����qt5-qtbase-common-5.15.9-10.el9_4����>� M Mv�������� ĉJ4!!�%j�o�Lne)Ip-Bm5 ']f�H&releng@rockylinux.org p-Bm5 ']q��h�X�s�U�J7y<�NKa+������Ŝ�����F�;�������BR�8��:�� ���5N�s����_G;��f�� ��\H���<�k0Y�^S�� ��i]�n��T%�@ Q.G�VL���9�QȓD�5�����x�ݦ5��~e�4M3-d�TG�q�%��&y�o��0v��uG��F�V�C��n��\ݺ�\��a���LT3W���g�YJ������P��8����#*4�r��,��D��4v��(m����i���P%[ y��"�a F �A8)��/\#�z)�{��3�r�zUeXS�V5 2s)�Ч�$ĹbM������-#zդ�L�" ��֋Ci�g�mu-'v]����g���"m�:Ñ�.V!��$��a�h ��gh�H&V��1F !}��{���}s &�)��0 z�(�?L)�]߽����2� �R�e����6�$M�ǃL�O�7YK��|�h�E��T95�qd쳛�[�ث߯��e�feb2f5dd104d72e5538ab6b531043ace339a2c1d0405b558b5faa069b8c899f1e5bf2fcdf96f32dee9861f83f4ccdbfd80b6cd97-l��c-9�� �5�d>�������= �? �d���� $� 9�P�T����������� ,�8�O�U\` b d h � ������� |(�8� 9� :� B�G�H�I�X�Y�Z�[ \ 0] 4^ Fb ]d �e �f �l �t �u �v �� �� � � H� LCqt5-qtbase-common5.15.910.el9_4Common files for Qt5Common files for Qt5.f�=�pb-a1508cb0-f227-48b7-ba97-2dd7d4b6fe9b-b-x86-64NRocky Linux 9.4Rocky Enterprise Software FoundationLGPLv2 with exceptions or GPLv3 with exceptionsRocky Linux Build System (Peridot) Unspecifiedhttp://qt-project.org/linuxnoarchN��f�A�1e4ff576b5870e255a54b4357a307f01446dab075b51ef800f405225384930adrootrootqt5-qtbase-5.15.9-10.el9_4.src.rpm����qt5-qtbase-common    qt5-qtbaserpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)5.15.9-10.el9_43.0.4-14.6.0-14.0-15.4.18-14.16.1.3f��@e�N@e���d�s@d�@d�dm�@dI@dG��d=4�Jan Grulich - 5.15.9-10Jan Grulich - 5.15.9-9Jan Grulich - 5.15.9-8Jan Grulich - 5.15.9-7Jan Grulich - 5.15.9-6Jan Grulich - 5.15.9-5Jan Grulich - 5.15.9-4Jan Grulich - 5.15.9-3Jan Grulich - 5.15.9-2Jan Grulich - 5.15.9-1- HTTP2: Delay any communication until encrypted() can be responded to Resolves: RHEL-46348- Fix CVE-2024-25580: potential buffer overflow when reading KTX images Resolves: RHEL-25726- Fix incorrect integer overflow check in HTTP2 implementation Resolves: RHEL-20239- Fix infinite loops in QXmlStreamReader (CVE-2023-38197) Resolves: bz#2222771- Don't allow remote attacker to bypass security restrictions caused by flaw in certificate validation (CVE-2023-34410) (version #2) Resolves: bz#2212754- Don't allow remote attacker to bypass security restrictions caused by flaw in certificate validation (CVE-2023-34410) Resolves: bz#2212754- Fix specific overflow in qtextlayout - Fix incorrect parsing of the strict-transport-security (HSTS) header - Fix buffer over-read via a crafted reply from a DNS server Resolves: bz#2209492- Rebuild (elfutils#2188064) Resolves: bz#2175727- Disable tests failing in gating Resolves: bz#2175727- 5.15.9 + sync with Fedora Resolves: bz#2175727qt5-qtbase-ibaseqt5-qtbase-tdsqt5-qtquick1qt5-qtquick1-devel5.15.9-10.el9_45.15.9-10.el9_45.15.9-10.el9_45.9.05.9.0macros.qt5-qtbase/usr/lib/rpm/macros.d/-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19x86_64-redhat-linux-gnuASCII textutf-8d0c781febba2f2ac56c1feda04d30a1fb5da70bab136a74230e8bd8f173e4068b7a70519f03ef9b08c858680046d1db70b467edbe1ee10549fc1297ef204cce1?���0(�/�h���pi`�ֈY�!�Do�!�MJj�r��oI��)%�`( ��g6�k�l��>��7C���*G�8� �.ufi��`�"��_��*�0�څ�p��������O<� P��.B�����s�3&��)�}���s� Q�c/g