��sequ���7�O�vSSL�{�hki���
�<����s Lay���:)�!��c��(�;)�tocol���a�%ll-���?gene�I-pur��e�uyptography��ko���?
: r�:b�r�H����&���Q���tt�d�JRSA De���:�
����Idou����&c�8�\PEM_��_bio_ex�D450�D�c-�Gfol��CBIO_new_NDEF�@3-�85�@in�_	�e��
��d2i_PKCS7���M6�MNULL�B�\a�D�(p��ic�my�E7�EX.400��S�.�u�D��G� N�
�L8Ւdu�Ԥ��F���J4�2��

Bug�HMAC�[��s�
l��je�b
���s < 112�
t�r��a��d�,��xFIPS�ue�Z#214����I�,���n��a ��
mum�1�-�����PBKDF2�X��stun��,um���) a�l��me��y��p���TCP�5n�����a�����h�f	�p8�ɭ8SHAKE��diges�p�-OAEP�>�g10�g�SS�VP�La�g
���5�a���p��siz���h��
���,ٙ2�� �Ua�I�79.31��d��m5�o-224,�38�512��P�56����es���
�YDRBGs��
5-16��7ު�áQ���欘�h�v9���e�^2048�_��EVP��EY_�
��u�w��517����9.1 N��\[0912] - �6or:���93:�it��en��e routi�::��n�	����gi�Flon����P�
��bmca�7��	��l�oca.so.4 (��3.���9�m��Hche��um�need�3pd��6584�
���*�O�o�c�a�!,����y�op�{ng�_���E���Pl2���(��m�J_sdu�2��net/blueto�U/�'��.c�
56��gs���%	do_p�B_d�vec���skip_spa�4378�QŹ�Q__nfs42_ssc_����fs/n�4�c���Co��mo��D��D���	�~9�~Net�N���vul���1ft�by�J
�)py_vla�1�[��7�Qi2c-�t�iv���287���W� 9.0: LTP T����+��8 a�k14 �S�hir�dapi�FPl���8280+�|3308��d1 ��� NMI watchdog's���
��	LPM����5�FMDSERVER�F:�:dp������1�*�&������K�
oa�$127�Rqla2xx�VMe-FC:  WARNING: CPU: 0 PID: 124072��xs/scsi/�=�_�c:70�S_�ɹ�ne_�tn��+0x25/0x30 [�#]���X��Re�on: K�n���L��vo T4�+�cAH40 USB-C��k����V327�Sc��
r U�+a��l�2)�.79�E�4, Nx_Gzip: n��ot�� c������decr�I
��y�š�un�(�ur���7b��lpa�
�D�. (FW10�/ DL�����
�MSFT, MANA��ET P�G��-9:�� race�.��"CQ�:�n��_ip�W�Rfix�b5�0��z�vPCI�W������
�Vi-MSI�B459�BÕVM�ploy�# F�gs��R��~�F93���'��' �{�5w�o�Zim��3#K�bs390x g�L881���.�R���H�3sync�Wup��am v6.0�K6134�1CEE�phf�#�'��i���?���ORIP�I��:n��s_��q_un��ef�8��]�p41����6�:��Ц2535�py�3��$tup�"s��a co�"�g��en�� s�P�B��Xbu�t�&" a��t����7�^�N��Np���:��*����d(ReDoS��`_i�!x.p�L$089��G��
�7�t�%
�ac��!b�^-or��e�	g���3gu�p���e�#�'�Il�	�ex���,�y��l�� dynam�J����d���l.���#��f�	t�0�q
�#�X�C�8�$�9o�/ w�޴��O�}����7�#via �f�V��IDNA��o���8506�4#�C�&�����
k��
e�V�&-��dump�1	re���/fs.su�6������4���xd�{
���f��a����a l�9����%5���%ua����	��ua���"���V�-we�� �V�>e���Lua��Yfr�t���d�#,��%-a�7�k��ua�����|s�
nd�d&Es�;��1�,9�4�<�1�_��um��ldo.c�Sa �H�?f�w���l�d35���7Vi�"Vi IM�0ed��n�j
d��� ��vi �	
o��$vim:�����$�5ret�#�qu�}XCh�eGC(�{��702�k'��GNU tar�f�save�K
p�ai�"in�~�v��O�fro��!�z�j:�$�V���C_he����¹���g!�y���t�8�O)�	!nut�
�5�3���"Gnu�%���J��	i�^gor�ms��p�\�ch�&��,����D��"����s��-ch�D1l���(�Y���a�4�+3��
��CCM��g��kb�,mi�L�f���s�9�3����j�5�)*�	ac��cmdl�[�q]: E����� �	i��z�Y���le ��s�1elf�� i��r�;0�cC�2��vo���v �qun_�_�&�#�!�ALSA: pc�rMo�:rwsem �!
s�
	n�4tl_��4� ��<v��
UA� 6����u�Bsoft�Tup��TC�r���-to-��� a��26�/�P9�- zfc�+�\mi��� �Bs�n�Mus�t�6t�!��278�&1���}
_v2�_e�U7e�O�3"�
/��er��s��#��pu�1
f�y�s
sk�Sa�Ius�r��
o�쵠�37����%�dd����%�Qi�^�x���_-rt�bug:�]�&circ���R����
��u��(&n->��_�%->&p->����wai��860�C��S���.s�_�@bal����!��3��� di�_� �}+�1��!�/k�@)��� �]��'�*#��k�
�K�+�1gpio���D8se��t���
I��h�R/�*�	�E5���9 ��orvs���'swiotlb ���$	�in��fiden�L��`7���>E�((�IBM �] FEAT�b��EQETH�g���n��	���e.�'�l��6�%��l�_ SPR�AMX: I��n�f�%�D���O8�5��c�V:�������+���1�y��d�D�F�5�
��0�D�����HTTP, F��eLDAP� �}:�0�{�
������239�&�
�]�FUSE�����A-pr��<l�d���K�s esca���h
8�{��Fi��_id���Eagle��/�3����~�?����>�pped�robu�7��,x�Y�
pth�)m��()�_�`)Samb�n�#-s�3c�P�7���N�!Me�>B�=	(SMB�
+��aC��A�n�2F�l
S�-(CIF�I+�$
�j PC-�Dmach�m#����u,�]�Z���P�������?C4/�M(-MD5�k!Log���1��6
�dak�b�3�
���	�2��UG�[#��#��(���$�_�C�)�$4289��-ul�|
�r�n��ULP�T�,4���"	�TD���y�j�l�Gecu��beyond��con���(	�Anch�Z1��/34�[�p c���.�,F�,PUT_VSCREE�
FO ��tl�z�@% OOB��/�/*�Z3365�	�M
�������!tty�_��s�A146� �F�,�d-kvm_mmu_�-pc�gva�F78� �~�
p�| _���-1�`�/1�>�=�W88��nV���:IBPB��9�O�� � �1S�vr���"��y11�G�%:�m%���"_��C�+�/���D�	�D�xfrm�&be_�
s����/���n0�Io��%��Wib_nh_m�I!���
ipv4/�!s�tic��34��Ȩhu�
l�Yo_�R� mm/��'2�����>�{6_re��/o�<��5��
���s���-3�����_af�;���'�P��
��opt�K�
�K�I�G�{�/�Nű�(cv_acl�L�P��(6�*�
����0�Q_pt��Sgup.c�+�uso�k�e�uy�\2�X�]��~��8v�<re�&�:��:_�f�Q��B%�7�2brcmf��<���fla�_���+��A�x�UD��?spl��2MB_gtt_����I�	gvt_dma�p_���n��f70�pt��	���>�8ra�Gal�'is��$�Y�|+�l2tp��E	��o����:_�i�
ό�d�gigm��i�Y��_mc_�]�y�	�x�o�,��i�	�
2-�qG�����
�6��
IMA�,15��usb_8�~_�~_xm�2������/�&��*�
2��Jn��I��:-nd���ro��>����T/KB��X�4���374�Hn�&m�n��_r� ���gm� ��^VM_PFNMAP �/s���
�(�oB�91�¢flush�5	�:mis�I�	�7K�nV�_P�MPTED�m�{�o���M����t�8���vl��dfg8�<1_��_n��0
�	���416�**�f�
to���
on_vma�re���G270���]ss_����(wirel�/�1��	72�"B�9���
��C���j��_�(�[���^&�beaco��)��n��	P2P-�P:�H�Ģ���/
�n-�r�47�	�tr��c���!�C�j
�H��*9�Hraw�Rp��_�p�f�@�39����9q�_g�6�D�290�G�!0��7hostn�/7i�t/�=s���q�3-119�{���Tc���e�63�Q
�A�$���@s:�Ҥ��j��c�%�Ti�E
l�BE, se��.R���Aes �Aed�Z�	R�-�"����at��C�*�;�%t�; �;��(�)�&�!��=͔:�A�J$�����J�/�C/shm�sym�`F��119�51�\��I�1�Y��cha�+��i�xok�]-�P�,
5�L�QU�C�a-gge�b���!��x�>n��J� n�35�P�>�fw�R	��J����e&�aT�N�B�
�Q�Nfirm��`�n:�� ad�>)�<��/etc/�&/� f�k
.c���[��5�Z�0�53r�~Tty�����B3�21�-@2�-@�AnD��/Ho�9C��E�~P�(DHCP�H�����"�u�����IP��
��e��i�twn�c�t�j��K�V���������a���cas�~�gFdhcp����y ��-ISC �����*i�q��en��F�N��.�����h�o��@c�@�
����R+ry�i�p�;��Dd���Z�29��b�����(�"�{@��s����E�Ih��*b�[u�!�(a� r�6�J,:� (4.17.5)�#3199���	���&�'_rnd�Yan����g�a2�9ct����Jom�'���"5�<�IU��& C��L Cip���+NID_un�:%�����~��rI�358�@����7/p��2���?(��Esev���f�St ���K�����/,�1io�eISO 9660 CD-ROM���.���i�`no����bsd�0�,���m2��a�3b�J	�v�,.��;�񤄦�pop�U(�3k�C"����7�	�R�L��$_��� '�9��Aberos�I��T+he���������i�(�s�qy��Sy e�/nat�~�
p���
�U�5�J�
�/�Ji�vP���ҩ�r8�
�?s���p����ea�����T:�Wp�{" �*��t�U%�(�"�#��0�w>ce��(KDC)�7�krb5 (1.20.1�0163�b�[���8�� a���FR�����	S4U2P��V0-�x*4�=��/��/9�5����
�_/�C�
H�
�	�
�
�BL� �FHb��f�Z?UNIX������m'��h��e��0����nec�L�����i�!���D���
h:�=�WS�� ��n��$(����_�B()�'���J��3�O13�-c�F�;�
 ��d�p������7�-7�-ar��b��
�a�Hh��\s DNS��om���U�i) �s����s ��Vol��k�a�v�~�H-��a UDP ��M��F�~3206���F��
��%rl�T.�ae�� J�n�D���43�^�KP�-�kB�$l���&c�� �6�{_r��6�[[�$��
x��u��~u�_�gv�GZy�nX�Zpo�
�_��/�\I�#�\�A�i�f�a��sil��
�o�<�a5�aC�Y�8�@B�;F��?�I[I��V�
-�0-AES-XTS�	�64�xV ARM�Y12�_/�$�4��W�W�4�2on�c�{�N�a�>��@�9586����W�
�y�eXor�dX�
RX�i4�i�@�L	��G�@o �J�Z�n�6IV�Ss�l\�N�V�C��d��
����/���I?s�a?-��9��z��@`��`��`��_�lg�C��l�!+fip�(�F_�F�f�s�_$��X�B����
�
�e���Z (��+?�M��@VE)�
��o)9���Y��
�o()���DHX�,�r3�v��^&�r�FEC��__�O0�(��R���__�"�r�gLe_�+���
��pairwi�o�=uc�-4�
������r�Z�L��DH�T���O�galway�Z���^l��lb�=2�A�b��;pkcs5 ��j�}�>�B1��1�B�b>��GEM�B�D�&,�W�V>�=it�ci�ǥP�4�����q/_�'�j�t�>��s�m���as�5�d�P%�x9�>��d �>�7re���[i�&7��[���_�= CIPHERS�bA��H���9�,396�r�[�Z����
_�YA_��c�D��{�WP�VD�H@E�IC�2�e4�FC�[5�.n�����]p�FWb��4�m
�/1�
<6�*
23�.K���2��n�~��zed�� �qV�j��0�$���5�k�'��rFS��-�H1�5�H�[�	"��gi�:6�_sl��_�)_xf�I�N9�N�H�8o_�+g�I5������2�y8�	�%	�qAQ�lA��=- (���D�g=768�RPL-P IOTG/�
S�
:�D��c���85��a�g�����:��to�-R�*�kPT�l���'�!��172�j��BUG�iwlmvm��fi�0�Q��"h��F67�6�bC 9�yqck��.�G��9�m/7a0a36�f2fd6�wa54a��f�hc8�Ae9b [��9��9Fix�Q�l0un��He�}re�kvmc�1Y�	�t1”blk�
nvme/047��a���E����S��l��7O�hif��a�r�+��es��r��&�7�y�3l��
J2 h�
s�`70����[�F]: t�& ��Ri�颲:1778��e�M�\�Q�e��o�$���
<�pE�� �*5���9�7e�U=��E�J�5934���2.��w�8:�los��@&�occ�ձ��:�wcach�h9234�wd�zwdt�^�67��,Munexpectedly (BZ#2192585)
* ice: high CPU usage with GNSS or ptp4l�5203154�5AlmaLinux 9 "smpboot: Scheduler frequency invarianc�Vent wobbly, disabling!" on nohz_full��s aft�Elong run�}78�}Dyi�percpu kworkers cause issues�Risola��Q[a��l��-9]�P229�PFJ9.2 Bug: [REG] NFS��finite��op of COMMIT�g��and�$4ERR_DELAY reply.�Y33�^��f erro��- "ev�syntax�: 'unc_p_delayed_c_st��_abort_core5'" b'_ value too big for�mat, maximum�� 255'��7471�: Inv�d charac�fdet� by rpmins�,�� Documen��ion/transl�s/zh_CN/process/magic-number.rst��8242��cifs: backp�� sm�Cpat�0s�� br��u��lose�9.1�0�1commit aea02fc40a7f�Tfix wro�>nlock bef�4��turn��om�)_tree�Onn�ܥ�904����x86_64, kdump 2��^nel���r��om�Gpanic�g"kvm-08-g�wt25.hv2"�_10614)The "l�'" utility��a text��le��ows��that��sembl�"m��", bu��ll�# us�� move�wards��t�f�Mas�k��s�!�. Si����do�]no�kad�8��ire�Fput�E��tartup, i�so�s �� quick���n�(dinary��edit��.

Secur��Fix(es):
�m��: cr��d data�Tn��ul�w�� -R"������� ANSI escape s�a��s�S��ơ(m���CVE-2022-46663)

F�0����ail��bout�5s���=(s), �-lud�t� imp�+,��CV�s���
cknowledg�$s,�o�/r���{�D���3,�f�㤩���Cg�m lis�,�R�&��c�:.Samba�5�kpen-sourc��le����AServ�iM�E��B�(SMB) ��toco��+��C�a�AInt��t��l�Hy��m�LIFS�;, which�� PC-��p��b�1machin��s�b���p��t���%�ou����-s���\MB2�0cke��ign��i��e�Dc��when����$= ���d"�0set�3-3347�

��1�otrus���hip�twee�Gis �5s�5�
��m����ai�:ail�y��23600)Libe�Cf��7�flex���H�igura�libr�o��rs�!man��key=���2���/. I�s� snippets��dif�t�	r�ories�ibuilds��f��K�Bit����:�ck-base�X�r ov���in��_�Q()��7/get��>t�.c�x22652��h��xml2��d��lop���lbox�=vi»��XML�knd����u: NULL�nr������
ma�1upCo�jxTy�4�848��
�IHash��o�	mpty�Mc��ys��n't�*	�`�i��946�I
��python-�s�`�p����a�
����de�aed�ake HTTP �9easy�
�e��t: Uni�2d�\leak��Proxy-Au�)riz�4h�r����2681�����{s�9e�1�}������]
�vow�a���R����G
��s��s�
��, F��eLDAP���}�ZDN�$dc�� m���y�³$Im�fp�C��	fica�[
V����32��V��POST-�-PUT�����6�R�o���|�3��!,����!any��d����s�	���E: ipvlan: �%-of-�-nds�T
��U�u�(ea�W	kb->cb�v�G
)�Ocls_�er�S�[l_�	_gen�_opt�5�P5788�QKVM:�
/mmu: ���e��N�_�f_fa�E�N�58��N��u�	�B
po�
�Cdo_prli�t���:/�P��0�[�YS�:��v2�
T m��g��cbl�L�<199�<�O�SSH��	�a��sup���La �,����, UNIX��s�vlar���
�e��	����������bo���!��cli��_���^
ssh:��mot�bd�x�*�m�-ag�MPKCS#11����840��D-Bu������Zsen��m�^s�Xappl����d���:���I-w���B�O�urv���a�sp����-logi���,���4��ac����d�W:�-dae��:�X�P����ure�4a ����c������=��dri�^��{b��l�ed�49�
subscrip�-�
r��grams����
�u�#��
�U�4y��Bos���;�o�e�t�R p����5ɷ: �d�e
�ya�J
of�b.�k.RHSM1 �� f�t��Oal��y�\�
9�
�!��in��!UP�!�����p�*��r����p
p��I���(throu���-Get-��Y����dm�t����P���������l 64���It����h�w�����	BIO�Ext�/�Firm�7�D�0(EFI),�Xp�4o�����?/DMI��.�is�stypi�ny�t���}��uf���r,����nam�zse�nl�^,�����g�Z�tag,�(���ɰ�p�n���s�;-b��o�%�
a�9�x�?63��_f�����$�	����$
��Aic�N��e��hw��md: Cross-P��'L�'�40593�4�Vfo����Yha�y��	up���� ��r �yt�m�t:��(5.14.0)�
�UAF��nf�>s�	�
�0�kup_glob�G�gg�y	�0h�bl���
d��nonym�Es�0�Xb���3��n�t�7nf_���o�;�Hin��a�� �
c��a�� �h�jNFT_MSG_NEWRULE�x61�x/s�K�Jw�pon���(b�ploit��s �8�c��
��cf_c��in�A f��776�����nf�7���i��e�	re���i��pipapo_���j4004�
\_newrul�d�]a �� �BA_�<_CHAIN_ID�\�Ű�y1���y���3�īݶibyid�1248�O�"��-�a�Ybyte�)er_e�4��001�Vs�e/r�����MSRs���S3��
s��*���Q163���&��bypass�`��d������e�S�a��� �Q110��g[�6	9.3 BU�5"[SPR][EM�FHF] ACPI:�1����w�5up�+ 802��[D��"�TM��!�!���j"��WD19TBS��S��wi�'VGA/DVI���-C��ng�s�j���rtmu��H�M�B��i�bwok�����)ue��in �"�3_adj�a_p��1���*21��
AWS ARM�gs�+�D�Mic��hif��2���s3��!.x�adat��
SEV-SNP �|!��>��L��U# ��u���
ne��� b�)��blk��ush_�m��562�<bpf_ji��$�
��g�-�dpy_�6��7�1�;69�o"��ep�c�j�cmsgr2��"fram�
����ng���	ck�707�Tem�����D�i���FIP�$teg�S�U��ould�=zeroiz�6�7%�]76��I�\���avf�g�ơeJu��Ӧ1815��i40e/�	]��$C�!�m�AMAC/�mi�41e:b7:e2:02:b1:aa/0��ifn��X4f0 ��0��� t��il�ava�:ble����lv�	ve�--sp�rca�I,�
��
�s ��hu��H48����%: ���5	�`un�
PMU�s3017��NVIDIA�G�: Ba��$i2c: ���� ��$�� d�#�fw��S483�S�nPEC���%MBUS�� ��X�*[Hy�kV][�i]in��le�6fc_���m��in �vsc�,s�{
��O�Aim��&���K3�&��K�"
�A o��CONFIG_CRYPTO_STATS���@(e�����$is�0h�j(��185�,�ק�Ex�	�Shv_�������b�wsrb�'�E
 SRB��US_INTERNAL_�(OR  (0x��
�{9�N
�z-�}'WARNING�'���&al�)d�'!�A�H��drm/as�b
��
��)���t6.4�M3��Lenov�a'��]  �&��&��M#echo c > ��'�rq-�x".�\70�h�f)bz20��69�/��/��ral�;(reg-suit�
�)aarch� (�s[pid]/w��
�)'��d392�eE����(�FEAT] �,*�*��_p���n�<HWP IO ��*s�3��,�l��7����Y- New MB�,AMP�*� C�~��Maya���}+a��o�d)�X896�X���ZMDRA��
- U��������k
�G�e	���� Add����5��-�+����1����#�r'��w�"�4���IX.1��t	er�� 6)�[a��15 �M�ie�	�!�&�����Ov�k#_�_��dup�G260�3�>Me�o
y��
��p�!�#c�t�E�
6�
�g�����p C�(�/�ʬ��%��;),�Am���%m)�ڢi���� �s� (nscd)�y m�ip�,�Ho��� With��se�q����c�����
l�$�):��%ld.��*�a��o�v�ge�*l��i91�0�QS�$
�H�Ug�Qddr��no-a����K527�Kp�i
���u��P�r806�Baih_i��@��P�[$����pre�3,��v��obj�1-�zn�Q��m��l��u�p�*���u��*cl�T�ex���Q
,�y�Y1l�% dy�ic��,�
����ng. ����|�?y��ll�C����.�Aw����W�%: TLS�M��ke��0217�&c�h%a�&p��*��SOCKS5�pxy���q85��Sc��i�j����n�u��8�X���nghttp2�������,��0T�
�pP��"�� 2 (��/2�_/�{C���,������web�?�vul�3�
t�dDDoS�1�_(Rap�LRes�L���448���#C ����s�u����s���.����
mar�F�3�Tf�%��.�M3��Bcrypt�ph��3�4�z���$i�I�<uth�Cc��ma��ԢI��7igita�d�E+a�W���$��7��Q4��
kcs�]rdos_�_�*� rc_����
97�0Ad�(�G�m
s:�Ҥ��j�ߤ%�Ti�;le�F�7��R� No�m�Wked���b�;t�G�Ua c�L�]of�)�q��Zma��0���(� ��in�K���0��� 'ar,�, g��f,��
, nm�������an�T��a�Lf,��z��.�p���m
2lin�] ���
�/�l)_bfd_�t_ge��ymbol���[_�������)����)2��:�>��r��:�;.ac�4��rol�2so�e��(R) PROS�?Wi��)WiFi�+276�;�A\40964�\�,��me��ism��a63�<ʾ�9v�R/in�]3�1�]�2R�D;A��.Pre�3���{�"����;���v056�H�807�
���'�
��n2�#�����=��dAc�C�*.�/�!��@/�@.�/3424�o4�m�6�x�o?�~�*C��"6ty'�PyCA'��I��
�������i����Ci��b�v��6�|:����via���2��	�l2393�Be��A-�'C��%�Goo�>!�Q�B�y���[:�c�(9������=_�'	_me�3��8468�<�G����%��2�9>�?�4��s��2��6te�C�
�]�
���-GNOME���s?�kF��y�n �#g���������<�0c��ms�
@�,���#: GVa�G�af�$-�e�
�t��*�\�"��i�'����&�=9��	�Wg_v�X�'swa���(t��4&��ime���	n�9�Y �
�)26�i��de�-� ����Dm� �E'�'�[��Y6�AK�7(-���-����#�M�n
�zword�[��(���,��X�4�Tuser�|g�+2p��
oun�:�º�E�1"��
�yl�Z��'�d(1)�Q�Y46�B*
c-ar����@f�Fa�eKch�J�sDN�D��DN��) �.�4��re�@Lv�{API.�6
/��(1.1�#)�A#103�!���3���2%_s�q
��()�+mis�y�?�K(�^90�
�aB�aUnd�2in ��_���
��)�311�2�D��)�Fic�p;�0Kn��J�#�f�����IDs�Q�&�Q��oToo�.���CARES_RANDOM_FI�T/���R*�)mpi�F�\�	�:��|�=��I�,���
	� >�(	��0�	to�.�=�^<�)���m� re�~H��palg�2hm�G,�6�/166���Z�8:�i�}i�n_�T_���	28�Q!�}z��!�4���3.9 (�.18�7����: �1P��K�Ky�65�c�E�07�$5�*=�$	g��R���?GNU M�r"��&arbit�
p���� a�e��s,�����s��C���};�ff�#�����o���)���H��4l�0�	�B�OR�C�s1-4�^7�=A�ӎR�4@s�,(4�:.6�<1�x1�i�s��Ro�<I�I*in��� AUTH�1AP���z5��@i��Xi�dssvc RP�I#�+��s�*li�%�'��D6�K���n�wK�L˜�#��	-s�u���0;�;�E�=��D�)G��d��g�(�[ea�4��n�� ��0��6�753�դCTELNET�q4IAC �)�43�4SF��P��~��%���9a�E1�:4�:�J����re��st�}3�=�A�tpm2-ts��%�5�=3��T�WW�bPl�H�;��
(TPM) 2.0�A��7�5��D�C�2(�����K�J�*#�����"3�TSS2_RC_D�F�74�=�pi�5�M�k������st�7%��Koft�`%�M�,.�@6n��4f��'�VP��I�x�PI�r��r����8acr�C �%�P��3��ei��"P�5I��s�Xs�a��z"���y
n���(new ����rout�<�p�`�L_-�@D�dB���hod��8�kc�Jb�e���r��o�]9�_m�2�
������u-�����fo����ic���xI��c��*�T,�'ut��0��E��8�j��
�Z�8to�>�x��:�R@a�N���;��-��va�/m��!�z��e�`�9�E6�<��]>�qos�n�R�0�/��K��i�(v�~�s��y���Eby e�Bn�
�~n�-���}c�hI�4S�6s��/�Jin une�$0��orm�"�tP�s���V�w��e�each�ֻ��ahel�fa�`�hi�p�
1y�} �#���
��bu�ce�D(KDC��Irb5: Den�^8����O�d'��un���}B���
60�`h�Pdou�=�'�� TGS�8	c�3997�A��l�LQ���a �"����T�R��#�wp�P��,�XZ�,�G�g�L
�n�Vt�[,�T��F��Ovm��?��,�F��!��pwdx����:�s�A�H4��>�<GAvahi�.�V
�	S�4Di�0v�\� �#7c��B�#��#�;^i��$Z��.�{UN�Qi�n�@�&Xat���dd�do���Q�. ���~�	-aw�	��%�m����I��u������mnd,�R9���,��	�peo�8to���
���n�����<��[�Y�P���1a�����3-���l-�6Yy-�8������%l�T/�6/�C�bY/so�g�P1��SH�ir��
�Y�L�_�6os�g �!_�Z�,Ms�uj�D�&�do ��HEly-�˺�?�>s5�D��®�K
�=shed�	D��W�198�=�	���jsmbd��	 �}4to�&	x�i�N�C�@�Q�Qoo�f96�)�3k�6
�u�Jt�5�
d-on��n�[
�b]��?9�R"rpc�H" ��g�!��d�
�Uslee�)�76�T4D ��	�h�z)�'[c�S@l�k�l� �
��v��X����5�~���A���<o�IPIN�L(��
�Dk�_ks��P��w�]Z����6�>N�T�MK�{����#B-� (en��<l��)�T1�To�� MyE�N�4N�l������?�7r�k�^�]53���ahL�=�Gki��a�)S�L �	���	L�;(�:)�������8(�I����(a �5{-�s"��-�]Q-purp�Jy��8���gDs�=�X��8�2���IV�H.�J�53�iwT���HM��f(R�����Z5��-�����7����P�f ���,�
�
v�8,�
�/�	��d�&����{�� OCTOU�)mi��
�BX��u�^f�Bm�
�%9�1\�A�:�3��wn/ch�/�Q���\����U8�Uш����/p��o��%�e
m�v@��1��u�a�|s�:��3�R��;���ks�G��o�T"p��ע��fQPOST abilities.

Security Fix(es):

* python-urllib3: Cookie request header isn't stripped d�Gng cross-origin�1directs (CVE-2023-43804)�e�^R�Wbody no�Saft�h�E from 303� atus changes��me��d to GET�r5803)

For more details�	out the s�issue(s), includ�Ӣ impact, a CVSS sc�G�
cknowledgments�nd o�/��lat��information,�f����R�� pag�m lis�,�R�&enc��s���:.SQLite���� �9rary�-at��le��� �( database en��e. A larg��ubset of�&92�Nsuppor�}�%co�Kte�A�!tor��a s�l�isk fil�ZT��API�(design�*f�iconveni�ƫe�M�xus��pplic�s��link again�ɥ�c��enjo��e pow�<�Jflexi��y�Q��wi���admini�Q�kve hassl�V�5����a�fpara�server�"sql��:�p-buf��-o�/flow ��sess��fuzz�71���P���n�'��pre�3,�ac�g, obj�1�en�Qprogramm��l��u�p, which��dmodu��, cl���excep�%, �^y high level dynamic�� type��d���l. ����s��fa�ԩmany sy��m�nll�C�^i��as well��.v�ous�bndow�̤;�K: Pars�.error�� em��/_p��Pdr.py��a��or��value�. �(�Z �5��tup���a2704���Qgrub2 p�ua���>vide��W 2���'Gr��Unifi�TBo�>Lo�(GRUB)�Ʋ3ly�figurabl�cu��miz�b�:l�:�@��a�prch��ctur�����S�b�e�kern���
�'�%�%,�`u���V�Mhardwa��vic���: bypass��� �
wor�k�X�'fea�`�001� nutl��!�NU T�s��Lay�h�I(GnuTLS�g�C��Ecrypt�ph�Halgor�m��]ocol���6�SSL, �R��D�	����: ti�s��-���0��SA-PSK au�
nt�$�598���K�+�fix�z�+�:4-0553�:re���e�f�je�T	���d�7ibu��tru��J67�FNet�/k�S��i�"(NS� �k	�.	����s��a�
p������elop���m�c-en�nd��i����j a�	�@ns��vulne����Min�?a�L�"�Tk�?6135�sudo���ta�1�ut�
����ows�
�
�to�=�	�Fusers��Qpermis�y�,ex� te
priv��g��omm��s,�o�X�C�	�^� ���purpo���

hav�]o�g��a����Bug��REn��c�H(��8487�: S�do��T
escape�'rol���	��in�0re���utp���S6�S��m����N42465�NT���C��u��	�,Reg���St�� V�|��s��OpenSC��/���
�������i��sm�G	c�ws.�Tfocuse�"n� ��B�oper���z���ir���q��, ��	�ТI��#d�/tal �Z����������s�z�j�=�k
�c PKCS#1�.d���M92�lugg�A�4M�O (PAM)��a����Aup�lpo��A�Ine����o�i���@h���V
�H.  ���  *��m: Im�Ep��Host�e I�S
��in�(_acc�L� �oA�C�zB�
�1096���
���P��Linux�!,����y����o	�����K�]pf:� ��runn�@���k������w41009)�IUSB:��ia�mos7840:�	crash�h�Wume�F2244�Fcxl/����\-�-fre���t�-of-�er��co�shut�n�_50226�tu�	��	��	 ��%����s �U�*�x�1lect�Mro���	)�x: `sc�pt_��`����`�}�-��j��arbit��,s�Td��
��2336)�si�5san��z�*��`�>�_�K` ��me�J�/� cre��()`�7�p7�c�f��2�5��J�����=
��:��زs��s������HTTP, F��eLDAP���}��
��
clos���exploi�mix�ca�hlaw��6218����SH�k�	�]��#���"a numb���, UNIX��s�y����	It�e�T�I��ne�m�%�bo�����
�6sh�
��t�T�oat��
�	Bin�eP��P��(BPP)��879��
*��n�Tp���wal���j�via���me�h��
138���ki�2�>.11��1��,�We�
IBM C�N�,���4764�Ρ5��L�������X��}�G58�e�XCo���s�&(���firm�(�d)��JeS�K�M�,
l��MFC 4960�m�1S�p�L�D Exp�s2�:0863��
7�E�=z)�ߧAP A�6s��ĔF�����V3�V�K�m��also b�r��oft��#en���Jb����"
��
���s
Sl�Daem��pkc�Qotd�ge��?�c����T��SA��
v1.5 ��
�iphe�x�dMar�E�(�91�q���s����O�:��XML�cu���pe�E:�3��/s�t�ger�dd�����A
�'242�x�N�zE�w�l��n�]�~28757)�"l�C"�X���br�� ���em�H"��", b����
��Hmov�7��w��@�M��'�.�0n�ʥ���
r�qh�)tire�Fput�E��up��so���*quickl��{
�F��
����Y����: �Q��quo��p����LESSCLOSE�
�d2-�2�����)��(83�"�N���$�^"�buil��/v�Uf�"�M��him���8�st-���UEFI��C�s�0�/t������u�f�3un�(��
environ�
S���#CE��http�:��m�N���?e�b��54�o�P���Q!�E�f�o! �o!���	ify_sbat_�A
�32-�gs���r8�rO�7�nd�P$a�in�����C6�C����_��()�!l�,��PE�t
�]9�]�\��()Ġ50�B���d whe�_�MZ b��i��5�;1
�cL�cGGSM multip�$n�Cac��di����M�Vl����k�Y�U����1�, �R3���4133�6932�,9198�51�i"�779�80��{5�26582��B��"to�[BR/EDR PIN�	i�p�
d�B�9	�ka���)on�N��0�l55�<emcg��li�=���;�,)IX�
	lock�sl��#me��ha�O�2-0480��NULL���$ der����2-�,)9�6622�15�2754�6�	�257��841�4�»���i��2�_�M#_�{)�r�net/b��/�#�J
c��459���a�7�b��
f_t�@��K��e�"_new�	��604�|GC'��!���� SKB����unix_�5e�f�_��
ic()����o UAF�31�hO�\�wr�)n�f�Wroup()����l�0�5(�)ev�'�_size�u9�u�3F���CFu��#��y A���	D�tn���U24��rdma������;577�YK�;dou����ci�+n_c�Ln�k�vb���*���W846�(��: HCI: glob�
�)���sync��d86�S�b�!"e�!�pUARTSETPROTO�I�G���u� 
_tty_ioct�*3��f������H745�y�89�9��12������IP��_CMD_ADD���SWAP����U�/k�*����xl_�_�Ph�	�D�[586�Csmb:��T�9OOB�� mb2�g)���+�5��mm/s�1���V�in�a��n
->u�
�V8�
�h���C��[-�a�����(_pe�Ndic_� Ŭ52�8�F��[
�?�A�258�V���]dge:�_+�/in�-��"_�h_f�g_f�V#hƯ78�]/�:���
�OETH_P_1588 �d�P
�^�î0�Psch��f
_c�dskb����kooo ��g�61�SCIFS��	�j�De�L!�I�,Valid�yR����Co�E���V�y��f�r�W�.-_�ed_�d���&�V���t'����'����a�������so�K�C�a�	3�L�� �X�#g�����
�i1s�G4֔tx�w# ��u��՚�	lxsw��p�
ru�!l_tc�@!F����	c�C$�K�i2c�801�<b��	�_
��a�t�ha����9�}��/m�ar�7
�@���te ����.�F	n�;_�/�]60���	�) QUEUE/DROP��+t��
��s�W�local�s�%���zt�@walk�,pychunk�*617�O�/x86/lbr�R�� v��K�.�4�D���7ime�m�anonym�l����2��ip6_tun��NEXTHDR_FRAGMENT�b���,nl�*tlv��_����O3�Y# �Ad���
Ch�I5��֤��n�'�'�Xi�l��3,�W��Alma�-R� N�s ��3�w�8͒
Squ��v��/mp�@�-on��
���r�
��(�/m�6!pu�c���vfs�U���,-�W
��unv��ݡ?���)��?ut��Gdesti��R1�b1�-�]�&D�7���������ymb�&�`�Q107��'���g�HarfB��5�4�e��� Ty�+��i�7�Mh�Rb�R:�,����O(n^2) g�#�!��con����6��*�251��:�Avahi�
�DNS�>0���0v�6� M��#t�#���Zero��)�4�T�0i�6I�ac�at���dd�d�/a��n�7�_9���~�	-a��a0����|l�d.��9�4��2�R�K,�/no���,��ew�peo�to��t�0��O�٣���fi�
har�E�}-�P����a���E<�3�+�:8r�Fin�_dns_�et_ap��d_��+�e�63�q�n�O�._label�C70�Cdbus_s��h�!(�'�C1އr�
��B2�Ba�t	��Ώ�=N�exfatp�A.���s�����'n�	p�exFAT�/���k:�w�s�r�C�H��z97�<�0�H�0�un�5�"�O�Nan����Qsp��E
23���:N�*L�>
�Ak���!B�<�S�~s�M"(�:��&�g"�d"�-",�h$a�T -�Gng�%�	'-��6�"y �"�f��*�AES-SIV��&�z	�/a� ���'�5���F?gn�Zempty�oci����ent��29���~Ex��d��	nt ��c�A6DH�fys�2�y�:4� ���Oq�H�?�1�#!��G�a� �Xly�	
n�'9.42��or�e�*���!b�u?�0�.
���;8ÎPOLY1305 MAC��s�I��r��7��	P��CPC�[�9��i��")p�|���P23�;��'�V
n�#���N�=���&��A�-��-����1g��,ab��,b���
(pse�V;-)�#*�10��$�Q�$�ca�es/ntfs��%un��>c��e���
692�]�N
���\�8�AY���7���-�H
���>�n�63�š��7�0�/V�7LSB init �6���s��Igr��Olle�K�bGp�,�
����RD-Bus��i�c9���r,�泌s,�~f�;-de��2�#�b�/��keeps���^3f��e�5�fc�!��n�����,�3Hsnapsho�
��q���P�Le��=�m����ao�
�$���	��Jl���J�a����y-�J��!�ic����-��	d�-����?�8@�Yysv�����/-��olv�]U��$re�%
ns��zone�
�S%�U�n1�c(D�QCEC=ye�7008�@��erout�y�-��A���;IP�)�o��i��t�;����(���+�) �1�>���:�6lin����316�<�l
s�^!�
�>3�0�<�a9�K�45�N
�.�$�F��:��8xyC�/�Jump�Js��8�bma�����th�W�N�~�60�^R�lMi�#�-�P�[Aurn�`
��~C�� �Y)�A��%�:s�Zden�"����-�?�[t�^���O�T�q���R��Odif����4�.P��#�3L�ϣF� (ELF)�/�}s,���}F, RPM�u	��v�z3�o�1�$�\:��"����0-�/�%�!�o�unc�\�5554�@�wpa_�
����	�d�y80�_<X�+I�%�lH�;WE�@WPA��Y;IEEE�71i /��N)�W�W@E�c)���A�k<y�key�goti�'�|a�h�fo�����
i��H�T
�,a�:���ƌ��a���WLAN�
i�����P�5�b�d��B�5452160�A��8��2��8�?�x�&Q�?SSSD) �� �M����e���^t��2+d��$i�7�K�����A�����g��N�
�!S���A��Q�M�!�l�X�Q1����ha�-!�J�&+-end��=nec��-����s�k!c��sssd��/�}�l�?6GPO��a,�/in�.$��ntly�@3�wB)�_P�{��JIRA:�Q��a3*�5ss�hc�To�"�P:a�et��H�V�=816�� �I��s72�*���xml2��
�S�3box�Y���#��?�-�	��u:�7�t�?Re���5506�O�m� � 	�3��!�;n9�C��,�������4d��/�u���=�U6�743 h�.am��Ins�.�rai�r#VC�j�Uat �9�FAMD-SN-3�,�L2��`,���ffdhe*�:ti�:i�	�s.��0a2e5b909���B.fips_�Qed=1 l���@"w���9cy t��>��N�3mglru�I-u�1>�e�1M�Rcache�B92��B[EMR] [TBOOT OS] SUT �ld�1go�nS��a�s��9.2 T�OS O�>CPU ��-16 �OBUSYɄ6��$����F	����t�
- NMI���v+�E30��E�g0�:6f:00.��OPTP��	��get��C1�k2
�i�P�m/�I*��7d�h�unbin�Z�x/��/�664�$1��/�V���[�	"1�3�Oe l�
3��4�^
 ��;in���E�Ļ�s�m7���S0�R0�.�9�1p���'
�e�Om�+�N�d��gl�~N��d�4��F� �/���<����p�),�Am�R7�%m�X�i�:�J���	 (nsc��H�#��p�9$o���tW�o$se�q�����v�0����	l�"�)�_;�in ic�fd ��2�zISO�r2-CN-��1
�9��S�e��<������F33�6W�G�7 ��=��f��Oin�)
�Y��Y�2ma�rm�B0����'l��V�r�L�Z1�Zas�Ts N�0�3��	�K#n-��ZX�4�T��ng�D�g�$�	��Hyp�kK��p�O� (��Q/2�(%�{C���y�p8ONTINUATION �N9�`
oS�P18�
�4K�](�U�1K �S�8��r���+K���KOS��Q�f2��Q�'ipv6��r�{=�
����-ptr-���7��
�Ufs:���F� >���9in�_br�_�� e_�0��S89�
#����c-a���Odefi�{Y�<h�RJ��	�
3(Dom�����) �a<�����n � ���S�N�~�.�6�_�C��56�u(�8��`�HC�pi�v6�e�!��b�X��/�	��#a�(b�}�f�g#�c�3�b�=�dia�o+st���i"�7#, SE�itr�D�C#��O�7ter��-� �9m�%������:�9��E��sos�����f�J�<�
4�Qhsakm����e��=���C���EH�2+o�,���3A�'�SA)��� (�Ekfd)���qidna���*��N��sum�s�:�!�,y������L.en�L�k6��K�'�m��;��}.�B.T�o�3��;�t�OH�\3�G��zi�8�.������e)mbs�H��T4�J�
N�wc���\�.�#���m+du���E���3�e�2fl��@��63�)4
n�TF�vD5e��	�p�Ed��	�v2i�v5�lime�m�zg�/*i_�l������B�B��JAvoid���5�eJ�R_�
�{8���Y�q: q�-�B	e�E�yAER �$6��
7��Exen-�yro�����W�sG_�G_f��cycl�`73�BE�g�a���JL��f��ny�b�MM� 6�n�[�J��M�3�J���_���58��;ʨ�&�
�@3i�
n��<fs�~��5=��t���O96�O�nGns3�3M���6E�_n�Jn�'<�%�S	��d����A74�/�+�)s��>n�.��_�_�_�E�9��BUG��B�t�f�)ge�c��N���E:�16bf752f�*Gff8 [a�Tl�T�g4.z]��I4��[H�U�& ��] �zm�V���g	�u�-l���	�.ch�p���x�KQ0�x�9]�/���l�L�_de��.c:51!�\68���: DPLL-�f�cܡ71�)CNB95����Jup�uD TC��to ���P v6.�y�`�.IP�!SR:�E�$���-"�X�S�F?�TRFE] B�Ot�	�gsw��W�/�g�U8�L����D���I�����5���O����|�8��sir�zڈ59����]���/a�VF�b�� n Tx M�+O� ��9�P�MC�4 REGR�]�] �Nbo�$:�
�
�`�z10+��s��495�ybnx2x�*��"�� PCI�Y�e,�s����432�F�

�
T5urity Fix(es):

* openssh: Possible remote code execution due to a rac�ndi�in signal handling affect�	AlmaLinux(CVE-2024-6409)

For more details about the s�r��issue(s),�dclud�Q� impact,��CVSS sc�G�
cknowledgments�nd o�/r��lated�Fforma��,�f��ҢR�� pag�m lis�,�R�&ences���:.T�kernel p�v�7s��Ȥ3��!,��� of��y��wra�$sy�om.  

S�����  *�K: TIPC mess�s��assembly use-after-fre��vuln�tbil�b�36886)�ge�7net: his�/�ݡ
ns�_dsaf_misc: fix��p�;array overflow�C�/ge_srst_by_port()��1-47548ā�|ns3�c��bug�\clgevf_send_mbx_msg�V9��vt�Ome�}��lapp��when��le��chars�buf�,�Y2-48627�Yca�"j1939: prev���Madlock by�Png�Y�#_s�s_���rw�	�`3-5263�mm/vms�f�u�cal�swakeup_kswapd�[with�"wro�zone��dex�26783�s/mlx5e: Use�>�%b��i�,e�B�PTP WQ xmit submi�o�,r���oc��s ���pul��Mm��data_mapÐ85�fil�B�
f_ta�b��us�i�tamp��che�<f�Rset ��m�|�"�S�a7397�avme�Ore��n�� f���reserv�ta��l��a�#�W435��ena:���orr�[�script����ehavior�59�tcp���count_�Q_not_zero�cp_twsk_uniq�7).��904�Slib/te��hmm.c:��}rc_pfns�>d�����u���\854�Ir8169���r���I�up�O�Rra��cTx�Rets.�a��`micr��g�^eiv�c��¡cme�#lan8841�^9�
�ytproxy:���Pif IP�/s���2is��d�ɢidevic��+0�^octe�0x2��: avoid�f-by-��r�7��om��rspa�O95��blk-cgrou�'�����d�K��t��io �t�663��
Libndp������rar���Cd�NetworkMan�Pr)�E���vide�0wr�	er�$�aIPv6�4ighb�Di���.y Protocol. It�so�Dtool n�kd ���
�n�&���NDP��s.���	l��:�9�[r�����< leng�field��5564�t	l�:	-firmwa���|	��e	�B�$�ơ!��requir�various��s���	e���oR��i�'gue�s�	spons�Tm�	��+ ��*�8alize�3-31346�Comm��UNIX�(in�oS��
��UPS)�-�	
�<��*lay���',�I��similar�:�:cup�.C�d�M�*n�bit�chmod 0140777�~2���Pyth�
�� in���
�3,�a�&v��obj�1-o��	�}��g�'m��ngu�p,�ich���odu�R, cl��exce�g��!h�3�ve�D	y�ic ��	 type�Y���l. ��sup��Pt��a��m�7
����
�C��i���we��a�.��w��
ow�(p�}:���	�4�d���va�jr����,4032�'�b���k	ull�	��Ar����i�)	l.c�
����ogic�t�B�z�{e m�	l��[524�Pext4�w	��
ng�Ms�-	�=	�I�W	���5�f_try_b�:f��m
��U
7�J
bp��	�
ac�d��7
�_�
r_��
cel_a�������c3�	dm:����{um�f
ho�
�Y�suspend�K88�
�ipv6��UAF��p6_�y_��th�ify�852�USquashfs���
��n�numb����&�v��d �u�h�8�^98�^nf�
�	�����_����s����}���{
sepa��^rs��[�(s�O3�Uicmp��SNULL���|�-_build_�be�]358��b�bige�����irq�;�NAPI �~�s0�Rsto�����
shut�_nĚ8�	scsi�mf�d�ten������fc_l�
_ptp_�up���8�G�h��c��_���o�
�Ī�rx_k�p�]�,���`�;45�`��p��R�eas�ba��ef���$_�l���_þ��
24�]M�� NPIV's�Rns�	 unreg��r��to�׹�ou�c��n up�h5�*�9amd-xgb�۪�skb��aund�e�I��7��epoll:��
b�X����q��fe�Œ��0�d�E0�/ph��60��multiple�aws�6808, �7065���99��e��ci���R2�awifiԄ97Ą52�4���51ä78¤�4��4��937��941�22���r���6�igc�!5�Admae�e/idxd�,182�,��R741�����903��61�a��5ǂe���!��6sw�#�eep���$4�<ce�!91ŭp�׺�/x86�*�6�\i40�M602Ÿrt�<�k�'1�1�x���7�t7�G�V606�W5���2�5��pvl���t�a��1�!735�	ir���$��tls�48�uxl/�ođ839őbo��%9�T�]n�r�8�3���1��2�	�����7�����n	loa�����.
��
us��p�s�HTTP, F��eLDAP�>r���0/2 push h��g�-�nk�239����
-�t
�s���c��,��enh�
���x��d�	ib�~��i�=ll��5��| ������7�^�N�;��pa/���
�ia�H fun�����d_�/����\�6345�'nf���	��_rbt�skip ��
v�/
����gc�z6581�I�;t_li�:�"����figu�I�ca�X�lge�g�d6��vfio/pc�L�
� e�hINTx�s�p�	1�
����._brid�V ���	�%/xe�Ad�Ko�!�x����mp.�^90��r�m���
�}gc��q_�ͫ�ab��
�>�e25�e�%�
-�#�__�nexpr_�l�u!t�7��$c�;�b19�b�S�c:��id�Pp��e�\�H6�H��:��rm�	cas�V�@�pass�gm��tack�j415�jre�r
ce�
s�v�f!����A����a��
3��x�A�~�
��di�L"r�� ���
g������ba�$h��#on�l7�l������p��%��ec��n�O��comple�O�X��]�I96�v�a�LAG�JVF �de���Yy�Y�*_vf�00��
���� e���T�<v�;r���ҦZ�77�ty��_gsm�x� CAP_NET_ADMIN�t��h N_GSM0710 l���X���hqla2xxx���z ��&$�_edif_��^�* s�	���;$�Qnet��9�/�J�@86�Pcry�Y�lcm -��ar��me���A57�ORDMA/rx��eg����ҡ_�=_�ue_pkt�J4�c
bnxt��shif��d��[�#in�*qp�_�c_�a_hwq�a���Xx�m�(�re�� �`e ��Ot�'�l�:yt�X�-&d/raid5���&����%&ai��itself�Q�Cr MD_SB_CHANGE_PENDING�o9���\��k��#�fib6_drop_pcpu_��O��
�b�?cfg8�61�_wi�k�R���_�e��O�,�ac�O�����eee�Rs�&p�(eliv���^�[�'hug��
:�_n&#39;�5��s������6lio�O���iwl��v���8n_�^�r ��acce�� ��Y2�u�^w�Aio�\�	��
��l	�gis c���d�� c�$�l�!'�h�������$p�ۢ�mfua�	�J��[4���ܶma��%�����*�NF_HOOK����End.DX���6���5�`�4��0cra����e�de�)fs��
e�R7��'ip�@+�N)a�j'���'��do�V���)��-��tap�5_�sh�n
�'d�pa�&#�5�&41���Uun�%U�u��$S�)SOCK_RCU_FREE �zl�h*in�!_�S���/,�Q�NFSv�����*��	s4�W
�_label�N����ntb�C:��_�?�()�7�u�����__��o�f�vm�q�N-���,�:oy�xtrl�q� s�	ish��c�v�7���3���<�!����
��+poo�0�
��POST �/i�T�v:�oxy-auth�/#z��	�f�����I(d��cr���e#gi�2di�b"���1��s$c�t$�em�R��doesn'�*p�0y quo��	newl�
��0�,�U��n�h�6�a3�gKerbe�Q�i�r�g ���3�=�|�Gc��m�0�o���y�;�E�
e�)n����n�-�o��c�
	��+�s�8�s	�/�/�J��n���ed ���0,��s�Ȳ��T���
���|0e��
�G���ahelp�y� u�-thir�M	rty��#key�Mce��	(KDC)��*rb�7G����*tok���
�$��3� �Bub��2. (/usr/bin/b�)���"	�t���l
�r�-l�gd�d���
�;s�Sa �li�l���4n�,s�	�)��k.�!0�if��pa��A�+���s��0s�s�&box�����Gp���nt= (--���47�(G�40�L���l�M�� (or�	���-�����l,�tC���]��_�0�-GNOME��m�qlo�w%�����n�*rg�]t��"������ng��c�-�s�6ctur�1g��2���9��5�4�
�D8����4�]5�%�Z�C�S"f�RO���9u�/�Q�3
V�u��m
�e��*��3�afsd�`RELEASE_L�{
OWNER�����0m�[*�|�g�A���9�"�'�Vlk�S�
)�.�$eba�,�5di�*�	5�.1 wb_dir�
����g���b7��B�;*�t��<a��
��B�;k�{)s�_"�*copy�_�"�*�b��5n��:�Bddr�p�d9�h*KVM�i�Fl�cp�s�' kvm-&gt;�o�(�+svm_�Q�e�
8���"�&��� �>m�P:s�>��Cc�S �Z�see��R� �RDRAND�CoCo��V8�J%�=tlb���N:�T��&;���Nv��;��S��i��uf��F�P����do�as_i�k�spli� 7pt_a���S80�c����-o�7�.s���ops�ê8���m�ap��_�Hc�7in�&�_�'�O��xusb-s�l:a�ealaud�:C�G�\�A�l��a�O�,86���ms��$�=Ÿ9��V�c-En��Spied��6��� �N�ŗ5�+xh�H�t
e TD���Ѳ=�%st��m���O�-��=��$�[�	����
m_�'_������]/s�ɵ�����sol�8a��h�F�����7��lai��-as-LCP but a���my�Wl�e�"��V�{�#�>�Ln�0�t��<_�4_���}PCI/MSI��Dmsi��0p�@�(�6�7x�6��"��
WARN�gx�.�{�_mo��p0�00����.p�r6��g�N��ro�%��JƕRe�
t ��4;�2��I�s10�o�6<�!���N�B�%t�.�'3�J3���?�Ldou��"���pay�)$���2�[Expat�
C�z'�'par�-XML�cu����;e�H:�*<ga�� L��P�FV�wCin�2�R54�y�NI�#O�#��Wra���e�;1�;��#�-�
O�SSL���&ki�����-
�l
���o�L�]:(�:)��T�\1���(TL�:t�A)��a�g
ll-�D��ge��l-pur��e��g����W�=�~G��&�I�X.509����~'1��%v
u�-��in�_���k�W
��#���C�Grr���'t�r�b�	�'�
we�	�*y�s���3����7�dAR�9��"/�f�'�i��>�
��D��no-m��F������"�:���v��c�=�<'�K�X�K�_o��ha��vp�F��X0�Xfc���E��f�i: d���?(�%
�vma �ql�	is�����P'���
�)
��hD��l��%&��(�>��P/pf, �FH�;P�	�� v����� �_���I*�]�v%�	�~$�����V�"0_��B�86�'gpio����T�w�~
�w���_�2Ied�a:�Y�4�Y�W"f���;i���	��o�B
al�A�����&-�eC����L�;�����J�r<���$�cppc_���W�J��<�P5�O<�b 2�H�&(g����o��<�P�N�!nl�#A�=��Gc�I�U�9.�Tof ����K�+.���g�'I�'�y����%a�+��'�����o�</��<���f��&�ACPICA����
I�\�m��BAR�uHY��K����.��}!��#�_$�3E�i1�ht7�V�*�?_�@��_�4=422��',�dnr�"Re�EPERM���#�K�L	�xs_�oJ�0��Let�j��D�{ l�uqFhw:�;:IOMMU����"s��r���
�yl�$t�Qloss���F�$��
�O205���w �xn�}+��f#�t<�ASEV���k�AC�4�p�F5�+�$�
Lo�C����-��u�_n�Dl(R) At�s)R�����&����=�v-�t._�&,�	�w�x�&i�J���H�gL��C274�C-��L�`&���e����ch�r/�����4c�Q�cy��3<�s'�o;�"�p;�Fo�2�#rmm�3C�le-CPU�g:��9�	9hwm�9w83792d)�[��2�����u�b�5ry� ��K�::3�[Amp��9e�9sn�*	x����
�����������_� ��
OOB ����!_t�� �
�(���3a�Q�c�R��t�-�Om�L�2�[85��:�J���vNMI + ��#�/
f�s��xr�6$t�4���:�~=oni��T�
n��'napi�0,�95�xfrm6�
p6_d�C�ա8re��n��D�b�+��,���R��
�	55�%_�_��
�Q20���ct�R*ke c�5f��d�}�p���cTs_ht_�q"�W27��*R��n��'������ _�)��2�_��o�A!rror�Z��e�6' �	��3'�D't�:i�<ReDo�b���ve ��V�-���+'�}�T2��K�
�v�U��.
�����Na�Bran��Hi�y��(BHI��22�?���+�$�q�sto��3�J��A66�'�&���re-�)�@?tale��"��:82�d�L �aW�vg�OPag�6�
>or��K���U�p()�T�)á�75�.���6ec �I���G���Z:�n�-_�(�r�}�b��C�4���w�6�H�Jc�0h��,��r��?���W��X�(�F	��9�5�
im�(bl�����"�N��0r��U<n�+nimum�o�Lr�/i��t�Zt�=cycl�|(�|962��x�i#�kog �Y�
�dU���N�F�l���8h_��8�fI94���@inn�9��a�h�[��h�BŷUSB:���Dc-w�M�~�
�3����=�o����jV�D0�Z�T
un��T
���~�6��L�)rt6��L4�w����Odo�%�4e EA�B�"�A#����#�3��V��G��dhu���)
�-ch�?�<�_�;�&�0
�Pinf�W��o�Zcf�
r_���[8����
n��`�c�+7e�S$�__��P��l_����2�k���K�|�(c�b�_�gB�$���P1�TJ��� 6�D&�:�}�������Q�V13�V�?�k�g�2x�
���r�_�X�R�:�u���a��J�p�\��
��5�)
�/���n#�b�:�=�1?�qse�����_��O501�3G�[�!�Y
n�d/�"�lm�(s��d������t�Cp��/o�rep�����:�.v�!�avail����+���"�+�o���UE�n�]wi�s�tmob�x
br��b��(WWAN��!�PPPoE���#�:,�TVPN�g���a�Aet��0dif�Ft�+��I�d��~S��765�	�V��Ad���C�bs��֤��n���'�Xi�	, se���f �RN�3�Ye�*��C�Opit�0bb����/�2d�s��GNU/�`��Ia�*b�Vw��m.o�s����E,�in�&��gn�	��
re��
,���itr�V��9o�-��-� s�*
����vc�����2d��0�3ki���������pam��*v'�*_�nv���1��@��8�5�
'�V5M��<��/�/�e/l��e�/p�_rmt�H�Z�Fg�pi�k5sealv3�N�S�Nkdc/ndr�=2�B��'�
��'Un�ed�4gr�h����^8�[��v1.3�t5�D�UE��y�.nt�DSA����ZB�06���s���
F�v!���U��]_��A74Ɣ�-se�A�0@xt_�k��e�Z2�B55�b�?K�3�I�*��a�0ic�ZZ�9k�d'�gl�աw�	s�Z8�B���?mo�T����V��75�V:�R �,AMD�O �����Xl �= escal��[�w�� Xe�X3R�3�,6�f2�F!�Xi���PR�]�U�z'�3��¬P�N93�S��KD©��"SGX�q�e!�g��&������]�CH�-�$��&���7��4�)3�QUn�LP�M�PC��(TM) Ul��_61���Dc�mg�
�	�^s�,
�
���&��G
ic�
gori�P�t�{:�>� Marv��At�T2�7�@	Vi�o.Vi IM��%�c	�Xd�
�d�	��o�vi e��or��vi�	��p-�Td�0q��x1�G�H��w?z�Y�| fo�H�]�_���"�?�[C: ��;��,��T�
��,�p�6d��2�$,��rt ��B����|pcmc��'�
�]�	q��: ��L�HID ���s�p�[�Tk��� ���p�Us�:F�	�u�	�Z�>dio���TAVR�;I�, V�&WA�d.I��]�^C�E�hV�!3-�7y4�&��ph�+Vboo�Bp������|�)1�{�tOBEX�D�m ��a����`4�`a�L��avrcp�s��S�&�Sd���2z2�ze�]�,{�23-51589)
  * bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability (CVE-20�n0�nAVRCP stack-based buffer overflow�gmote code execu�l�a44431�aphone book access profile heap�2t5�0�`t2��

For mo�udetails ab�� the s�Dr�6issue(s),��cluding� impact, a CVSS sc�G, ��nowledgments�nd o�/r��late�,���to�R�� pag�m �6�,�R�&en����:.  

Addi�al Changes:��֤��n �c�'�Xi��le�R,�We�jAlmaLinux�t� N�Zs��nk�NfromΒ
T�pyt��-dns p��ϩ�n����8�lib�wdul�rat�Kle�0�NDNS cli�
�<a��2s�3defin�Zer�Z symbolic�k��Ju�)y�P��uch as�}typ��class�d�op�=�VS��Fix(es)�T���&��:�~ni��of��rvice ��tub�Qsolv���p29483�Fptpm2-tool�ps�5�(set���
l���f�an�"�-�+�z��f Tru�P�;�� M��(TPM) 2.0���s��us�Ms�v�9���'rbitrary qu�data��y go �et�ݴ��5_check�)�Q4�Q038)�Zpcr��l� va�R �snot�m��Wwith�P�e��T�CGNU nano����mall�fr��dl��ext e��or�H�E: runn�p`ch�`�K�own`�̢��2nam��l�!s �sicious���Zreplac�ݹrg��y�7�#a�3�^��6a roo��wn���-�A5742�B@Bubblewrap (/usr/bin/b�)�S�%�eng���unpriv��g�e�er�Eworks��,ui�vin��Ckerne������7�R��s��f��pak�
��	���+s�
sid���box��app���p����nt= (--�)�c4247�d
P�H��n�(terpre�4,�a�'v��obj�2-o�(�R�gramm��l�qu�q, whi����es�(	, ���excep�y��y high level dy���9	��	�	���l. ��support��t�}a�թ�Uy�%��m c�r�C��	��i��a�He��.v��Wwindow�̤;�U�}	c�tar�V:�cDos via��ss�< b��tr��_�"le �
�
h�
���!s�\623�[�	Comm��UNIX Pr����S��(CUPS)�Kvi�/a ��ab� �*lay����,�I��simila�~
p���,��cup�F�ppd: �
mm�Sinj�����/��rol�o����PPD�v�Kerberos��net� au�0��c�\�\��c�.m���V���
your�E�?
elim��t��n�-���_��n�p�*�8ds�V�/�J��un��ryp�Ѣ�. It�Z�
���

�]o��e�ea���H�
help���x�x�<rd��ty,�"�#key�)�X�ce� (KDC)��re��diu����g��c�3596�RExp�Qs���y���XML docu���6�>e�N: �DoS���C_Res�CP��r�
060�B�	�T�<	�4��	�!���	������l�K:�t�x��p: In�
a����eld�d
dump�å(��422�m�Si�euf�uRequi��ri�������a�l_inv�pda���	�]6824�]mptcp�|m:�� uaf��__ti�U_d��
�Jsync�F58�&

Zerion Mini Shell 1.0